<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cc="http://web.resource.org/cc/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" version="2.0">

  <channel>
    <atom:link href="https://rss.libsyn.com/shows/43394/destinations/136543.xml" rel="self" type="application/rss+xml"/>
    <title>Excelsior Life</title>
    <pubDate>Sat, 13 Dec 2025 12:01:01 +0000</pubDate>
    <lastBuildDate>Sat, 13 Dec 2025 12:01:01 +0000</lastBuildDate>
    <generator>Libsyn RSSgen 1.0</generator>
    <link>http://excelsiorlife.libsyn.com</link>
    <language/>
    <copyright>Copyright 2013 Excelsior College</copyright>
    <docs>http://excelsiorlife.libsyn.com</docs>
    <itunes:summary>"Excelsior Life: Distance EDU on Demand" showcases the people, events, and programs that make Excelsior a vibrant community. Ranging from behind-the-scenes looks at faculty research to the passionate pursuits of staff and achievements of graduates, "Excelsior Life: Distance EDU on Demand" is the insider's source for all things Excelsior, whether across campus or around the world. </itunes:summary>
    <image>
      <url>https://static.libsyn.com/p/assets/e/a/6/2/ea6225582d237636/ExcelsiorLife_small.jpg</url>
      <title>Excelsior Life</title>
      <link><![CDATA[http://excelsiorlife.libsyn.com]]></link>
    </image>
    <itunes:author>Mike Lesczinski</itunes:author>
		

    <itunes:image href="https://static.libsyn.com/p/assets/e/a/6/2/ea6225582d237636/ExcelsiorLife_small.jpg"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name/>
      <itunes:email/>
    </itunes:owner>
    <description><![CDATA[Excelsior Life: Distance EDU on Demand is an academic podcast series exploring a variety of education, business, and technology topics. Individual shows include 'Excelsior LIVE,' an interview series, and 'Today in Cybersecurity,' a daily podcast show airing each October during National Cybersecurity Month.]]></description>
    
    <itunes:type>episodic</itunes:type>
    

    <itunes:keywords>excelsior,college,higher,education,distance,education,distance,learning,academic</itunes:keywords>

    

    
    <podcast:locked owner="">no</podcast:locked>
    
    
    
    
    
    <itunes:subtitle>Distance EDU on Demand</itunes:subtitle><itunes:category text="Education"><itunes:category text="Higher Education"/></itunes:category><item>
      <title>Excelsior LIVE: Ethics of Using Games</title>
      <itunes:title>Excelsior LIVE: Ethics of Using Games</itunes:title>
      <pubDate>Mon, 15 Aug 2016 13:19:23 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[56dff8fb5d0d1a2955ce601ed2840da5]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-ethics-of-using-games]]></link>
      <description><![CDATA[Karen Schrier is an Assistant Professor of Media Arts at Marist College and Director of the Games and Emerging Media program. She joins the podcast to discuss some of the ethical issues around the use of games in education.]]></description>
      
      <content:encoded><![CDATA[Karen Schrier is an Assistant Professor of Media Arts at Marist College and Director of the Games and Emerging Media program. She joins the podcast to discuss some of the ethical issues around the use of games in education.]]></content:encoded>
      
      
      <enclosure length="7695344" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/RevolutionaryLearning.KarenSchrier.Ethics.Games.mp3?dest-id=136543"/>
      <itunes:duration>08:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Karen Schrier is an Assistant Professor of Media Arts at Marist College and Director of the Games and Emerging Media program. She joins the podcast to discuss some of the ethical issues around the use of games in education.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Karen Schrier is an Assistant Professor of Media Arts at Marist College and Director of the Games and Emerging Media program. She joins the podcast to discuss some of the ethical issues around the use of games in education.</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Tina Goodyear on the need for alternative education quality assurance</title>
      <itunes:title>Excelsior LIVE: Tina Goodyear on the need for alternative education quality assurance</itunes:title>
      <pubDate>Mon, 25 Jul 2016 13:48:13 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4a334ff63f15b7c3cdca108548d01dbd]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-tina-goodyear-on-the-need-for-alternative-education-quality-assurance]]></link>
      <description><![CDATA[Tina Goodyear, COO of the Presidents' Forum, joins the podcast to discuss recent efforts exploring the need for a quality assurance entity (QAE) for alternative education providers, such as coding bootcamps. The project, led by the Presidents' Forum and Distance Education Accreditation Commission (DEAC), is being funded by a $150,000 planning grant from USA Funds. Resources Tina Goodyear Expert Profile Presidents' Forum DEAC USA Funds]]></description>
      
      <content:encoded><![CDATA[Tina Goodyear, COO of the Presidents' Forum, joins the podcast to discuss recent efforts exploring the need for a quality assurance entity (QAE) for alternative education providers, such as coding bootcamps. The project, led by the Presidents' Forum and Distance Education Accreditation Commission (DEAC), is being funded by a $150,000 planning grant from USA Funds. Resources Tina Goodyear Expert Profile Presidents' Forum DEAC USA Funds]]></content:encoded>
      
      
      <enclosure length="7204183" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/ExcelsiorLIVE.Goodyear.USAFunds.QAE.mp3?dest-id=136543"/>
      <itunes:duration>07:31</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Tina Goodyear, COO of the Presidents' Forum, joins the podcast to discuss recent efforts exploring the need for a quality assurance entity (QAE) for alternative education providers, such as coding bootcamps. The project, led by the Presidents' Forum and Distance Education Accreditation Commission (DEAC), is being funded by a $150,000 planning grant from USA Funds. Resources Tina Goodyear Expert Profile Presidents' Forum DEAC USA Funds</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Tina Goodyear, COO of the Presidents' Forum, joins the podcast to discuss recent efforts exploring the need for a quality assurance entity (QAE) for alternative education providers, such as coding bootcamps. The project, led by the Presidents' Forum and Distance Education Accreditation Commission (DEAC), is being funded by a $150,000 planning grant from USA Funds. Resources Tina Goodyear Expert Profile Presidents' Forum DEAC USA Funds</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Nick Fortugno on storytelling for learning</title>
      <itunes:title>Excelsior LIVE: Nick Fortugno on storytelling for learning</itunes:title>
      <pubDate>Thu, 30 Jun 2016 15:40:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7479d836ea454eeb2542259ff8a11d6b]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-nick-fortugno-on-storytelling-for-learning]]></link>
      <description><![CDATA[Nick Fortugno is recognized around the world as a leading game designer, narrative and story expert as well as an entrepreneur of digital and real-world games. The chief creative officer of Playmatics joins the podcast to discuss his upcoming presentation at Revolutionary Learning 2016: Storytelling for Learning. Resources Revolutionary Learning 2016 Nick Fortugno Profile Storytelling for Learning (Presentation) Playmatics]]></description>
      
      <content:encoded><![CDATA[Nick Fortugno is recognized around the world as a leading game designer, narrative and story expert as well as an entrepreneur of digital and real-world games. The chief creative officer of Playmatics joins the podcast to discuss his upcoming presentation at Revolutionary Learning 2016: Storytelling for Learning. Resources Revolutionary Learning 2016 Nick Fortugno Profile Storytelling for Learning (Presentation) Playmatics]]></content:encoded>
      
      
      <enclosure length="12989907" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/RevolutionaryLearning.NickFortugno.StorytellingforLearning.mp3?dest-id=136543"/>
      <itunes:duration>13:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Nick Fortugno is recognized around the world as a leading game designer, narrative and story expert as well as an entrepreneur of digital and real-world games. The chief creative officer of Playmatics joins the podcast to discuss his upcoming presentation at Revolutionary Learning 2016: Storytelling for Learning. Resources Revolutionary Learning 2016 Nick Fortugno Profile Storytelling for Learning (Presentation) Playmatics</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Nick Fortugno is recognized around the world as a leading game designer, narrative and story expert as well as an entrepreneur of digital and real-world games. The chief creative officer of Playmatics joins the podcast to discuss his upcoming presentation at Revolutionary Learning 2016: Storytelling for Learning. Resources Revolutionary Learning 2016 Nick Fortugno Profile Storytelling for Learning (Presentation) Playmatics</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Clark Aldrich on teaching and learning via short simulations</title>
      <itunes:title>Excelsior LIVE: Clark Aldrich on teaching and learning via short simulations</itunes:title>
      <pubDate>Thu, 23 Jun 2016 20:46:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1056d919f99af74c64d6fe03a00c4df7]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-clark-aldrich-on-teaching-and-learning-via-short-simulations]]></link>
      <description><![CDATA[Clark Aldrich, one of the top educational simulation designers in the world and the founder and Managing Partner of Clark Aldrich Designs, joins the podcast to discuss the game changing nature of short simulations as an educational tool.]]></description>
      
      <content:encoded><![CDATA[Clark Aldrich, one of the top educational simulation designers in the world and the founder and Managing Partner of Clark Aldrich Designs, joins the podcast to discuss the game changing nature of short simulations as an educational tool.]]></content:encoded>
      
      
      <enclosure length="15463254" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/ExcelsiorLIVE.Aldrich.ShortSims.RevolutionaryLearning.mp3?dest-id=136543"/>
      <itunes:duration>16:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Clark Aldrich, one of the top educational simulation designers in the world and the founder and Managing Partner of Clark Aldrich Designs, joins the podcast to discuss the game changing nature of short simulations as an educational tool.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Clark Aldrich, one of the top educational simulation designers in the world and the founder and Managing Partner of Clark Aldrich Designs, joins the podcast to discuss the game changing nature of short simulations as an educational tool.</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Tina Goodyear on "The Case for CACE"</title>
      <itunes:title>Excelsior LIVE: Tina Goodyear on "The Case for CACE"</itunes:title>
      <pubDate>Fri, 10 Jun 2016 17:12:31 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[d52d722a0356c3fafb6b2bc5ae44f136]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-tina-goodyear-on-the-case-for-cace]]></link>
      <description><![CDATA[Tina Goodyear, COO of the Presidents' Forum, joins Excelsior Live to discuss the new Consortium for the Assessment of College Equivalency, which brings together six institutions with expertise in Prior Learning Assessment and allows them to collaborate, pool their resources, and set common standards that could drastically improve how all of higher education facilitates the awarding of academic credit for workplace training. Resources The Case for CACE: The Consortium for the Assessment of College Equivalency (WCET) Tina Goodyear Expert Profile]]></description>
      
      <content:encoded><![CDATA[Tina Goodyear, COO of the Presidents' Forum, joins Excelsior Live to discuss the new Consortium for the Assessment of College Equivalency, which brings together six institutions with expertise in Prior Learning Assessment and allows them to collaborate, pool their resources, and set common standards that could drastically improve how all of higher education facilitates the awarding of academic credit for workplace training. Resources The Case for CACE: The Consortium for the Assessment of College Equivalency (WCET) Tina Goodyear Expert Profile]]></content:encoded>
      
      
      <enclosure length="10637812" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/ExcelsiorLIVE.Goodyear.CACE.mp3?dest-id=136543"/>
      <itunes:duration>11:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Tina Goodyear, COO of the Presidents' Forum, joins Excelsior Live to discuss the new Consortium for the Assessment of College Equivalency, which brings together six institutions with expertise in Prior Learning Assessment and allows them to collaborate, pool their resources, and set common standards that could drastically improve how all of higher education facilitates the awarding of academic credit for workplace training. Resources The Case for CACE: The Consortium for the Assessment of College Equivalency (WCET) Tina Goodyear Expert Profile</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Tina Goodyear, COO of the Presidents' Forum, joins Excelsior Live to discuss the new Consortium for the Assessment of College Equivalency, which brings together six institutions with expertise in Prior Learning Assessment and allows them to collaborate, pool their resources, and set common standards that could drastically improve how all of higher education facilitates the awarding of academic credit for workplace training. Resources The Case for CACE: The Consortium for the Assessment of College Equivalency (WCET) Tina Goodyear Expert Profile</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Avery Rueb on good game design</title>
      <itunes:title>Excelsior LIVE: Avery Rueb on good game design</itunes:title>
      <pubDate>Tue, 31 May 2016 13:21:13 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[591a7dede5e149a23e814f701380e8bd]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-avery-rueb-on-good-game-design]]></link>
      <description><![CDATA[In part two of the interview with the co-founders of Affordance Studio, Avery Rueb, discusses his Revoluionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design.]]></description>
      
      <content:encoded><![CDATA[In part two of the interview with the co-founders of Affordance Studio, Avery Rueb, discusses his Revoluionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design.]]></content:encoded>
      
      
      <enclosure length="3403354" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/ExcelsiorLIVE.AffordanceStudio.AveryRueb.RevLearning.Interview.May2016.mp3?dest-id=136543"/>
      <itunes:duration>07:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>In part two of the interview with the co-founders of Affordance Studio, Avery Rueb, discusses his Revoluionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>In part two of the interview with the co-founders of Affordance Studio, Avery Rueb, discusses his Revoluionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design.</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Pascal Nataf and Avery Rueb on teaching academics to think like game designers</title>
      <itunes:title>Excelsior LIVE: Pascal Nataf and Avery Rueb on teaching academics to think like game designers</itunes:title>
      <pubDate>Tue, 31 May 2016 13:17:58 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[39e7a03190b49bca8db21893a32110b9]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-pascal-nataf-and-avery-rueb-on-teaching-academics-to-think-like-game-designers]]></link>
      <description><![CDATA[Pascal Nataf, co-founder of Affordance Studio, a serious game company based in Montreal and a Quebec Entrepreneur of the Year finalist joins Excelsior LIVE to discuss all things educational gaming. In part two of the interview, Avery Rueb, Affordance Studio's other co-founder, joins the podcast to discuss his upcoming Revolutionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design. Full Interview with Pascal Nataf and Avery Rueb Avery Rueb segment More information Affordance Studio Revolutionary Learning Avery Rueb Revolutionary Learning Conference profile Brainstorm Cards: Playing a Card Game to Learn about Good Game Design (Revolutionary Learning session)]]></description>
      
      <content:encoded><![CDATA[Pascal Nataf, co-founder of Affordance Studio, a serious game company based in Montreal and a Quebec Entrepreneur of the Year finalist joins Excelsior LIVE to discuss all things educational gaming. In part two of the interview, Avery Rueb, Affordance Studio's other co-founder, joins the podcast to discuss his upcoming Revolutionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design. Full Interview with Pascal Nataf and Avery Rueb Avery Rueb segment More information Affordance Studio Revolutionary Learning Avery Rueb Revolutionary Learning Conference profile Brainstorm Cards: Playing a Card Game to Learn about Good Game Design (Revolutionary Learning session)]]></content:encoded>
      
      
      <enclosure length="21701668" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/ExcelsiorLIVE.AffordanceStudio.RevLearning.CompleteInterview.May2016.mp3?dest-id=136543"/>
      <itunes:duration>22:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Pascal Nataf, co-founder of Affordance Studio, a serious game company based in Montreal and a Quebec Entrepreneur of the Year finalist joins Excelsior LIVE to discuss all things educational gaming. In part two of the interview, Avery Rueb, Affordance Studio's other co-founder, joins the podcast to discuss his upcoming Revolutionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design. Full Interview with Pascal Nataf and Avery Rueb Avery Rueb segment More information Affordance Studio Revolutionary Learning Avery Rueb Revolutionary Learning Conference profile Brainstorm Cards: Playing a Card Game to Learn about Good Game Design (Revolutionary Learning session)</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Pascal Nataf, co-founder of Affordance Studio, a serious game company based in Montreal and a Quebec Entrepreneur of the Year finalist joins Excelsior LIVE to discuss all things educational gaming. In part two of the interview, Avery Rueb, Affordance Studio's other co-founder, joins the podcast to discuss his upcoming Revolutionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design. Full Interview with Pascal Nataf and Avery Rueb Avery Rueb segment More information Affordance Studio Revolutionary Learning Avery Rueb Revolutionary Learning Conference profile Brainstorm Cards: Playing a Card Game to Learn about Good Game Design (Revolutionary Learning session)</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Dorcey Applyrs on public health and economic development</title>
      <itunes:title>Excelsior LIVE: Dorcey Applyrs on public health and economic development</itunes:title>
      <pubDate>Mon, 02 May 2016 13:12:38 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7635681f690c9a9bca3f2e5237f4343b]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-dorcey-applyrs-on-public-health-and-economic-development]]></link>
      <description><![CDATA[Dorcey Applyrs, DrPH, MPH, faculty program director for Excelsior College, discusses the reciprocal relationship between public health and economic development.]]></description>
      
      <content:encoded><![CDATA[Dorcey Applyrs, DrPH, MPH, faculty program director for Excelsior College, discusses the reciprocal relationship between public health and economic development.]]></content:encoded>
      
      
      <enclosure length="7640899" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Dorcey.Nyquist__Final5.mp3?dest-id=136543"/>
      <itunes:duration>06:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dorcey Applyrs, DrPH, MPH, faculty program director for Excelsior College, discusses the reciprocal relationship between public health and economic development.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dorcey Applyrs, DrPH, MPH, faculty program director for Excelsior College, discusses the reciprocal relationship between public health and economic development.</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Braddock on Excelsior College Student Success Center</title>
      <itunes:title>Excelsior LIVE: Braddock on Excelsior College Student Success Center</itunes:title>
      <pubDate>Fri, 26 Feb 2016 18:57:14 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2d543c07fd9dbce10db633463f619139]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-braddock-on-excelsior-college-student-success-center]]></link>
      <description><![CDATA[In this audio-only version of this Excelsior LIVE broadcast, Glenn Braddock, PhD, executive director of the new Excelsior College Student Success Center, discusses the new initiative, the differences between academic coaches and academic advisors, and the need for more personalized student support across all of higher education.]]></description>
      
      <content:encoded><![CDATA[In this audio-only version of this Excelsior LIVE broadcast, Glenn Braddock, PhD, executive director of the new Excelsior College Student Success Center, discusses the new initiative, the differences between academic coaches and academic advisors, and the need for more personalized student support across all of higher education.]]></content:encoded>
      
      
      <enclosure length="12461375" type="audio/x-m4a" url="https://traffic.libsyn.com/secure/excelsiorlife/Braddock.LIVE.audio.m4a?dest-id=136543"/>
      <itunes:duration>08:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>In this audio-only version of this Excelsior LIVE broadcast, Glenn Braddock, PhD, executive director of the new Excelsior College Student Success Center, discusses the new initiative, the differences between academic coaches and academic advisors, and the need for more personalized student support across all of higher education.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>In this audio-only version of this Excelsior LIVE broadcast, Glenn Braddock, PhD, executive director of the new Excelsior College Student Success Center, discusses the new initiative, the differences between academic coaches and academic advisors, and the need for more personalized student support across all of higher education.</itunes:summary></item>
    
    <item>
      <title>Excelsior LIVE: Andrew Hurd on cybersecurity workforce development</title>
      <itunes:title>Excelsior LIVE: Andrew Hurd on cybersecurity workforce development</itunes:title>
      <pubDate>Fri, 19 Feb 2016 16:03:54 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b3ccab44157ab00c6ec24a2183b279f4]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-live-andrew-hurd-on-cybersecurity-workforce-development]]></link>
      <description><![CDATA[Dr. Andrew Hurd, faculty program director for cybersecurity at Excelsior College, discusses the NSA Day of Cyber, what drew him to Excelsior and distance education, and why so many employers are struggling to both build an educated and adaptable cyber workforce and create an informed cyber culture.]]></description>
      
      <content:encoded><![CDATA[Dr. Andrew Hurd, faculty program director for cybersecurity at Excelsior College, discusses the NSA Day of Cyber, what drew him to Excelsior and distance education, and why so many employers are struggling to both build an educated and adaptable cyber workforce and create an informed cyber culture.]]></content:encoded>
      
      
      <enclosure length="41350464" type="video/x-mp4" url="https://traffic.libsyn.com/secure/excelsiorlife/ExcelsiorLiveChat.AndrewHurd.mp4?dest-id=136543"/>
      <itunes:duration>05:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dr. Andrew Hurd, faculty program director for cybersecurity at Excelsior College, discusses the NSA Day of Cyber, what drew him to Excelsior and distance education, and why so many employers are struggling to both build an educated and adaptable cyber workforce and create an informed cyber culture.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dr. Andrew Hurd, faculty program director for cybersecurity at Excelsior College, discusses the NSA Day of Cyber, what drew him to Excelsior and distance education, and why so many employers are struggling to both build an educated and adaptable cyber workforce and create an informed cyber culture.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Virtualization Security</title>
      <itunes:title>Today in Cybersecurity: Virtualization Security</itunes:title>
      <pubDate>Fri, 30 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b57ce7a948b5bb630db426645acdcb99]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-virtualization-security]]></link>
      <description><![CDATA[Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple virtual machines. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple virtual machines. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6666448" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.VirtualizationSecurity.mp3?dest-id=136543"/>
      <itunes:duration>06:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple virtual machines. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple virtual machines. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Insider versus Outsider Threats</title>
      <itunes:title>Today in Cybersecurity: Insider versus Outsider Threats</itunes:title>
      <pubDate>Thu, 29 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f725f2e83fd0c3c42a57d77272252486]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-insider-versus-outsider-threats]]></link>
      <description><![CDATA[Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for each threat. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for each threat. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6401461" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.InsidervsOutsiderThreats.mp3?dest-id=136543"/>
      <itunes:duration>06:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for each threat. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for each threat. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Physical Security</title>
      <itunes:title>Today in Cybersecurity: Physical Security</itunes:title>
      <pubDate>Wed, 28 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c0f6493ed593f1e089f7f11436086ad6]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-physical-security]]></link>
      <description><![CDATA[Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6960691" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.PhysicalSecurity.mp3?dest-id=136543"/>
      <itunes:duration>07:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Honeypots</title>
      <itunes:title>Today in Cybersecurity: Honeypots</itunes:title>
      <pubDate>Tue, 27 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[edb7db552171ae3cf230bcf81e918b20]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-honeypots]]></link>
      <description><![CDATA[A honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical systems. This keeps the attacker busy giving attention to a systems that has no real information on it. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[A honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical systems. This keeps the attacker busy giving attention to a systems that has no real information on it. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="5970963" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.Honeypots.mp3?dest-id=136543"/>
      <itunes:duration>06:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>A honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical systems. This keeps the attacker busy giving attention to a systems that has no real information on it. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>A honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical systems. This keeps the attacker busy giving attention to a systems that has no real information on it. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Separation of Duties</title>
      <itunes:title>Today in Cybersecurity: Separation of Duties</itunes:title>
      <pubDate>Mon, 26 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1bd2059ebb89dd22db4e0d4729a8c84b]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-separation-of-duties]]></link>
      <description><![CDATA[Separation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate fraud and protect the organization. One individual should not perform multiple duties, to prevent the possibility of improper actions. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Separation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate fraud and protect the organization. One individual should not perform multiple duties, to prevent the possibility of improper actions. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6160299" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.SeparationofDuties.mp3?dest-id=136543"/>
      <itunes:duration>06:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Separation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate fraud and protect the organization. One individual should not perform multiple duties, to prevent the possibility of improper actions. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Separation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate fraud and protect the organization. One individual should not perform multiple duties, to prevent the possibility of improper actions. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: The Principle of Least Privilege</title>
      <itunes:title>Today in Cybersecurity: The Principle of Least Privilege</itunes:title>
      <pubDate>Fri, 23 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[451026a741d10e75a6b8bc0dd47e2317]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-the-principle-of-least-privilege]]></link>
      <description><![CDATA[An individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary can lead to unnecessary security violations. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[An individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary can lead to unnecessary security violations. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6300733" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.PrincipleofLeastPrivilege.mp3?dest-id=136543"/>
      <itunes:duration>06:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>An individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary can lead to unnecessary security violations. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>An individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary can lead to unnecessary security violations. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity:  Access Control</title>
      <itunes:title>Today in Cybersecurity:  Access Control</itunes:title>
      <pubDate>Thu, 22 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[48223e73b6d8b86a65fe885ca2af4c5a]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-access-control]]></link>
      <description><![CDATA[Access control is applied to packets on a network, connections between computers, and users and their ability to access files and folders on company systems. Controlling access is essential to security in keeping information out of the wrong hands. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Access control is applied to packets on a network, connections between computers, and users and their ability to access files and folders on company systems. Controlling access is essential to security in keeping information out of the wrong hands. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6223411" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.AccessControl.mp3?dest-id=136543"/>
      <itunes:duration>06:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Access control is applied to packets on a network, connections between computers, and users and their ability to access files and folders on company systems. Controlling access is essential to security in keeping information out of the wrong hands. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Access control is applied to packets on a network, connections between computers, and users and their ability to access files and folders on company systems. Controlling access is essential to security in keeping information out of the wrong hands. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: The Cloud</title>
      <itunes:title>Today in Cybersecurity: The Cloud</itunes:title>
      <pubDate>Wed, 21 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[dd02cefab90def4f8a68271f97b56f54]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-the-cloud]]></link>
      <description><![CDATA[What is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is a problem within the cloud provider? Why is it important to read the cloud license agreement? James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[What is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is a problem within the cloud provider? Why is it important to read the cloud license agreement? James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6181197" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.TheCloud.mp3?dest-id=136543"/>
      <itunes:duration>06:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>What is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is a problem within the cloud provider? Why is it important to read the cloud license agreement? James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>What is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is a problem within the cloud provider? Why is it important to read the cloud license agreement? James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Penetration Testing</title>
      <itunes:title>Today in Cybersecurity: Penetration Testing</itunes:title>
      <pubDate>Tue, 20 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[8c023f52a8627636f01c5d14db9c7573]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-penetration-testing]]></link>
      <description><![CDATA[Penetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the inside, typically using a black box test or a white box test. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Penetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the inside, typically using a black box test or a white box test. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="7309687" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.PenetrationTesting.mp3?dest-id=136543"/>
      <itunes:duration>07:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Penetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the inside, typically using a black box test or a white box test. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Penetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the inside, typically using a black box test or a white box test. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Baselining</title>
      <itunes:title>Today in Cybersecurity: Baselining</itunes:title>
      <pubDate>Mon, 19 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[54952191323ff4cd729988a15b1d29c7]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-baselining]]></link>
      <description><![CDATA[Baselining is a technique we use to enhance our security and alert us that something is not right and may need further investigation. Any behavior that does not fit the baseline should be considered suspicious until it is examined. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Baselining is a technique we use to enhance our security and alert us that something is not right and may need further investigation. Any behavior that does not fit the baseline should be considered suspicious until it is examined. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6527685" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.Baselining.mp3?dest-id=136543"/>
      <itunes:duration>06:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Baselining is a technique we use to enhance our security and alert us that something is not right and may need further investigation. Any behavior that does not fit the baseline should be considered suspicious until it is examined. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Baselining is a technique we use to enhance our security and alert us that something is not right and may need further investigation. Any behavior that does not fit the baseline should be considered suspicious until it is examined. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Disaster Recovery and Business Continuity</title>
      <itunes:title>Today in Cybersecurity: Disaster Recovery and Business Continuity</itunes:title>
      <pubDate>Fri, 16 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[9d1a7231c6e3f54dc53e66728ed00bee]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-disaster-recovery-and-business-continuity]]></link>
      <description><![CDATA[Disaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast as possible after a disaster. Business continuity is concerned with the long-term health and growth of the company. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Disaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast as possible after a disaster. Business continuity is concerned with the long-term health and growth of the company. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6339603" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI._Jim_Antonakos.DisasterRecovery.mp3?dest-id=136543"/>
      <itunes:duration>06:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Disaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast as possible after a disaster. Business continuity is concerned with the long-term health and growth of the company. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Disaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast as possible after a disaster. Business continuity is concerned with the long-term health and growth of the company. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Passwords</title>
      <itunes:title>Today in Cybersecurity: Passwords</itunes:title>
      <pubDate>Thu, 15 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4954a04f47bf17a05f92b5a7be352fd4]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-passwords]]></link>
      <description><![CDATA[Passwords are the single most common thing we use to authenticate ourselves to a computer system. But it is surprising how little care people use in choosing and managing their passwords. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Passwords are the single most common thing we use to authenticate ourselves to a computer system. But it is surprising how little care people use in choosing and managing their passwords. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="5973053" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.Passwords.mp3?dest-id=136543"/>
      <itunes:duration>06:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Passwords are the single most common thing we use to authenticate ourselves to a computer system. But it is surprising how little care people use in choosing and managing their passwords. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Passwords are the single most common thing we use to authenticate ourselves to a computer system. But it is surprising how little care people use in choosing and managing their passwords. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Zero-day Attacks</title>
      <itunes:title>Today in Cybersecurity: Zero-day Attacks</itunes:title>
      <pubDate>Wed, 14 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c95da0f6086a042921401ef1a01daa2b]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-zero-day-attacks-0]]></link>
      <description><![CDATA[A zero-day attack is a malware attack that is so new it is not recognized by signature-based anti-virus software, and is therefore able to infect a system without detection. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[A zero-day attack is a malware attack that is so new it is not recognized by signature-based anti-virus software, and is therefore able to infect a system without detection. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6038673" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.ZeroDayAttacks.mp3?dest-id=136543"/>
      <itunes:duration>06:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>A zero-day attack is a malware attack that is so new it is not recognized by signature-based anti-virus software, and is therefore able to infect a system without detection. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>A zero-day attack is a malware attack that is so new it is not recognized by signature-based anti-virus software, and is therefore able to infect a system without detection. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Computer Forensics</title>
      <itunes:title>Today in Cybersecurity: Computer Forensics</itunes:title>
      <pubDate>Tue, 13 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a97cccaff586a93925c36acf44b2fa9b]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-computer-forensics]]></link>
      <description><![CDATA[Computer forensics is a set of processes used to acquire and analyze digital evidence. This is useful in determining how malware entered a system and also for proving or disproving that information of a certain form exists or does not exist on a system. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Computer forensics is a set of processes used to acquire and analyze digital evidence. This is useful in determining how malware entered a system and also for proving or disproving that information of a certain form exists or does not exist on a system. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6515146" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.ComputerForensics.mp3?dest-id=136543"/>
      <itunes:duration>06:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Computer forensics is a set of processes used to acquire and analyze digital evidence. This is useful in determining how malware entered a system and also for proving or disproving that information of a certain form exists or does not exist on a system. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Computer forensics is a set of processes used to acquire and analyze digital evidence. This is useful in determining how malware entered a system and also for proving or disproving that information of a certain form exists or does not exist on a system. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Risk Assessment</title>
      <itunes:title>Today in Cybersecurity: Risk Assessment</itunes:title>
      <pubDate>Mon, 12 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a1c41c01c50390040d8304587ca9fed0]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-risk-assessment]]></link>
      <description><![CDATA[A risk assessment is used to identify assets within an organization, determine the threats to those assets, evaluate the probabilities of the asset being compromised, the impact to the organization, and a plan to mitigate or eliminate the risks. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[A risk assessment is used to identify assets within an organization, determine the threats to those assets, evaluate the probabilities of the asset being compromised, the impact to the organization, and a plan to mitigate or eliminate the risks. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6635937" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.RiskAssessment.mp3?dest-id=136543"/>
      <itunes:duration>06:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>A risk assessment is used to identify assets within an organization, determine the threats to those assets, evaluate the probabilities of the asset being compromised, the impact to the organization, and a plan to mitigate or eliminate the risks. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>A risk assessment is used to identify assets within an organization, determine the threats to those assets, evaluate the probabilities of the asset being compromised, the impact to the organization, and a plan to mitigate or eliminate the risks. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Encryption</title>
      <itunes:title>Today in Cybersecurity: Encryption</itunes:title>
      <pubDate>Fri, 09 Oct 2015 16:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[8270a3f1fcad8e0fada1e51e66bd8500]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-encryption]]></link>
      <description><![CDATA[Encryption is a process where we take information that is readable and make it unreadable. Symmetric encryption uses one key to encrypt and decrypt. Asymmetric encryption uses two keys: one key to encrypt and a second key to decrypt. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Encryption is a process where we take information that is readable and make it unreadable. Symmetric encryption uses one key to encrypt and decrypt. Asymmetric encryption uses two keys: one key to encrypt and a second key to decrypt. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6503861" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.Encryption.mp3?dest-id=136543"/>
      <itunes:duration>06:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Encryption is a process where we take information that is readable and make it unreadable. Symmetric encryption uses one key to encrypt and decrypt. Asymmetric encryption uses two keys: one key to encrypt and a second key to decrypt. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Encryption is a process where we take information that is readable and make it unreadable. Symmetric encryption uses one key to encrypt and decrypt. Asymmetric encryption uses two keys: one key to encrypt and a second key to decrypt. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Backups</title>
      <itunes:title>Today in Cybersecurity: Backups</itunes:title>
      <pubDate>Thu, 08 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[8b83760b1fe1439c4791b2f27523c6fd]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-backups]]></link>
      <description><![CDATA[James Antonakos of the National Cybersecurity Institute explains the importance of performing backups on a regular basis, testing the backups to make sure they work, and with storing the backups off site so they are not destroyed during a disaster.]]></description>
      
