<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:psc="http://podlove.org/simple-chapters" version="2.0">
<channel>
  <atom:link href="https://rss.buzzsprout.com/9743.rss" rel="self" type="application/rss+xml"/>
  <atom:link xmlns="http://www.w3.org/2005/Atom" href="https://pubsubhubbub.appspot.com/" rel="hub"/>
  <title>SecurityWeek Podcast Series - Cybersecurity Insights</title>

  <lastBuildDate>Mon, 09 Mar 2026 14:41:49 -0400</lastBuildDate>
  <link>http://www.securityweek.com</link>
  <language>en-us</language>
  <copyright>Wired Business Media</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>9f36fc3f-8dc3-5ae9-ba30-32270ed41b75</podcast:guid>
  <itunes:author>SecurityWeek</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>no</itunes:explicit>
  <description>SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..</description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>security,threats,malware,it,security,exploits,hacking,hackers,news</itunes:keywords>
  <itunes:owner>
    <itunes:name>SecurityWeek</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/8e6gsnmt5tnf78f79pdal7xfwpa6?.jpg</url>
     <title>SecurityWeek Podcast </title>
     <link>http://www.securityweek.com</link>
  </image>
  <itunes:image href="https://www.securityweek.com/sites/default/files/features/Naraine-Podcast-Header_0.jpg"/>
  
  
  
  <itunes:summary>Ryan Naraine discusses the latest IT Security news, topics and trends.</itunes:summary><itunes:subtitle>Security Conversations - a Podcast with Ryan Naraine</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Gadgets"/></itunes:category><itunes:category text="Technology"><itunes:category text="Gadgets"/></itunes:category><item>
    <itunes:title>Embedded Industrial Security: The Network-Native Advantage</itunes:title>
    <title>Embedded Industrial Security: The Network-Native Advantage</title>
    <itunes:summary><![CDATA[Andrew McPhee, Industrial IoT Security Solution Manager at Cisco, joins the SecurityWeek podcast and dives into why traditional monitoring and SPAN-based approaches fail to deliver true visibility in industrial environments, and how network-native security embeds inspection, segmentation, and protection directly into the network. We discuss real-world implementation challenges, economic tradeoffs, and how to move from visibility to action without disrupting operations.  (Want to continue...]]></itunes:summary>
    <description><![CDATA[<p>Andrew McPhee, Industrial IoT Security Solution Manager at Cisco, joins the SecurityWeek podcast and dives into why traditional monitoring and SPAN-based approaches fail to deliver true visibility in industrial environments, and how network-native security embeds inspection, segmentation, and protection directly into the network. We discuss real-world implementation challenges, economic tradeoffs, and how to move from visibility to action without disrupting operations.  (Want to continue the discussion? <a href='https://engage2demand.cisco.com/LP=27098?ccid=cc009046&amp;oid=pdtit033296'>Contact Cisco</a>.)</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>Andrew McPhee, Industrial IoT Security Solution Manager at Cisco, joins the SecurityWeek podcast and dives into why traditional monitoring and SPAN-based approaches fail to deliver true visibility in industrial environments, and how network-native security embeds inspection, segmentation, and protection directly into the network. We discuss real-world implementation challenges, economic tradeoffs, and how to move from visibility to action without disrupting operations.  (Want to continue the discussion? <a href='https://engage2demand.cisco.com/LP=27098?ccid=cc009046&amp;oid=pdtit033296'>Contact Cisco</a>.)</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="19916000" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/18589806-embedded-industrial-security-the-network-native-advantage.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18589806</guid>
    <pubDate>Thu, 29 Jan 2026 07:00:00 -0500</pubDate>
    <itunes:duration>1653</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Andrew McPhee, Industrial IoT Security Solution Manager at Cisco, joins the SecurityWeek podcast and dives into why traditional monitoring and SPAN-based approaches fail to deliver true visibility in industrial environments, and how network-native security embeds inspection, segmentation, and protection directly into the network. We discuss real-world implementation challenges, economic tradeoffs, and how to move from visibility to action without disrupting operations.  (Want to continue the discussion? Contact Cisco.) Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>CISO Perspectives: Navigating the Security Landscape in 2025</itunes:title>
    <title>CISO Perspectives: Navigating the Security Landscape in 2025</title>
