<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" 
xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:pp="http://www.pupuplayer.com/ppexplination-rtf">
<channel>
<title>Infosecurity Europe Podcast</title>
<description>The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-face, a visit to the event is a must. For more information about the event visit www.infosec.co.uk, where you can also sign up for event updates and access exclusive 60 second interviews, white papers and case studies.</description>
<link>http://www.infosec.co.uk/</link>
<category>Technology</category>
<copyright>Infosecurity Europe</copyright>
<docs>http://blogs.law.harvard.edu/tech/rss</docs>
<language>en-gb</language>
<lastBuildDate>Wed, 05 Sep 2007 00:00:00 +0000</lastBuildDate>
<managingEditor>hello@yada-yada.net (yada yada productions)</managingEditor>
<pubDate>Wed, 05 Sep 2007 00:00:00 +0000</pubDate>
<webMaster>info@yada-yada.net</webMaster>
<generator>yada yada productions</generator>
<itunes:subtitle>Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. For more information about the event, visit www.infosec.co.uk.</itunes:subtitle>
<itunes:summary>The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-face, a visit to the event is a must. For more information about the event visit www.infosec.co.uk, where you can also sign up for event updates and access exclusive 60 second interviews, white papers and case studies.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:keywords>data, distribution, security, issues, Olympia, yada, Unified Communications, FaceTime</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:owner>
<itunes:email>info@infosec.co.uk</itunes:email>
<itunes:name>Infosecurity Europe</itunes:name>
</itunes:owner>
<itunes:explicit>no</itunes:explicit>
<image>
<url>http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/feed/InfosecurityEurope_sm.jpg</url>
<title>Infosecurity Europe</title>
<link>http://www.infosec.co.uk/</link>
<description>Infosecurity Europe</description>
<width>144</width>
<height>144</height>
</image>
<itunes:link rel="image" type="image/jpeg" href="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/feed/InfosecurityEurope_bg.jpg" width="300" height="300">Infosecurity Europe</itunes:link>
<itunes:image href="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/feed/InfosecurityEurope_bg.jpg"/>



<item>
<title>Marcus Ranum</title>
<description> Brian McKenna talks to Marcus Ranum on cyberwarfare</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Marcus_Ranum.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Marcus_Ranum.mp3</guid>
<pubDate>Fri, 29 Jan 2010 00:00:00 +0000</pubDate>
<itunes:subtitle>Brian McKenna talks to Marcus Ranum on cyberwarfare.</itunes:subtitle>
<itunes:summary> Brian McKenna talks to Marcus Ranum on cyberwarfare.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:14:07</itunes:duration>
<itunes:keywords>data, distribution, security, issues,  yada, Peter Wood, IT, Infosecurity</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Brian McKenna talks to Marcus Ranum on cyberwarfare.</content:encoded>
</item>

<item>
<title>Phil Zimmerman</title>
<description> Jon Collins talks to Phil Zimmerman</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Infosecurity09/Phil_Zimmerman.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Infosecurity09/Phil_Zimmerman.mp3</guid>
<pubDate>Fri, 29 Jan 2010 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins talks to Phil Zimmerman.</itunes:subtitle>
<itunes:summary> Jon Collins talks to Phil Zimmerman.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:10:08</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Infosecurity</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins talks to Phil Zimmerman .</content:encoded>
</item>

<item>
<title>Paujl Dorey</title>
<description> Jon Collins talks to Paul Dorey</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Infosecurity09/Marcus_Ranum.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Infosecurity09/Marcus_Ranum.mp3</guid>
<pubDate>Fri, 29 Jan 2010 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins talks to Paul Dorey.</itunes:subtitle>
<itunes:summary> Jon Collins talks to Paul Dorey.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:07:45</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Infosecurity</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins talks to Paul Dorey.</content:encoded>
</item>

<item>
<title>David Lacey</title>
<description> Jon Collins talks to David Lacey</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Infosecurity09/David_Lacey.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Infosecurity09/David_Lacey.mp3</guid>
<pubDate>Fri, 29 Jan 2010 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins talks to David Lacey.</itunes:subtitle>
<itunes:summary> Jon Collins talks to David Lacey.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:11:09</itunes:duration>
<itunes:keywords>data, distribution, security, issues,  Infosecurity</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins talks to David Lacey.</content:encoded>
</item>