      <content:encoded><![CDATA[James Antonakos of the National Cybersecurity Institute explains the importance of performing backups on a regular basis, testing the backups to make sure they work, and with storing the backups off site so they are not destroyed during a disaster.]]></content:encoded>
      
      
      <enclosure length="6201259" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.Backups.mp3?dest-id=136543"/>
      <itunes:duration>06:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>James Antonakos of the National Cybersecurity Institute explains the importance of performing backups on a regular basis, testing the backups to make sure they work, and with storing the backups off site so they are not destroyed during a disaster.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>James Antonakos of the National Cybersecurity Institute explains the importance of performing backups on a regular basis, testing the backups to make sure they work, and with storing the backups off site so they are not destroyed during a disaster.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Social Engineering</title>
      <itunes:title>Today in Cybersecurity: Social Engineering</itunes:title>
      <pubDate>Wed, 07 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4530741175de6f09bfa7792145cdf85e]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-social-engineering]]></link>
      <description><![CDATA[James Antonakos of the National Cybersecurity Institute explains social engineering. This technique is essentially clever lying or deception, where one human tricks another human to obtain information or access to a restricted area.]]></description>
      
      <content:encoded><![CDATA[James Antonakos of the National Cybersecurity Institute explains social engineering. This technique is essentially clever lying or deception, where one human tricks another human to obtain information or access to a restricted area.]]></content:encoded>
      
      
      <enclosure length="6288194" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI._Jim_Antonakos._Social_Engineering.mp3?dest-id=136543"/>
      <itunes:duration>06:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>James Antonakos of the National Cybersecurity Institute explains social engineering. This technique is essentially clever lying or deception, where one human tricks another human to obtain information or access to a restricted area.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>James Antonakos of the National Cybersecurity Institute explains social engineering. This technique is essentially clever lying or deception, where one human tricks another human to obtain information or access to a restricted area.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Layered Security</title>
      <itunes:title>Today in Cybersecurity: Layered Security</itunes:title>
      <pubDate>Tue, 06 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[39762906bc2d9d1cae67412f96955b5c]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-layered-security]]></link>
      <description><![CDATA[Security must be built in layers, with each layer providing a different measure of security, such as hardware, software, and even human behavior. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Security must be built in layers, with each layer providing a different measure of security, such as hardware, software, and even human behavior. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6438660" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.Layered_Security.mp3?dest-id=136543"/>
      <itunes:duration>06:43</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Security must be built in layers, with each layer providing a different measure of security, such as hardware, software, and even human behavior. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Security must be built in layers, with each layer providing a different measure of security, such as hardware, software, and even human behavior. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Authentication</title>
      <itunes:title>Today in Cybersecurity: Authentication</itunes:title>
      <pubDate>Mon, 05 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[ec4bd013a281761894b4d663c3d2da95]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-authentication]]></link>
      <description><![CDATA[Authentication is how a human proves who he or she is to a computer, using one or more of the following: something you know, something you have, or something you are. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[Authentication is how a human proves who he or she is to a computer, using one or more of the following: something you know, something you have, or something you are. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6129788" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.Authentication.mp3?dest-id=136543"/>
      <itunes:duration>06:24</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Authentication is how a human proves who he or she is to a computer, using one or more of the following: something you know, something you have, or something you are. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Authentication is how a human proves who he or she is to a computer, using one or more of the following: something you know, something you have, or something you are. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Confidentiality, Integrity, and Availability</title>
      <itunes:title>Today in Cybersecurity: Confidentiality, Integrity, and Availability</itunes:title>
      <pubDate>Fri, 02 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[842d93f1ea31371f6484f7b6ae52f4c4]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-confidentiality-integrity-and-availability]]></link>
      <description><![CDATA[All three of these areas – confidentiality, integrity, and availability - must be present in order to provide a secure information environment. This is true for information that is stored as well as transmitted. James Antonakos of the National Cybersecurity Institute explains.]]></description>
      
      <content:encoded><![CDATA[All three of these areas – confidentiality, integrity, and availability - must be present in order to provide a secure information environment. This is true for information that is stored as well as transmitted. James Antonakos of the National Cybersecurity Institute explains.]]></content:encoded>
      
      
      <enclosure length="6449945" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.Confidentiality.mp3?dest-id=136543"/>
      <itunes:duration>06:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>All three of these areas – confidentiality, integrity, and availability - must be present in order to provide a secure information environment. This is true for information that is stored as well as transmitted. James Antonakos of the National Cybersecurity Institute explains.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>All three of these areas – confidentiality, integrity, and availability - must be present in order to provide a secure information environment. This is true for information that is stored as well as transmitted. James Antonakos of the National Cybersecurity Institute explains.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: People, Process, and Technology</title>
      <itunes:title>Today in Cybersecurity: People, Process, and Technology</itunes:title>
      <pubDate>Thu, 01 Oct 2015 04:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[376f9b56977a533795ef880ab871c519]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-james-antonakos-on-people-process-and-technology]]></link>
      <description><![CDATA[Information security depends on people, process, and technology. James Antonakos of the National Cybersecurity Institute discusses why all three areas must be utilized properly in order for a security program to be effective.]]></description>
      
      <content:encoded><![CDATA[Information security depends on people, process, and technology. James Antonakos of the National Cybersecurity Institute discusses why all three areas must be utilized properly in order for a security program to be effective.]]></content:encoded>
      
      
      <enclosure length="6036222" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final.NCI.Jim_Antonakos.People.Process.Tech.mp3?dest-id=136543"/>
      <itunes:duration>06:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Information security depends on people, process, and technology. James Antonakos of the National Cybersecurity Institute discusses why all three areas must be utilized properly in order for a security program to be effective.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Information security depends on people, process, and technology. James Antonakos of the National Cybersecurity Institute discusses why all three areas must be utilized properly in order for a security program to be effective.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Ebersole on higher education and the first National Republican debates</title>
      <itunes:title>Distance EDU on Demand: Ebersole on higher education and the first National Republican debates</itunes:title>
      <pubDate>Fri, 07 Aug 2015 11:34:29 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[06f54ccb5adb16feb25662fef8569733]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/ebersole-on-higher-education-and-the-first-national-republican-debates]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--><!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In response to last night’s National Republican debates, Excelsior College President John Ebersole offered the following response. “In last night’s Republican debates, little was said about either K-12 or higher education. While the Common Core curriculum received passing criticism, slightly more attention was given to the role of the Federal government in quality setting as opposed to those of the states. Senator Rubio of Florida, who has been an instructor at Florida International University and is a frequent critic of higher education, described how the U.S. government frequently uses Federal funding to pursue interests that may be at odds with those of the State or educational systems. He also mentions that like many college graduates, he had amassed considerable student loan debt. However, he says this in the context of pulling himself up from humble beginnings and seem to suggest that education may have played an important role in his success. In the earlier debate between the candidates, especially those who are still languishing in the polls, I had thought that Governor Jindal, a former president in the University of Louisiana system, might make a connection between the critical need for more education and training in cybersecurity. Here, the government is reporting shortages running in the thousands (of workers) and there is a clear connection between more education and our nation’s security. Additionally, a similar connection exists between the workforce of the future and our economic prosperity. Labor workforce researchers are now reporting that 60 percent of future jobs will require more than a secondary education. The need for greater emphasis on education and degree completion is now intertwined with that of economic growth and future prosperity. Hopefully in the weeks and months to come, the candidates on both sides of the aisle will be spending more time talking about education and the role that it plays in making for a better life and a better society for all. Let’s keep our fingers crossed.”]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--><!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In response to last night’s National Republican debates, Excelsior College President John Ebersole offered the following response. “In last night’s Republican debates, little was said about either K-12 or higher education. While the Common Core curriculum received passing criticism, slightly more attention was given to the role of the Federal government in quality setting as opposed to those of the states. Senator Rubio of Florida, who has been an instructor at Florida International University and is a frequent critic of higher education, described how the U.S. government frequently uses Federal funding to pursue interests that may be at odds with those of the State or educational systems. He also mentions that like many college graduates, he had amassed considerable student loan debt. However, he says this in the context of pulling himself up from humble beginnings and seem to suggest that education may have played an important role in his success. In the earlier debate between the candidates, especially those who are still languishing in the polls, I had thought that Governor Jindal, a former president in the University of Louisiana system, might make a connection between the critical need for more education and training in cybersecurity. Here, the government is reporting shortages running in the thousands (of workers) and there is a clear connection between more education and our nation’s security. Additionally, a similar connection exists between the workforce of the future and our economic prosperity. Labor workforce researchers are now reporting that 60 percent of future jobs will require more than a secondary education. The need for greater emphasis on education and degree completion is now intertwined with that of economic growth and future prosperity. Hopefully in the weeks and months to come, the candidates on both sides of the aisle will be spending more time talking about education and the role that it plays in making for a better life and a better society for all. Let’s keep our fingers crossed.”]]></content:encoded>
      
      
      <enclosure length="1267200" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/RepublicanDebateResponse.Ebersole.mp3?dest-id=136543"/>
      <itunes:duration>02:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In response to last night’s National Republican debates, Excelsior College President John Ebersole offered the following response. “In last night’s Republican debates, little was said about either K-12 or higher education. While the Common Core curriculum received passing criticism, slightly more attention was given to the role of the Federal government in quality setting as opposed to those of the states. Senator Rubio of Florida, who has been an instructor at Florida International University and is a frequent critic of higher education, described how the U.S. government frequently uses Federal funding to pursue interests that may be at odds with those of the State or educational systems. He also mentions that like many college graduates, he had amassed considerable student loan debt. However, he says this in the context of pulling himself up from humble beginnings and seem to suggest that education may have played an important role in his success. In the earlier debate between the candidates, especially those who are still languishing in the polls, I had thought that Governor Jindal, a former president in the University of Louisiana system, might make a connection between the critical need for more education and training in cybersecurity. Here, the government is reporting shortages running in the thousands (of workers) and there is a clear connection between more education and our nation’s security. Additionally, a similar connection exists between the workforce of the future and our economic prosperity. Labor workforce researchers are now reporting that 60 percent of future jobs will require more than a secondary education. The need for greater emphasis on education and degree completion is now intertwined with that of economic growth and future prosperity. Hopefully in the weeks and months to come, the candidates on both sides of the aisle will be spending more time talking about education and the role that it plays in making for a better life and a better society for all. Let’s keep our fingers crossed.”</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In response to last night’s National Republican debates, Excelsior College President John Ebersole offered the following response. “In last night’s Republican debates, little was said about either K-12 or higher education. While the Common Core curriculum received passing criticism, slightly more attention was given to the role of the Federal government in quality setting as opposed to those of the states. Senator Rubio of Florida, who has been an instructor at Florida International University and is a frequent critic of higher education, described how the U.S. government frequently uses Federal funding to pursue interests that may be at odds with those of the State or educational systems. He also mentions that like many college graduates, he had amassed considerable student loan debt. However, he says this in the context of pulling himself up from humble beginnings and seem to suggest that education may have played an important role in his success. In the earlier debate between the candidates, especially those who are still languishing in the polls, I had thought that Governor Jindal, a former president in the University of Louisiana system, might make a connection between the critical need for more education and training in cybersecurity. Here, the government is reporting shortages running in the thousands (of workers) and there is a clear connection between more education and our nation’s security. Additionally, a similar connection exists between the workforce of the future and our economic prosperity. Labor workforce researchers are now reporting that 60 percent of future jobs will require more than a secondary education. The need for greater emphasis on education and degree completion is now intertwined with that of economic growth and future prosperity. Hopefully in the weeks and months to come, the candidates on both sides of the aisle will be spending more time talking about education and the role that it plays in making for a better life and a better society for all. Let’s keep our fingers crossed.”</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Berenson on how online college students can find a mentor</title>
      <itunes:title>Distance EDU on Demand: Berenson on how online college students can find a mentor</itunes:title>
      <pubDate>Mon, 03 Aug 2015 16:11:01 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[68899154909bdd884245ee7899915129]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/berenson-on-how-online-college-students-can-find-a-mentor]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--><!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Robin Berenson, associate dean, School of Business and Technology, joins the Distance EDU on Demand podcast to discuss how adults returning to college online can find and connect with a mentor who can help guide them through their academic and professional pursuits. Topics include: · How early in the process adults should begin to think about mentorship · How newly enrolled students can find a mentor within an online classroom or on social media · Advice on approaching a potential mentor and determining whether they would be a good fit · Setting and managing expectations Show Notes Mentorship Program – Lt. Col. Bryant A. Murray Veterans Center at Excelsior College]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--><!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Robin Berenson, associate dean, School of Business and Technology, joins the Distance EDU on Demand podcast to discuss how adults returning to college online can find and connect with a mentor who can help guide them through their academic and professional pursuits. Topics include: · How early in the process adults should begin to think about mentorship · How newly enrolled students can find a mentor within an online classroom or on social media · Advice on approaching a potential mentor and determining whether they would be a good fit · Setting and managing expectations Show Notes Mentorship Program – Lt. Col. Bryant A. Murray Veterans Center at Excelsior College]]></content:encoded>
      
      
      <enclosure length="4286588" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Mentorship.Berenson.Final.mp3?dest-id=136543"/>
      <itunes:duration>04:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Robin Berenson, associate dean, School of Business and Technology, joins the Distance EDU on Demand podcast to discuss how adults returning to college online can find and connect with a mentor who can help guide them through their academic and professional pursuits. Topics include: · How early in the process adults should begin to think about mentorship · How newly enrolled students can find a mentor within an online classroom or on social media · Advice on approaching a potential mentor and determining whether they would be a good fit · Setting and managing expectations Show Notes Mentorship Program – Lt. Col. Bryant A. Murray Veterans Center at Excelsior College</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Robin Berenson, associate dean, School of Business and Technology, joins the Distance EDU on Demand podcast to discuss how adults returning to college online can find and connect with a mentor who can help guide them through their academic and professional pursuits. Topics include: · How early in the process adults should begin to think about mentorship · How newly enrolled students can find a mentor within an online classroom or on social media · Advice on approaching a potential mentor and determining whether they would be a good fit · Setting and managing expectations Show Notes Mentorship Program – Lt. Col. Bryant A. Murray Veterans Center at Excelsior College</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Tom Dalton on FAFSA simplification</title>
      <itunes:title>Distance EDU on Demand: Tom Dalton on FAFSA simplification</itunes:title>
      <pubDate>Thu, 30 Jul 2015 14:04:14 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5469b8d4cbd1db3836a6477e21003634]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/distance-edu-on-demand-tom-dalton-on-fafsa-simplification]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--><!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Beyond the iron triangle of cost, quality, and access, the narratives around the reauthorization of the Higher Education Act are focusing squarely on transparency and simplification, in particular around the Federal financial aid process. Tom Dalton, assistant vice president of Enrollment Management at Excelsior College, discusses the benefits of simplifying the Free Application for Federal Student Aid (FAFSA) and particular proposals, including the NASFAA FAFSA Working Group’s three-level means-tested application.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--><!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Beyond the iron triangle of cost, quality, and access, the narratives around the reauthorization of the Higher Education Act are focusing squarely on transparency and simplification, in particular around the Federal financial aid process. Tom Dalton, assistant vice president of Enrollment Management at Excelsior College, discusses the benefits of simplifying the Free Application for Federal Student Aid (FAFSA) and particular proposals, including the NASFAA FAFSA Working Group’s three-level means-tested application.]]></content:encoded>
      
      
      <enclosure length="4824501" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/FAFSA.HEA.TomDalton.Final.mp3?dest-id=136543"/>
      <itunes:duration>05:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Beyond the iron triangle of cost, quality, and access, the narratives around the reauthorization of the Higher Education Act are focusing squarely on transparency and simplification, in particular around the Federal financial aid process. Tom Dalton, assistant vice president of Enrollment Management at Excelsior College, discusses the benefits of simplifying the Free Application for Federal Student Aid (FAFSA) and particular proposals, including the NASFAA FAFSA Working Group’s three-level means-tested application.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Beyond the iron triangle of cost, quality, and access, the narratives around the reauthorization of the Higher Education Act are focusing squarely on transparency and simplification, in particular around the Federal financial aid process. Tom Dalton, assistant vice president of Enrollment Management at Excelsior College, discusses the benefits of simplifying the Free Application for Federal Student Aid (FAFSA) and particular proposals, including the NASFAA FAFSA Working Group’s three-level means-tested application.</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: "Commencement Stories" with Laurie Cox</title>
      <itunes:title>Distance EDU On Demand: "Commencement Stories" with Laurie Cox</itunes:title>
      <pubDate>Thu, 18 Jun 2015 19:57:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[576e5da137a95bca47ed85e80af5c3c7]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/distance-edu-on-demand-commencement-stories-with-laurie-cox]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Laurie Cox , course chair at Samaritan Hospital School of Nursing in Troy, New York, earned her first nursing degree in 1984 - from a traditional school. More than 30 years later, she’s graduating from Excelsior College with a Master of Science in nursing. She joins the podcast to discuss what brought her back to school, initial challenges adjusting to the online classroom environment, and how her education turned her into a better leader and educator.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Laurie Cox , course chair at Samaritan Hospital School of Nursing in Troy, New York, earned her first nursing degree in 1984 - from a traditional school. More than 30 years later, she’s graduating from Excelsior College with a Master of Science in nursing. She joins the podcast to discuss what brought her back to school, initial challenges adjusting to the online classroom environment, and how her education turned her into a better leader and educator.]]></content:encoded>
      
      
      <enclosure length="7824612" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Podcast.ExcelsiorLife.Commencement.Laurie_Cox.mp3?dest-id=136543"/>
      <itunes:duration>08:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Laurie Cox , course chair at Samaritan Hospital School of Nursing in Troy, New York, earned her first nursing degree in 1984 - from a traditional school. More than 30 years later, she’s graduating from Excelsior College with a Master of Science in nursing. She joins the podcast to discuss what brought her back to school, initial challenges adjusting to the online classroom environment, and how her education turned her into a better leader and educator.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Laurie Cox , course chair at Samaritan Hospital School of Nursing in Troy, New York, earned her first nursing degree in 1984 - from a traditional school. More than 30 years later, she’s graduating from Excelsior College with a Master of Science in nursing. She joins the podcast to discuss what brought her back to school, initial challenges adjusting to the online classroom environment, and how her education turned her into a better leader and educator.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: "Commencement Stories" with Jason Duke</title>
      <itunes:title>Distance EDU on Demand: "Commencement Stories" with Jason Duke</itunes:title>
      <pubDate>Mon, 15 Jun 2015 19:01:13 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a237677ada6cb1d2fa8155d0a24c267d]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/distance-edu-on-demand-commencement-stories-jason-duke]]></link>
      <description><![CDATA[Jason Duke, recipient of the Jean M. Smith Award, presented to a student who demonstrates outstanding academic and professional achievement in the world of business, joins the podcast to discuss his educational journey. Duke, a supervising auto damage appraiser, earned a Bachelor of Science in Business from Excelsior with a 3.9 GPA, graduating summa cum laude. Planning to continue his educational pursuits, Duke has enrolled in Excelsior’s MBA program.]]></description>
      
      <content:encoded><![CDATA[Jason Duke, recipient of the Jean M. Smith Award, presented to a student who demonstrates outstanding academic and professional achievement in the world of business, joins the podcast to discuss his educational journey. Duke, a supervising auto damage appraiser, earned a Bachelor of Science in Business from Excelsior with a 3.9 GPA, graduating summa cum laude. Planning to continue his educational pursuits, Duke has enrolled in Excelsior’s MBA program.]]></content:encoded>
      
      
      <enclosure length="3811392" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Podcast.ExcelsiorLife.Commencement.Jason_Duke.mp3?dest-id=136543"/>
      <itunes:duration>07:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Jason Duke, recipient of the Jean M. Smith Award, presented to a student who demonstrates outstanding academic and professional achievement in the world of business, joins the podcast to discuss his educational journey. Duke, a supervising auto damage appraiser, earned a Bachelor of Science in Business from Excelsior with a 3.9 GPA, graduating summa cum laude. Planning to continue his educational pursuits, Duke has enrolled in Excelsior’s MBA program.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Jason Duke, recipient of the Jean M. Smith Award, presented to a student who demonstrates outstanding academic and professional achievement in the world of business, joins the podcast to discuss his educational journey. Duke, a supervising auto damage appraiser, earned a Bachelor of Science in Business from Excelsior with a 3.9 GPA, graduating summa cum laude. Planning to continue his educational pursuits, Duke has enrolled in Excelsior’s MBA program.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dr. David Seelow on "Revolutionary Learning"</title>
      <itunes:title>Distance EDU on Demand: Dr. David Seelow on "Revolutionary Learning"</itunes:title>
      <pubDate>Thu, 26 Feb 2015 16:23:37 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4a40d789d82e65dd0cd63e6b52b287f4]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/distance-edu-on-demand-dr-david-seelow-on-revolutionary-learning]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. David Seelow joins the podcast to discuss the development of the Center for Game and Simulation-Based Learning, why he wants to spark a revolution in learning, and why One Flew Over the Cuckoo’s Nest is a great example of the power of games in education. The interview ends with a discussion of the Center’s upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health conference,scheduled for May 20 in Washington, DC. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> 0:31 The idea. 3:31 First year reflections. 7:14 “What kind of revolution do you seek?” 8:55 What “One Flew Over the Cuckoo’s Nest” can teach us about the power of games in education. 12:00 How games can solve public health challenges. 15:48 Revolutionary Learning 2015.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. David Seelow joins the podcast to discuss the development of the Center for Game and Simulation-Based Learning, why he wants to spark a revolution in learning, and why One Flew Over the Cuckoo’s Nest is a great example of the power of games in education. The interview ends with a discussion of the Center’s upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health conference,scheduled for May 20 in Washington, DC. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> 0:31 The idea. 3:31 First year reflections. 7:14 “What kind of revolution do you seek?” 8:55 What “One Flew Over the Cuckoo’s Nest” can teach us about the power of games in education. 12:00 How games can solve public health challenges. 15:48 Revolutionary Learning 2015.]]></content:encoded>
      
      
      <enclosure length="18657279" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Podcast.Seelow.CenterforGame.mp3?dest-id=136543"/>
      <itunes:duration>19:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. David Seelow joins the podcast to discuss the development of the Center for Game and Simulation-Based Learning, why he wants to spark a revolution in learning, and why One Flew Over the Cuckoo’s Nest is a great example of the power of games in education. The interview ends with a discussion of the Center’s upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health conference,scheduled for May 20 in Washington, DC. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} 0:31 The idea. 3:31 First year reflections. 7:14 “What kind of revolution do you seek?” 8:55 What “One Flew Over the Cuckoo’s Nest” can teach us about the power of games in education. 12:00 How games can solve public health challenges. 15:48 Revolutionary Learning 2015.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. David Seelow joins the podcast to discuss the development of the Center for Game and Simulation-Based Learning, why he wants to spark a revolution in learning, and why One Flew Over the Cuckoo’s Nest is a great example of the power of games in education. The interview ends with a discussion of the Center’s upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health conference,scheduled for May 20 in Washington, DC. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} 0:31 The idea. 3:31 First year reflections. 7:14 “What kind of revolution do you seek?” 8:55 What “One Flew Over the Cuckoo’s Nest” can teach us about the power of games in education. 12:00 How games can solve public health challenges. 15:48 Revolutionary Learning 2015.</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Revolutionary Learning 2015</title>
      <itunes:title>Distance EDU On Demand: Revolutionary Learning 2015</itunes:title>
      <pubDate>Thu, 26 Feb 2015 16:09:37 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[243b9053a4bb3d4b3e4f3823524ba732]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/campustalk-revolutionary-learning-2015]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. David Seelow, founder of the Center for Game and Simulation-Based Learning, discusses the upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health. The event will be held on May 20 in Washington, DC.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. David Seelow, founder of the Center for Game and Simulation-Based Learning, discusses the upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health. The event will be held on May 20 in Washington, DC.]]></content:encoded>
      
      
      <enclosure length="7221915" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/CampusTalk.Podcast.Seelow.RevolutionaryLearning2015.mp3?dest-id=136543"/>
      <itunes:duration>07:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. David Seelow, founder of the Center for Game and Simulation-Based Learning, discusses the upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health. The event will be held on May 20 in Washington, DC.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. David Seelow, founder of the Center for Game and Simulation-Based Learning, discusses the upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health. The event will be held on May 20 in Washington, DC.</itunes:summary></item>
    