    <itunes:summary><![CDATA[In a world where cyber risk is business risk, today's Chief Information Security Officers are not just defenders of data—they are strategic partners driving organizational resilience. Moderated by Gartner's Ash Ahuja, this candid conversation explores how security leaders are balancing innovation with risk management, influencing board-level decision-making, and navigating complex threat environments in 2025. Ash Ahuja, VP &amp; Executive Partner, Security &amp; Risk Management - GartnerTim S...]]></itunes:summary>
    <description><![CDATA[<p>In a world where cyber risk is business risk, today&apos;s Chief Information Security Officers are not just defenders of data—they are strategic partners driving organizational resilience. Moderated by Gartner&apos;s Ash Ahuja, this candid conversation explores how security leaders are balancing innovation with risk management, influencing board-level decision-making, and navigating complex threat environments in 2025.</p><ul><li>Ash Ahuja, VP &amp; Executive Partner, Security &amp; Risk Management - Gartner</li><li>Tim Silverline, VP of Security, Rocket Lawyer</li><li>Jarell Mikell, Executive Director - Power Systems &amp; Gas Cybersecurity - Southern Company</li></ul><p><b>This session took place at </b><a href='https://www.cisoforum.com/agenda/'><b>SecurityWeek&apos;s CISO Forum</b></a><b> at the Ritz-Carlton, Half Moon Bay in August 2025.</b></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>In a world where cyber risk is business risk, today&apos;s Chief Information Security Officers are not just defenders of data—they are strategic partners driving organizational resilience. Moderated by Gartner&apos;s Ash Ahuja, this candid conversation explores how security leaders are balancing innovation with risk management, influencing board-level decision-making, and navigating complex threat environments in 2025.</p><ul><li>Ash Ahuja, VP &amp; Executive Partner, Security &amp; Risk Management - Gartner</li><li>Tim Silverline, VP of Security, Rocket Lawyer</li><li>Jarell Mikell, Executive Director - Power Systems &amp; Gas Cybersecurity - Southern Company</li></ul><p><b>This session took place at </b><a href='https://www.cisoforum.com/agenda/'><b>SecurityWeek&apos;s CISO Forum</b></a><b> at the Ritz-Carlton, Half Moon Bay in August 2025.</b></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="32016550" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/18150374-ciso-perspectives-navigating-the-security-landscape-in-2025.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18150374</guid>
    <pubDate>Fri, 07 Nov 2025 10:00:00 -0500</pubDate>
    <itunes:duration>2661</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>In a world where cyber risk is business risk, today&amp;apos;s Chief Information Security Officers are not just defenders of data—they are strategic partners driving organizational resilience. Moderated by Gartner&amp;apos;s Ash Ahuja, this candid conversation explores how security leaders are balancing innovation with risk management, influencing board-level decision-making, and navigating complex threat environments in 2025.Ash Ahuja, VP &amp;amp; Executive Partner, Security &amp;amp; Risk Management - GartnerTim Silverline, VP of Security, Rocket LawyerJarell Mikell, Executive Director - Power Systems &amp;amp; Gas Cybersecurity - Southern Company This session took place at SecurityWeek&amp;apos;s CISO Forum at the Ritz-Carlton, Half Moon Bay in August 2025. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat With Phil Venables, CISO at Google Cloud</itunes:title>
    <title>Fireside Chat With Phil Venables, CISO at Google Cloud</title>
    <itunes:summary><![CDATA[In this fireside chat, we speak with Phil Venables, Chief Information Security Officer of Google Cloud. Venables leads the risk, security, compliance, and privacy teams for Google Cloud. Before joining Google, he was a Partner at Goldman Sachs where he held multiple roles over a long career, initially as their first Chief Information Security Officer, a role he held for 17 years.   (Session recorded at SecurityWeek's 2024 Cloud &amp; Data Security Summit)   Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[<p>In this fireside chat, we speak with <b>Phil Venables</b>, Chief Information Security Officer of Google Cloud. Venables leads the risk, security, compliance, and privacy teams for Google Cloud. Before joining Google, he was a Partner at Goldman Sachs where he held multiple roles over a long career, initially as their first Chief Information Security Officer, a role he held for 17 years. <br/><br/>(Session recorded at <a href='https://www.securitysummits.com/event/cloud-security-summit/'>SecurityWeek&apos;s 2024 Cloud &amp; Data Security Summit</a>)</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this fireside chat, we speak with <b>Phil Venables</b>, Chief Information Security Officer of Google Cloud. Venables leads the risk, security, compliance, and privacy teams for Google Cloud. Before joining Google, he was a Partner at Goldman Sachs where he held multiple roles over a long career, initially as their first Chief Information Security Officer, a role he held for 17 years. <br/><br/>(Session recorded at <a href='https://www.securitysummits.com/event/cloud-security-summit/'>SecurityWeek&apos;s 2024 Cloud &amp; Data Security Summit</a>)</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="24616201" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/15707522-fireside-chat-with-phil-venables-ciso-at-google-cloud.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15707522</guid>
    <pubDate>Mon, 09 Sep 2024 06:00:00 -0400</pubDate>
    <itunes:duration>2045</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>In this fireside chat, we speak with Phil Venables, Chief Information Security Officer of Google Cloud. Venables leads the risk, security, compliance, and privacy teams for Google Cloud. Before joining Google, he was a Partner at Goldman Sachs where he held multiple roles over a long career, initially as their first Chief Information Security Officer, a role he held for 17 years. (Session recorded at SecurityWeek&amp;apos;s 2024 Cloud &amp;amp; Data Security Summit) Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat: Bennett Pursell on the OpenSSF Siren Threat Intel Project</itunes:title>
    <title>Fireside Chat: Bennett Pursell on the OpenSSF Siren Threat Intel Project</title>
    <itunes:summary><![CDATA[In this session SecurityWeek speaks to Bennett Pursell, Ecosystem Strategist at the Open Source Security Foundation (OpenSSF) about OpenSSF Siren, a community data-sharing initiative aimed at bolstering the defenses of open source projects worldwide. In this fireside chat, Pursell discusses the origins and goals of OpenSSF Siren, exploring transparent access to data that can help small- and medium-sized businesses during active incidents. Pursell also shares insights on the value of threat in...]]></itunes:summary>
    <description><![CDATA[<p>In this session SecurityWeek speaks to Bennett Pursell, Ecosystem Strategist at the Open Source Security Foundation (OpenSSF) about OpenSSF Siren, a community data-sharing initiative aimed at bolstering the defenses of open source projects worldwide. In this fireside chat, Pursell discusses the origins and goals of OpenSSF Siren, exploring transparent access to data that can help small- and medium-sized businesses during active incidents. Pursell also shares insights on the value of threat intelligence, the shelf life of IOC (indicators of compromise) and how businesses with limited resources can mitigate exposure to risk.<br/><br/>(Recorded at SecurityWeek&apos;s 2024 <a href='https://www.securitysummits.com/event/threat-intelligence-summit/'>Threat Detection &amp; Incident Response Summit</a>)</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this session SecurityWeek speaks to Bennett Pursell, Ecosystem Strategist at the Open Source Security Foundation (OpenSSF) about OpenSSF Siren, a community data-sharing initiative aimed at bolstering the defenses of open source projects worldwide. In this fireside chat, Pursell discusses the origins and goals of OpenSSF Siren, exploring transparent access to data that can help small- and medium-sized businesses during active incidents. Pursell also shares insights on the value of threat intelligence, the shelf life of IOC (indicators of compromise) and how businesses with limited resources can mitigate exposure to risk.<br/><br/>(Recorded at SecurityWeek&apos;s 2024 <a href='https://www.securitysummits.com/event/threat-intelligence-summit/'>Threat Detection &amp; Incident Response Summit</a>)</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="22128858" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/15707563-fireside-chat-bennett-pursell-on-the-openssf-siren-threat-intel-project.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15707563</guid>
    <pubDate>Fri, 06 Sep 2024 12:00:00 -0400</pubDate>
    <itunes:duration>1837</itunes:duration>
    <itunes:keywords>Cybersecurity, OpenSource, OpenSSF</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>In this session SecurityWeek speaks to Bennett Pursell, Ecosystem Strategist at the Open Source Security Foundation (OpenSSF) about OpenSSF Siren, a community data-sharing initiative aimed at bolstering the defenses of open source projects worldwide. In this fireside chat, Pursell discusses the origins and goals of OpenSSF Siren, exploring transparent access to data that can help small- and medium-sized businesses during active incidents. Pursell also shares insights on the value of threat intelligence, the shelf life of IOC (indicators of compromise) and how businesses with limited resources can mitigate exposure to risk. (Recorded at SecurityWeek&amp;apos;s 2024 Threat Detection &amp;amp; Incident Response Summit) Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat: Abhishek Arya, Head of Google's Open Source Security Team</itunes:title>