<item>
<title>Dan Kaminsky</title>
<description> Jon Collins talks to Dan Kaminsky</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Infosecurity09/Dan_Kaminsky.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Infosecurity09/Dan_Kaminsky.mp3</guid>
<pubDate>Fri, 29 Jan 2010 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins talks to Dan Kaminsky.</itunes:subtitle>
<itunes:summary> Jon Collins talks to Dan Kaminsky.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:13:55</itunes:duration>
<itunes:keywords>data, distribution, security, IT, Infosecurity</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins talks to Dan Kaminsky.</content:encoded>
</item>

<item>
<title>Gerry O'Neill 1</title>
<description>Gerry O'Neill on whether effective information security is about people or technology.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Gerry_ONeill_01.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Gerry_ONeill_01.mp3</guid>
<pubDate>Thu, 12 Feb 2009 00:00:00 +0000</pubDate>
<itunes:subtitle>Gerry O'Neill on whether effective information security is about people or technology.</itunes:subtitle>
<itunes:summary>Gerry O'Neill on whether effective information security is about people or technology.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:09:53</itunes:duration>
<itunes:keywords>data, distribution, security, issues,  yada, Peter Wood, IT, Infosecurity</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Gerry O'Neill on whether effective information security is about people or technology.</content:encoded>
</item>


<item>
<title>Gerry O'Neill 2</title>
<description>Gerry O'Neill reveals why there is a need for greater professionalism in the information security industry, and explains the key criteria an employer needs to look for when recruiting for a role, and which qualifications are the most important to obtain.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Gerry_ONeill_02.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Gerry_ONeill_02.mp3</guid>
<pubDate>Thu, 12 Feb 2009 00:00:00 +0000</pubDate>
<itunes:subtitle>Gerry O'Neill reveals why there is a need for greater professionalism in the information security industry.</itunes:subtitle>
<itunes:summary>Gerry O'Neill reveals why there is a need for greater professionalism in the information security industry, and explains the key criteria an employer needs to look for when recruiting for a role, and which qualifications are the most important to obtain.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:14:31</itunes:duration>
<itunes:keywords>data, distribution, security, issues,  yada, Peter Wood, IT, Infosecurity</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Gerry O'Neill reveals why there is a need for greater professionalism in the information security industry.</content:encoded>
</item>


<item>
<title>Blended Social Engineering and IT Based Attacks </title>
<description>A disturbing trend has emerged of IT based attacks facilitated by information garnered through social engineering. In this podcast pen tester and ethical hacking guru Peter Wood of First Base Technologies discusses some of the features of these attacks, and the steps that organisations can undertake to reduce their vulnerability to them.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/PeterWoods.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/PeterWoods.mp3</guid>
<pubDate>Thu, 25 Sep 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Peter Wood talks about IT based attacks through social engineering.</itunes:subtitle>
<itunes:summary>A disturbing trend has emerged of IT based attacks facilitated by information garnered through social engineering. In this podcast pen tester and ethical hacking guru Peter Wood of First Base Technologies discusses some of the features of these attacks, and the steps that organisations can undertake to reduce their vulnerability to them.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:10:30</itunes:duration>
<itunes:keywords>data, distribution, security, issues,  yada, Peter Wood, IT, Infosecurity</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Peter Wood talks about IT based attacks through social engineering.</content:encoded>
</item>


<item>
<title>Fred Piper</title>
<description>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the fifth of the legends, Fred Piper, on what he thinks the next big issue will be.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/FredPiper.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/FredPiper.mp3</guid>
<pubDate>Mon, 16 Jun 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins speaks to Fred Piper.</itunes:subtitle>
<itunes:summary>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the fifth of the legends, Fred Piper on what he thinks the next big issue will be.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:10:10</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada, Fred Piper</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins speaks to Fred Piper.</content:encoded>
</item>

<item>
<title>Howard Schmidt</title>
<description>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the fourth of the legends, Howard Schmidt, on what he thinks the next big issue will be.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/HowardSchmidt.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/HowardSchmidt.mp3</guid>
<pubDate>Sat, 07 Jun 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins speaks to Howard Schmidt.</itunes:subtitle>
<itunes:summary>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the fourth of the legends, Howard Schmidt on what he thinks the next big issue will be.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:14:48</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada, Bruce Schneier</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins speaks to Alan Paller.</content:encoded>
</item>