    <item>
      <title>Initiative for Women in Cybersecurity: Interview with Anne Kohnke, PhD</title>
      <itunes:title>Initiative for Women in Cybersecurity: Interview with Anne Kohnke, PhD</itunes:title>
      <pubDate>Wed, 18 Feb 2015 20:05:47 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e3549f51ebae400c52e0c41f60142c6e]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/initiative-for-women-in-cybersecurity-interview-with-anne-kohnke-phd]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> The goal of the National Cybersecurity Initiative for Women in Cybersecurity is to offer support and solutions to women in cybersecurity by offering skills training and identifying best practices for utilization by women in the cyber security field to help understand and influence perceptions. Women in Cybersecurity Leadership will cover best practices utilized by women in the cybersecurity field in various areas of critical infrastructure. Each podcast will feature a noted woman leader in the cyber security arena who will share with Who she is! What she does! and How she gets it done! Interviewee: Anne Kohnke, PhD is an Assistant Professor of IT at Lawrence Technological University and teaches courses in both the Information Technology and Organization Development/Change Management disciplines at the bachelor through doctorate levels. Anne started as an Adjunct Professor in 2002 and joined the faculty full-time in 2011. Prior to joining LTU, Anne worked in Industry for 25 years where she focused in information technology and management. Her IT career started in the mid-1980's on a help desk, and over the years Anne developed technical proficiency as a database administrator, network administrator, and technical business analyst. After a decade, Anne was promoted to management and worked as a project manager, IT Director, and Vice President of IT and Chief Information Security Officer (CISO). Dr. Kohnke's technical experience and organization development background aided her in building collaborative, high performance teams to work on complex medium to large-scale technical projects. Anne has managed multi-million dollar IT budgets in fast paced entrepreneurial environments. As a former CISO, Anne has extensive hands-on experience in risk management, IT security controls, IT governance, and IT audits to include NIST and PCI certifications. Dr. Kohnke earned her PhD from Benedictine University and an MBA from Lawrence Technological University.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> The goal of the National Cybersecurity Initiative for Women in Cybersecurity is to offer support and solutions to women in cybersecurity by offering skills training and identifying best practices for utilization by women in the cyber security field to help understand and influence perceptions. Women in Cybersecurity Leadership will cover best practices utilized by women in the cybersecurity field in various areas of critical infrastructure. Each podcast will feature a noted woman leader in the cyber security arena who will share with Who she is! What she does! and How she gets it done! Interviewee: Anne Kohnke, PhD is an Assistant Professor of IT at Lawrence Technological University and teaches courses in both the Information Technology and Organization Development/Change Management disciplines at the bachelor through doctorate levels. Anne started as an Adjunct Professor in 2002 and joined the faculty full-time in 2011. Prior to joining LTU, Anne worked in Industry for 25 years where she focused in information technology and management. Her IT career started in the mid-1980's on a help desk, and over the years Anne developed technical proficiency as a database administrator, network administrator, and technical business analyst. After a decade, Anne was promoted to management and worked as a project manager, IT Director, and Vice President of IT and Chief Information Security Officer (CISO). Dr. Kohnke's technical experience and organization development background aided her in building collaborative, high performance teams to work on complex medium to large-scale technical projects. Anne has managed multi-million dollar IT budgets in fast paced entrepreneurial environments. As a former CISO, Anne has extensive hands-on experience in risk management, IT security controls, IT governance, and IT audits to include NIST and PCI certifications. Dr. Kohnke earned her PhD from Benedictine University and an MBA from Lawrence Technological University.]]></content:encoded>
      
      
      <enclosure length="38512560" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/NCI.InitiativeforWomeninCybersecurity.mp3?dest-id=136543"/>
      <itunes:duration>32:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} The goal of the National Cybersecurity Initiative for Women in Cybersecurity is to offer support and solutions to women in cybersecurity by offering skills training and identifying best practices for utilization by women in the cyber security field to help understand and influence perceptions. Women in Cybersecurity Leadership will cover best practices utilized by women in the cybersecurity field in various areas of critical infrastructure. Each podcast will feature a noted woman leader in the cyber security arena who will share with Who she is! What she does! and How she gets it done! Interviewee: Anne Kohnke, PhD is an Assistant Professor of IT at Lawrence Technological University and teaches courses in both the Information Technology and Organization Development/Change Management disciplines at the bachelor through doctorate levels. Anne started as an Adjunct Professor in 2002 and joined the faculty full-time in 2011. Prior to joining LTU, Anne worked in Industry for 25 years where she focused in information technology and management. Her IT career started in the mid-1980's on a help desk, and over the years Anne developed technical proficiency as a database administrator, network administrator, and technical business analyst. After a decade, Anne was promoted to management and worked as a project manager, IT Director, and Vice President of IT and Chief Information Security Officer (CISO). Dr. Kohnke's technical experience and organization development background aided her in building collaborative, high performance teams to work on complex medium to large-scale technical projects. Anne has managed multi-million dollar IT budgets in fast paced entrepreneurial environments. As a former CISO, Anne has extensive hands-on experience in risk management, IT security controls, IT governance, and IT audits to include NIST and PCI certifications. Dr. Kohnke earned her PhD from Benedictine University and an MBA from Lawrence Technological University.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} The goal of the National Cybersecurity Initiative for Women in Cybersecurity is to offer support and solutions to women in cybersecurity by offering skills training and identifying best practices for utilization by women in the cyber security field to help understand and influence perceptions. Women in Cybersecurity Leadership will cover best practices utilized by women in the cybersecurity field in various areas of critical infrastructure. Each podcast will feature a noted woman leader in the cyber security arena who will share with Who she is! What she does! and How she gets it done! Interviewee: Anne Kohnke, PhD is an Assistant Professor of IT at Lawrence Technological University and teaches courses in both the Information Technology and Organization Development/Change Management disciplines at the bachelor through doctorate levels. Anne started as an Adjunct Professor in 2002 and joined the faculty full-time in 2011. Prior to joining LTU, Anne worked in Industry for 25 years where she focused in information technology and management. Her IT career started in the mid-1980's on a help desk, and over the years Anne developed technical proficiency as a database administrator, network administrator, and technical business analyst. After a decade, Anne was promoted to management and worked as a project manager, IT Director, and Vice President of IT and Chief Information Security Officer (CISO). Dr. Kohnke's technical experience and organization development background aided her in building collaborative, high performance teams to work on complex medium to large-scale technical projects. Anne has managed multi-million dollar IT budgets in fast paced entrepreneurial environments. As a former CISO, Anne has extensive hands-on experience in risk management, IT security controls, IT governance, and IT audits to include NIST and PCI certifications. Dr. Kohnke earned her PhD from Benedictine University and an MBA from Lawrence Technological University.</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Excelsior College Student Success Center</title>
      <itunes:title>Distance EDU On Demand: Excelsior College Student Success Center</itunes:title>
      <pubDate>Wed, 04 Feb 2015 18:12:38 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b15a465cac20a15adfbe170988a31524]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/campustalk-excelsior-college-student-success-center]]></link>
      <description><![CDATA[Glen Braddock, director of student success at Excelsior, presents to the college community on the development of the Excelsior College Student Success Center. Braddock discusses the central role of academic advising, enhanced student services, data informed outreach to vulnerable student populations, and other efforts to increase persistence, retention, and graduation rates.]]></description>
      
      <content:encoded><![CDATA[Glen Braddock, director of student success at Excelsior, presents to the college community on the development of the Excelsior College Student Success Center. Braddock discusses the central role of academic advising, enhanced student services, data informed outreach to vulnerable student populations, and other efforts to increase persistence, retention, and graduation rates.]]></content:encoded>
      
      
      <enclosure length="7670386" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/CampusTalk.GlennBraddock.StudentSuccess.mp3?dest-id=136543"/>
      <itunes:duration>08:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Glen Braddock, director of student success at Excelsior, presents to the college community on the development of the Excelsior College Student Success Center. Braddock discusses the central role of academic advising, enhanced student services, data informed outreach to vulnerable student populations, and other efforts to increase persistence, retention, and graduation rates.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Glen Braddock, director of student success at Excelsior, presents to the college community on the development of the Excelsior College Student Success Center. Braddock discusses the central role of academic advising, enhanced student services, data informed outreach to vulnerable student populations, and other efforts to increase persistence, retention, and graduation rates.</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: How to fund higher education innovation</title>
      <itunes:title>Distance EDU On Demand: How to fund higher education innovation</itunes:title>
      <pubDate>Tue, 25 Nov 2014 19:55:41 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5f39ba8f1f3da92291cf3d6a25de9265]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/campus-talk-how-to-fund-higher-education-innovation]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> The Office of Grant Writing and Management at Excelsior College discusses how to write a winning award proposal and what it takes to secure funding for the institution’s most innovative projects and initiatives. Guests include Patti Croop, Director of Grants and Research, Bethany de Barros, Grants Manager, and Jane Weyers, Grants Writer. 0:24 HESC Grant and the key elements of a successful proposal. 3:04 Data and building upon existing research. 4:27 Managing multiple stakeholders. 5:36 Are successful grant proposals always successful grants projects? 6:50 Every proposal demands a “champion.” 7:43 Challenges and opportunities. 8:52 How does a proposal get started? Vetted? 10:35 Why great proposals don’t start with a funder, but with an idea.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> The Office of Grant Writing and Management at Excelsior College discusses how to write a winning award proposal and what it takes to secure funding for the institution’s most innovative projects and initiatives. Guests include Patti Croop, Director of Grants and Research, Bethany de Barros, Grants Manager, and Jane Weyers, Grants Writer. 0:24 HESC Grant and the key elements of a successful proposal. 3:04 Data and building upon existing research. 4:27 Managing multiple stakeholders. 5:36 Are successful grant proposals always successful grants projects? 6:50 Every proposal demands a “champion.” 7:43 Challenges and opportunities. 8:52 How does a proposal get started? Vetted? 10:35 Why great proposals don’t start with a funder, but with an idea.]]></content:encoded>
      
      
      <enclosure length="11451244" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/CampusTalk.FundingHigherEducationInnovation.mp3?dest-id=136543"/>
      <itunes:duration>11:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} The Office of Grant Writing and Management at Excelsior College discusses how to write a winning award proposal and what it takes to secure funding for the institution’s most innovative projects and initiatives. Guests include Patti Croop, Director of Grants and Research, Bethany de Barros, Grants Manager, and Jane Weyers, Grants Writer. 0:24 HESC Grant and the key elements of a successful proposal. 3:04 Data and building upon existing research. 4:27 Managing multiple stakeholders. 5:36 Are successful grant proposals always successful grants projects? 6:50 Every proposal demands a “champion.” 7:43 Challenges and opportunities. 8:52 How does a proposal get started? Vetted? 10:35 Why great proposals don’t start with a funder, but with an idea.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} The Office of Grant Writing and Management at Excelsior College discusses how to write a winning award proposal and what it takes to secure funding for the institution’s most innovative projects and initiatives. Guests include Patti Croop, Director of Grants and Research, Bethany de Barros, Grants Manager, and Jane Weyers, Grants Writer. 0:24 HESC Grant and the key elements of a successful proposal. 3:04 Data and building upon existing research. 4:27 Managing multiple stakeholders. 5:36 Are successful grant proposals always successful grants projects? 6:50 Every proposal demands a “champion.” 7:43 Challenges and opportunities. 8:52 How does a proposal get started? Vetted? 10:35 Why great proposals don’t start with a funder, but with an idea.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Nursing entrepreneur Robert Freeman</title>
      <itunes:title>Distance EDU on Demand: Nursing entrepreneur Robert Freeman</itunes:title>
      <pubDate>Wed, 12 Nov 2014 15:37:44 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[cb3fd10f0d69f475ab193e43ae62a0f5]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/campus-talk-nursing-entrepreneur-robert-freeman]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Clinical nurse specialist and tech entrepreneur Robert Freeman, ’14, discusses how Excelsior’s Master of Science in nursing program prepared him for a career in health care and innovation.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Clinical nurse specialist and tech entrepreneur Robert Freeman, ’14, discusses how Excelsior’s Master of Science in nursing program prepared him for a career in health care and innovation.]]></content:encoded>
      
      
      <enclosure length="1347917" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Freeman_on_Nursing_Degree.mp3?dest-id=136543"/>
      <itunes:duration>01:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Clinical nurse specialist and tech entrepreneur Robert Freeman, ’14, discusses how Excelsior’s Master of Science in nursing program prepared him for a career in health care and innovation.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Clinical nurse specialist and tech entrepreneur Robert Freeman, ’14, discusses how Excelsior’s Master of Science in nursing program prepared him for a career in health care and innovation.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: How to Establish Effective Cybersecurity Metrics</title>
      <itunes:title>Today in Cybersecurity: How to Establish Effective Cybersecurity Metrics</itunes:title>
      <pubDate>Tue, 28 Oct 2014 14:52:42 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[72cc6813047aa6a11a27ec474fec481a]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-how-to-establish-effective-cybersecurity-metrics]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith provides a definition of security metrics, explains the value of these metrics, and provides seven steps for building a security metrics program. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith provides a definition of security metrics, explains the value of these metrics, and provides seven steps for building a security metrics program. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="11884335" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Cybersecurity_Metrics.mp3?dest-id=136543"/>
      <itunes:duration>12:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith provides a definition of security metrics, explains the value of these metrics, and provides seven steps for building a security metrics program. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith provides a definition of security metrics, explains the value of these metrics, and provides seven steps for building a security metrics program. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: The Importance of Security Awareness Training</title>
      <itunes:title>Today in Cybersecurity: The Importance of Security Awareness Training</itunes:title>
      <pubDate>Tue, 28 Oct 2014 14:12:34 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c30b5c4aaacda3041fe43bfb5a97622d]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-the-importance-of-security-awareness-training]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek A. Smith discusses the importance of organizations having a good security awareness program and provides seven tips to more effectively communicate and educate employees on the topic of security awareness. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek A. Smith discusses the importance of organizations having a good security awareness program and provides seven tips to more effectively communicate and educate employees on the topic of security awareness. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="8322081" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity.Derek_Smith_on_Security_Awareness_Training.mp3?dest-id=136543"/>
      <itunes:duration>08:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek A. Smith discusses the importance of organizations having a good security awareness program and provides seven tips to more effectively communicate and educate employees on the topic of security awareness. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek A. Smith discusses the importance of organizations having a good security awareness program and provides seven tips to more effectively communicate and educate employees on the topic of security awareness. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Deborah Golden Alecson on Dying in America</title>
      <itunes:title>Distance EDU On Demand: Deborah Golden Alecson on Dying in America</itunes:title>
      <pubDate>Fri, 24 Oct 2014 15:05:28 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0068eae13edc9aa1523b35948283eaf5]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/deborah-golden-alecson-on-dying-in-america]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--><!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Deborah Golden Alecson, a faculty member in the Schools of Health Science and Nursing at Excelsior College, joins the show to discuss a September 2014 report issued by the Institute of Medicine called “Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life.” Alecson is faculty member in the Schools of Health Science and Nursing, an author, and one of Excelsior’s resident experts on death, dying and bereavement. 0:30 Top takeaways from “Dying in America” report. 4:55 “Most people aren’t planning for their demise.” 5:48 Palliative care versus hospice care. 7:50 Characteristics of the U.S. health care system that impede high quality end-of-life care. 11:45 Why a lack of physician-patient communication leads to higher ER visits. 13:38 Transparency over reimbursements. 13:26 Opportunities for improvement. 15:00 Reform - what do accountability measures look like? 16:25 Public education and awareness campaigns. Show Notes Deborah Golden Alecson Expert Profile Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life (Institute of Medicine) School of Health Sciences School of Nursing]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--><!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Deborah Golden Alecson, a faculty member in the Schools of Health Science and Nursing at Excelsior College, joins the show to discuss a September 2014 report issued by the Institute of Medicine called “Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life.” Alecson is faculty member in the Schools of Health Science and Nursing, an author, and one of Excelsior’s resident experts on death, dying and bereavement. 0:30 Top takeaways from “Dying in America” report. 4:55 “Most people aren’t planning for their demise.” 5:48 Palliative care versus hospice care. 7:50 Characteristics of the U.S. health care system that impede high quality end-of-life care. 11:45 Why a lack of physician-patient communication leads to higher ER visits. 13:38 Transparency over reimbursements. 13:26 Opportunities for improvement. 15:00 Reform - what do accountability measures look like? 16:25 Public education and awareness campaigns. Show Notes Deborah Golden Alecson Expert Profile Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life (Institute of Medicine) School of Health Sciences School of Nursing]]></content:encoded>
      
      
      <enclosure length="22363741" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Alecson_on_Dying_in_America.mp3?dest-id=136543"/>
      <itunes:duration>23:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Deborah Golden Alecson, a faculty member in the Schools of Health Science and Nursing at Excelsior College, joins the show to discuss a September 2014 report issued by the Institute of Medicine called “Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life.” Alecson is faculty member in the Schools of Health Science and Nursing, an author, and one of Excelsior’s resident experts on death, dying and bereavement. 0:30 Top takeaways from “Dying in America” report. 4:55 “Most people aren’t planning for their demise.” 5:48 Palliative care versus hospice care. 7:50 Characteristics of the U.S. health care system that impede high quality end-of-life care. 11:45 Why a lack of physician-patient communication leads to higher ER visits. 13:38 Transparency over reimbursements. 13:26 Opportunities for improvement. 15:00 Reform - what do accountability measures look like? 16:25 Public education and awareness campaigns. Show Notes Deborah Golden Alecson Expert Profile Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life (Institute of Medicine) School of Health Sciences School of Nursing</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Deborah Golden Alecson, a faculty member in the Schools of Health Science and Nursing at Excelsior College, joins the show to discuss a September 2014 report issued by the Institute of Medicine called “Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life.” Alecson is faculty member in the Schools of Health Science and Nursing, an author, and one of Excelsior’s resident experts on death, dying and bereavement. 0:30 Top takeaways from “Dying in America” report. 4:55 “Most people aren’t planning for their demise.” 5:48 Palliative care versus hospice care. 7:50 Characteristics of the U.S. health care system that impede high quality end-of-life care. 11:45 Why a lack of physician-patient communication leads to higher ER visits. 13:38 Transparency over reimbursements. 13:26 Opportunities for improvement. 15:00 Reform - what do accountability measures look like? 16:25 Public education and awareness campaigns. Show Notes Deborah Golden Alecson Expert Profile Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life (Institute of Medicine) School of Health Sciences School of Nursing</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Cyber Stalking...Protect Yourself</title>
      <itunes:title>Today in Cybersecurity: Cyber Stalking...Protect Yourself</itunes:title>
      <pubDate>Fri, 24 Oct 2014 14:33:34 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[735a3bdef737c46fb58c439c158a8a88]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-cyber-stalkingprotect-yourself]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Cyber Stalking is a new occurrence that media and law enforcement have struggled to define. In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley will define cyber stalking, discuss its targets, what law enforcement is combating the problem, and present ways to protect yourself from cyber stalking. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Cyber Stalking is a new occurrence that media and law enforcement have struggled to define. In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley will define cyber stalking, discuss its targets, what law enforcement is combating the problem, and present ways to protect yourself from cyber stalking. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></content:encoded>
      
      
      <enclosure length="6810677" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity.Wesley_on_Cyber_Stalking.mp3?dest-id=136543"/>
      <itunes:duration>07:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Cyber Stalking is a new occurrence that media and law enforcement have struggled to define. In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley will define cyber stalking, discuss its targets, what law enforcement is combating the problem, and present ways to protect yourself from cyber stalking. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Cyber Stalking is a new occurrence that media and law enforcement have struggled to define. In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley will define cyber stalking, discuss its targets, what law enforcement is combating the problem, and present ways to protect yourself from cyber stalking. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Preventing Online Identity Theft</title>
      <itunes:title>Today in Cybersecurity: Preventing Online Identity Theft</itunes:title>
      <pubDate>Fri, 24 Oct 2014 14:19:57 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[dc229217b539033dce902f5ad269ec3a]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-preventing-online-identity-theft]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, former Federal investigator Derek A. Smith offers several ways to protect your personal information while working online. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, former Federal investigator Derek A. Smith offers several ways to protect your personal information while working online. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="8077139" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Derek_Smith_on_Preventing_Online_Identity_Theft.mp3?dest-id=136543"/>
      <itunes:duration>08:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, former Federal investigator Derek A. Smith offers several ways to protect your personal information while working online. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, former Federal investigator Derek A. Smith offers several ways to protect your personal information while working online. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Are Public Wireless Networks Safe?</title>
      <itunes:title>Today in Cybersecurity: Are Public Wireless Networks Safe?</itunes:title>
      <pubDate>Wed, 22 Oct 2014 15:38:17 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[cb6cc60cf245de8a1ef67b1fba37cdf5]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-are-public-wireless-networks-safe]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith highlights security threats you may encounter when using public wireless access points, and explains what you need to know to use wireless safely in public. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} <![endif]--> Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith highlights security threats you may encounter when using public wireless access points, and explains what you need to know to use wireless safely in public. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} <![endif]--> Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="8655197" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Smith_on_Public_Wireless_Networks.mp3?dest-id=136543"/>
      <itunes:duration>09:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} In this National Cybersecurity Institute podcast, Derek Smith highlights security threats you may encounter when using public wireless access points, and explains what you need to know to use wireless safely in public. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} In this National Cybersecurity Institute podcast, Derek Smith highlights security threats you may encounter when using public wireless access points, and explains what you need to know to use wireless safely in public. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Cyber Investigations....What is the Procedure?</title>
      <itunes:title>Today in Cybersecurity: Cyber Investigations....What is the Procedure?</itunes:title>
      <pubDate>Tue, 21 Oct 2014 20:27:12 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[d893e6d6df66d81198e5cf4943bd3d1e]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-cyber-investigationswhat-is-the-procedure]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the topic of cyber investigations and various procedures that an investigator may utilize during a crime investigation. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the topic of cyber investigations and various procedures that an investigator may utilize during a crime investigation. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></content:encoded>
      
      
      <enclosure length="7305123" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Wesley_on_Cyber_Investigations.mp3?dest-id=136543"/>
      <itunes:duration>07:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the topic of cyber investigations and various procedures that an investigator may utilize during a crime investigation. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the topic of cyber investigations and various procedures that an investigator may utilize during a crime investigation. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Cyber Risk Insurance</title>
      <itunes:title>Today in Cybersecurity: Cyber Risk Insurance</itunes:title>
      <pubDate>Mon, 20 Oct 2014 15:18:05 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bafb62cb6281fbead5f944b6f2cd6149]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-cyber-risk-insurance]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek A. Smith provides a brief overview of cyber risk insurance. He describes what cyber risk insurance is, talks about a few problems with this type of insurance and offers five considerations should you decide to purchase cyber risk insurance. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek A. Smith provides a brief overview of cyber risk insurance. He describes what cyber risk insurance is, talks about a few problems with this type of insurance and offers five considerations should you decide to purchase cyber risk insurance. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="9408324" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Cyber_Risk_Insurance.mp3?dest-id=136543"/>
      <itunes:duration>09:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek A. Smith provides a brief overview of cyber risk insurance. He describes what cyber risk insurance is, talks about a few problems with this type of insurance and offers five considerations should you decide to purchase cyber risk insurance. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek A. Smith provides a brief overview of cyber risk insurance. He describes what cyber risk insurance is, talks about a few problems with this type of insurance and offers five considerations should you decide to purchase cyber risk insurance. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Deanne Cranford-Wesley on Secure Software Development</title>
      <itunes:title>Today in Cybersecurity: Deanne Cranford-Wesley on Secure Software Development</itunes:title>
      <pubDate>Thu, 16 Oct 2014 18:55:51 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[fbdebd16afd65e3c72e5c356336ef1a2]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-deanne-cranford-wesley-on-secure-software-development]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses the importance of secure code in the protection of data. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses the importance of secure code in the protection of data. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></content:encoded>
      
      
      <enclosure length="7570139" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Wesley_on_Secure_Software_Development.mp3?dest-id=136543"/>
      <itunes:duration>07:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses the importance of secure code in the protection of data. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses the importance of secure code in the protection of data. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Zero Day Attacks</title>
      <itunes:title>Today in Cybersecurity: Zero Day Attacks</itunes:title>
      <pubDate>Thu, 16 Oct 2014 18:53:51 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c402a3f76faa226d62f3ccafac46f5fb]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-zero-day-attacks]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--><!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek A. Smith discusses zero day attacks, attack vectors utilized to exploit zero day vulnerabilities, and steps to protect against such attacks. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--><!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek A. Smith discusses zero day attacks, attack vectors utilized to exploit zero day vulnerabilities, and steps to protect against such attacks. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="7845992" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Derek_Smith_on_Zero_Day_Attacks.mp3?dest-id=136543"/>
      <itunes:duration>08:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek A. Smith discusses zero day attacks, attack vectors utilized to exploit zero day vulnerabilities, and steps to protect against such attacks. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek A. Smith discusses zero day attacks, attack vectors utilized to exploit zero day vulnerabilities, and steps to protect against such attacks. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Robots and Zombies</title>
      <itunes:title>Today in Cybersecurity: Robots and Zombies</itunes:title>
      <pubDate>Wed, 15 Oct 2014 15:54:28 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2a9415dcb9da2c7f3a8173a4ae4f91f9]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-robots-and-zombies]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> In this National Cybersecurity Institute Podcast, Derek Smith provides a brief overview of Botnets – what they are, what can they do and how to protect against them. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+. <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]-->]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> In this National Cybersecurity Institute Podcast, Derek Smith provides a brief overview of Botnets – what they are, what can they do and how to protect against them. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+. <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]-->]]></content:encoded>
      
      
      <enclosure length="8020699" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Derek_Smith_on_Robots_and_Zombies.mp3?dest-id=136543"/>
      <itunes:duration>08:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 In this National Cybersecurity Institute Podcast, Derek Smith provides a brief overview of Botnets – what they are, what can they do and how to protect against them. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 In this National Cybersecurity Institute Podcast, Derek Smith provides a brief overview of Botnets – what they are, what can they do and how to protect against them. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Medical Device Cybersecurity</title>
      <itunes:title>Today in Cybersecurity: Medical Device Cybersecurity</itunes:title>
      <pubDate>Tue, 14 Oct 2014 19:01:33 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1070e6d6920e19a1dc71871f8bf6407b]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-medical-device-cybersecurity]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith discusses the possibility of medical devices being hacked and the FDAs guidance on how to deal with such a threat. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith discusses the possibility of medical devices being hacked and the FDAs guidance on how to deal with such a threat. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="6306231" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Derek_Smith_on_Hacking_Medical_Devices.mp3?dest-id=136543"/>
      <itunes:duration>06:35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith discusses the possibility of medical devices being hacked and the FDAs guidance on how to deal with such a threat. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith discusses the possibility of medical devices being hacked and the FDAs guidance on how to deal with such a threat. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Social Media Tricks and Tips</title>
      <itunes:title>Today in Cybersecurity: Social Media Tricks and Tips</itunes:title>
      <pubDate>Tue, 14 Oct 2014 18:59:01 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[984f11e7260107094ac229d4875324ad]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-social-media-tricks-and-tips]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Social Media is a great way to stay connected with others, but caution is essential when building a personal internet presence. In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses social media safety and tricks and tips to protect your online presence. Dr. Deanne Cranford-Wesley Biography Dr. Deanne Cranford-Wesley is a National Cybersecurity Institute fellow, and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford-Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology, and an MA in Administration. Furthermore, she has obtained the following certifications: Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Social Media is a great way to stay connected with others, but caution is essential when building a personal internet presence. In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses social media safety and tricks and tips to protect your online presence. Dr. Deanne Cranford-Wesley Biography Dr. Deanne Cranford-Wesley is a National Cybersecurity Institute fellow, and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford-Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology, and an MA in Administration. Furthermore, she has obtained the following certifications: Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></content:encoded>
      