    <title>Fireside Chat: Abhishek Arya, Head of Google's Open Source Security Team</title>
    <itunes:summary><![CDATA[In this exclusive fireside chat, SecurityWeek editor-at-large Ryan Naraine interviews Abhishek Arya, Director of Engineering on Google’s open source and supply chain security teams.  We cover the evolving landscape of Software Supply Chain security, highlighting key advancements, challenges, research priorities, and much more. Session recoredef for SecurityWeek's 2024 Supply Chain Security Summit. Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[<p>In this exclusive fireside chat, SecurityWeek editor-at-large Ryan Naraine interviews <b>Abhishek Arya, Director of Engineering on Google’s</b> open source and supply chain security teams.  We cover the evolving landscape of Software Supply Chain security, highlighting key advancements, challenges, research priorities, and much more. Session recoredef for SecurityWeek&apos;s 2024 <a href='https://www.securitysummits.com/event/supply-chain-security-summit/'>Supply Chain Security Summit</a>.</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this exclusive fireside chat, SecurityWeek editor-at-large Ryan Naraine interviews <b>Abhishek Arya, Director of Engineering on Google’s</b> open source and supply chain security teams.  We cover the evolving landscape of Software Supply Chain security, highlighting key advancements, challenges, research priorities, and much more. Session recoredef for SecurityWeek&apos;s 2024 <a href='https://www.securitysummits.com/event/supply-chain-security-summit/'>Supply Chain Security Summit</a>.</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="22790881" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/14771778-fireside-chat-abhishek-arya-head-of-google-s-open-source-security-team.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14771778</guid>
    <pubDate>Tue, 26 Mar 2024 12:00:00 -0400</pubDate>
    <itunes:duration>1893</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>In this exclusive fireside chat, SecurityWeek editor-at-large Ryan Naraine interviews Abhishek Arya, Director of Engineering on Google’s open source and supply chain security teams.  We cover the evolving landscape of Software Supply Chain security, highlighting key advancements, challenges, research priorities, and much more. Session recoredef for SecurityWeek&amp;apos;s 2024 Supply Chain Security Summit. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Palo Alto Networks Talks IT/OT Convergence</itunes:title>
    <title>Palo Alto Networks Talks IT/OT Convergence</title>
    <itunes:summary><![CDATA[In this episode, SecurityWeek editor-at-large Ryan Naraine interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape. We discuss the evolution of cyber resilience, the challenges of merging IT and OT governance structures, process integrations for IT/OT security strategy, consolidated tech stacks for IT and OT, and the role of next-generation firewalls in an integrated IT/OT world. Follow SecurityWeek o...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, SecurityWeek editor-at-large Ryan Naraine interviews Del Rodillas, Senior Director of Product Management at <a href='https://www.paloaltonetworks.com/network-security/zero-trust-ot-security?utm_source=securityweek'>Palo Alto Networks</a>, about the integration of IT and OT in the ICS threat landscape. We discuss the evolution of cyber resilience, the challenges of merging IT and OT governance structures, process integrations for IT/OT security strategy, consolidated tech stacks for IT and OT, and the role of next-generation firewalls in an integrated IT/OT world.</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, SecurityWeek editor-at-large Ryan Naraine interviews Del Rodillas, Senior Director of Product Management at <a href='https://www.paloaltonetworks.com/network-security/zero-trust-ot-security?utm_source=securityweek'>Palo Alto Networks</a>, about the integration of IT and OT in the ICS threat landscape. We discuss the evolution of cyber resilience, the challenges of merging IT and OT governance structures, process integrations for IT/OT security strategy, consolidated tech stacks for IT and OT, and the role of next-generation firewalls in an integrated IT/OT world.</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="15171634" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/14397733-palo-alto-networks-talks-it-ot-convergence.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14397733</guid>