<item>
<title>Alan Paller</title>
<description>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the fourth of the legends, Howard Schmidt, on what he thinks the next big issue will be.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Alan_Paller.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Alan Paller.mp3</guid>
<pubDate>Fri, 30 May 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins speaks to Alan Paller.</itunes:subtitle>
<itunes:summary>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the third of the legends, Alan Paller, on what he thinks the next big issue will be.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:14:48</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada, Bruce Schneier</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins speaks to Alan Paller.</content:encoded>
</item>

<item>
<title>Adam Laurie</title>
<description>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the second of the legends, Adam Laurie, on what he thinks the next big issue will be.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Adam_Laurie.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Adam_Laurie.mp3</guid>
<pubDate>Fri, 23 May 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins speaks to Adam Laurie.</itunes:subtitle>
<itunes:summary>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the second of the legends, Adam Laurie, on what he thinks the next big issue will be.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:12:48</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada, Bruce Schneier</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins speaks to Adam Laurie.</content:encoded>
</item>

<item>
<title>Bruce Schneier</title>
<description>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the first of the legends, Bruce Schneier, on what he thinks the next big issue will be.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Bruce_Schneier.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/Bruce_Schneier.mp3</guid>
<pubDate>Fri, 16 May 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Jon Collins speaks to Bruce Schneier.</itunes:subtitle>
<itunes:summary>At Infosecurity Europe this year, we heard from some of the legends of the Industry in the Hall of Fame. In this podcast, Jon Collins speaks to the first of the legends, Bruce Schneier, on what he thinks the next big issue will be.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:14:16</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada, Bruce Schneier</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Jon Collins speaks to Bruce Schneier.</content:encoded>
</item>


<item>
<title>David Blunkett on Information Security</title>
<description>At a time when confidence in the Government’s ability to protect private information is at an all time low and identity cards and mass personal informatics are getting ever closer to introduction - Infosecurity Europe’s Richard Fitzhugh talks to David Blunkett, MP for Sheffield Brightside and former Home Secretary about some of the concerns for businesses in information security and privacy.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/InfoSec_DavidBlunkett.mp3" length="9872031" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/InfoSec_DavidBlunkett.mp3</guid>
<pubDate>Tue, 25 Mar 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Infosecurity Europe’s Richard Fitzhugh talks to David Blunkett, MP for Sheffield Brightside and former Home Secretary.</itunes:subtitle>
<itunes:summary>At a time when confidence in the Government’s ability to protect private information is at an all time low and identity cards and mass personal informatics are getting ever closer to introduction - Infosecurity Europe’s Richard Fitzhugh talks to David Blunkett, MP for Sheffield Brightside and former Home Secretary about some of the concerns for businesses in information security and privacy.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:20:29</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>At a time when confidence in the Government’s ability to protect private information is at an all time low and identity cards and mass personal informatics are getting ever closer to introduction - Infosecurity Europe’s Richard Fitzhugh talks to David Blunkett, MP for Sheffield Brightside and former Home Secretary about some of the concerns for businesses in information security and privacy.</content:encoded>
</item>

<item>
<title>Can Security Keep Pace with Mobilisation and Convergence? (enhanced)</title>
<description>2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. about the security issues around mobile devices and what can be done to mitigate these issues.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/enhanced/AmritWilliams_BigFix.m4a" length="5155023" type="audio/x-m4a" />
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/enhanced/AmritWilliams_BigFix.m4a</guid>
<pubDate>Tue, 26 Feb 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Amrit Williams, CTO from BigFix Inc. discusses the security issues around mobile devices and what can be done to mitigate these issues.</itunes:subtitle>
<itunes:summary>2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. about the security issues around mobile devices and what can be done to mitigate these issues.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:10:20</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. about the security issues around mobile devices and what can be done to mitigate these issues.</content:encoded>
</item>