      
      <enclosure length="7319364" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Wesley_on_Social_Media_Safety.mp3?dest-id=136543"/>
      <itunes:duration>07:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Social Media is a great way to stay connected with others, but caution is essential when building a personal internet presence. In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses social media safety and tricks and tips to protect your online presence. Dr. Deanne Cranford-Wesley Biography Dr. Deanne Cranford-Wesley is a National Cybersecurity Institute fellow, and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford-Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology, and an MA in Administration. Furthermore, she has obtained the following certifications: Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Social Media is a great way to stay connected with others, but caution is essential when building a personal internet presence. In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses social media safety and tricks and tips to protect your online presence. Dr. Deanne Cranford-Wesley Biography Dr. Deanne Cranford-Wesley is a National Cybersecurity Institute fellow, and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford-Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology, and an MA in Administration. Furthermore, she has obtained the following certifications: Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Derek Smith on Ransomware</title>
      <itunes:title>Today in Cybersecurity: Derek Smith on Ransomware</itunes:title>
      <pubDate>Thu, 09 Oct 2014 18:00:23 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6044904b8f6e805af03c5e4cae3c14c4]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-derek-smith-on-ransomware]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith offers an introduction to ransomware, a type of malware that restricts access to an infected computer system and demands a ransom for the restriction to be removed. This podcast provides a brief introduction to ransomware, including specific programs like CryptoLocker, and steps organizations can take to combat an attack. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith offers an introduction to ransomware, a type of malware that restricts access to an infected computer system and demands a ransom for the restriction to be removed. This podcast provides a brief introduction to ransomware, including specific programs like CryptoLocker, and steps organizations can take to combat an attack. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="8719945" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._Derek_Smith_on_Ransomware.mp3?dest-id=136543"/>
      <itunes:duration>09:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith offers an introduction to ransomware, a type of malware that restricts access to an infected computer system and demands a ransom for the restriction to be removed. This podcast provides a brief introduction to ransomware, including specific programs like CryptoLocker, and steps organizations can take to combat an attack. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith offers an introduction to ransomware, a type of malware that restricts access to an infected computer system and demands a ransom for the restriction to be removed. This podcast provides a brief introduction to ransomware, including specific programs like CryptoLocker, and steps organizations can take to combat an attack. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dr. Michael Johnson on careers in energy</title>
      <itunes:title>Distance EDU on Demand: Dr. Michael Johnson on careers in energy</itunes:title>
      <pubDate>Wed, 08 Oct 2014 14:47:59 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6528b8a5279edf9353248736455ea061]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/-distance-edu-on-demand-dr-michael-johnson-on-careers-in-energy]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In recognition of National Careers in Energy Week, Dr. Michael Johnson, faculty member, School of Business and Technology discusses recent developments in the energy industry, in-demand energy career pathways, and the importance of a degree to career advancement. Before arriving in academia, Dr. Johnson served in the U.S. Navy and worked for more than two decades in the nuclear industry. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> 2:20 Current in-demand energy careers. 3:25 How has the nuclear industry evolved over past decade? 4: 05 Career advancement in the energy industry. 4:25 Common questions nuclear plant workers have concerning higher education? 5:53 Energy-related degree offerings at Excelsior. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Show Notes Excelsior College School of Business and Technology ABET]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In recognition of National Careers in Energy Week, Dr. Michael Johnson, faculty member, School of Business and Technology discusses recent developments in the energy industry, in-demand energy career pathways, and the importance of a degree to career advancement. Before arriving in academia, Dr. Johnson served in the U.S. Navy and worked for more than two decades in the nuclear industry. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> 2:20 Current in-demand energy careers. 3:25 How has the nuclear industry evolved over past decade? 4: 05 Career advancement in the energy industry. 4:25 Common questions nuclear plant workers have concerning higher education? 5:53 Energy-related degree offerings at Excelsior. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Show Notes Excelsior College School of Business and Technology ABET]]></content:encoded>
      
      
      <enclosure length="6908446" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Distance_EDU_on_Demand.Michael_Johnson_on_Careers_in_Energy.mp3?dest-id=136543"/>
      <itunes:duration>07:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In recognition of National Careers in Energy Week, Dr. Michael Johnson, faculty member, School of Business and Technology discusses recent developments in the energy industry, in-demand energy career pathways, and the importance of a degree to career advancement. Before arriving in academia, Dr. Johnson served in the U.S. Navy and worked for more than two decades in the nuclear industry. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} 2:20 Current in-demand energy careers. 3:25 How has the nuclear industry evolved over past decade? 4: 05 Career advancement in the energy industry. 4:25 Common questions nuclear plant workers have concerning higher education? 5:53 Energy-related degree offerings at Excelsior. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Show Notes Excelsior College School of Business and Technology ABET</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In recognition of National Careers in Energy Week, Dr. Michael Johnson, faculty member, School of Business and Technology discusses recent developments in the energy industry, in-demand energy career pathways, and the importance of a degree to career advancement. Before arriving in academia, Dr. Johnson served in the U.S. Navy and worked for more than two decades in the nuclear industry. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} 2:20 Current in-demand energy careers. 3:25 How has the nuclear industry evolved over past decade? 4: 05 Career advancement in the energy industry. 4:25 Common questions nuclear plant workers have concerning higher education? 5:53 Energy-related degree offerings at Excelsior. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Show Notes Excelsior College School of Business and Technology ABET</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Deanne Cranford-Wesley on Network Attacks</title>
      <itunes:title>Today in Cybersecurity: Deanne Cranford-Wesley on Network Attacks</itunes:title>
      <pubDate>Tue, 07 Oct 2014 14:30:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[402149f784be5899d443729030468fdc]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-deanne-cranford-wesley-on-network-attacks]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses networks and the importance of instant communicating to our personal and business lives. The conversation touches upon the most common attacks conducted on networks as well as steps organizations can take to protect them, including access controls, management controls, and segregation of duties. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses networks and the importance of instant communicating to our personal and business lives. The conversation touches upon the most common attacks conducted on networks as well as steps organizations can take to protect them, including access controls, management controls, and segregation of duties. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></content:encoded>
      
      
      <enclosure length="7559272" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._DeanneCranfordWesley_on_Network_Attacks.mp3?dest-id=136543"/>
      <itunes:duration>07:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses networks and the importance of instant communicating to our personal and business lives. The conversation touches upon the most common attacks conducted on networks as well as steps organizations can take to protect them, including access controls, management controls, and segregation of duties. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Deanne Cranford-Wesley discusses networks and the importance of instant communicating to our personal and business lives. The conversation touches upon the most common attacks conducted on networks as well as steps organizations can take to protect them, including access controls, management controls, and segregation of duties. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Dr. Deanne Cranford-Wesley on NIST Cybersecurity Framework</title>
      <itunes:title>Today in Cybersecurity: Dr. Deanne Cranford-Wesley on NIST Cybersecurity Framework</itunes:title>
      <pubDate>Mon, 06 Oct 2014 15:39:19 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[93bfeb3016ba9285a116983129d09084]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-dr-deanne-cranford-wesley-on-nist-cybersecurity-framework]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the Cybersecurity Framework, which was completed in February, 2014 by the National Institute of Standards and Technology in collaboration with law enforcement, federal agencies and industry. The Cybersecurity Framework is a set of industry standards and best practices to help organizations manage cybersecurity risks. This podcast discusses possible implementations of the cybersecurity framework. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley Biography Dr. Deanne Cranford-Wesley is a National Cybersecurity Institute fellow, and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology, and an MA in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the Cybersecurity Framework, which was completed in February, 2014 by the National Institute of Standards and Technology in collaboration with law enforcement, federal agencies and industry. The Cybersecurity Framework is a set of industry standards and best practices to help organizations manage cybersecurity risks. This podcast discusses possible implementations of the cybersecurity framework. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley Biography Dr. Deanne Cranford-Wesley is a National Cybersecurity Institute fellow, and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology, and an MA in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></content:encoded>
      
      
      <enclosure length="6226828" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Final._Wesley_on_NIST_Cybersecurity_Framework.mp3?dest-id=136543"/>
      <itunes:duration>06:30</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the Cybersecurity Framework, which was completed in February, 2014 by the National Institute of Standards and Technology in collaboration with law enforcement, federal agencies and industry. The Cybersecurity Framework is a set of industry standards and best practices to help organizations manage cybersecurity risks. This podcast discusses possible implementations of the cybersecurity framework. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Biography Dr. Deanne Cranford-Wesley is a National Cybersecurity Institute fellow, and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology, and an MA in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the Cybersecurity Framework, which was completed in February, 2014 by the National Institute of Standards and Technology in collaboration with law enforcement, federal agencies and industry. The Cybersecurity Framework is a set of industry standards and best practices to help organizations manage cybersecurity risks. This podcast discusses possible implementations of the cybersecurity framework. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Biography Dr. Deanne Cranford-Wesley is a National Cybersecurity Institute fellow, and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology, and an MA in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Derek Smith on Advanced Persistent Threats</title>
      <itunes:title>Today in Cybersecurity: Derek Smith on Advanced Persistent Threats</itunes:title>
      <pubDate>Thu, 02 Oct 2014 16:44:58 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4599a17d0618c26adaa67907ecbca9d4]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-derek-smith-on-advanced-persistent-threats]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith discusses Advanced Persistent Threats (APTs). Smith defines what APT's are and provides an overview of how Advanced Persistent Threat actors breach enterprises. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith discusses Advanced Persistent Threats (APTs). Smith defines what APT's are and provides an overview of how Advanced Persistent Threat actors breach enterprises. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="7262939" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity.Derek_Smith_on_Advanced_Persistent_Threats.mp3?dest-id=136543"/>
      <itunes:duration>07:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith discusses Advanced Persistent Threats (APTs). Smith defines what APT's are and provides an overview of how Advanced Persistent Threat actors breach enterprises. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith discusses Advanced Persistent Threats (APTs). Smith defines what APT's are and provides an overview of how Advanced Persistent Threat actors breach enterprises. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Deanne Cranford-Wesley on Incident Response and Disaster Recovery</title>
      <itunes:title>Today in Cybersecurity: Deanne Cranford-Wesley on Incident Response and Disaster Recovery</itunes:title>
      <pubDate>Thu, 02 Oct 2014 15:57:04 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a9de252cfba8a65df58f39bbede0aa11]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-deanne-cranford-wesley-on-incident-response-and-disaster-recovery]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses incident response and disaster recovery and how an organization can effectively and efficiently develop an Incident Response to Disaster Recovery plan. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses incident response and disaster recovery and how an organization can effectively and efficiently develop an Incident Response to Disaster Recovery plan. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></content:encoded>
      
      
      <enclosure length="5954309" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity.Wesley_on_DisasterIncidentResponseandRecovery.mp3?dest-id=136543"/>
      <itunes:duration>06:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses incident response and disaster recovery and how an organization can effectively and efficiently develop an Incident Response to Disaster Recovery plan. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses incident response and disaster recovery and how an organization can effectively and efficiently develop an Incident Response to Disaster Recovery plan. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Jay Julian on combating cyber crime</title>
      <itunes:title>Distance EDU on Demand: Jay Julian on combating cyber crime</itunes:title>
      <pubDate>Thu, 02 Oct 2014 14:16:46 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a3d248a57d5fef3117cfc11f5ebd4ba9]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/campustalk-jay-julian-on-the-challenge-of-combating-cyber-crime]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Jay Julian, a faculty member in the School of Public Service, discusses the difficulties in identifying and preventing cyber crime and steps to prevent from becoming a victim. Julian is a retired Nassau County Police Officer, U.S. marine, criminologist, and former Surface Transportation Security Inspector for Department of Homeland Security (DHS).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Jay Julian, a faculty member in the School of Public Service, discusses the difficulties in identifying and preventing cyber crime and steps to prevent from becoming a victim. Julian is a retired Nassau County Police Officer, U.S. marine, criminologist, and former Surface Transportation Security Inspector for Department of Homeland Security (DHS).]]></content:encoded>
      
      
      <enclosure length="855936" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Jay_Julian_on_Combating_Cyber_Crime.mp3?dest-id=136543"/>
      <itunes:duration>01:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Jay Julian, a faculty member in the School of Public Service, discusses the difficulties in identifying and preventing cyber crime and steps to prevent from becoming a victim. Julian is a retired Nassau County Police Officer, U.S. marine, criminologist, and former Surface Transportation Security Inspector for Department of Homeland Security (DHS).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Jay Julian, a faculty member in the School of Public Service, discusses the difficulties in identifying and preventing cyber crime and steps to prevent from becoming a victim. Julian is a retired Nassau County Police Officer, U.S. marine, criminologist, and former Surface Transportation Security Inspector for Department of Homeland Security (DHS).</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Cyber Threat Intelligence</title>
      <itunes:title>Today in Cybersecurity: Cyber Threat Intelligence</itunes:title>
      <pubDate>Thu, 02 Oct 2014 13:57:52 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[16cc5d17952b9fbb74327928d1838b7c]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-cyber-threat-intelligence]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--><!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith provides a brief introduction to cyber-threat intelligence. The intent is to create awareness of the cyber security threat environment and discuss a few methods and means of collecting and reporting threat information for actionable intelligence and risk assessment analysis. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--><!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> In this National Cybersecurity Institute podcast, Derek Smith provides a brief introduction to cyber-threat intelligence. The intent is to create awareness of the cyber security threat environment and discuss a few methods and means of collecting and reporting threat information for actionable intelligence and risk assessment analysis. <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="9031397" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity.DerekSmith.Cyber_Threat_Intelligence.mp3?dest-id=136543"/>
      <itunes:duration>09:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith provides a brief introduction to cyber-threat intelligence. The intent is to create awareness of the cyber security threat environment and discuss a few methods and means of collecting and reporting threat information for actionable intelligence and risk assessment analysis. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith provides a brief introduction to cyber-threat intelligence. The intent is to create awareness of the cyber security threat environment and discuss a few methods and means of collecting and reporting threat information for actionable intelligence and risk assessment analysis. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Dr. Deanne Cranford-Wesley on e-discovery Tools</title>
      <itunes:title>Today in Cybersecurity: Dr. Deanne Cranford-Wesley on e-discovery Tools</itunes:title>
      <pubDate>Mon, 29 Sep 2014 20:57:19 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[8b2f2c15791a95161b90f346be6a19a8]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/dr-deanne-cranford-wesley-on-e-discovery-tools]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley discusses e-discovery tools, their use within the investigation and litigation process, and how they compare with digital forensics toolkits. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Deanne Cranford-Wesley discusses e-discovery tools, their use within the investigation and litigation process, and how they compare with digital forensics toolkits. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).]]></content:encoded>
      
      
      <enclosure length="6623462" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity._DeanneCranfordWesley.mp3?dest-id=136543"/>
      <itunes:duration>06:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley discusses e-discovery tools, their use within the investigation and litigation process, and how they compare with digital forensics toolkits. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley discusses e-discovery tools, their use within the investigation and litigation process, and how they compare with digital forensics toolkits. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Derek Smith on SCADA</title>
      <itunes:title>Today in Cybersecurity: Derek Smith on SCADA</itunes:title>
      <pubDate>Fri, 26 Sep 2014 17:46:59 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[426e893779b23b5f8f0e1ce08a347ebf]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-derek-smith-on-scada]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> This podcast provides a brief overview of security issues related to Supervisory Control and Data Systems, or SCADA, security. Derek Smith of the National Cybersecurity Institute at Excelsior College provides a brief overview of what SCADA is, why it needs securing, and introduce a new SCADA network protocol for communicating and protecting SCADA controlled communications. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> This podcast provides a brief overview of security issues related to Supervisory Control and Data Systems, or SCADA, security. Derek Smith of the National Cybersecurity Institute at Excelsior College provides a brief overview of what SCADA is, why it needs securing, and introduce a new SCADA network protocol for communicating and protecting SCADA controlled communications. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="6516046" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Today_in_Cybersecurity.Derek_Smith_on_SCADA.mp3?dest-id=136543"/>
      <itunes:duration>06:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} This podcast provides a brief overview of security issues related to Supervisory Control and Data Systems, or SCADA, security. Derek Smith of the National Cybersecurity Institute at Excelsior College provides a brief overview of what SCADA is, why it needs securing, and introduce a new SCADA network protocol for communicating and protecting SCADA controlled communications. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} This podcast provides a brief overview of security issues related to Supervisory Control and Data Systems, or SCADA, security. Derek Smith of the National Cybersecurity Institute at Excelsior College provides a brief overview of what SCADA is, why it needs securing, and introduce a new SCADA network protocol for communicating and protecting SCADA controlled communications. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Today in Cybersecurity: Derek Smith on Cyber Forensics Tools</title>
      <itunes:title>Today in Cybersecurity: Derek Smith on Cyber Forensics Tools</itunes:title>
      <pubDate>Fri, 26 Sep 2014 17:32:20 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[73af4b7baad0b656bf4a63eaf597a4c6]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/today-in-cybersecurity-derek-smith-on-cyber-forensics-tools]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--><!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--><!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> This podcast provides a brief introduction to cyber and digital forensic operations. Derek Smith of the National Cybersecurity Institute at Excelsior College provides a brief overview of the field of cyber forensics and then discusses some of the most prevalent security tools used by cyber forensic professionals today. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--><!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--><!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> This podcast provides a brief introduction to cyber and digital forensic operations. Derek Smith of the National Cybersecurity Institute at Excelsior College provides a brief overview of the field of cyber forensics and then discusses some of the most prevalent security tools used by cyber forensic professionals today. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.]]></content:encoded>
      
      
      <enclosure length="9310939" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Derek_Smith_on_Cyber_Forensics.mp3?dest-id=136543"/>
      <itunes:duration>09:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} This podcast provides a brief introduction to cyber and digital forensic operations. Derek Smith of the National Cybersecurity Institute at Excelsior College provides a brief overview of the field of cyber forensics and then discusses some of the most prevalent security tools used by cyber forensic professionals today. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} This podcast provides a brief introduction to cyber and digital forensic operations. Derek Smith of the National Cybersecurity Institute at Excelsior College provides a brief overview of the field of cyber forensics and then discusses some of the most prevalent security tools used by cyber forensic professionals today. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Jamie Rottmann on returning to school</title>
      <itunes:title>Distance EDU on Demand: Jamie Rottmann on returning to school</itunes:title>
      <pubDate>Wed, 17 Sep 2014 15:55:07 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c9438a0a296d22729620e57e991fb5a8]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/campustalk-jamie-rottmann-on-returning-to-school]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> 2014 Excelsior College graduate Jamie Rottmann was honored at this year’s Commencement with the Marvin Curling Memorial Award, given to a student who has achieved outstanding academic achievement while pursuing a degree in a nuclear technology program. Rottman, a senior nuclear instructor at Entergy Services, describes why he decided to return to school to pursue a college degree.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> 2014 Excelsior College graduate Jamie Rottmann was honored at this year’s Commencement with the Marvin Curling Memorial Award, given to a student who has achieved outstanding academic achievement while pursuing a degree in a nuclear technology program. Rottman, a senior nuclear instructor at Entergy Services, describes why he decided to return to school to pursue a college degree.]]></content:encoded>
      
      
      <enclosure length="977187" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Rottmann_ReturningtoSchool.mp3?dest-id=136543"/>
      <itunes:duration>01:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} 2014 Excelsior College graduate Jamie Rottmann was honored at this year’s Commencement with the Marvin Curling Memorial Award, given to a student who has achieved outstanding academic achievement while pursuing a degree in a nuclear technology program. Rottman, a senior nuclear instructor at Entergy Services, describes why he decided to return to school to pursue a college degree.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} 2014 Excelsior College graduate Jamie Rottmann was honored at this year’s Commencement with the Marvin Curling Memorial Award, given to a student who has achieved outstanding academic achievement while pursuing a degree in a nuclear technology program. Rottman, a senior nuclear instructor at Entergy Services, describes why he decided to return to school to pursue a college degree.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: 2014 Academic Partnership Forum</title>
      <itunes:title>Distance EDU on Demand: 2014 Academic Partnership Forum</itunes:title>
      <pubDate>Mon, 08 Sep 2014 15:57:36 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[07c9a28f3c60e37e0952a088ec2e7b0e]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/campustalk-2014-academic-partnership-forum]]></link>
      <description><![CDATA[Christina Yang, director of academic partnerships, discusses the 2014 Academic Partnership Forum to be held on Excelsior’s campus this Wednesday, September 10.]]></description>
      
      <content:encoded><![CDATA[Christina Yang, director of academic partnerships, discusses the 2014 Academic Partnership Forum to be held on Excelsior’s campus this Wednesday, September 10.]]></content:encoded>
      
      
      <enclosure length="2151936" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Yang_PartnershipForum.mp3?dest-id=136543"/>
      <itunes:duration>04:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Christina Yang, director of academic partnerships, discusses the 2014 Academic Partnership Forum to be held on Excelsior’s campus this Wednesday, September 10.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Christina Yang, director of academic partnerships, discusses the 2014 Academic Partnership Forum to be held on Excelsior’s campus this Wednesday, September 10.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: $1 million federal nursing grant</title>
      <itunes:title>Distance EDU on Demand: $1 million federal nursing grant</itunes:title>
      <pubDate>Fri, 05 Sep 2014 18:29:55 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bef34e0956c93651e41fdfe829bc2937]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/campustalk-press-conference-on-1-million-federal-nursing-grant]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. John Ebersole announces a $1 million federal grant awarded to Excelsior College to assist veterans pursuing a nursing career. U.S. Congressman Paul Tonko (D-NY) offers his own remarks on the importance of supporting the military and our veteran communities.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. John Ebersole announces a $1 million federal grant awarded to Excelsior College to assist veterans pursuing a nursing career. U.S. Congressman Paul Tonko (D-NY) offers his own remarks on the importance of supporting the military and our veteran communities.]]></content:encoded>
      
      
      <enclosure length="19205421" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_College_Nursing_Grant_Press_Conference.mp3?dest-id=136543"/>
      <itunes:duration>20:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. John Ebersole announces a $1 million federal grant awarded to Excelsior College to assist veterans pursuing a nursing career. U.S. Congressman Paul Tonko (D-NY) offers his own remarks on the importance of supporting the military and our veteran communities.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. John Ebersole announces a $1 million federal grant awarded to Excelsior College to assist veterans pursuing a nursing career. U.S. Congressman Paul Tonko (D-NY) offers his own remarks on the importance of supporting the military and our veteran communities.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dr. Robert Kinsinger on the nursing education revolution</title>
      <itunes:title>Distance EDU on Demand: Dr. Robert Kinsinger on the nursing education revolution</itunes:title>
      <pubDate>Fri, 18 Jul 2014 14:23:23 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3f5ff075cb47a0364b1344fe47460d8c]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/dr-robert-kinsinger-on-the-nursing-education-revolution]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Robert Kinsinger,former vice president of the W.K. Kellogg Foundation and a former chair of the Regents College Board of Overseers, joins the podcast to discuss his pioneering work on nursing education in the 1950s. Dr. Kinsinger discusses his collaboration with fellow nursing visionary Dr. Mildred Montag, whether reality lived up to their vision, and his thoughts on the future of the recently launched Institute for Nursing Excellence named in his honor. 1:21 Encountering Dr. Mildred Montag and her ideas for a two-year nursing degree that would prove revolutionary. 3:27 Overcoming initial backlash from physicians and hospitals concerned with losing out on their “free labor”. 4:20 Joining the W.K. Kellogg Foundation. 6:45 The W.K. Kellogg Foundation’s role in expanding two-year nursing education. 8:01 Did reality live up to the vision? 8:32 Changes in nursing education over the decades. 9:30 How does Excelsior’s nursing courses fit into this new paradigm? 12:50 Vision for the Robert E. Kinsinger Institute for Nursing Excellence. Show Notes Dr. Robert E. Kinsinger Robert E. Kinsinger Institute for Nursing Excellence Dr. Barbara Pieper on the Robert E. Kinsinger Institute for Nursing Excellence]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Robert Kinsinger,former vice president of the W.K. Kellogg Foundation and a former chair of the Regents College Board of Overseers, joins the podcast to discuss his pioneering work on nursing education in the 1950s. Dr. Kinsinger discusses his collaboration with fellow nursing visionary Dr. Mildred Montag, whether reality lived up to their vision, and his thoughts on the future of the recently launched Institute for Nursing Excellence named in his honor. 1:21 Encountering Dr. Mildred Montag and her ideas for a two-year nursing degree that would prove revolutionary. 3:27 Overcoming initial backlash from physicians and hospitals concerned with losing out on their “free labor”. 4:20 Joining the W.K. Kellogg Foundation. 6:45 The W.K. Kellogg Foundation’s role in expanding two-year nursing education. 8:01 Did reality live up to the vision? 8:32 Changes in nursing education over the decades. 9:30 How does Excelsior’s nursing courses fit into this new paradigm? 12:50 Vision for the Robert E. Kinsinger Institute for Nursing Excellence. Show Notes Dr. Robert E. Kinsinger Robert E. Kinsinger Institute for Nursing Excellence Dr. Barbara Pieper on the Robert E. Kinsinger Institute for Nursing Excellence]]></content:encoded>
      
      
      <enclosure length="14482284" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Dr._Robert_Kinsinger_on_the_Nursing_Education_Revolution.mp3?dest-id=136543"/>
      <itunes:duration>15:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Robert Kinsinger,former vice president of the W.K. Kellogg Foundation and a former chair of the Regents College Board of Overseers, joins the podcast to discuss his pioneering work on nursing education in the 1950s. Dr. Kinsinger discusses his collaboration with fellow nursing visionary Dr. Mildred Montag, whether reality lived up to their vision, and his thoughts on the future of the recently launched Institute for Nursing Excellence named in his honor. 1:21 Encountering Dr. Mildred Montag and her ideas for a two-year nursing degree that would prove revolutionary. 3:27 Overcoming initial backlash from physicians and hospitals concerned with losing out on their “free labor”. 4:20 Joining the W.K. Kellogg Foundation. 6:45 The W.K. Kellogg Foundation’s role in expanding two-year nursing education. 8:01 Did reality live up to the vision? 8:32 Changes in nursing education over the decades. 9:30 How does Excelsior’s nursing courses fit into this new paradigm? 12:50 Vision for the Robert E. Kinsinger Institute for Nursing Excellence. Show Notes Dr. Robert E. Kinsinger Robert E. Kinsinger Institute for Nursing Excellence Dr. Barbara Pieper on the Robert E. Kinsinger Institute for Nursing Excellence</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Robert Kinsinger,former vice president of the W.K. Kellogg Foundation and a former chair of the Regents College Board of Overseers, joins the podcast to discuss his pioneering work on nursing education in the 1950s. Dr. Kinsinger discusses his collaboration with fellow nursing visionary Dr. Mildred Montag, whether reality lived up to their vision, and his thoughts on the future of the recently launched Institute for Nursing Excellence named in his honor. 1:21 Encountering Dr. Mildred Montag and her ideas for a two-year nursing degree that would prove revolutionary. 3:27 Overcoming initial backlash from physicians and hospitals concerned with losing out on their “free labor”. 4:20 Joining the W.K. Kellogg Foundation. 6:45 The W.K. Kellogg Foundation’s role in expanding two-year nursing education. 8:01 Did reality live up to the vision? 8:32 Changes in nursing education over the decades. 9:30 How does Excelsior’s nursing courses fit into this new paradigm? 12:50 Vision for the Robert E. Kinsinger Institute for Nursing Excellence. Show Notes Dr. Robert E. Kinsinger Robert E. Kinsinger Institute for Nursing Excellence Dr. Barbara Pieper on the Robert E. Kinsinger Institute for Nursing Excellence</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Commencement Stories with the Class of 2014</title>
      <itunes:title>Distance EDU on Demand: Commencement Stories with the Class of 2014</itunes:title>
      <pubDate>Thu, 03 Jul 2014 12:55:51 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[eec0c56804cc177d08a0c0739e083018]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/commencement-stories-the-class-of-2014]]></link>
      <description><![CDATA[In this week’s special Commencement edition of the podcast, host Mike Lesczinski discusses this year’s graduating class and Excelsior’s upcoming Commencement ceremony on July 11. The episode ncludes a complete interview with 2014 nursing graduate Maria Malone, an administrative assistant who, wanting more out of life, headed back to school to pursue a nursing career and is now a clinical nursing supervisor. Malone talks about her decision to change careers, her educational journey, and her plans for the future. In addition, Hannah Elizabeth Arthur, the Charles W. Laffin Jr. Memorial Award winner, discusses applying what she learned in the virtual classroom to her everyday business and plans to co-found a learning center with her mother, a lifelong teacher. The show closes with Marvin Curling Memorial Award winner and US Navy veteran Jamie Rottman discussing why he decided to pursue a Bachelor of Science in Nuclear Engineering Technology. Listen to "Commencement Stories": 1:31 Class of 2014 At-a-Glance 2:34 Commencement Ceremony, Speaker, Awards 4:21 Interview with Maria Malone 11:52 Hannah Elizabeth Arthur, Charles W. Laffin Jr. Memorial Award winner 16:22 Jamie Rottman, Marvin Curling Award winner Show Notes Excelsior College Commencement Behind-the-Scenes: Graduating from a Distance Learning Institution 2014 “Commencement Stories” Archive Class of 2014 “At-a-Glance” Jamie P. Merisotis, president and CEO of Lumina Foundation President’s Medal Awards and Achievements Excelsior College Programs]]></description>
      
      <content:encoded><![CDATA[In this week’s special Commencement edition of the podcast, host Mike Lesczinski discusses this year’s graduating class and Excelsior’s upcoming Commencement ceremony on July 11. The episode ncludes a complete interview with 2014 nursing graduate Maria Malone, an administrative assistant who, wanting more out of life, headed back to school to pursue a nursing career and is now a clinical nursing supervisor. Malone talks about her decision to change careers, her educational journey, and her plans for the future. In addition, Hannah Elizabeth Arthur, the Charles W. Laffin Jr. Memorial Award winner, discusses applying what she learned in the virtual classroom to her everyday business and plans to co-found a learning center with her mother, a lifelong teacher. The show closes with Marvin Curling Memorial Award winner and US Navy veteran Jamie Rottman discussing why he decided to pursue a Bachelor of Science in Nuclear Engineering Technology. Listen to "Commencement Stories": 1:31 Class of 2014 At-a-Glance 2:34 Commencement Ceremony, Speaker, Awards 4:21 Interview with Maria Malone 11:52 Hannah Elizabeth Arthur, Charles W. Laffin Jr. Memorial Award winner 16:22 Jamie Rottman, Marvin Curling Award winner Show Notes Excelsior College Commencement Behind-the-Scenes: Graduating from a Distance Learning Institution 2014 “Commencement Stories” Archive Class of 2014 “At-a-Glance” Jamie P. Merisotis, president and CEO of Lumina Foundation President’s Medal Awards and Achievements Excelsior College Programs]]></content:encoded>
      