    <pubDate>Mon, 29 Jan 2024 09:00:00 -0500</pubDate>
    <itunes:duration>1258</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>In this episode, SecurityWeek editor-at-large Ryan Naraine interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape. We discuss the evolution of cyber resilience, the challenges of merging IT and OT governance structures, process integrations for IT/OT security strategy, consolidated tech stacks for IT and OT, and the role of next-generation firewalls in an integrated IT/OT world. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat With Former Netflix Security Chief, Jason Chan</itunes:title>
    <title>Fireside Chat With Former Netflix Security Chief, Jason Chan</title>
    <itunes:summary><![CDATA[Enjoy this fireside chat with Jason Chan, former head of information security at Netflix and operating advisor, Bessemer Venture Partners. Jason joins SecurityWeek editor-at-large Ryan Naraine for a frank discussion on the state of vulnerability management and software development, multi-cloud deployments and expanding attack surfaces, the cyber startup vendor ecosystem, Microsoft's booming cybersecurity business, and some areas still ripe for innovation. (Recorded at SecurityWeek's 2023 Atta...]]></itunes:summary>
    <description><![CDATA[<p>Enjoy this fireside chat with Jason Chan, former head of information security at Netflix and operating advisor, Bessemer Venture Partners. Jason joins SecurityWeek editor-at-large Ryan Naraine for a frank discussion on the state of vulnerability management and software development, multi-cloud deployments and expanding attack surfaces, the cyber startup vendor ecosystem, Microsoft&apos;s booming cybersecurity business, and some areas still ripe for innovation. (Recorded at SecurityWeek&apos;s <a href='https://www.securitysummits.com/event/attack-surface-management-summit/'>2023 Attack Surface Management Summit</a>)</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>Enjoy this fireside chat with Jason Chan, former head of information security at Netflix and operating advisor, Bessemer Venture Partners. Jason joins SecurityWeek editor-at-large Ryan Naraine for a frank discussion on the state of vulnerability management and software development, multi-cloud deployments and expanding attack surfaces, the cyber startup vendor ecosystem, Microsoft&apos;s booming cybersecurity business, and some areas still ripe for innovation. (Recorded at SecurityWeek&apos;s <a href='https://www.securitysummits.com/event/attack-surface-management-summit/'>2023 Attack Surface Management Summit</a>)</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="24072947" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/13978076-fireside-chat-with-former-netflix-security-chief-jason-chan.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13978076</guid>
    <pubDate>Wed, 15 Nov 2023 10:00:00 -0500</pubDate>
    <itunes:duration>1999</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Enjoy this fireside chat with Jason Chan, former head of information security at Netflix and operating advisor, Bessemer Venture Partners. Jason joins SecurityWeek editor-at-large Ryan Naraine for a frank discussion on the state of vulnerability management and software development, multi-cloud deployments and expanding attack surfaces, the cyber startup vendor ecosystem, Microsoft&amp;apos;s booming cybersecurity business, and some areas still ripe for innovation. (Recorded at SecurityWeek&amp;apos;s 2023 Attack Surface Management Summit) Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat With Steve Mancini, Guardant Health</itunes:title>
    <title>Fireside Chat With Steve Mancini, Guardant Health</title>
    <itunes:summary><![CDATA[In this interview from SecurityWeek's 2022 Threat Hunting Summit, Steve Mancini, head of Information Security at Guardant Health, discusses his personal mission to help secure healthcare data in the cancer research space and how threat hunting and threat intelligence fits into a modern cybersecurity program.  Mancini  discusses a career in the cybersecurity trenches -- managing threat intel at Intel Corp. before pivoting into the CISO chair to building and and security programs.  At...]]></itunes:summary>