<item>
<title>Can Security Keep Pace with Mobilisation and Convergence?</title>
<description>2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. about the security issues around mobile devices and what can be done to mitigate these issues.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/AmritWilliams_BigFix.mp3" length="4980066" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/AmritWilliams_BigFix.mp3</guid>
<pubDate>Tue, 26 Feb 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>Amrit Williams, CTO from BigFix Inc. discusses the security issues around mobile devices and what can be done to mitigate these issues.</itunes:subtitle>
<itunes:summary>2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. about the security issues around mobile devices and what can be done to mitigate these issues.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:10:20</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>2007 was a milestone in the Mobilisation of the workforce, with 50% of employees working remotely. Coupled to the plethora of new technologies being employed to facilitate work-on-the-go, this movement is throwing up some unique security challenges. In this podcast Infosecurity Europe’s Sam Willoughby talks to Amrit Williams, CTO from BigFix Inc. about the security issues around mobile devices and what can be done to mitigate these issues.</content:encoded>
</item>

<item>
<title>Securely Managing Unified Communications (enhanced)</title>
<description>In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcast, Infosecurity Europe's Sam Willoughby talks to FaceTime Communications about strategies to mitigate these issues.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/enhanced/UnifiedCommunications.m4a" length="3492262" type="audio/x-m4a" />
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/enhanced/UnifiedCommunications.m4a</guid>
<pubDate>Wed, 09 Jan 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>In this podcast, Infosecurity Europe's Sam Willoughby talks to FaceTime Communications about strategies to mitigate Unified Communications issues.</itunes:subtitle>
<itunes:summary>In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcast, Infosecurity Europe's Sam Willoughby talks to FaceTime Communications about strategies to mitigate these issues.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:07:14</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada, Unified Communications, Securing your Unified Communications, FaceTime</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcast, Infosecurity Europe's Sam Willoughby talks to FaceTime Communications about strategies to mitigate these issues.</content:encoded>
</item>

<item>
<title>Securely Managing Unified Communications</title>
<description>In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcast, Infosecurity Europe's Sam Willoughby talks to FaceTime Communications about strategies to mitigate these issues.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/UnifiedCommunications.mp3" length="3492262" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/UnifiedCommunications.mp3</guid>
<pubDate>Wed, 09 Jan 2008 00:00:00 +0000</pubDate>
<itunes:subtitle>In this podcast, Infosecurity Europe's Sam Willoughby talks to FaceTime Communications about strategies to mitigate Unified Communications issues.</itunes:subtitle>
<itunes:summary>In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcast, Infosecurity Europe's Sam Willoughby talks to FaceTime Communications about strategies to mitigate these issues.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:07:14</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>In recent years, Unified Communications has exploded with users increasingly conducting document exchange, virtual conferences and collaboration on projects using internet protocol based technology. It is recognized that the unified management of these platforms gives huge benefits but also raises many security and compliance issues. In this podcast, Infosecurity Europe's Sam Willoughby talks to FaceTime Communications about strategies to mitigate these issues.</content:encoded>
</item>

<item>
<title>Reducing Laptop Security Threats</title>
<description>The proliferation of laptop usage by employees has thrown companies open to a whole range of security threats from outright theft to illegal wireless access. In this podcast, Tony Neate, Managing Director of Get Safe Online, will explore some of the threats associated with laptop use, and give advice on how to reduce your vulnerabilities.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/TonyNeate.mp3" length="3743702" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/TonyNeate.mp3</guid>
<pubDate>Tue, 13 Nov 2007 00:00:00 +0000</pubDate>
<itunes:subtitle>In this podcast, Tony Neate, Managing Director of Get Safe Online, will explore some of the threats associated with laptop use.</itunes:subtitle>
<itunes:summary>The proliferation of laptop usage by employees has thrown companies open to a whole range of security threats from outright theft to illegal wireless access. In this podcast, Tony Neate, Managing Director of Get Safe Online, will explore some of the threats associated with laptop use, and give advice on how to reduce your vulnerabilities.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:07:46</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>The proliferation of laptop usage by employees has thrown companies open to a whole range of security threats from outright theft to illegal wireless access. In this podcast, Tony Neate, Managing Director of Get Safe Online, will explore some of the threats associated with laptop use, and give advice on how to reduce your vulnerabilities.</content:encoded>
</item>