      
      <enclosure length="17729409" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Commencement_2.mp3?dest-id=136543"/>
      <itunes:duration>18:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>In this week’s special Commencement edition of the podcast, host Mike Lesczinski discusses this year’s graduating class and Excelsior’s upcoming Commencement ceremony on July 11. The episode ncludes a complete interview with 2014 nursing graduate Maria Malone, an administrative assistant who, wanting more out of life, headed back to school to pursue a nursing career and is now a clinical nursing supervisor. Malone talks about her decision to change careers, her educational journey, and her plans for the future. In addition, Hannah Elizabeth Arthur, the Charles W. Laffin Jr. Memorial Award winner, discusses applying what she learned in the virtual classroom to her everyday business and plans to co-found a learning center with her mother, a lifelong teacher. The show closes with Marvin Curling Memorial Award winner and US Navy veteran Jamie Rottman discussing why he decided to pursue a Bachelor of Science in Nuclear Engineering Technology. Listen to "Commencement Stories": 1:31 Class of 2014 At-a-Glance 2:34 Commencement Ceremony, Speaker, Awards 4:21 Interview with Maria Malone 11:52 Hannah Elizabeth Arthur, Charles W. Laffin Jr. Memorial Award winner 16:22 Jamie Rottman, Marvin Curling Award winner Show Notes Excelsior College Commencement Behind-the-Scenes: Graduating from a Distance Learning Institution 2014 “Commencement Stories” Archive Class of 2014 “At-a-Glance” Jamie P. Merisotis, president and CEO of Lumina Foundation President’s Medal Awards and Achievements Excelsior College Programs</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>In this week’s special Commencement edition of the podcast, host Mike Lesczinski discusses this year’s graduating class and Excelsior’s upcoming Commencement ceremony on July 11. The episode ncludes a complete interview with 2014 nursing graduate Maria Malone, an administrative assistant who, wanting more out of life, headed back to school to pursue a nursing career and is now a clinical nursing supervisor. Malone talks about her decision to change careers, her educational journey, and her plans for the future. In addition, Hannah Elizabeth Arthur, the Charles W. Laffin Jr. Memorial Award winner, discusses applying what she learned in the virtual classroom to her everyday business and plans to co-found a learning center with her mother, a lifelong teacher. The show closes with Marvin Curling Memorial Award winner and US Navy veteran Jamie Rottman discussing why he decided to pursue a Bachelor of Science in Nuclear Engineering Technology. Listen to "Commencement Stories": 1:31 Class of 2014 At-a-Glance 2:34 Commencement Ceremony, Speaker, Awards 4:21 Interview with Maria Malone 11:52 Hannah Elizabeth Arthur, Charles W. Laffin Jr. Memorial Award winner 16:22 Jamie Rottman, Marvin Curling Award winner Show Notes Excelsior College Commencement Behind-the-Scenes: Graduating from a Distance Learning Institution 2014 “Commencement Stories” Archive Class of 2014 “At-a-Glance” Jamie P. Merisotis, president and CEO of Lumina Foundation President’s Medal Awards and Achievements Excelsior College Programs</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dr. Patrick Jones on why online courses are superior to face-to-face classes</title>
      <itunes:title>Distance EDU on Demand: Dr. Patrick Jones on why online courses are superior to face-to-face classes</itunes:title>
      <pubDate>Fri, 20 Jun 2014 14:06:42 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[52ea4b2de329c5a413a047fa1bb10836]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/dr-patrick-jones-on-why-online-courses-are-superior-to-face-to-face-classes]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Patrick Jones, vice provost and interim co-dean of the School of Liberal Arts at Excelsior College, joins the podcast to discuss why online courses are superior to face-to-face traditional classes. Dr. Jones, an assessment and course development expert, believes when it comes to access, faculty-student engagement, and assessment, online has the clear advantage. 0:50 Initial skepticism over whether a quality education can be delivered online. 3:29 Experiences teaching at a traditional college. 4:30 How does an online course increase access? 6:00 Why online courses have more effective instructor-student engagement. 8:02 What could compel traditional schools to move away from one-to-many communication? 11:59 The importance of “assessment events” and how they can be used to improve teaching and learning. 15:16 Where do we go from here? How will online education improve in the coming years? Show Notes Dr. Patrick Jones Expert Profile Faculty Connects: Why Online Courses are Superior to Face-to-Face ClassesExcelsior College Awarded Grant to Explore Adaptive Learning Excelsior Joins National Efforts to Expand Adoption of Competency-Based Education Across U.S. Tina Grant on Competency, Adaptive Learning and Higher Ed Innovation]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Patrick Jones, vice provost and interim co-dean of the School of Liberal Arts at Excelsior College, joins the podcast to discuss why online courses are superior to face-to-face traditional classes. Dr. Jones, an assessment and course development expert, believes when it comes to access, faculty-student engagement, and assessment, online has the clear advantage. 0:50 Initial skepticism over whether a quality education can be delivered online. 3:29 Experiences teaching at a traditional college. 4:30 How does an online course increase access? 6:00 Why online courses have more effective instructor-student engagement. 8:02 What could compel traditional schools to move away from one-to-many communication? 11:59 The importance of “assessment events” and how they can be used to improve teaching and learning. 15:16 Where do we go from here? How will online education improve in the coming years? Show Notes Dr. Patrick Jones Expert Profile Faculty Connects: Why Online Courses are Superior to Face-to-Face ClassesExcelsior College Awarded Grant to Explore Adaptive Learning Excelsior Joins National Efforts to Expand Adoption of Competency-Based Education Across U.S. Tina Grant on Competency, Adaptive Learning and Higher Ed Innovation]]></content:encoded>
      
      
      <enclosure length="18173700" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Patrick_Jones.mp3?dest-id=136543"/>
      <itunes:duration>18:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Patrick Jones, vice provost and interim co-dean of the School of Liberal Arts at Excelsior College, joins the podcast to discuss why online courses are superior to face-to-face traditional classes. Dr. Jones, an assessment and course development expert, believes when it comes to access, faculty-student engagement, and assessment, online has the clear advantage. 0:50 Initial skepticism over whether a quality education can be delivered online. 3:29 Experiences teaching at a traditional college. 4:30 How does an online course increase access? 6:00 Why online courses have more effective instructor-student engagement. 8:02 What could compel traditional schools to move away from one-to-many communication? 11:59 The importance of “assessment events” and how they can be used to improve teaching and learning. 15:16 Where do we go from here? How will online education improve in the coming years? Show Notes Dr. Patrick Jones Expert Profile Faculty Connects: Why Online Courses are Superior to Face-to-Face ClassesExcelsior College Awarded Grant to Explore Adaptive Learning Excelsior Joins National Efforts to Expand Adoption of Competency-Based Education Across U.S. Tina Grant on Competency, Adaptive Learning and Higher Ed Innovation</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Patrick Jones, vice provost and interim co-dean of the School of Liberal Arts at Excelsior College, joins the podcast to discuss why online courses are superior to face-to-face traditional classes. Dr. Jones, an assessment and course development expert, believes when it comes to access, faculty-student engagement, and assessment, online has the clear advantage. 0:50 Initial skepticism over whether a quality education can be delivered online. 3:29 Experiences teaching at a traditional college. 4:30 How does an online course increase access? 6:00 Why online courses have more effective instructor-student engagement. 8:02 What could compel traditional schools to move away from one-to-many communication? 11:59 The importance of “assessment events” and how they can be used to improve teaching and learning. 15:16 Where do we go from here? How will online education improve in the coming years? Show Notes Dr. Patrick Jones Expert Profile Faculty Connects: Why Online Courses are Superior to Face-to-Face ClassesExcelsior College Awarded Grant to Explore Adaptive Learning Excelsior Joins National Efforts to Expand Adoption of Competency-Based Education Across U.S. Tina Grant on Competency, Adaptive Learning and Higher Ed Innovation</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dr. Anna Zendell and Carol Shenise on stress management strategies</title>
      <itunes:title>Distance EDU on Demand: Dr. Anna Zendell and Carol Shenise on stress management strategies</itunes:title>
      <pubDate>Fri, 06 Jun 2014 15:06:22 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7130ef00dbf6b398993c538bd69713b7]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/stress-management-strategies-with-dr-anna-zendell-and-carole-shenise-rn]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Excelsior College’s Dr. Anna Zendell, MSW and Carol Shenise, MS, RN, join the podcast to discuss stress, including triggers, coping strategies, and developing a stress management plan. The conversation touches upon what employers can do to alleviate workplace stress and unique stressors for active duty military and veterans. 0:50 “Managing Stress” course 1:30 The three types of stress. 2:15 Physical manifestations of stress. 3:10 What can trigger stress? How do we identify our stressors? 5:05 Coping strategies. 6:45 Advice for employers looking to mitigate workplace stress. 8:55 Developing a stress management plan. 11:00 Unique stressors to military life. 14:00 Advice and further resources. Show Notes Excelsior College School of Health Sciences Troy Record – Live Chat – Tips on Tackling Stress Manage Stress Before It Manages You (Part 2) Lt. Col. Bryant A. Murray Veterans Center: Health and Wellness Resources]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Excelsior College’s Dr. Anna Zendell, MSW and Carol Shenise, MS, RN, join the podcast to discuss stress, including triggers, coping strategies, and developing a stress management plan. The conversation touches upon what employers can do to alleviate workplace stress and unique stressors for active duty military and veterans. 0:50 “Managing Stress” course 1:30 The three types of stress. 2:15 Physical manifestations of stress. 3:10 What can trigger stress? How do we identify our stressors? 5:05 Coping strategies. 6:45 Advice for employers looking to mitigate workplace stress. 8:55 Developing a stress management plan. 11:00 Unique stressors to military life. 14:00 Advice and further resources. Show Notes Excelsior College School of Health Sciences Troy Record – Live Chat – Tips on Tackling Stress Manage Stress Before It Manages You (Part 2) Lt. Col. Bryant A. Murray Veterans Center: Health and Wellness Resources]]></content:encoded>
      
      
      <enclosure length="14688338" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Stress_Management_with_Zendell_and_Shenise.mp3?dest-id=136543"/>
      <itunes:duration>15:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Excelsior College’s Dr. Anna Zendell, MSW and Carol Shenise, MS, RN, join the podcast to discuss stress, including triggers, coping strategies, and developing a stress management plan. The conversation touches upon what employers can do to alleviate workplace stress and unique stressors for active duty military and veterans. 0:50 “Managing Stress” course 1:30 The three types of stress. 2:15 Physical manifestations of stress. 3:10 What can trigger stress? How do we identify our stressors? 5:05 Coping strategies. 6:45 Advice for employers looking to mitigate workplace stress. 8:55 Developing a stress management plan. 11:00 Unique stressors to military life. 14:00 Advice and further resources. Show Notes Excelsior College School of Health Sciences Troy Record – Live Chat – Tips on Tackling Stress Manage Stress Before It Manages You (Part 2) Lt. Col. Bryant A. Murray Veterans Center: Health and Wellness Resources</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Excelsior College’s Dr. Anna Zendell, MSW and Carol Shenise, MS, RN, join the podcast to discuss stress, including triggers, coping strategies, and developing a stress management plan. The conversation touches upon what employers can do to alleviate workplace stress and unique stressors for active duty military and veterans. 0:50 “Managing Stress” course 1:30 The three types of stress. 2:15 Physical manifestations of stress. 3:10 What can trigger stress? How do we identify our stressors? 5:05 Coping strategies. 6:45 Advice for employers looking to mitigate workplace stress. 8:55 Developing a stress management plan. 11:00 Unique stressors to military life. 14:00 Advice and further resources. Show Notes Excelsior College School of Health Sciences Troy Record – Live Chat – Tips on Tackling Stress Manage Stress Before It Manages You (Part 2) Lt. Col. Bryant A. Murray Veterans Center: Health and Wellness Resources</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Jo Ann Webb on impact of Affordable Care Act on nursing</title>
      <itunes:title>Distance EDU on Demand: Jo Ann Webb on impact of Affordable Care Act on nursing</itunes:title>
      <pubDate>Mon, 12 May 2014 16:54:54 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[d40e0b7b160b767213155b71d06a595a]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/impact-of-affordable-care-act-on-nursing-with-jo-ann-webb-rn-mha]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Jo Ann Webb, RN, MHA, Senior Director of Federal Relations and Policy for the American Organization of Nurses Executives (AONE), joins the Excelsior Life: Distance EDU on Demand podcast to discuss the Affordable Care Act and its impact on nurse educators, managers, and administrators. 0:45 How does the Affordable Care Act allow nurses to showcase their “true” value? 2:20 The ACA and the nursing shortage. 2:50 Does the ACA provide the resources to meet an increase in nursing demand? 3:54 Are nurses prepared for shifting paradigm? 5:00 A much stronger role for nursing schools? 5:50 More money in nursing education. 7:45 What question should nurses be asking when it comes to health care reform? 8:55 A growing role for nurses in primary care. 11:00 Does ACA impact the delivery of health care to military and veteran populations? 12:35 Student career planning. 13:40 How will the Affordable Care Act be viewed in 20 years?]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Jo Ann Webb, RN, MHA, Senior Director of Federal Relations and Policy for the American Organization of Nurses Executives (AONE), joins the Excelsior Life: Distance EDU on Demand podcast to discuss the Affordable Care Act and its impact on nurse educators, managers, and administrators. 0:45 How does the Affordable Care Act allow nurses to showcase their “true” value? 2:20 The ACA and the nursing shortage. 2:50 Does the ACA provide the resources to meet an increase in nursing demand? 3:54 Are nurses prepared for shifting paradigm? 5:00 A much stronger role for nursing schools? 5:50 More money in nursing education. 7:45 What question should nurses be asking when it comes to health care reform? 8:55 A growing role for nurses in primary care. 11:00 Does ACA impact the delivery of health care to military and veteran populations? 12:35 Student career planning. 13:40 How will the Affordable Care Act be viewed in 20 years?]]></content:encoded>
      
      
      <enclosure length="46440478" type="video/x-mp4" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life-_Jo_Ann_Webb2C_RN2C_MHA2C_Discusses_Impact_of_Affordable_Care_Act_on_Nursing.mp4?dest-id=136543"/>
      <itunes:duration>16:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Jo Ann Webb, RN, MHA, Senior Director of Federal Relations and Policy for the American Organization of Nurses Executives (AONE), joins the Excelsior Life: Distance EDU on Demand podcast to discuss the Affordable Care Act and its impact on nurse educators, managers, and administrators. 0:45 How does the Affordable Care Act allow nurses to showcase their “true” value? 2:20 The ACA and the nursing shortage. 2:50 Does the ACA provide the resources to meet an increase in nursing demand? 3:54 Are nurses prepared for shifting paradigm? 5:00 A much stronger role for nursing schools? 5:50 More money in nursing education. 7:45 What question should nurses be asking when it comes to health care reform? 8:55 A growing role for nurses in primary care. 11:00 Does ACA impact the delivery of health care to military and veteran populations? 12:35 Student career planning. 13:40 How will the Affordable Care Act be viewed in 20 years?</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Jo Ann Webb, RN, MHA, Senior Director of Federal Relations and Policy for the American Organization of Nurses Executives (AONE), joins the Excelsior Life: Distance EDU on Demand podcast to discuss the Affordable Care Act and its impact on nurse educators, managers, and administrators. 0:45 How does the Affordable Care Act allow nurses to showcase their “true” value? 2:20 The ACA and the nursing shortage. 2:50 Does the ACA provide the resources to meet an increase in nursing demand? 3:54 Are nurses prepared for shifting paradigm? 5:00 A much stronger role for nursing schools? 5:50 More money in nursing education. 7:45 What question should nurses be asking when it comes to health care reform? 8:55 A growing role for nurses in primary care. 11:00 Does ACA impact the delivery of health care to military and veteran populations? 12:35 Student career planning. 13:40 How will the Affordable Care Act be viewed in 20 years?</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Victoria Van Voorhis  on reimagining learning through serious games</title>
      <itunes:title>Distance EDU on Demand: Victoria Van Voorhis  on reimagining learning through serious games</itunes:title>
      <pubDate>Fri, 09 May 2014 16:29:03 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7cc40408a044051ad3170a4a0008738d]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/reimagining-learning-through-serious-games-with-victoria-van-voorhis]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Victoria Van Voorhis, CEO, Second Avenue Learning, joins the podcast to discuss the disruptive nature of educational games. Topics include how to interject “serious games” back into the educational process, the use of games to enhance traditional learning, and potential obstacles to mainstream expansion. The talk concludes with a discussion of the innovative work of Second Avenue Learning and her vision for the future. 0:57 Games, Disruptive Innovation, Efficacy, and Adoption. 3:00 Using games to enhance the traditional learning experience. 3:55 Games don’t replace a teacher, but extend their ability to engage. 5:10 Breaking down technical barriers to mainstream acceptance of serious games. 6:10 Teacher professional development, budgetary concerns. 8:00 Second Avenue Learning: Reimagining Learning. 10:15 Martha Madison, Funded by National Science Foundation. 13:00 Rochester, New York as a catalyst for growth. 14:40 Looking ahead. Show Notes Center for Game and Simulation-Based Learning Victoria Van Voorhis Second Avenue Learning Martha Madison]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Victoria Van Voorhis, CEO, Second Avenue Learning, joins the podcast to discuss the disruptive nature of educational games. Topics include how to interject “serious games” back into the educational process, the use of games to enhance traditional learning, and potential obstacles to mainstream expansion. The talk concludes with a discussion of the innovative work of Second Avenue Learning and her vision for the future. 0:57 Games, Disruptive Innovation, Efficacy, and Adoption. 3:00 Using games to enhance the traditional learning experience. 3:55 Games don’t replace a teacher, but extend their ability to engage. 5:10 Breaking down technical barriers to mainstream acceptance of serious games. 6:10 Teacher professional development, budgetary concerns. 8:00 Second Avenue Learning: Reimagining Learning. 10:15 Martha Madison, Funded by National Science Foundation. 13:00 Rochester, New York as a catalyst for growth. 14:40 Looking ahead. Show Notes Center for Game and Simulation-Based Learning Victoria Van Voorhis Second Avenue Learning Martha Madison]]></content:encoded>
      
      
      <enclosure length="14985834" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Ep_32_Victoria_Van_Voorhis_Updated.mp3?dest-id=136543"/>
      <itunes:duration>15:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Victoria Van Voorhis, CEO, Second Avenue Learning, joins the podcast to discuss the disruptive nature of educational games. Topics include how to interject “serious games” back into the educational process, the use of games to enhance traditional learning, and potential obstacles to mainstream expansion. The talk concludes with a discussion of the innovative work of Second Avenue Learning and her vision for the future. 0:57 Games, Disruptive Innovation, Efficacy, and Adoption. 3:00 Using games to enhance the traditional learning experience. 3:55 Games don’t replace a teacher, but extend their ability to engage. 5:10 Breaking down technical barriers to mainstream acceptance of serious games. 6:10 Teacher professional development, budgetary concerns. 8:00 Second Avenue Learning: Reimagining Learning. 10:15 Martha Madison, Funded by National Science Foundation. 13:00 Rochester, New York as a catalyst for growth. 14:40 Looking ahead. Show Notes Center for Game and Simulation-Based Learning Victoria Van Voorhis Second Avenue Learning Martha Madison</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Victoria Van Voorhis, CEO, Second Avenue Learning, joins the podcast to discuss the disruptive nature of educational games. Topics include how to interject “serious games” back into the educational process, the use of games to enhance traditional learning, and potential obstacles to mainstream expansion. The talk concludes with a discussion of the innovative work of Second Avenue Learning and her vision for the future. 0:57 Games, Disruptive Innovation, Efficacy, and Adoption. 3:00 Using games to enhance the traditional learning experience. 3:55 Games don’t replace a teacher, but extend their ability to engage. 5:10 Breaking down technical barriers to mainstream acceptance of serious games. 6:10 Teacher professional development, budgetary concerns. 8:00 Second Avenue Learning: Reimagining Learning. 10:15 Martha Madison, Funded by National Science Foundation. 13:00 Rochester, New York as a catalyst for growth. 14:40 Looking ahead. Show Notes Center for Game and Simulation-Based Learning Victoria Van Voorhis Second Avenue Learning Martha Madison</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dr. Barbara Pieper  on the Robert E. Kinsinger Institute for Nursing Excellence</title>
      <itunes:title>Distance EDU on Demand: Dr. Barbara Pieper  on the Robert E. Kinsinger Institute for Nursing Excellence</itunes:title>
      <pubDate>Wed, 30 Apr 2014 16:10:44 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[803a7d18c3543e1b8ae0efb23617078d]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/exploring-the-robert-e-kinsinger-institute-for-nursing-excellence-with-dr-barbara-pieper]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Barbara Pieper, director of the Robert E. Kinsinger Institute for Nursing Excellence at Excelsior College, joins the podcast to discuss the institute’s launch, objectives, scholarship agenda, support services, and future plans. 1:20 The mission of the Robert E. Kinsinger Institute. 1:48 Legacy of Dr. Robert E. Kinsinger. 3:17 A radical change in nursing education 1950s. 4:40 Serving students. 5:35 Faculty professional development. 6:08 Supporting faculty research. 6:45 Expanding collaboration. 7:21 Embracing the challenge of running a nursing institute. 8:23 The Institute in 2019. Show Notes Robert E. Kisinger Institute for Nursing Excellence at Excelsior College Excelsior College School of Nursing]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Barbara Pieper, director of the Robert E. Kinsinger Institute for Nursing Excellence at Excelsior College, joins the podcast to discuss the institute’s launch, objectives, scholarship agenda, support services, and future plans. 1:20 The mission of the Robert E. Kinsinger Institute. 1:48 Legacy of Dr. Robert E. Kinsinger. 3:17 A radical change in nursing education 1950s. 4:40 Serving students. 5:35 Faculty professional development. 6:08 Supporting faculty research. 6:45 Expanding collaboration. 7:21 Embracing the challenge of running a nursing institute. 8:23 The Institute in 2019. Show Notes Robert E. Kisinger Institute for Nursing Excellence at Excelsior College Excelsior College School of Nursing]]></content:encoded>
      
      
      <enclosure length="49247244" type="application/octet-stream" url="https://traffic.libsyn.com/secure/excelsiorlife/Ep_30_Barbara_Pieper.wav?dest-id=136543"/>
      <itunes:duration>09:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Barbara Pieper, director of the Robert E. Kinsinger Institute for Nursing Excellence at Excelsior College, joins the podcast to discuss the institute’s launch, objectives, scholarship agenda, support services, and future plans. 1:20 The mission of the Robert E. Kinsinger Institute. 1:48 Legacy of Dr. Robert E. Kinsinger. 3:17 A radical change in nursing education 1950s. 4:40 Serving students. 5:35 Faculty professional development. 6:08 Supporting faculty research. 6:45 Expanding collaboration. 7:21 Embracing the challenge of running a nursing institute. 8:23 The Institute in 2019. Show Notes Robert E. Kisinger Institute for Nursing Excellence at Excelsior College Excelsior College School of Nursing</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Barbara Pieper, director of the Robert E. Kinsinger Institute for Nursing Excellence at Excelsior College, joins the podcast to discuss the institute’s launch, objectives, scholarship agenda, support services, and future plans. 1:20 The mission of the Robert E. Kinsinger Institute. 1:48 Legacy of Dr. Robert E. Kinsinger. 3:17 A radical change in nursing education 1950s. 4:40 Serving students. 5:35 Faculty professional development. 6:08 Supporting faculty research. 6:45 Expanding collaboration. 7:21 Embracing the challenge of running a nursing institute. 8:23 The Institute in 2019. Show Notes Robert E. Kisinger Institute for Nursing Excellence at Excelsior College Excelsior College School of Nursing</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: What is competency-based education?</title>
      <itunes:title>Distance EDU on Demand: What is competency-based education?</itunes:title>
      <pubDate>Wed, 09 Apr 2014 16:21:24 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[60f4baf4276deae7d696e011ee5e34f0]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/quick-qa-what-is-competency-based-education]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Steve Ernst, vice president of Innovation at Excelsior, discusses competency-based education.]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dr. Steve Ernst, vice president of Innovation at Excelsior, discusses competency-based education.]]></content:encoded>
      
      
      <enclosure length="3284015" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Mailbag.What_is_Competency_Based_Education.mp3?dest-id=136543"/>
      <itunes:duration>03:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Steve Ernst, vice president of Innovation at Excelsior, discusses competency-based education.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Steve Ernst, vice president of Innovation at Excelsior, discusses competency-based education.</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Tina Grant on competency, adaptive learning and higher ed innovation</title>
      <itunes:title>Distance EDU on Demand: Tina Grant on competency, adaptive learning and higher ed innovation</itunes:title>
      <pubDate>Wed, 02 Apr 2014 20:04:16 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[dc8a02b8481c9fb0b293f3c198115d82]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/competency-adaptive-learning-and-higher-ed-innovation-with-tina-grant]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Tina Grant, executive director of the Center for the Assessment of Post-Traditional Learning at Excelsior College, joins the podcast to discuss how competency-based education and new technology such as adaptive learning can help turn many of today’s higher education challenges into opportunities. Grant also talks about her selection to the Next Generation Leadership Challenges (NGLC) Breakthrough Models Incubator Leadership Academy. Follow on Twitter: Tina Grant (@TGAlbany) Excelsior Life (@ExcelsiorLife) 1:15 Next Generation Leadership Challenges (NGLC) Breakthrough Models Incubator/Leadership Academy. 2:16 Turning higher education’s greatest challenges into opportunities. 3:23 Why brick-and-mortars and post-traditional schools must work together. 5:05 Adaptive learning and role of technology. 6:18 Growth of competency-based education – will it continue? 7:53 Securing employer buy-in on competency. 8:38 Tacking the student retention problem. 9:38 “Building Block Model” of competency-based education. Show Notes Beyond Business As Usual: The 2014 Breakthrough Models Incubator Tina Grant Expert Profile Tina Grant Thought Leadership Archive (Evolllution) Excelsior College Awarded Grant to Evaluate Adaptive Learning Software Steve Ernst, PhD Expert Profile]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> <!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Tina Grant, executive director of the Center for the Assessment of Post-Traditional Learning at Excelsior College, joins the podcast to discuss how competency-based education and new technology such as adaptive learning can help turn many of today’s higher education challenges into opportunities. Grant also talks about her selection to the Next Generation Leadership Challenges (NGLC) Breakthrough Models Incubator Leadership Academy. Follow on Twitter: Tina Grant (@TGAlbany) Excelsior Life (@ExcelsiorLife) 1:15 Next Generation Leadership Challenges (NGLC) Breakthrough Models Incubator/Leadership Academy. 2:16 Turning higher education’s greatest challenges into opportunities. 3:23 Why brick-and-mortars and post-traditional schools must work together. 5:05 Adaptive learning and role of technology. 6:18 Growth of competency-based education – will it continue? 7:53 Securing employer buy-in on competency. 8:38 Tacking the student retention problem. 9:38 “Building Block Model” of competency-based education. Show Notes Beyond Business As Usual: The 2014 Breakthrough Models Incubator Tina Grant Expert Profile Tina Grant Thought Leadership Archive (Evolllution) Excelsior College Awarded Grant to Evaluate Adaptive Learning Software Steve Ernst, PhD Expert Profile]]></content:encoded>
      