    <description><![CDATA[<p>In this interview from SecurityWeek&apos;s 2022 <a href='https://www.securitysummits.com/event/threat-hunting-summit/'>Threat Hunting Summit</a>, Steve Mancini, head of Information Security at Guardant Health, discusses his personal mission to help secure healthcare data in the cancer research space and how threat hunting and threat intelligence fits into a modern cybersecurity program.<br/><br/>Mancini  discusses a career in the cybersecurity trenches -- managing threat intel at Intel Corp. before pivoting into the CISO chair to building and and security programs.  Attendees can expect an engaging conversation on the CISO&apos;s decision-making process, best practices for securing corporate assets and data, the EDR and anti-malware landscape, and frameworks for measuring program success.</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this interview from SecurityWeek&apos;s 2022 <a href='https://www.securitysummits.com/event/threat-hunting-summit/'>Threat Hunting Summit</a>, Steve Mancini, head of Information Security at Guardant Health, discusses his personal mission to help secure healthcare data in the cancer research space and how threat hunting and threat intelligence fits into a modern cybersecurity program.<br/><br/>Mancini  discusses a career in the cybersecurity trenches -- managing threat intel at Intel Corp. before pivoting into the CISO chair to building and and security programs.  Attendees can expect an engaging conversation on the CISO&apos;s decision-making process, best practices for securing corporate assets and data, the EDR and anti-malware landscape, and frameworks for measuring program success.</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="23144429" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/11993807-fireside-chat-with-steve-mancini-guardant-health.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11993807</guid>
    <pubDate>Wed, 16 Nov 2022 12:00:00 -0500</pubDate>
    <itunes:duration>1922</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>In this interview from SecurityWeek&amp;apos;s 2022 Threat Hunting Summit, Steve Mancini, head of Information Security at Guardant Health, discusses his personal mission to help secure healthcare data in the cancer research space and how threat hunting and threat intelligence fits into a modern cybersecurity program. Mancini  discusses a career in the cybersecurity trenches -- managing threat intel at Intel Corp. before pivoting into the CISO chair to building and and security programs.  Attendees can expect an engaging conversation on the CISO&amp;apos;s decision-making process, best practices for securing corporate assets and data, the EDR and anti-malware landscape, and frameworks for measuring program success. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat With Fidelity CISO, Adam Ely</itunes:title>
    <title>Fireside Chat With Fidelity CISO, Adam Ely</title>
    <itunes:summary><![CDATA[Enjoy this engaging fireside chat on security leadership with Adam Ely, Chief Information Security Officer at Fidelity Investments.  At SecurityWeek's 2022 CISO Forum, SecurityWeek's editor-at-large Ryan Naraine hosted a discussion with Adam on the role of the modern CISO, the challenges of building a mature risk management program, communications challenges in large organizations, mentorship and staff retention, and much more.   Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[<p>Enjoy this engaging fireside chat on security leadership with Adam Ely, Chief Information Security Officer at Fidelity Investments.<br/><br/>At SecurityWeek&apos;s <a href='https://www.securitysummits.com/event/ciso-virtual-summit/'>2022 CISO Forum</a>, SecurityWeek&apos;s editor-at-large Ryan Naraine hosted a discussion with Adam on the role of the modern CISO, the challenges of building a mature risk management program, communications challenges in large organizations, mentorship and staff retention, and much more.  </p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>Enjoy this engaging fireside chat on security leadership with Adam Ely, Chief Information Security Officer at Fidelity Investments.<br/><br/>At SecurityWeek&apos;s <a href='https://www.securitysummits.com/event/ciso-virtual-summit/'>2022 CISO Forum</a>, SecurityWeek&apos;s editor-at-large Ryan Naraine hosted a discussion with Adam on the role of the modern CISO, the challenges of building a mature risk management program, communications challenges in large organizations, mentorship and staff retention, and much more.  </p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="25333685" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/11982833-fireside-chat-with-fidelity-ciso-adam-ely.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11982833</guid>
    <pubDate>Wed, 14 Sep 2022 00:00:00 -0400</pubDate>
    <itunes:duration>2104</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Enjoy this engaging fireside chat on security leadership with Adam Ely, Chief Information Security Officer at Fidelity Investments. At SecurityWeek&amp;apos;s 2022 CISO Forum, SecurityWeek&amp;apos;s editor-at-large Ryan Naraine hosted a discussion with Adam on the role of the modern CISO, the challenges of building a mature risk management program, communications challenges in large organizations, mentorship and staff retention, and much more.   Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat With Katie Moussouris, Luta Security</itunes:title>