<item>
<title>Social Networking: Threat or Opportunity?</title>
<description>With ever increasing numbers of employees now having a profile on a social networking site, this interview with Maury Shenk, Head of European Legal Programme, SANs Institute, looks at how the business connectivity advantages of social networking weigh up against the potential dangers. From wasting employee time to leaking valuable corporate information, there are many potential pitfalls. This podcast also explores the policies and technical steps that should be in place to ensure that your organisation does not suffer as a result of this rapidly expanding trend.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/socialnetworking.mp3" length="4424594" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/socialnetworking.mp3</guid>
<pubDate>Tue, 02 Oct 2007 00:00:00 +0000</pubDate>
<itunes:subtitle>This podcast looks at how the business connectivity advantages of social networking weigh up against the potential dangers. From wasting employee time to leaking valuable corporate information, there are many potential pitfalls.</itunes:subtitle>
<itunes:summary>With ever increasing numbers of employees now having a profile on a social networking site, this interview with Maury Shenk, Head of European Legal Programme, SANs Institute, looks at how the business connectivity advantages of social networking weigh up against the potential dangers. From wasting employee time to leaking valuable corporate information, there are many potential pitfalls. This podcast also explores the policies and technical steps that should be in place to ensure that your organisation does not suffer as a result of this rapidly expanding trend.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:10:32</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>With ever increasing numbers of employees now having a profile on a social networking site, this interview with Maury Shenk, Head of European Legal Programme, SANs Institute, looks at how the business connectivity advantages of social networking weigh up against the potential dangers. From wasting employee time to leaking valuable corporate information, there are many potential pitfalls. This podcast also explores the policies and technical steps that should be in place to ensure that your organisation does not suffer as a result of this rapidly expanding trend.</content:encoded>
</item>

<item>
<title>Wireless Security: Top Tips to Mitigating Threats</title>
<description>Recent high profile security breaches have shown just how vital wireless security can be, but organisations often have little control of their employees' wireless activities, a poor understanding of the potential threats across the organisation and little protection in place to detect, prevent and locate breaches. This podcast features Paul Lawrence, VP &amp; General Manager, EMEA, AirTight Networks, who gives his views and looks in detail at the scale of the problems, the threat sources, and how your company's vulnerability can be reduced through easy-to-apply steps.</description>
<link>http://www.infosec.co.uk/</link>
<author>info@infosec.co.uk</author>
<category>Technology</category>
<comments>http://www.infosec.co.uk/</comments>
<enclosure url="http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/WirelessSecurity.mp3" length="4701692" type="audio/mpeg"/>
<guid isPermaLink="true">http://www.yada-yada.co.uk/podcasts/ReedExhibitions/InfosecurityEurope/audio/WirelessSecurity.mp3</guid>
<pubDate>Wed, 05 Sep 2007 00:00:00 +0000</pubDate>
<itunes:subtitle>This podcast features Paul Lawrence, VP &amp; General Manager, EMEA, Airtight Networks, who gives his views and looks in detail at the scale of the problems, the threat sources, and how your company's vulnerability can be reduced through easy-to-apply steps.</itunes:subtitle>
<itunes:summary>Recent high profile security breaches have shown just how vital wireless security can be, but organisations often have little control of their employees' wireless activities, a poor understanding of the potential threats across the organisation and little protection in place to detect, prevent and locate breaches. This podcast features Paul Lawrence, VP &amp; General Manager, EMEA, AirTight Networks, who gives his views and looks in detail at the scale of the problems, the threat sources, and how your company's vulnerability can be reduced through easy-to-apply steps.</itunes:summary>
<itunes:category text="Business">
</itunes:category>
<itunes:category text="Technology">
</itunes:category>
<itunes:duration>00:09:43</itunes:duration>
<itunes:keywords>data, distribution, security, issues, Olympia, yada</itunes:keywords>
<itunes:author>Infosecurity Europe</itunes:author>
<itunes:explicit>no</itunes:explicit>
<content:encoded>Recent high profile security breaches have shown just how vital wireless security can be, but organisations often have little control of their employees' wireless activities, a poor understanding of the potential threats across the organisation and little protection in place to detect, prevent and locate breaches. This podcast features Paul Lawrence, VP &amp; General Manager, EMEA, AirTight Networks, who gives his views and looks in detail at the scale of the problems, the threat sources, and how your company's vulnerability can be reduced through easy-to-apply steps.</content:encoded>
</item>

</channel>
</rss>