      
      <enclosure length="11150314" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Ep_29_Tina_Grant.mp3?dest-id=136543"/>
      <itunes:duration>11:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Tina Grant, executive director of the Center for the Assessment of Post-Traditional Learning at Excelsior College, joins the podcast to discuss how competency-based education and new technology such as adaptive learning can help turn many of today’s higher education challenges into opportunities. Grant also talks about her selection to the Next Generation Leadership Challenges (NGLC) Breakthrough Models Incubator Leadership Academy. Follow on Twitter: Tina Grant (@TGAlbany) Excelsior Life (@ExcelsiorLife) 1:15 Next Generation Leadership Challenges (NGLC) Breakthrough Models Incubator/Leadership Academy. 2:16 Turning higher education’s greatest challenges into opportunities. 3:23 Why brick-and-mortars and post-traditional schools must work together. 5:05 Adaptive learning and role of technology. 6:18 Growth of competency-based education – will it continue? 7:53 Securing employer buy-in on competency. 8:38 Tacking the student retention problem. 9:38 “Building Block Model” of competency-based education. Show Notes Beyond Business As Usual: The 2014 Breakthrough Models Incubator Tina Grant Expert Profile Tina Grant Thought Leadership Archive (Evolllution) Excelsior College Awarded Grant to Evaluate Adaptive Learning Software Steve Ernst, PhD Expert Profile</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Tina Grant, executive director of the Center for the Assessment of Post-Traditional Learning at Excelsior College, joins the podcast to discuss how competency-based education and new technology such as adaptive learning can help turn many of today’s higher education challenges into opportunities. Grant also talks about her selection to the Next Generation Leadership Challenges (NGLC) Breakthrough Models Incubator Leadership Academy. Follow on Twitter: Tina Grant (@TGAlbany) Excelsior Life (@ExcelsiorLife) 1:15 Next Generation Leadership Challenges (NGLC) Breakthrough Models Incubator/Leadership Academy. 2:16 Turning higher education’s greatest challenges into opportunities. 3:23 Why brick-and-mortars and post-traditional schools must work together. 5:05 Adaptive learning and role of technology. 6:18 Growth of competency-based education – will it continue? 7:53 Securing employer buy-in on competency. 8:38 Tacking the student retention problem. 9:38 “Building Block Model” of competency-based education. Show Notes Beyond Business As Usual: The 2014 Breakthrough Models Incubator Tina Grant Expert Profile Tina Grant Thought Leadership Archive (Evolllution) Excelsior College Awarded Grant to Evaluate Adaptive Learning Software Steve Ernst, PhD Expert Profile</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dorcey Applyrs on cultural competence in health care delivery</title>
      <itunes:title>Distance EDU on Demand: Dorcey Applyrs on cultural competence in health care delivery</itunes:title>
      <pubDate>Thu, 13 Mar 2014 19:23:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2464059fb9212db26f748c1535fb1b1e]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/health-care-issues-in-culturally-diverse-populations-with-dorcey-applyrs]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dorcey Applyrs, faculty program director for the Excelsior College School of Health Sciences, joins the podcast to discuss her work in the HIV/AIDs field, institutionalized problems within the health care system, cultural competence, and other health care issues in culturally diverse populations. 0:58 Drawn to the field of public health. 5:11 Researching the socioeconomic root causes of HIV/AIDS. 7:20 Cultural diversity and delivering culturally competent health care. 9:30 The relationship between cultural practices and health. 11:20 Cultural competency: Rating the US health care system. 13:43 Demographic differences. 16:55 How can patients take more control over their health care? 19:00 What does reform look like?]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Dorcey Applyrs, faculty program director for the Excelsior College School of Health Sciences, joins the podcast to discuss her work in the HIV/AIDs field, institutionalized problems within the health care system, cultural competence, and other health care issues in culturally diverse populations. 0:58 Drawn to the field of public health. 5:11 Researching the socioeconomic root causes of HIV/AIDS. 7:20 Cultural diversity and delivering culturally competent health care. 9:30 The relationship between cultural practices and health. 11:20 Cultural competency: Rating the US health care system. 13:43 Demographic differences. 16:55 How can patients take more control over their health care? 19:00 What does reform look like?]]></content:encoded>
      
      
      <enclosure length="19637549" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Health_Care_Issues_in_Culturally_Diverse_Populations_with_Dorcey_Applyrs.mp3?dest-id=136543"/>
      <itunes:duration>20:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dorcey Applyrs, faculty program director for the Excelsior College School of Health Sciences, joins the podcast to discuss her work in the HIV/AIDs field, institutionalized problems within the health care system, cultural competence, and other health care issues in culturally diverse populations. 0:58 Drawn to the field of public health. 5:11 Researching the socioeconomic root causes of HIV/AIDS. 7:20 Cultural diversity and delivering culturally competent health care. 9:30 The relationship between cultural practices and health. 11:20 Cultural competency: Rating the US health care system. 13:43 Demographic differences. 16:55 How can patients take more control over their health care? 19:00 What does reform look like?</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dorcey Applyrs, faculty program director for the Excelsior College School of Health Sciences, joins the podcast to discuss her work in the HIV/AIDs field, institutionalized problems within the health care system, cultural competence, and other health care issues in culturally diverse populations. 0:58 Drawn to the field of public health. 5:11 Researching the socioeconomic root causes of HIV/AIDS. 7:20 Cultural diversity and delivering culturally competent health care. 9:30 The relationship between cultural practices and health. 11:20 Cultural competency: Rating the US health care system. 13:43 Demographic differences. 16:55 How can patients take more control over their health care? 19:00 What does reform look like?</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Susan Petrie  on small press publishing</title>
      <itunes:title>Distance EDU on Demand: Susan Petrie  on small press publishing</itunes:title>
      <pubDate>Thu, 27 Feb 2014 20:46:32 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2573c2dc7d3ddc2203b3ee9bcc085e9a]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/small-press-publishing-with-susan-petrie]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Susan Petrie joins the podcast to discuss the benefits and unique challenges of running a small university press. Petrie is the managing director of Hudson Whitman/Excelsior College Press, the first press affiliated with a distance learning nonprofit college. 0: 55 A career in publishing. 6:32 Building trust between author and publisher. 7:55 Hudson Whitman and the hybrid model. 9:21 Balancing commercial interests and publishing mission. 11:00 The transformation of an “impressionist painting” into an award-winning memoir. 14:07 Small vs large press shops; cultivating emerging writers. 16:15 Day in the life of a publisher. 18:10 Cloud-based manuscript submission and other ways technology is altering the publishing landscape. 20:48 Publishing in five years. 22:00 Hudson Whitman expansion across culture and language . Show Notes Hudson Whitman/Excelsior College Press The Sanctuary of Illness: A Memoir Of Heart Disease (Order) The Language of Men (Order) [Podcast] “The Language of Men” with Anthony D’Aries]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE <![endif]--> <!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]--> Susan Petrie joins the podcast to discuss the benefits and unique challenges of running a small university press. Petrie is the managing director of Hudson Whitman/Excelsior College Press, the first press affiliated with a distance learning nonprofit college. 0: 55 A career in publishing. 6:32 Building trust between author and publisher. 7:55 Hudson Whitman and the hybrid model. 9:21 Balancing commercial interests and publishing mission. 11:00 The transformation of an “impressionist painting” into an award-winning memoir. 14:07 Small vs large press shops; cultivating emerging writers. 16:15 Day in the life of a publisher. 18:10 Cloud-based manuscript submission and other ways technology is altering the publishing landscape. 20:48 Publishing in five years. 22:00 Hudson Whitman expansion across culture and language . Show Notes Hudson Whitman/Excelsior College Press The Sanctuary of Illness: A Memoir Of Heart Disease (Order) The Language of Men (Order) [Podcast] “The Language of Men” with Anthony D’Aries]]></content:encoded>
      
      
      <enclosure length="21948429" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Small_Press_Publishing_with_Susan_Petrie.mp3?dest-id=136543"/>
      <itunes:duration>22:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Susan Petrie joins the podcast to discuss the benefits and unique challenges of running a small university press. Petrie is the managing director of Hudson Whitman/Excelsior College Press, the first press affiliated with a distance learning nonprofit college. 0: 55 A career in publishing. 6:32 Building trust between author and publisher. 7:55 Hudson Whitman and the hybrid model. 9:21 Balancing commercial interests and publishing mission. 11:00 The transformation of an “impressionist painting” into an award-winning memoir. 14:07 Small vs large press shops; cultivating emerging writers. 16:15 Day in the life of a publisher. 18:10 Cloud-based manuscript submission and other ways technology is altering the publishing landscape. 20:48 Publishing in five years. 22:00 Hudson Whitman expansion across culture and language . Show Notes Hudson Whitman/Excelsior College Press The Sanctuary of Illness: A Memoir Of Heart Disease (Order) The Language of Men (Order) [Podcast] “The Language of Men” with Anthony D’Aries</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Susan Petrie joins the podcast to discuss the benefits and unique challenges of running a small university press. Petrie is the managing director of Hudson Whitman/Excelsior College Press, the first press affiliated with a distance learning nonprofit college. 0: 55 A career in publishing. 6:32 Building trust between author and publisher. 7:55 Hudson Whitman and the hybrid model. 9:21 Balancing commercial interests and publishing mission. 11:00 The transformation of an “impressionist painting” into an award-winning memoir. 14:07 Small vs large press shops; cultivating emerging writers. 16:15 Day in the life of a publisher. 18:10 Cloud-based manuscript submission and other ways technology is altering the publishing landscape. 20:48 Publishing in five years. 22:00 Hudson Whitman expansion across culture and language . Show Notes Hudson Whitman/Excelsior College Press The Sanctuary of Illness: A Memoir Of Heart Disease (Order) The Language of Men (Order) [Podcast] “The Language of Men” with Anthony D’Aries</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dr. Joseph Hunter and Judy Reed on veteran suicide prevention training</title>
      <itunes:title>Distance EDU on Demand: Dr. Joseph Hunter and Judy Reed on veteran suicide prevention training</itunes:title>
      <pubDate>Mon, 10 Feb 2014 21:33:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[06a6872c278c71926c973ca44478908c]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/veteran-suicide-prevention-training-with-dr-joseph-hunter-and-judy-reed]]></link>
      <description><![CDATA[Dr. Joseph Hunter, suicide prevention coordinator for the Albany Stratton Veterans Affairs (VA) Medical Center, joins the podcast to discuss suicide prevention training programs, including the VA’s Operation SAVE, and how they can are being used to lower veteran suicide rates. Judy Reed, director of veteran services and outreach at Excelsior College, talks about the importance of training academic advisors to identify risk factors and expedite help. Part 1 – Interview with Dr. Hunter 1:25 How concerned is the VA with suicide rates among America’s veterans? 2:30 Operation SAVE, Veterans Crisis Line and other prevention programs. 3:58 Impact of campus-based VA prevention programs. 5:13 Biggest suicide risk factors and how to expedite help. 7:28 Where should veterans go for resources and help? Part 2 – Interview with Judy Reed 9:12 Why did the Center for Military Education bring Dr. Hunter to campus to train advisors? 10:19 “School was more stressful than combat.” 11:48 Refresher courses. 12:25 Excelsior’s Veteran Center and resources pertaining to PTSD and other mental health issues. Show Notes Veterans Affairs Operation SAVE Veterans Crisis Line 1-800-273-8255 Lt. Col. Bryant A. Murray Veterans Center – Health and Wellness resources]]></description>
      
      <content:encoded><![CDATA[Dr. Joseph Hunter, suicide prevention coordinator for the Albany Stratton Veterans Affairs (VA) Medical Center, joins the podcast to discuss suicide prevention training programs, including the VA’s Operation SAVE, and how they can are being used to lower veteran suicide rates. Judy Reed, director of veteran services and outreach at Excelsior College, talks about the importance of training academic advisors to identify risk factors and expedite help. Part 1 – Interview with Dr. Hunter 1:25 How concerned is the VA with suicide rates among America’s veterans? 2:30 Operation SAVE, Veterans Crisis Line and other prevention programs. 3:58 Impact of campus-based VA prevention programs. 5:13 Biggest suicide risk factors and how to expedite help. 7:28 Where should veterans go for resources and help? Part 2 – Interview with Judy Reed 9:12 Why did the Center for Military Education bring Dr. Hunter to campus to train advisors? 10:19 “School was more stressful than combat.” 11:48 Refresher courses. 12:25 Excelsior’s Veteran Center and resources pertaining to PTSD and other mental health issues. Show Notes Veterans Affairs Operation SAVE Veterans Crisis Line 1-800-273-8255 Lt. Col. Bryant A. Murray Veterans Center – Health and Wellness resources]]></content:encoded>
      
      
      <enclosure length="13655291" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Veteran_Suicide_Prevention_Training_with_Dr._Joseph_Hunter_and_Judy_Reed.mp3?dest-id=136543"/>
      <itunes:duration>14:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dr. Joseph Hunter, suicide prevention coordinator for the Albany Stratton Veterans Affairs (VA) Medical Center, joins the podcast to discuss suicide prevention training programs, including the VA’s Operation SAVE, and how they can are being used to lower veteran suicide rates. Judy Reed, director of veteran services and outreach at Excelsior College, talks about the importance of training academic advisors to identify risk factors and expedite help. Part 1 – Interview with Dr. Hunter 1:25 How concerned is the VA with suicide rates among America’s veterans? 2:30 Operation SAVE, Veterans Crisis Line and other prevention programs. 3:58 Impact of campus-based VA prevention programs. 5:13 Biggest suicide risk factors and how to expedite help. 7:28 Where should veterans go for resources and help? Part 2 – Interview with Judy Reed 9:12 Why did the Center for Military Education bring Dr. Hunter to campus to train advisors? 10:19 “School was more stressful than combat.” 11:48 Refresher courses. 12:25 Excelsior’s Veteran Center and resources pertaining to PTSD and other mental health issues. Show Notes Veterans Affairs Operation SAVE Veterans Crisis Line 1-800-273-8255 Lt. Col. Bryant A. Murray Veterans Center – Health and Wellness resources</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dr. Joseph Hunter, suicide prevention coordinator for the Albany Stratton Veterans Affairs (VA) Medical Center, joins the podcast to discuss suicide prevention training programs, including the VA’s Operation SAVE, and how they can are being used to lower veteran suicide rates. Judy Reed, director of veteran services and outreach at Excelsior College, talks about the importance of training academic advisors to identify risk factors and expedite help. Part 1 – Interview with Dr. Hunter 1:25 How concerned is the VA with suicide rates among America’s veterans? 2:30 Operation SAVE, Veterans Crisis Line and other prevention programs. 3:58 Impact of campus-based VA prevention programs. 5:13 Biggest suicide risk factors and how to expedite help. 7:28 Where should veterans go for resources and help? Part 2 – Interview with Judy Reed 9:12 Why did the Center for Military Education bring Dr. Hunter to campus to train advisors? 10:19 “School was more stressful than combat.” 11:48 Refresher courses. 12:25 Excelsior’s Veteran Center and resources pertaining to PTSD and other mental health issues. Show Notes Veterans Affairs Operation SAVE Veterans Crisis Line 1-800-273-8255 Lt. Col. Bryant A. Murray Veterans Center – Health and Wellness resources</itunes:summary></item>
    
    <item>
      <title>Distance EDU on Demand: Dr. Michael Verro on forensics in pop culture</title>
      <itunes:title>Distance EDU on Demand: Dr. Michael Verro on forensics in pop culture</itunes:title>
      <pubDate>Thu, 30 Jan 2014 20:42:12 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[d801d75336b97c136d963c0420e11f7b]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/forensics-in-pop-culture-with-dr-michael-verro]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Crystal Sands 12.00 <![endif]--> Dr. Michael Verro, criminal justice program director at Excelsior College, joins the podcast to discuss the depiction of forensics in pop culture, including the whether the “CSI effect” is a real phenomenon. The discussion touches on general practice areas within the Forensics field and career opportunities for graduates of Excelsior’s new Forensics concentration. Verro, a former police officer, major crimes investigator, DEA Drug Task Force narcotics investigator, and author, specializes in criminal justice and psychology. 0:58 Forensics in pop culture. 2:13 Is the CSI (or X-files) effect real? 3:17 Quincy M.E. 4:20 General practice areas within Forensics. 5:12 What led Excelsior to develop a Forensics concentration? 7:25 Reflecting on Forensics-related cases. 8:30 Career opportunities for BS in Criminal Justice (Forensics concentration) graduates. 10:00 Advice for students or those in the criminal justice field interested in Forensics studies. Show Notes Dr. Michael Verro Expert Profile [Podcast] Criminal Justice Career Pathways with Dr. Michael Verro School of Public Service Forensics Concentration BS in Criminal Justice]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Crystal Sands 12.00 <![endif]--> Dr. Michael Verro, criminal justice program director at Excelsior College, joins the podcast to discuss the depiction of forensics in pop culture, including the whether the “CSI effect” is a real phenomenon. The discussion touches on general practice areas within the Forensics field and career opportunities for graduates of Excelsior’s new Forensics concentration. Verro, a former police officer, major crimes investigator, DEA Drug Task Force narcotics investigator, and author, specializes in criminal justice and psychology. 0:58 Forensics in pop culture. 2:13 Is the CSI (or X-files) effect real? 3:17 Quincy M.E. 4:20 General practice areas within Forensics. 5:12 What led Excelsior to develop a Forensics concentration? 7:25 Reflecting on Forensics-related cases. 8:30 Career opportunities for BS in Criminal Justice (Forensics concentration) graduates. 10:00 Advice for students or those in the criminal justice field interested in Forensics studies. Show Notes Dr. Michael Verro Expert Profile [Podcast] Criminal Justice Career Pathways with Dr. Michael Verro School of Public Service Forensics Concentration BS in Criminal Justice]]></content:encoded>
      
      
      <enclosure length="13245273" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_25_Michael_Verro.mp3?dest-id=136543"/>
      <itunes:duration>13:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Crystal Sands 12.00 Dr. Michael Verro, criminal justice program director at Excelsior College, joins the podcast to discuss the depiction of forensics in pop culture, including the whether the “CSI effect” is a real phenomenon. The discussion touches on general practice areas within the Forensics field and career opportunities for graduates of Excelsior’s new Forensics concentration. Verro, a former police officer, major crimes investigator, DEA Drug Task Force narcotics investigator, and author, specializes in criminal justice and psychology. 0:58 Forensics in pop culture. 2:13 Is the CSI (or X-files) effect real? 3:17 Quincy M.E. 4:20 General practice areas within Forensics. 5:12 What led Excelsior to develop a Forensics concentration? 7:25 Reflecting on Forensics-related cases. 8:30 Career opportunities for BS in Criminal Justice (Forensics concentration) graduates. 10:00 Advice for students or those in the criminal justice field interested in Forensics studies. Show Notes Dr. Michael Verro Expert Profile [Podcast] Criminal Justice Career Pathways with Dr. Michael Verro School of Public Service Forensics Concentration BS in Criminal Justice</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Crystal Sands 12.00 Dr. Michael Verro, criminal justice program director at Excelsior College, joins the podcast to discuss the depiction of forensics in pop culture, including the whether the “CSI effect” is a real phenomenon. The discussion touches on general practice areas within the Forensics field and career opportunities for graduates of Excelsior’s new Forensics concentration. Verro, a former police officer, major crimes investigator, DEA Drug Task Force narcotics investigator, and author, specializes in criminal justice and psychology. 0:58 Forensics in pop culture. 2:13 Is the CSI (or X-files) effect real? 3:17 Quincy M.E. 4:20 General practice areas within Forensics. 5:12 What led Excelsior to develop a Forensics concentration? 7:25 Reflecting on Forensics-related cases. 8:30 Career opportunities for BS in Criminal Justice (Forensics concentration) graduates. 10:00 Advice for students or those in the criminal justice field interested in Forensics studies. Show Notes Dr. Michael Verro Expert Profile [Podcast] Criminal Justice Career Pathways with Dr. Michael Verro School of Public Service Forensics Concentration BS in Criminal Justice</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. Crystal Sands on the Excelsior College Online Writing Lab (OWL)</title>
      <itunes:title>Distance EDU On Demand: Dr. Crystal Sands on the Excelsior College Online Writing Lab (OWL)</itunes:title>
      <pubDate>Tue, 14 Jan 2014 15:55:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c3f77f71e4de71f77c72c348353828b7]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-college-online-writing-lab-owl-with-dr-crystal-sands]]></link>
      <description><![CDATA[Dr. Crystal Sands, online writing lab project director at Excelsior College, joins the podcast to discuss the development of the new Excelsior OWL, a highly-interactive, media-rich, first-of-its-kind writing lab designed to serve the needs of struggling writers as they make the transition to college-level writing and the writing disciplines. 1:01 What is the OWL and what makes it different from other Online Writing Labs? 2:44 Meeting a critical employer demand. 4:06 Kresge Foundation and the development process. 5:38 Open-source and opening the OWL up to the world for free. 6:44 Using the OWL to lower employee training costs. 7:06 Breaking down individual sections of the OWL. 8:33 Incorporating the award-winning ESL-WOW into the OWL. 9:21 Digital writing. 10:39 Introducing gaming into the curriculum with “Paper Capers”. 12:21 A writing teacher’s favorite section. 13:58 Pilot program studying the impact of the OWL on writing outcomes. 15:04 The OWL and the Common Core. 16:41 Building an OWL community on social media. Show Notes The Excelsior College Online Writing Lab (Excelsior OWL) Join the Excelsior Online Writing Lab Facebook Community Watch: Excelsior OWL Teaser Trailer]]></description>
      
      <content:encoded><![CDATA[Dr. Crystal Sands, online writing lab project director at Excelsior College, joins the podcast to discuss the development of the new Excelsior OWL, a highly-interactive, media-rich, first-of-its-kind writing lab designed to serve the needs of struggling writers as they make the transition to college-level writing and the writing disciplines. 1:01 What is the OWL and what makes it different from other Online Writing Labs? 2:44 Meeting a critical employer demand. 4:06 Kresge Foundation and the development process. 5:38 Open-source and opening the OWL up to the world for free. 6:44 Using the OWL to lower employee training costs. 7:06 Breaking down individual sections of the OWL. 8:33 Incorporating the award-winning ESL-WOW into the OWL. 9:21 Digital writing. 10:39 Introducing gaming into the curriculum with “Paper Capers”. 12:21 A writing teacher’s favorite section. 13:58 Pilot program studying the impact of the OWL on writing outcomes. 15:04 The OWL and the Common Core. 16:41 Building an OWL community on social media. Show Notes The Excelsior College Online Writing Lab (Excelsior OWL) Join the Excelsior Online Writing Lab Facebook Community Watch: Excelsior OWL Teaser Trailer]]></content:encoded>
      
      
      <enclosure length="17329164" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_24_Crystal_Sands.mp3?dest-id=136543"/>
      <itunes:duration>18:04</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dr. Crystal Sands, online writing lab project director at Excelsior College, joins the podcast to discuss the development of the new Excelsior OWL, a highly-interactive, media-rich, first-of-its-kind writing lab designed to serve the needs of struggling writers as they make the transition to college-level writing and the writing disciplines. 1:01 What is the OWL and what makes it different from other Online Writing Labs? 2:44 Meeting a critical employer demand. 4:06 Kresge Foundation and the development process. 5:38 Open-source and opening the OWL up to the world for free. 6:44 Using the OWL to lower employee training costs. 7:06 Breaking down individual sections of the OWL. 8:33 Incorporating the award-winning ESL-WOW into the OWL. 9:21 Digital writing. 10:39 Introducing gaming into the curriculum with “Paper Capers”. 12:21 A writing teacher’s favorite section. 13:58 Pilot program studying the impact of the OWL on writing outcomes. 15:04 The OWL and the Common Core. 16:41 Building an OWL community on social media. Show Notes The Excelsior College Online Writing Lab (Excelsior OWL) Join the Excelsior Online Writing Lab Facebook Community Watch: Excelsior OWL Teaser Trailer</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dr. Crystal Sands, online writing lab project director at Excelsior College, joins the podcast to discuss the development of the new Excelsior OWL, a highly-interactive, media-rich, first-of-its-kind writing lab designed to serve the needs of struggling writers as they make the transition to college-level writing and the writing disciplines. 1:01 What is the OWL and what makes it different from other Online Writing Labs? 2:44 Meeting a critical employer demand. 4:06 Kresge Foundation and the development process. 5:38 Open-source and opening the OWL up to the world for free. 6:44 Using the OWL to lower employee training costs. 7:06 Breaking down individual sections of the OWL. 8:33 Incorporating the award-winning ESL-WOW into the OWL. 9:21 Digital writing. 10:39 Introducing gaming into the curriculum with “Paper Capers”. 12:21 A writing teacher’s favorite section. 13:58 Pilot program studying the impact of the OWL on writing outcomes. 15:04 The OWL and the Common Core. 16:41 Building an OWL community on social media. Show Notes The Excelsior College Online Writing Lab (Excelsior OWL) Join the Excelsior Online Writing Lab Facebook Community Watch: Excelsior OWL Teaser Trailer</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. Jane LeClair on the National Cybersecurity Institute at Excelsior College</title>
      <itunes:title>Distance EDU On Demand: Dr. Jane LeClair on the National Cybersecurity Institute at Excelsior College</itunes:title>
      <pubDate>Fri, 03 Jan 2014 13:42:22 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[314b8784aff062d4f1d31bb116a0dc96]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/national-cybersecurity-institute-at-excelsior-college-with-dr-jane-le-clair]]></link>
      <description><![CDATA[Dr. Jane LeClair, chief operating officer at the National Cybersecurity Institute (NCI) at Excelsior College, joins the podcast to discuss NCI’s purpose, mission, and organizational structure, as well as the development process leading up to its launch. LeClair also talks contemporary cyber challenges, upcoming initiatives - including a cybersecurity MOOC, scholarly journal, and new book - and what to expect in the coming years. 1:13 What is the National Cybersecurity Institute at Excelsior College? 2:44 Web attacks costs businesses $114 billion annually. 4:18 Developing the Institute’s strategic outlook. 4:42 What is NSA CNSS certification? 7:30 The purpose and mission of the National Cybersecurity Institute. 9:10 Social engineering attacks and why “people are conditioned to see what they are expecting to see”. 10:19 MOOC: Introduction to Cybersecurity. 13:00 NationalCybersecurityInstitute.org 13:47 Protecting our Future: Educating a Cybersecurity Workforce. 16:16 The NCI leadership structure – Advisors and Fellows. Show Notes National Cybersecurity Institute at Excelsior College Excelsior College Receives NSA Cybersecurity Designation at CISSE Dr. Jane LeClair Expert Profile MOOC: Introduction to Cybersecurity (Register) Book: Protecting Our Future: Educating a Cybersecurity Workforce (Order Now) Excelsior Life Cybersecurity Archive]]></description>
      
      <content:encoded><![CDATA[Dr. Jane LeClair, chief operating officer at the National Cybersecurity Institute (NCI) at Excelsior College, joins the podcast to discuss NCI’s purpose, mission, and organizational structure, as well as the development process leading up to its launch. LeClair also talks contemporary cyber challenges, upcoming initiatives - including a cybersecurity MOOC, scholarly journal, and new book - and what to expect in the coming years. 1:13 What is the National Cybersecurity Institute at Excelsior College? 2:44 Web attacks costs businesses $114 billion annually. 4:18 Developing the Institute’s strategic outlook. 4:42 What is NSA CNSS certification? 7:30 The purpose and mission of the National Cybersecurity Institute. 9:10 Social engineering attacks and why “people are conditioned to see what they are expecting to see”. 10:19 MOOC: Introduction to Cybersecurity. 13:00 NationalCybersecurityInstitute.org 13:47 Protecting our Future: Educating a Cybersecurity Workforce. 16:16 The NCI leadership structure – Advisors and Fellows. Show Notes National Cybersecurity Institute at Excelsior College Excelsior College Receives NSA Cybersecurity Designation at CISSE Dr. Jane LeClair Expert Profile MOOC: Introduction to Cybersecurity (Register) Book: Protecting Our Future: Educating a Cybersecurity Workforce (Order Now) Excelsior Life Cybersecurity Archive]]></content:encoded>
      