    <title>Fireside Chat With Katie Moussouris, Luta Security</title>
    <itunes:summary><![CDATA[In this fireside chat from SecurityWeek's CISO Forum, Luta Security chief executive Katie Moussouris  shares lessons from her work creating bug bounty and vulnerability disclosure programs for some of the biggest organizations in the world. Join this session to learn about the value -- and pitfalls -- of bug bounty programs, best practices around managing the flow of vulnerability data, and security response priorities. Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[<p>In this fireside chat from <a href='https://www.cisoforum.com/'>SecurityWeek&apos;s CISO Forum,</a> Luta Security chief executive Katie Moussouris  shares lessons from her work creating bug bounty and vulnerability disclosure programs for some of the biggest organizations in the world. Join this session to learn about the value -- and pitfalls -- of bug bounty programs, best practices around managing the flow of vulnerability data, and security response priorities.</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this fireside chat from <a href='https://www.cisoforum.com/'>SecurityWeek&apos;s CISO Forum,</a> Luta Security chief executive Katie Moussouris  shares lessons from her work creating bug bounty and vulnerability disclosure programs for some of the biggest organizations in the world. Join this session to learn about the value -- and pitfalls -- of bug bounty programs, best practices around managing the flow of vulnerability data, and security response priorities.</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="22932212" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/11982793-fireside-chat-with-katie-moussouris-luta-security.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11982793</guid>
    <pubDate>Wed, 14 Sep 2022 00:00:00 -0400</pubDate>
    <itunes:duration>1904</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>In this fireside chat from SecurityWeek&amp;apos;s CISO Forum, Luta Security chief executive Katie Moussouris  shares lessons from her work creating bug bounty and vulnerability disclosure programs for some of the biggest organizations in the world. Join this session to learn about the value -- and pitfalls -- of bug bounty programs, best practices around managing the flow of vulnerability data, and security response priorities. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Should CISOs Care About Cyberwarfare?</itunes:title>
    <title>Should CISOs Care About Cyberwarfare?</title>
    <itunes:summary><![CDATA[For the modern CISO, it's impossible to avoid news headlines and warnings about 'cyberwar' and nation-state APT attacks that require urgent attention. From the latest zero day exploit discovery to advisories from intelligence agencies, security leaders are often overwhelmed and unable to filter through the noise to make informed decisions. In this discussion from SecurityWeek's Threat Intelligence Summit, threat intel and detection and response practitioners will help explain the current thre...]]></itunes:summary>
    <description><![CDATA[<p>For the modern CISO, it&apos;s impossible to avoid news headlines and warnings about &apos;cyberwar&apos; and nation-state APT attacks that require urgent attention. From the latest zero day exploit discovery to advisories from intelligence agencies, security leaders are often overwhelmed and unable to filter through the noise to make informed decisions.</p><p>In this discussion from <a href='https://www.securitysummits.com/event/threat-intelligence-summit/'>SecurityWeek&apos;s Threat Intelligence Summit</a>, threat intel and detection and response practitioners will help explain the current threat landscape, the surge in zero-day exploit discoveries, the blurring of lines between APTs and ransomware attacks, and much more.<br/><br/><b>Guests: </b></p><ul><li><b>Allison Wikoff, </b>Global Threat Intelligence Lead at PwC</li><li><b>Silas Cutler, </b>Senior Director for Cyber Threat Research and Analysis at the Institute for Security and Technology.</li></ul><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>For the modern CISO, it&apos;s impossible to avoid news headlines and warnings about &apos;cyberwar&apos; and nation-state APT attacks that require urgent attention. From the latest zero day exploit discovery to advisories from intelligence agencies, security leaders are often overwhelmed and unable to filter through the noise to make informed decisions.</p><p>In this discussion from <a href='https://www.securitysummits.com/event/threat-intelligence-summit/'>SecurityWeek&apos;s Threat Intelligence Summit</a>, threat intel and detection and response practitioners will help explain the current threat landscape, the surge in zero-day exploit discoveries, the blurring of lines between APTs and ransomware attacks, and much more.<br/><br/><b>Guests: </b></p><ul><li><b>Allison Wikoff, </b>Global Threat Intelligence Lead at PwC</li><li><b>Silas Cutler, </b>Senior Director for Cyber Threat Research and Analysis at the Institute for Security and Technology.</li></ul><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="33380434" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/11982877-should-cisos-care-about-cyberwarfare.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11982877</guid>