      
      <enclosure length="18356751" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_23_Jane_LeClair.mp3?dest-id=136543"/>
      <itunes:duration>19:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dr. Jane LeClair, chief operating officer at the National Cybersecurity Institute (NCI) at Excelsior College, joins the podcast to discuss NCI’s purpose, mission, and organizational structure, as well as the development process leading up to its launch. LeClair also talks contemporary cyber challenges, upcoming initiatives - including a cybersecurity MOOC, scholarly journal, and new book - and what to expect in the coming years. 1:13 What is the National Cybersecurity Institute at Excelsior College? 2:44 Web attacks costs businesses $114 billion annually. 4:18 Developing the Institute’s strategic outlook. 4:42 What is NSA CNSS certification? 7:30 The purpose and mission of the National Cybersecurity Institute. 9:10 Social engineering attacks and why “people are conditioned to see what they are expecting to see”. 10:19 MOOC: Introduction to Cybersecurity. 13:00 NationalCybersecurityInstitute.org 13:47 Protecting our Future: Educating a Cybersecurity Workforce. 16:16 The NCI leadership structure – Advisors and Fellows. Show Notes National Cybersecurity Institute at Excelsior College Excelsior College Receives NSA Cybersecurity Designation at CISSE Dr. Jane LeClair Expert Profile MOOC: Introduction to Cybersecurity (Register) Book: Protecting Our Future: Educating a Cybersecurity Workforce (Order Now) Excelsior Life Cybersecurity Archive</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dr. Jane LeClair, chief operating officer at the National Cybersecurity Institute (NCI) at Excelsior College, joins the podcast to discuss NCI’s purpose, mission, and organizational structure, as well as the development process leading up to its launch. LeClair also talks contemporary cyber challenges, upcoming initiatives - including a cybersecurity MOOC, scholarly journal, and new book - and what to expect in the coming years. 1:13 What is the National Cybersecurity Institute at Excelsior College? 2:44 Web attacks costs businesses $114 billion annually. 4:18 Developing the Institute’s strategic outlook. 4:42 What is NSA CNSS certification? 7:30 The purpose and mission of the National Cybersecurity Institute. 9:10 Social engineering attacks and why “people are conditioned to see what they are expecting to see”. 10:19 MOOC: Introduction to Cybersecurity. 13:00 NationalCybersecurityInstitute.org 13:47 Protecting our Future: Educating a Cybersecurity Workforce. 16:16 The NCI leadership structure – Advisors and Fellows. Show Notes National Cybersecurity Institute at Excelsior College Excelsior College Receives NSA Cybersecurity Designation at CISSE Dr. Jane LeClair Expert Profile MOOC: Introduction to Cybersecurity (Register) Book: Protecting Our Future: Educating a Cybersecurity Workforce (Order Now) Excelsior Life Cybersecurity Archive</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Michele Dutcher on Exploring Google GLASS</title>
      <itunes:title>Distance EDU On Demand: Michele Dutcher on Exploring Google GLASS</itunes:title>
      <pubDate>Wed, 20 Nov 2013 16:20:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0e30a58f0a8d8469ae7b0ee74d020702]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/exploring-google-glass-with-michele-dutcher]]></link>
      <description><![CDATA[Michele Dutcher, interactive marketing and communications manager at Excelsior College and a Google GLASS explorer, joins the podcast to discuss Google’s latest initiative. Dutcher discusses the real-life application of Google GLASS technology and the varied reactions she has received while wearing the device, including a frightening encounter with a paranoid cab driver with a criminal record. The talk ends with a discussion of the factors that lead people to Orwellian fear or “Matrixesque” blind acceptance of new technology. 0:52 TedX Albany Round-up. 3:16 Google GLASS. 4:26 “Ok, GLASS: Save a life.” 5:20 GLASS in the operating room. 6:43 Gaming, training and how GLASS can be used in the Arts. 8:00 Becoming part of the Explorer Program. 9:00 Reactions to GLASS – A Frightening encounter with a cab driver with a criminal record. 11:00 Orwellian fear vs Matrix blind acceptance. Which camp do you fall? 13:20 New technology and the generational divide. 14:45 Take the blue pill and educate yourself.]]></description>
      
      <content:encoded><![CDATA[Michele Dutcher, interactive marketing and communications manager at Excelsior College and a Google GLASS explorer, joins the podcast to discuss Google’s latest initiative. Dutcher discusses the real-life application of Google GLASS technology and the varied reactions she has received while wearing the device, including a frightening encounter with a paranoid cab driver with a criminal record. The talk ends with a discussion of the factors that lead people to Orwellian fear or “Matrixesque” blind acceptance of new technology. 0:52 TedX Albany Round-up. 3:16 Google GLASS. 4:26 “Ok, GLASS: Save a life.” 5:20 GLASS in the operating room. 6:43 Gaming, training and how GLASS can be used in the Arts. 8:00 Becoming part of the Explorer Program. 9:00 Reactions to GLASS – A Frightening encounter with a cab driver with a criminal record. 11:00 Orwellian fear vs Matrix blind acceptance. Which camp do you fall? 13:20 New technology and the generational divide. 14:45 Take the blue pill and educate yourself.]]></content:encoded>
      
      
      <enclosure length="16934969" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_22_Michele_Dutcher.mp3?dest-id=136543"/>
      <itunes:duration>17:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Michele Dutcher, interactive marketing and communications manager at Excelsior College and a Google GLASS explorer, joins the podcast to discuss Google’s latest initiative. Dutcher discusses the real-life application of Google GLASS technology and the varied reactions she has received while wearing the device, including a frightening encounter with a paranoid cab driver with a criminal record. The talk ends with a discussion of the factors that lead people to Orwellian fear or “Matrixesque” blind acceptance of new technology. 0:52 TedX Albany Round-up. 3:16 Google GLASS. 4:26 “Ok, GLASS: Save a life.” 5:20 GLASS in the operating room. 6:43 Gaming, training and how GLASS can be used in the Arts. 8:00 Becoming part of the Explorer Program. 9:00 Reactions to GLASS – A Frightening encounter with a cab driver with a criminal record. 11:00 Orwellian fear vs Matrix blind acceptance. Which camp do you fall? 13:20 New technology and the generational divide. 14:45 Take the blue pill and educate yourself.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Michele Dutcher, interactive marketing and communications manager at Excelsior College and a Google GLASS explorer, joins the podcast to discuss Google’s latest initiative. Dutcher discusses the real-life application of Google GLASS technology and the varied reactions she has received while wearing the device, including a frightening encounter with a paranoid cab driver with a criminal record. The talk ends with a discussion of the factors that lead people to Orwellian fear or “Matrixesque” blind acceptance of new technology. 0:52 TedX Albany Round-up. 3:16 Google GLASS. 4:26 “Ok, GLASS: Save a life.” 5:20 GLASS in the operating room. 6:43 Gaming, training and how GLASS can be used in the Arts. 8:00 Becoming part of the Explorer Program. 9:00 Reactions to GLASS – A Frightening encounter with a cab driver with a criminal record. 11:00 Orwellian fear vs Matrix blind acceptance. Which camp do you fall? 13:20 New technology and the generational divide. 14:45 Take the blue pill and educate yourself.</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. Murray Block on 66 Years of Higher Education Innovation</title>
      <itunes:title>Distance EDU On Demand: Dr. Murray Block on 66 Years of Higher Education Innovation</itunes:title>
      <pubDate>Wed, 30 Oct 2013 14:22:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2db65f69518148408e100e4e2bd92cb0]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/66-years-of-higher-education-innovation-with-dr-murray-block]]></link>
      <description><![CDATA[Dr. Murray Block, chief of staff at Excelsior College and a passionate advocate for lifelong learning since the start of his career in 1947, discusses opposition to community colleges in the 1950s and the parallels to contemporary higher education debate over distance learning. 1:12 Drawn to higher education following WWII service. 2:57 The history of community colleges in New York State. 5:37 Standing up to vocal opposition to community colleges in the 1950s. 7:20 “Democratizing” higher education. 8:30 “We won’t be able to take transfers from the good colleges either.” 12:47 Parallels to contemporary skepticism over distance education. 15:37 “The good fights in higher education are variations on a theme: tradition versus innovation.” 18:28 Reflecting on the journey. Show Notes: My 64 Years of Fighting for Innovation – The Chronicle of Higher Education Dr. Murray Block Expert Profile]]></description>
      
      <content:encoded><![CDATA[Dr. Murray Block, chief of staff at Excelsior College and a passionate advocate for lifelong learning since the start of his career in 1947, discusses opposition to community colleges in the 1950s and the parallels to contemporary higher education debate over distance learning. 1:12 Drawn to higher education following WWII service. 2:57 The history of community colleges in New York State. 5:37 Standing up to vocal opposition to community colleges in the 1950s. 7:20 “Democratizing” higher education. 8:30 “We won’t be able to take transfers from the good colleges either.” 12:47 Parallels to contemporary skepticism over distance education. 15:37 “The good fights in higher education are variations on a theme: tradition versus innovation.” 18:28 Reflecting on the journey. Show Notes: My 64 Years of Fighting for Innovation – The Chronicle of Higher Education Dr. Murray Block Expert Profile]]></content:encoded>
      
      
      <enclosure length="19646309" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_21_Murray_Block.mp3?dest-id=136543"/>
      <itunes:duration>20:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dr. Murray Block, chief of staff at Excelsior College and a passionate advocate for lifelong learning since the start of his career in 1947, discusses opposition to community colleges in the 1950s and the parallels to contemporary higher education debate over distance learning. 1:12 Drawn to higher education following WWII service. 2:57 The history of community colleges in New York State. 5:37 Standing up to vocal opposition to community colleges in the 1950s. 7:20 “Democratizing” higher education. 8:30 “We won’t be able to take transfers from the good colleges either.” 12:47 Parallels to contemporary skepticism over distance education. 15:37 “The good fights in higher education are variations on a theme: tradition versus innovation.” 18:28 Reflecting on the journey. Show Notes: My 64 Years of Fighting for Innovation – The Chronicle of Higher Education Dr. Murray Block Expert Profile</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dr. Murray Block, chief of staff at Excelsior College and a passionate advocate for lifelong learning since the start of his career in 1947, discusses opposition to community colleges in the 1950s and the parallels to contemporary higher education debate over distance learning. 1:12 Drawn to higher education following WWII service. 2:57 The history of community colleges in New York State. 5:37 Standing up to vocal opposition to community colleges in the 1950s. 7:20 “Democratizing” higher education. 8:30 “We won’t be able to take transfers from the good colleges either.” 12:47 Parallels to contemporary skepticism over distance education. 15:37 “The good fights in higher education are variations on a theme: tradition versus innovation.” 18:28 Reflecting on the journey. Show Notes: My 64 Years of Fighting for Innovation – The Chronicle of Higher Education Dr. Murray Block Expert Profile</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Jeremy Glasstetter on the Patriot Poll</title>
      <itunes:title>Distance EDU On Demand: Jeremy Glasstetter on the Patriot Poll</itunes:title>
      <pubDate>Thu, 17 Oct 2013 20:56:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bff6b123e51c8e529ae02e692706c079]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/the-patriot-poll-with-jeremy-glasstetter]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]-->Jeremy Glasstetter, director of the Lt. Col. Bryant A Murray Veterans Center, discusses the results of the Excelsior College “Patriot Poll”, a nationwide survey of active duty military and veterans, on their use of social media and technology, education and veterans benefits, as well as the types of services they expect from institutions of higher education. 0:49 What is the Patriot Poll? 2:02 Military and veteran use of social media. 3:35 Creating engagement among military and veterans populations on social media. 4:58 Education and employment results. 7:07 Military and veteran fears over the cost of a college education. 10:50 More servicemembers are transferring benefits to their dependents. 11:40 What services do military and veterans expect from colleges? 16:25 Job placement support. 18:15 “How do I pay for my school?” 19:21 The role of veteran partners. 20:48 Do veterans want colleges to provide mentors? Show Notes Poll: Troops using Post 9/11 GI Bill on their own educations (Military Times) Patriot Poll: What Services Should Colleges Provide Veterans? (Excelsior Life) Podcast: Transition Challenges for Veterans Returning to School with Jeremy Glasstetter (Excelsior Life: Distance EDU on Demand)]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> <![endif]--><!-- [if gte mso 10]> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} <![endif]-->Jeremy Glasstetter, director of the Lt. Col. Bryant A Murray Veterans Center, discusses the results of the Excelsior College “Patriot Poll”, a nationwide survey of active duty military and veterans, on their use of social media and technology, education and veterans benefits, as well as the types of services they expect from institutions of higher education. 0:49 What is the Patriot Poll? 2:02 Military and veteran use of social media. 3:35 Creating engagement among military and veterans populations on social media. 4:58 Education and employment results. 7:07 Military and veteran fears over the cost of a college education. 10:50 More servicemembers are transferring benefits to their dependents. 11:40 What services do military and veterans expect from colleges? 16:25 Job placement support. 18:15 “How do I pay for my school?” 19:21 The role of veteran partners. 20:48 Do veterans want colleges to provide mentors? Show Notes Poll: Troops using Post 9/11 GI Bill on their own educations (Military Times) Patriot Poll: What Services Should Colleges Provide Veterans? (Excelsior Life) Podcast: Transition Challenges for Veterans Returning to School with Jeremy Glasstetter (Excelsior Life: Distance EDU on Demand)]]></content:encoded>
      
      
      <enclosure length="22091367" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_20_Jeremey_Glasstetter.mp3?dest-id=136543"/>
      <itunes:duration>23:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>/* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Jeremy Glasstetter, director of the Lt. Col. Bryant A Murray Veterans Center, discusses the results of the Excelsior College “Patriot Poll”, a nationwide survey of active duty military and veterans, on their use of social media and technology, education and veterans benefits, as well as the types of services they expect from institutions of higher education. 0:49 What is the Patriot Poll? 2:02 Military and veteran use of social media. 3:35 Creating engagement among military and veterans populations on social media. 4:58 Education and employment results. 7:07 Military and veteran fears over the cost of a college education. 10:50 More servicemembers are transferring benefits to their dependents. 11:40 What services do military and veterans expect from colleges? 16:25 Job placement support. 18:15 “How do I pay for my school?” 19:21 The role of veteran partners. 20:48 Do veterans want colleges to provide mentors? Show Notes Poll: Troops using Post 9/11 GI Bill on their own educations (Military Times) Patriot Poll: What Services Should Colleges Provide Veterans? (Excelsior Life) Podcast: Transition Challenges for Veterans Returning to School with Jeremy Glasstetter (Excelsior Life: Distance EDU on Demand)</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>/* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Jeremy Glasstetter, director of the Lt. Col. Bryant A Murray Veterans Center, discusses the results of the Excelsior College “Patriot Poll”, a nationwide survey of active duty military and veterans, on their use of social media and technology, education and veterans benefits, as well as the types of services they expect from institutions of higher education. 0:49 What is the Patriot Poll? 2:02 Military and veteran use of social media. 3:35 Creating engagement among military and veterans populations on social media. 4:58 Education and employment results. 7:07 Military and veteran fears over the cost of a college education. 10:50 More servicemembers are transferring benefits to their dependents. 11:40 What services do military and veterans expect from colleges? 16:25 Job placement support. 18:15 “How do I pay for my school?” 19:21 The role of veteran partners. 20:48 Do veterans want colleges to provide mentors? Show Notes Poll: Troops using Post 9/11 GI Bill on their own educations (Military Times) Patriot Poll: What Services Should Colleges Provide Veterans? (Excelsior Life) Podcast: Transition Challenges for Veterans Returning to School with Jeremy Glasstetter (Excelsior Life: Distance EDU on Demand)</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Angela Stimpson on Paying it Forward</title>
      <itunes:title>Distance EDU On Demand: Angela Stimpson on Paying it Forward</itunes:title>
      <pubDate>Thu, 03 Oct 2013 19:18:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[dc4809bdff25f02554528e7c61eefbd2]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/donating-a-kidney-saving-a-life-with-angela-stimpson]]></link>
      <description><![CDATA[Angela Stimpson, marketing design manager for Excelsior College, joins the podcast to discuss donating a kidney to a complete stranger. Stimpson shares her feelings on the donation process, sharing the news with family and friends, and the positive impact the decision has had on her life. 1:10 The start of a journey. 2:40 Using social media to learn about the donation process. 4:20 “What is my purpose?” 6:00 Sharing the news with family and friends. 7:20 Overcoming identity problems. 9:30 The Meeting. 11:10 Advice for others looking to donate? 12:30 Finding donation information.]]></description>
      
      <content:encoded><![CDATA[Angela Stimpson, marketing design manager for Excelsior College, joins the podcast to discuss donating a kidney to a complete stranger. Stimpson shares her feelings on the donation process, sharing the news with family and friends, and the positive impact the decision has had on her life. 1:10 The start of a journey. 2:40 Using social media to learn about the donation process. 4:20 “What is my purpose?” 6:00 Sharing the news with family and friends. 7:20 Overcoming identity problems. 9:30 The Meeting. 11:10 Advice for others looking to donate? 12:30 Finding donation information.]]></content:encoded>
      
      
      <enclosure length="12892921" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_19_Angela_Stimpson.mp3?dest-id=136543"/>
      <itunes:duration>13:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Angela Stimpson, marketing design manager for Excelsior College, joins the podcast to discuss donating a kidney to a complete stranger. Stimpson shares her feelings on the donation process, sharing the news with family and friends, and the positive impact the decision has had on her life. 1:10 The start of a journey. 2:40 Using social media to learn about the donation process. 4:20 “What is my purpose?” 6:00 Sharing the news with family and friends. 7:20 Overcoming identity problems. 9:30 The Meeting. 11:10 Advice for others looking to donate? 12:30 Finding donation information.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Angela Stimpson, marketing design manager for Excelsior College, joins the podcast to discuss donating a kidney to a complete stranger. Stimpson shares her feelings on the donation process, sharing the news with family and friends, and the positive impact the decision has had on her life. 1:10 The start of a journey. 2:40 Using social media to learn about the donation process. 4:20 “What is my purpose?” 6:00 Sharing the news with family and friends. 7:20 Overcoming identity problems. 9:30 The Meeting. 11:10 Advice for others looking to donate? 12:30 Finding donation information.</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Cathy Kushner on Diversity and Philanthropy</title>
      <itunes:title>Distance EDU On Demand: Cathy Kushner on Diversity and Philanthropy</itunes:title>
      <pubDate>Thu, 19 Sep 2013 20:07:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[9834068e5fb3c5fbcc5d886fed5c6eba]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/diversity-and-philanthropy-with-cathy-kushner]]></link>
      <description><![CDATA[Cathy Kushner, vice president of Institutional Advancement at Excelsior College, joins the Distance EDU on Demand podcast, to talk about her career in diversity and inclusion and the challenges of philanthropy in a down economy. 1:25 A devotion to public service. 3:39 Inspired by family. 4:29 Passion for inclusion and growing up in the 1960s. 5:54 Influence of Dorothy Height and the Civil Rights Movement. 8:30 Shaped by personal experience. 11:50 Philanthropy and a challenging economy. 14:21 “It comes out of a passion.” 15:09 How do you keep a donor engaged? 17:06 What would your 17-year old self say about the life to come?]]></description>
      
      <content:encoded><![CDATA[Cathy Kushner, vice president of Institutional Advancement at Excelsior College, joins the Distance EDU on Demand podcast, to talk about her career in diversity and inclusion and the challenges of philanthropy in a down economy. 1:25 A devotion to public service. 3:39 Inspired by family. 4:29 Passion for inclusion and growing up in the 1960s. 5:54 Influence of Dorothy Height and the Civil Rights Movement. 8:30 Shaped by personal experience. 11:50 Philanthropy and a challenging economy. 14:21 “It comes out of a passion.” 15:09 How do you keep a donor engaged? 17:06 What would your 17-year old self say about the life to come?]]></content:encoded>
      
      
      <enclosure length="18268301" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_18_Cathy_Kushner.mp3?dest-id=136543"/>
      <itunes:duration>19:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Cathy Kushner, vice president of Institutional Advancement at Excelsior College, joins the Distance EDU on Demand podcast, to talk about her career in diversity and inclusion and the challenges of philanthropy in a down economy. 1:25 A devotion to public service. 3:39 Inspired by family. 4:29 Passion for inclusion and growing up in the 1960s. 5:54 Influence of Dorothy Height and the Civil Rights Movement. 8:30 Shaped by personal experience. 11:50 Philanthropy and a challenging economy. 14:21 “It comes out of a passion.” 15:09 How do you keep a donor engaged? 17:06 What would your 17-year old self say about the life to come?</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Cathy Kushner, vice president of Institutional Advancement at Excelsior College, joins the Distance EDU on Demand podcast, to talk about her career in diversity and inclusion and the challenges of philanthropy in a down economy. 1:25 A devotion to public service. 3:39 Inspired by family. 4:29 Passion for inclusion and growing up in the 1960s. 5:54 Influence of Dorothy Height and the Civil Rights Movement. 8:30 Shaped by personal experience. 11:50 Philanthropy and a challenging economy. 14:21 “It comes out of a passion.” 15:09 How do you keep a donor engaged? 17:06 What would your 17-year old self say about the life to come?</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. Mika Hoffman on the Nature of Competency-Based Higher Education</title>
      <itunes:title>Distance EDU On Demand: Dr. Mika Hoffman on the Nature of Competency-Based Higher Education</itunes:title>
      <pubDate>Fri, 06 Sep 2013 13:17:30 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bd98bce1e607c99b11f6a97f758d8826]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/the-nature-of-competency-based-higher-education-with-dr-mika-hoffman]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> Dr. Mika Hoffman, executive director of the Center for Educational Measurement at Excelsior College, joins the podcast to discuss prior learning assessment, competency-based education, and how colleges and universities in the post-traditional era can differentiate themselves. Dr. Hoffman also discusses credit-by-examination as a more affordable degree pathway and the role of psychometricians in the assessment process. 1:19 What is a psychometrican? 2:34 Proving the validity of assessments. 3:55 Thoughts on the nature of the post-traditional era of higher education. 5:42 How do schools differentiate themselves in the market? 9:05 Opening the door to competency-based education. 14:20 The affordability question. 15:53 Responding to critics. 19:35 The mainstreaming of PLA and competency-based education. 22:40 Encouraging more institutions to accept prior learning. Resources discussed during podcast: Credentialing is How Institutions Will Differentiate in the Future (Evolllution) UExcel (Excelsior College's credit by examination program)]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> Dr. Mika Hoffman, executive director of the Center for Educational Measurement at Excelsior College, joins the podcast to discuss prior learning assessment, competency-based education, and how colleges and universities in the post-traditional era can differentiate themselves. Dr. Hoffman also discusses credit-by-examination as a more affordable degree pathway and the role of psychometricians in the assessment process. 1:19 What is a psychometrican? 2:34 Proving the validity of assessments. 3:55 Thoughts on the nature of the post-traditional era of higher education. 5:42 How do schools differentiate themselves in the market? 9:05 Opening the door to competency-based education. 14:20 The affordability question. 15:53 Responding to critics. 19:35 The mainstreaming of PLA and competency-based education. 22:40 Encouraging more institutions to accept prior learning. Resources discussed during podcast: Credentialing is How Institutions Will Differentiate in the Future (Evolllution) UExcel (Excelsior College's credit by examination program)]]></content:encoded>
      
      
      <enclosure length="11840534" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_17_Mika_Hoffman.mp3?dest-id=136543"/>
      <itunes:duration>24:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Dr. Mika Hoffman, executive director of the Center for Educational Measurement at Excelsior College, joins the podcast to discuss prior learning assessment, competency-based education, and how colleges and universities in the post-traditional era can differentiate themselves. Dr. Hoffman also discusses credit-by-examination as a more affordable degree pathway and the role of psychometricians in the assessment process. 1:19 What is a psychometrican? 2:34 Proving the validity of assessments. 3:55 Thoughts on the nature of the post-traditional era of higher education. 5:42 How do schools differentiate themselves in the market? 9:05 Opening the door to competency-based education. 14:20 The affordability question. 15:53 Responding to critics. 19:35 The mainstreaming of PLA and competency-based education. 22:40 Encouraging more institutions to accept prior learning. Resources discussed during podcast: Credentialing is How Institutions Will Differentiate in the Future (Evolllution) UExcel (Excelsior College's credit by examination program)</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Dr. Mika Hoffman, executive director of the Center for Educational Measurement at Excelsior College, joins the podcast to discuss prior learning assessment, competency-based education, and how colleges and universities in the post-traditional era can differentiate themselves. Dr. Hoffman also discusses credit-by-examination as a more affordable degree pathway and the role of psychometricians in the assessment process. 1:19 What is a psychometrican? 2:34 Proving the validity of assessments. 3:55 Thoughts on the nature of the post-traditional era of higher education. 5:42 How do schools differentiate themselves in the market? 9:05 Opening the door to competency-based education. 14:20 The affordability question. 15:53 Responding to critics. 19:35 The mainstreaming of PLA and competency-based education. 22:40 Encouraging more institutions to accept prior learning. Resources discussed during podcast: Credentialing is How Institutions Will Differentiate in the Future (Evolllution) UExcel (Excelsior College's credit by examination program)</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Anthony D'Aries on 'The Language of Men'</title>
      <itunes:title>Distance EDU On Demand: Anthony D'Aries on 'The Language of Men'</itunes:title>
      <pubDate>Fri, 23 Aug 2013 13:35:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6a6b5825fe4c383ea2654dedad6dd183]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/the-language-of-men-with-anthony-d-aries]]></link>
      <description><![CDATA[Anthony D’Aries, one of the literary world’s most talented young writers, joins the podcast to discuss his award-winning debut novel, The Language of Men (2012, Hudson Whitman/Excelsior College Press). D’Aries takes us through his journey half-way across the world to Vietnam in search of the truth behind whom his father, a Vietnam veteran, really was. In the process, D’Aries learns not only more about himself and his relationship with his father but how men communicate and what it means to be a man. 1:44 Why write “The Language of Men”? 5:35 A rainstorm, a river of garbage, and feeling connected for the first time. 9:44 Why visiting Vietnam left more questions than answers. 11:15 The Language of Men. 14:52 Finding a purpose. 16:11 A code of silence and how men communicate. 19:20 Writing slows down time. 21:26 Vietnam became a gateway to prior experiences. 22:32 Teaching prisoners to write. 24:07 “Trying to pause a movie that doesn’t stop.” Resources discussed during podcast: The official website of Anthony D’Aries Hudson Whitman/Excelsior College Press Order a copy of The Language of Men]]></description>
      
      <content:encoded><![CDATA[Anthony D’Aries, one of the literary world’s most talented young writers, joins the podcast to discuss his award-winning debut novel, The Language of Men (2012, Hudson Whitman/Excelsior College Press). D’Aries takes us through his journey half-way across the world to Vietnam in search of the truth behind whom his father, a Vietnam veteran, really was. In the process, D’Aries learns not only more about himself and his relationship with his father but how men communicate and what it means to be a man. 1:44 Why write “The Language of Men”? 5:35 A rainstorm, a river of garbage, and feeling connected for the first time. 9:44 Why visiting Vietnam left more questions than answers. 11:15 The Language of Men. 14:52 Finding a purpose. 16:11 A code of silence and how men communicate. 19:20 Writing slows down time. 21:26 Vietnam became a gateway to prior experiences. 22:32 Teaching prisoners to write. 24:07 “Trying to pause a movie that doesn’t stop.” Resources discussed during podcast: The official website of Anthony D’Aries Hudson Whitman/Excelsior College Press Order a copy of The Language of Men]]></content:encoded>
      
      
      <enclosure length="12021481" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_16_Anthony_DAries.mp3?dest-id=136543"/>
      <itunes:duration>25:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Anthony D’Aries, one of the literary world’s most talented young writers, joins the podcast to discuss his award-winning debut novel, The Language of Men (2012, Hudson Whitman/Excelsior College Press). D’Aries takes us through his journey half-way across the world to Vietnam in search of the truth behind whom his father, a Vietnam veteran, really was. In the process, D’Aries learns not only more about himself and his relationship with his father but how men communicate and what it means to be a man. 1:44 Why write “The Language of Men”? 5:35 A rainstorm, a river of garbage, and feeling connected for the first time. 9:44 Why visiting Vietnam left more questions than answers. 11:15 The Language of Men. 14:52 Finding a purpose. 16:11 A code of silence and how men communicate. 19:20 Writing slows down time. 21:26 Vietnam became a gateway to prior experiences. 22:32 Teaching prisoners to write. 24:07 “Trying to pause a movie that doesn’t stop.” Resources discussed during podcast: The official website of Anthony D’Aries Hudson Whitman/Excelsior College Press Order a copy of The Language of Men</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Anthony D’Aries, one of the literary world’s most talented young writers, joins the podcast to discuss his award-winning debut novel, The Language of Men (2012, Hudson Whitman/Excelsior College Press). D’Aries takes us through his journey half-way across the world to Vietnam in search of the truth behind whom his father, a Vietnam veteran, really was. In the process, D’Aries learns not only more about himself and his relationship with his father but how men communicate and what it means to be a man. 1:44 Why write “The Language of Men”? 5:35 A rainstorm, a river of garbage, and feeling connected for the first time. 9:44 Why visiting Vietnam left more questions than answers. 11:15 The Language of Men. 14:52 Finding a purpose. 16:11 A code of silence and how men communicate. 19:20 Writing slows down time. 21:26 Vietnam became a gateway to prior experiences. 22:32 Teaching prisoners to write. 24:07 “Trying to pause a movie that doesn’t stop.” Resources discussed during podcast: The official website of Anthony D’Aries Hudson Whitman/Excelsior College Press Order a copy of The Language of Men</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Maribeth Gunner on the Art of Informational Interviewing</title>
      <itunes:title>Distance EDU On Demand: Maribeth Gunner on the Art of Informational Interviewing</itunes:title>
      <pubDate>Fri, 16 Aug 2013 12:23:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a779ccc76736e10b169ab05d632d8348]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/the-art-of-informational-interviewing-with-maribeth-gunner]]></link>
      <description><![CDATA[Maribeth Gunner, director of career services at Excelsior College, joins the podcast to discuss Informational Interviewing, a powerful, but underused job search tactic. Gunner, an expert on career development, career counseling and military career transition, also discusses the most common questions she is confronted with by adult students and teases new Career Center initiatives under development. 1:36 How does an online career center work? 2:52 What is informational interviewing? 3:55 Feedback from students 6:59 The benefits 7:58 Not a job interview 10:01 Research and other prep 10:55 Where to begin 12:16 Common questions 13:48 Transition issues for the military 15:16 New initiatives Resources discussed during the show: Excelsior College Career Center The Benefits of Informational Interviewing by Maribeth Gunner Webinar: How to Demonstrate Your Skills to Civilian Employers]]></description>
      
      <content:encoded><![CDATA[Maribeth Gunner, director of career services at Excelsior College, joins the podcast to discuss Informational Interviewing, a powerful, but underused job search tactic. Gunner, an expert on career development, career counseling and military career transition, also discusses the most common questions she is confronted with by adult students and teases new Career Center initiatives under development. 1:36 How does an online career center work? 2:52 What is informational interviewing? 3:55 Feedback from students 6:59 The benefits 7:58 Not a job interview 10:01 Research and other prep 10:55 Where to begin 12:16 Common questions 13:48 Transition issues for the military 15:16 New initiatives Resources discussed during the show: Excelsior College Career Center The Benefits of Informational Interviewing by Maribeth Gunner Webinar: How to Demonstrate Your Skills to Civilian Employers]]></content:encoded>
      
      
      <enclosure length="7877851" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_15_Maribeth_Gunner.mp3?dest-id=136543"/>
      <itunes:duration>16:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Maribeth Gunner, director of career services at Excelsior College, joins the podcast to discuss Informational Interviewing, a powerful, but underused job search tactic. Gunner, an expert on career development, career counseling and military career transition, also discusses the most common questions she is confronted with by adult students and teases new Career Center initiatives under development. 1:36 How does an online career center work? 2:52 What is informational interviewing? 3:55 Feedback from students 6:59 The benefits 7:58 Not a job interview 10:01 Research and other prep 10:55 Where to begin 12:16 Common questions 13:48 Transition issues for the military 15:16 New initiatives Resources discussed during the show: Excelsior College Career Center The Benefits of Informational Interviewing by Maribeth Gunner Webinar: How to Demonstrate Your Skills to Civilian Employers</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Maribeth Gunner, director of career services at Excelsior College, joins the podcast to discuss Informational Interviewing, a powerful, but underused job search tactic. Gunner, an expert on career development, career counseling and military career transition, also discusses the most common questions she is confronted with by adult students and teases new Career Center initiatives under development. 1:36 How does an online career center work? 2:52 What is informational interviewing? 3:55 Feedback from students 6:59 The benefits 7:58 Not a job interview 10:01 Research and other prep 10:55 Where to begin 12:16 Common questions 13:48 Transition issues for the military 15:16 New initiatives Resources discussed during the show: Excelsior College Career Center The Benefits of Informational Interviewing by Maribeth Gunner Webinar: How to Demonstrate Your Skills to Civilian Employers</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. Wayne Brown on Researching Gender Trends Among Higher Ed CIOs</title>
      <itunes:title>Distance EDU On Demand: Dr. Wayne Brown on Researching Gender Trends Among Higher Ed CIOs</itunes:title>
      <pubDate>Fri, 09 Aug 2013 12:41:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[324a9b5ea571f6ce8d8d9586b418c274]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/why-are-fewer-women-rising-to-higher-ed-cio-with-dr-wayne-brown]]></link>
      <description><![CDATA[Dr. Wayne Brown, founder of the Center for Higher Education Chief Information Officer Studies and vice president of Extended Education at Excelsior College, joins the podcast to explore his recent Information Week piece “In Higher Education, Fewer Women Graduate to CIO.” Dr. Brown discusses this alarming trend, root causes behind gender disparities for mentoring and on-the-job training, and why he remains hopeful for the future. The conversation touches on another of different areas explored in his longitudinal research including expected degree pathways of aspiring CIOs. 1:10 Why is the percentage of women CIOs in higher ed on the decline? 2:26 How much research is there out there? 3:39 Possible factors at play. 6:05 Indications of future turnaround. 7:55 Should we be hopeful for the future? 9:07 Men favor their own CIOs for mentorship, women their peers. 10:50 What types of degrees should aspiring CIOs pursue? 12:15 What could derail potential progress? 14:04 Bridging the disconnect. 15:00 Additional trends – why tech leaders may not understand what a CIO does.]]></description>
      
      <content:encoded><![CDATA[Dr. Wayne Brown, founder of the Center for Higher Education Chief Information Officer Studies and vice president of Extended Education at Excelsior College, joins the podcast to explore his recent Information Week piece “In Higher Education, Fewer Women Graduate to CIO.” Dr. Brown discusses this alarming trend, root causes behind gender disparities for mentoring and on-the-job training, and why he remains hopeful for the future. The conversation touches on another of different areas explored in his longitudinal research including expected degree pathways of aspiring CIOs. 1:10 Why is the percentage of women CIOs in higher ed on the decline? 2:26 How much research is there out there? 3:39 Possible factors at play. 6:05 Indications of future turnaround. 7:55 Should we be hopeful for the future? 9:07 Men favor their own CIOs for mentorship, women their peers. 10:50 What types of degrees should aspiring CIOs pursue? 12:15 What could derail potential progress? 14:04 Bridging the disconnect. 15:00 Additional trends – why tech leaders may not understand what a CIO does.]]></content:encoded>
      
      
      <enclosure length="8158251" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_14_Wayne_Brown.mp3?dest-id=136543"/>
      <itunes:duration>17:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dr. Wayne Brown, founder of the Center for Higher Education Chief Information Officer Studies and vice president of Extended Education at Excelsior College, joins the podcast to explore his recent Information Week piece “In Higher Education, Fewer Women Graduate to CIO.” Dr. Brown discusses this alarming trend, root causes behind gender disparities for mentoring and on-the-job training, and why he remains hopeful for the future. The conversation touches on another of different areas explored in his longitudinal research including expected degree pathways of aspiring CIOs. 1:10 Why is the percentage of women CIOs in higher ed on the decline? 2:26 How much research is there out there? 3:39 Possible factors at play. 6:05 Indications of future turnaround. 7:55 Should we be hopeful for the future? 9:07 Men favor their own CIOs for mentorship, women their peers. 10:50 What types of degrees should aspiring CIOs pursue? 12:15 What could derail potential progress? 14:04 Bridging the disconnect. 15:00 Additional trends – why tech leaders may not understand what a CIO does.</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dr. Wayne Brown, founder of the Center for Higher Education Chief Information Officer Studies and vice president of Extended Education at Excelsior College, joins the podcast to explore his recent Information Week piece “In Higher Education, Fewer Women Graduate to CIO.” Dr. Brown discusses this alarming trend, root causes behind gender disparities for mentoring and on-the-job training, and why he remains hopeful for the future. The conversation touches on another of different areas explored in his longitudinal research including expected degree pathways of aspiring CIOs. 1:10 Why is the percentage of women CIOs in higher ed on the decline? 2:26 How much research is there out there? 3:39 Possible factors at play. 6:05 Indications of future turnaround. 7:55 Should we be hopeful for the future? 9:07 Men favor their own CIOs for mentorship, women their peers. 10:50 What types of degrees should aspiring CIOs pursue? 12:15 What could derail potential progress? 14:04 Bridging the disconnect. 15:00 Additional trends – why tech leaders may not understand what a CIO does.</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Educational Journeys with the 2013 Graduating Class</title>
      <itunes:title>Distance EDU On Demand: Educational Journeys with the 2013 Graduating Class</itunes:title>
      <pubDate>Fri, 05 Jul 2013 13:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0bdf25d48a7d7bd0855cb05e8e6a9d75]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/excelsior-college-commencement]]></link>
      <description><![CDATA[In this special Commencement edition of the podcast, host Mike Lesczinski talks about Excelsior’s 2013 graduating class and shares the inspiring stories of eight graduates. The episode includes interviews with several of the graduates discussing why they returned to school and what their educational journey has meant to them and their families. 1:15 Commencement at a distance learning institution 2:40 A diverse class 3:20 Jon Gonzalez, achieving the “American Dream” 5:27 Rhonda Esposito, putting her studies into practice 8:52 Jeff Urkevich, three degrees of success 11:43 Terry Bedard, and a dream no longer deferred 16:15 Mike Sturgess, never too old to learn 17:50 Joy Aburquez, Navy veteran kept a promise to herself 19:40 Patricia Mann, a courageous learner 20:57 The inspiring story of Eugene Cuthbert, Excelsior’s 150,000th graduate 23:47 The Excelsior success story – forty years of growth]]></description>
      
      <content:encoded><![CDATA[In this special Commencement edition of the podcast, host Mike Lesczinski talks about Excelsior’s 2013 graduating class and shares the inspiring stories of eight graduates. The episode includes interviews with several of the graduates discussing why they returned to school and what their educational journey has meant to them and their families. 1:15 Commencement at a distance learning institution 2:40 A diverse class 3:20 Jon Gonzalez, achieving the “American Dream” 5:27 Rhonda Esposito, putting her studies into practice 8:52 Jeff Urkevich, three degrees of success 11:43 Terry Bedard, and a dream no longer deferred 16:15 Mike Sturgess, never too old to learn 17:50 Joy Aburquez, Navy veteran kept a promise to herself 19:40 Patricia Mann, a courageous learner 20:57 The inspiring story of Eugene Cuthbert, Excelsior’s 150,000th graduate 23:47 The Excelsior success story – forty years of growth]]></content:encoded>
      
      
      <enclosure length="25762419" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life__Ep_12_Educational_Journeys_with_the_2013_Graduating_Class.mp3?dest-id=136543"/>
      <itunes:duration>26:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/b/1/c/3b1ceb6947f15bc7/Commencement_Square.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>In this special Commencement edition of the podcast, host Mike Lesczinski talks about Excelsior’s 2013 graduating class and shares the inspiring stories of eight graduates. The episode includes interviews with several of the graduates discussing why they returned to school and what their educational journey has meant to them and their families. 1:15 Commencement at a distance learning institution 2:40 A diverse class 3:20 Jon Gonzalez, achieving the “American Dream” 5:27 Rhonda Esposito, putting her studies into practice 8:52 Jeff Urkevich, three degrees of success 11:43 Terry Bedard, and a dream no longer deferred 16:15 Mike Sturgess, never too old to learn 17:50 Joy Aburquez, Navy veteran kept a promise to herself 19:40 Patricia Mann, a courageous learner 20:57 The inspiring story of Eugene Cuthbert, Excelsior’s 150,000th graduate 23:47 The Excelsior success story – forty years of growth</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>In this special Commencement edition of the podcast, host Mike Lesczinski talks about Excelsior’s 2013 graduating class and shares the inspiring stories of eight graduates. The episode includes interviews with several of the graduates discussing why they returned to school and what their educational journey has meant to them and their families. 1:15 Commencement at a distance learning institution 2:40 A diverse class 3:20 Jon Gonzalez, achieving the “American Dream” 5:27 Rhonda Esposito, putting her studies into practice 8:52 Jeff Urkevich, three degrees of success 11:43 Terry Bedard, and a dream no longer deferred 16:15 Mike Sturgess, never too old to learn 17:50 Joy Aburquez, Navy veteran kept a promise to herself 19:40 Patricia Mann, a courageous learner 20:57 The inspiring story of Eugene Cuthbert, Excelsior’s 150,000th graduate 23:47 The Excelsior success story – forty years of growth</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. Michael Verro on criminal justice career pathways</title>
      <itunes:title>Distance EDU On Demand: Dr. Michael Verro on criminal justice career pathways</itunes:title>
      <pubDate>Fri, 28 Jun 2013 13:01:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[daf7fd42cf90e77aa23549d7f2221e43]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/dr-michael-verro-on-criminal-justice-career-pathways]]></link>
      <description><![CDATA[Dr. Michael Verro, Criminal Justice program director at Excelsior College, joins the podcast to discuss careers in criminal justice, myths about law enforcement, the growing need for cyberprofessionals and how to convert criminal justice training into college credit. Dr. Verro, a former police officer, major crimes investigator, DEA Drug Task Force narcotics investigator, and author, specializes in criminal justice and psychology. He helps clear up some myths about law enforcement and whether or not a “police personality” actually exists. 1:46 From “cop” to academic 3:26 Criminal justice career options: more than law enforcement 5:57 Clearing up misconceptions – is the glass ceiling cracked? 8:00 The experience myth 9:40 Homeland Security, cybersecurity, and other growing industries 11:45 The Excelsior Criminal Justice program 14:12 Converting criminal justice training to college credit though the CJTA program 16:17 Is there a “police personality”?]]></description>
      
      <content:encoded><![CDATA[Dr. Michael Verro, Criminal Justice program director at Excelsior College, joins the podcast to discuss careers in criminal justice, myths about law enforcement, the growing need for cyberprofessionals and how to convert criminal justice training into college credit. Dr. Verro, a former police officer, major crimes investigator, DEA Drug Task Force narcotics investigator, and author, specializes in criminal justice and psychology. He helps clear up some myths about law enforcement and whether or not a “police personality” actually exists. 1:46 From “cop” to academic 3:26 Criminal justice career options: more than law enforcement 5:57 Clearing up misconceptions – is the glass ceiling cracked? 8:00 The experience myth 9:40 Homeland Security, cybersecurity, and other growing industries 11:45 The Excelsior Criminal Justice program 14:12 Converting criminal justice training to college credit though the CJTA program 16:17 Is there a “police personality”?]]></content:encoded>
      
      
      <enclosure length="8828285" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_12_Michael_Verro.mp3?dest-id=136543"/>
      <itunes:duration/>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dr. Michael Verro, Criminal Justice program director at Excelsior College, joins the podcast to discuss careers in criminal justice, myths about law enforcement, the growing need for cyberprofessionals and how to convert criminal justice training into college credit. Dr. Verro, a former police officer, major crimes investigator, DEA Drug Task Force narcotics investigator, and author, specializes in criminal justice and psychology. He helps clear up some myths about law enforcement and whether or not a “police personality” actually exists. 1:46 From “cop” to academic 3:26 Criminal justice career options: more than law enforcement 5:57 Clearing up misconceptions – is the glass ceiling cracked? 8:00 The experience myth 9:40 Homeland Security, cybersecurity, and other growing industries 11:45 The Excelsior Criminal Justice program 14:12 Converting criminal justice training to college credit though the CJTA program 16:17 Is there a “police personality”?</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dr. Michael Verro, Criminal Justice program director at Excelsior College, joins the podcast to discuss careers in criminal justice, myths about law enforcement, the growing need for cyberprofessionals and how to convert criminal justice training into college credit. Dr. Verro, a former police officer, major crimes investigator, DEA Drug Task Force narcotics investigator, and author, specializes in criminal justice and psychology. He helps clear up some myths about law enforcement and whether or not a “police personality” actually exists. 1:46 From “cop” to academic 3:26 Criminal justice career options: more than law enforcement 5:57 Clearing up misconceptions – is the glass ceiling cracked? 8:00 The experience myth 9:40 Homeland Security, cybersecurity, and other growing industries 11:45 The Excelsior Criminal Justice program 14:12 Converting criminal justice training to college credit though the CJTA program 16:17 Is there a “police personality”?</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. David Seelow on developing the ESL Writing Online Workshop (ESL-WOW)</title>
      <itunes:title>Distance EDU On Demand: Dr. David Seelow on developing the ESL Writing Online Workshop (ESL-WOW)</itunes:title>
      <pubDate>Fri, 14 Jun 2013 18:00:30 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3188f403e0a99dc7c02323fdbdd64698]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/developing-the-esl-writing-online-workshop-esl-wow-with-dr-david-seelow]]></link>
      <description><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> Dr. David Seelow, director of writing programs and the online writing lab at Excelsior College, joins the podcast to explore the development of the award-winning ESL-Writing Online Workshop (ESL-WOW). Dr. Seelow discusses the challenges ESL students face with college-level written composition, how the center addresses these deficiencies, and the importance of these kinds of investments by institutions of higher education. Visit the ESL-WOW: http://www.esl-wow.org/ 1:20 The purpose of the ESL-WOW 3:50 What has higher ed taken so long (in general) to address the writing skills of ESL students? 6:37 The challenges of developing an online writing center 10:55 How ESL-WOW works 16:08 “Avoiding Plagiarism” 19:50 NUTN Award 23:27 The Future of ESL-WOW]]></description>
      
      <content:encoded><![CDATA[<!-- [if gte mso 9]> Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--> Dr. David Seelow, director of writing programs and the online writing lab at Excelsior College, joins the podcast to explore the development of the award-winning ESL-Writing Online Workshop (ESL-WOW). Dr. Seelow discusses the challenges ESL students face with college-level written composition, how the center addresses these deficiencies, and the importance of these kinds of investments by institutions of higher education. Visit the ESL-WOW: http://www.esl-wow.org/ 1:20 The purpose of the ESL-WOW 3:50 What has higher ed taken so long (in general) to address the writing skills of ESL students? 6:37 The challenges of developing an online writing center 10:55 How ESL-WOW works 16:08 “Avoiding Plagiarism” 19:50 NUTN Award 23:27 The Future of ESL-WOW]]></content:encoded>
      
      
      <enclosure length="13144526" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_11_David_Seelow.mp3?dest-id=136543"/>
      <itunes:duration>27:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Dr. David Seelow, director of writing programs and the online writing lab at Excelsior College, joins the podcast to explore the development of the award-winning ESL-Writing Online Workshop (ESL-WOW). Dr. Seelow discusses the challenges ESL students face with college-level written composition, how the center addresses these deficiencies, and the importance of these kinds of investments by institutions of higher education. Visit the ESL-WOW: http://www.esl-wow.org/ 1:20 The purpose of the ESL-WOW 3:50 What has higher ed taken so long (in general) to address the writing skills of ESL students? 6:37 The challenges of developing an online writing center 10:55 How ESL-WOW works 16:08 “Avoiding Plagiarism” 19:50 NUTN Award 23:27 The Future of ESL-WOW</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Dr. David Seelow, director of writing programs and the online writing lab at Excelsior College, joins the podcast to explore the development of the award-winning ESL-Writing Online Workshop (ESL-WOW). Dr. Seelow discusses the challenges ESL students face with college-level written composition, how the center addresses these deficiencies, and the importance of these kinds of investments by institutions of higher education. Visit the ESL-WOW: http://www.esl-wow.org/ 1:20 The purpose of the ESL-WOW 3:50 What has higher ed taken so long (in general) to address the writing skills of ESL students? 6:37 The challenges of developing an online writing center 10:55 How ESL-WOW works 16:08 “Avoiding Plagiarism” 19:50 NUTN Award 23:27 The Future of ESL-WOW</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Mahesh Harvu on big data</title>
      <itunes:title>Distance EDU On Demand: Mahesh Harvu on big data</itunes:title>
      <pubDate>Fri, 07 Jun 2013 13:51:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c89107e894f0e49d0bbb67a9216a6a18]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/big-data-with-mahesh-harvu]]></link>
      <description><![CDATA[Mahesh Harvu, a senior tech executive, author and adjunct instructor at Excelsior College joins the podcast to discuss the role of Big Data in the corporate world, specifically its value at the enterprise level, impact on the bottom line, and some of the key implementation obstacles that a company must overcome to realize its full potential. The conversation concludes with a discussion on human capital and the role of Big Data in five years. 1:04 What is Big Data? 3:35 The challenge of collection 9:15 The value at the enterprise data 13:15 Determining "good" vs "bad" data 17:28 Is Big Data too costly? Is human capital to scarce? 24:03 Big Data in 5 years]]></description>
      
      <content:encoded><![CDATA[Mahesh Harvu, a senior tech executive, author and adjunct instructor at Excelsior College joins the podcast to discuss the role of Big Data in the corporate world, specifically its value at the enterprise level, impact on the bottom line, and some of the key implementation obstacles that a company must overcome to realize its full potential. The conversation concludes with a discussion on human capital and the role of Big Data in five years. 1:04 What is Big Data? 3:35 The challenge of collection 9:15 The value at the enterprise data 13:15 Determining "good" vs "bad" data 17:28 Is Big Data too costly? Is human capital to scarce? 24:03 Big Data in 5 years]]></content:encoded>
      
      
      <enclosure length="12678081" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_10_Mahesh_Harvu.mp3?dest-id=136543"/>
      <itunes:duration>26:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Mahesh Harvu, a senior tech executive, author and adjunct instructor at Excelsior College joins the podcast to discuss the role of Big Data in the corporate world, specifically its value at the enterprise level, impact on the bottom line, and some of the key implementation obstacles that a company must overcome to realize its full potential. The conversation concludes with a discussion on human capital and the role of Big Data in five years. 1:04 What is Big Data? 3:35 The challenge of collection 9:15 The value at the enterprise data 13:15 Determining "good" vs "bad" data 17:28 Is Big Data too costly? Is human capital to scarce? 24:03 Big Data in 5 years</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Mahesh Harvu, a senior tech executive, author and adjunct instructor at Excelsior College joins the podcast to discuss the role of Big Data in the corporate world, specifically its value at the enterprise level, impact on the bottom line, and some of the key implementation obstacles that a company must overcome to realize its full potential. The conversation concludes with a discussion on human capital and the role of Big Data in five years. 1:04 What is Big Data? 3:35 The challenge of collection 9:15 The value at the enterprise data 13:15 Determining "good" vs "bad" data 17:28 Is Big Data too costly? Is human capital to scarce? 24:03 Big Data in 5 years</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. Sandra Dutton on treating the illogical logically</title>
      <itunes:title>Distance EDU On Demand: Dr. Sandra Dutton on treating the illogical logically</itunes:title>
      <pubDate>Fri, 31 May 2013 12:41:18 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b82a89a0ad9e9a2d66c94e735afe8a1e]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/treating-the-illogical-logically-with-dr-sandra-dutton]]></link>
      <description><![CDATA[Dr. Sandra Dutton, author, illustrator and Excelsior adjunct instructor, joins Excelsior Life: Distance EDU on Demand to discuss two of her most recent works, a children’s book called “Dr. Ms. Perfect: A Beast’s Guide to Proper Behavior” and “Just a Matter of Time” – an off-Broadway musical she is working to revive. Dutton discusses the creative process for developing both children’s literature and musicals, her love of the English language and finding inspiration in the illogical. 1:26 Inspiration to write for children 2:34 what is creative process like? 4:28 Finding inspiration in physics 7:02 Making logic of the illogical 7:30 Work in progress 8:29 No Child Left Behind 9:24 Just a Matter of Time 9:58 Lewis Carrol meets Dr. Seuss meets Salvador Dali meets… 12:09 Turning a coffee shop play into an off-Broadway musical]]></description>
      
      <content:encoded><![CDATA[Dr. Sandra Dutton, author, illustrator and Excelsior adjunct instructor, joins Excelsior Life: Distance EDU on Demand to discuss two of her most recent works, a children’s book called “Dr. Ms. Perfect: A Beast’s Guide to Proper Behavior” and “Just a Matter of Time” – an off-Broadway musical she is working to revive. Dutton discusses the creative process for developing both children’s literature and musicals, her love of the English language and finding inspiration in the illogical. 1:26 Inspiration to write for children 2:34 what is creative process like? 4:28 Finding inspiration in physics 7:02 Making logic of the illogical 7:30 Work in progress 8:29 No Child Left Behind 9:24 Just a Matter of Time 9:58 Lewis Carrol meets Dr. Seuss meets Salvador Dali meets… 12:09 Turning a coffee shop play into an off-Broadway musical]]></content:encoded>
      
      
      <enclosure length="8694830" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelsior_Life_Podcast_Ep_9_Sandra_Dutton.mp3?dest-id=136543"/>
      <itunes:duration>18:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Dr. Sandra Dutton, author, illustrator and Excelsior adjunct instructor, joins Excelsior Life: Distance EDU on Demand to discuss two of her most recent works, a children’s book called “Dr. Ms. Perfect: A Beast’s Guide to Proper Behavior” and “Just a Matter of Time” – an off-Broadway musical she is working to revive. Dutton discusses the creative process for developing both children’s literature and musicals, her love of the English language and finding inspiration in the illogical. 1:26 Inspiration to write for children 2:34 what is creative process like? 4:28 Finding inspiration in physics 7:02 Making logic of the illogical 7:30 Work in progress 8:29 No Child Left Behind 9:24 Just a Matter of Time 9:58 Lewis Carrol meets Dr. Seuss meets Salvador Dali meets… 12:09 Turning a coffee shop play into an off-Broadway musical</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Dr. Sandra Dutton, author, illustrator and Excelsior adjunct instructor, joins Excelsior Life: Distance EDU on Demand to discuss two of her most recent works, a children’s book called “Dr. Ms. Perfect: A Beast’s Guide to Proper Behavior” and “Just a Matter of Time” – an off-Broadway musical she is working to revive. Dutton discusses the creative process for developing both children’s literature and musicals, her love of the English language and finding inspiration in the illogical. 1:26 Inspiration to write for children 2:34 what is creative process like? 4:28 Finding inspiration in physics 7:02 Making logic of the illogical 7:30 Work in progress 8:29 No Child Left Behind 9:24 Just a Matter of Time 9:58 Lewis Carrol meets Dr. Seuss meets Salvador Dali meets… 12:09 Turning a coffee shop play into an off-Broadway musical</itunes:summary></item>
    
    <item>
      <title>Distance EDU On Demand: Dr. Christopher Davidson on rethinking the role of MOOCs in higher ed</title>
      <itunes:title>Distance EDU On Demand: Dr. Christopher Davidson on rethinking the role of MOOCs in higher ed</itunes:title>
      <pubDate>Fri, 24 May 2013 12:48:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bbe951a63f1dabf8748a6cd0fbd40561]]></guid>
      <link><![CDATA[https://excelsiorlife.libsyn.com/rethinking-the-role-of-moo-cs-in-higher-ed-with-dr-christopher-davidson]]></link>
      <description><![CDATA[Sociologist Dr. Christopher Davidson, an adjunct instructor at Excelsior College, joins the podcast to discuss Massively Open Online Courses (MOOCs), and what role, if any, they can or should play in higher education. Dr. Davidson argues that the reality of MOOCs differs from how they are portrayed by the mainstream media and advocates. 1:30 Thoughts on “Academically Adrift” 4:28 Who do MOOCs serve? 6:35 MOOCS are resources, not courses 8:00 Faculty backlash 10:15 What is the purpose of higher education? 11:45 The potential 12:35 Faculty concerns 15:25 Decoupling the learning process from assessment 19:12 “My Question on MOOCs” 21:38 Best practices for course development 22:02 MOOCs in 2023]]></description>
      
      <content:encoded><![CDATA[Sociologist Dr. Christopher Davidson, an adjunct instructor at Excelsior College, joins the podcast to discuss Massively Open Online Courses (MOOCs), and what role, if any, they can or should play in higher education. Dr. Davidson argues that the reality of MOOCs differs from how they are portrayed by the mainstream media and advocates. 1:30 Thoughts on “Academically Adrift” 4:28 Who do MOOCs serve? 6:35 MOOCS are resources, not courses 8:00 Faculty backlash 10:15 What is the purpose of higher education? 11:45 The potential 12:35 Faculty concerns 15:25 Decoupling the learning process from assessment 19:12 “My Question on MOOCs” 21:38 Best practices for course development 22:02 MOOCs in 2023]]></content:encoded>
      
      
      <enclosure length="11508615" type="audio/mpeg" url="https://traffic.libsyn.com/secure/excelsiorlife/Excelisor_Life_Ep_8_Christopher_Davidson.mp3?dest-id=136543"/>
      <itunes:duration>23:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Lesczinski</dc:creator><itunes:subtitle>Sociologist Dr. Christopher Davidson, an adjunct instructor at Excelsior College, joins the podcast to discuss Massively Open Online Courses (MOOCs), and what role, if any, they can or should play in higher education. Dr. Davidson argues that the reality of MOOCs differs from how they are portrayed by the mainstream media and advocates. 1:30 Thoughts on “Academically Adrift” 4:28 Who do MOOCs serve? 6:35 MOOCS are resources, not courses 8:00 Faculty backlash 10:15 What is the purpose of higher education? 11:45 The potential 12:35 Faculty concerns 15:25 Decoupling the learning process from assessment 19:12 “My Question on MOOCs” 21:38 Best practices for course development 22:02 MOOCs in 2023</itunes:subtitle><itunes:author>Mike Lesczinski</itunes:author><itunes:summary>Sociologist Dr. Christopher Davidson, an adjunct instructor at Excelsior College, joins the podcast to discuss Massively Open Online Courses (MOOCs), and what role, if any, they can or should play in higher education. Dr. Davidson argues that the reality of MOOCs differs from how they are portrayed by the mainstream media and advocates. 1:30 Thoughts on “Academically Adrift” 4:28 Who do MOOCs serve? 6:35 MOOCS are resources, not courses 8:00 Faculty backlash 10:15 What is the purpose of higher education? 11:45 The potential 12:35 Faculty concerns 15:25 Decoupling the learning process from assessment 19:12 “My Question on MOOCs” 21:38 Best practices for course development 22:02 MOOCs in 2023</itunes:summary></item>
    
  </channel>
</rss>