    <pubDate>Wed, 18 May 2022 14:00:00 -0400</pubDate>
    <itunes:duration>2775</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>For the modern CISO, it&amp;apos;s impossible to avoid news headlines and warnings about &amp;apos;cyberwar&amp;apos; and nation-state APT attacks that require urgent attention. From the latest zero day exploit discovery to advisories from intelligence agencies, security leaders are often overwhelmed and unable to filter through the noise to make informed decisions. In this discussion from SecurityWeek&amp;apos;s Threat Intelligence Summit, threat intel and detection and response practitioners will help explain the current threat landscape, the surge in zero-day exploit discoveries, the blurring of lines between APTs and ransomware attacks, and much more. Guests: Allison Wikoff, Global Threat Intelligence Lead at PwCSilas Cutler, Senior Director for Cyber Threat Research and Analysis at the Institute for Security and Technology. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat With Shane Huntley, Google Threat Analysis Group (TAG)</itunes:title>
    <title>Fireside Chat With Shane Huntley, Google Threat Analysis Group (TAG)</title>
    <itunes:summary><![CDATA[Enjoy this exclusive fireside chat with Shane Huntley, head of Google's TAG (Threat Analysis Group). In this session from SecurityWeek's Threat Intelligence Summit, we have a frank discussion on the science of threat intelligence, the cloudy nature of the APT landscape, the surge in big-game ransomware and nation-state malware activity worth tracking. Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[<p>Enjoy this exclusive fireside chat with Shane Huntley, head of Google&apos;s TAG (Threat Analysis Group). In this session from <a href='https://www.securitysummits.com/event/threat-intelligence-summit/'>SecurityWeek&apos;s Threat Intelligence Summit</a>, we have a frank discussion on the science of threat intelligence, the cloudy nature of the APT landscape, the surge in big-game ransomware and nation-state malware activity worth tracking.</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>Enjoy this exclusive fireside chat with Shane Huntley, head of Google&apos;s TAG (Threat Analysis Group). In this session from <a href='https://www.securitysummits.com/event/threat-intelligence-summit/'>SecurityWeek&apos;s Threat Intelligence Summit</a>, we have a frank discussion on the science of threat intelligence, the cloudy nature of the APT landscape, the surge in big-game ransomware and nation-state malware activity worth tracking.</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="20674641" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/11982858-fireside-chat-with-shane-huntley-google-threat-analysis-group-tag.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11982858</guid>
    <pubDate>Wed, 18 May 2022 11:00:00 -0400</pubDate>
    <itunes:duration>1716</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Enjoy this exclusive fireside chat with Shane Huntley, head of Google&amp;apos;s TAG (Threat Analysis Group). In this session from SecurityWeek&amp;apos;s Threat Intelligence Summit, we have a frank discussion on the science of threat intelligence, the cloudy nature of the APT landscape, the surge in big-game ransomware and nation-state malware activity worth tracking. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>News Podcast: Pipedream/Incontroller ICS Malware Designed to Target ICS</itunes:title>
    <title>News Podcast: Pipedream/Incontroller ICS Malware Designed to Target ICS</title>
    <itunes:summary><![CDATA[[Breaking News Podcast] Sergio Caltagirone, VP of Threat Intelligence at industrial cybersecurity firm Dragos, discusses the U.S. government's joint advisory on the discovery of rare custom malware known as Pipedream/Incontroller, which is capable of doing damage to ICS/SCADA installations.   Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[<p><b>[Breaking News Podcast] </b>Sergio Caltagirone, VP of Threat Intelligence at industrial cybersecurity firm Dragos, discusses the U.S. government&apos;s joint advisory on the discovery of rare custom <a href='https://www.securityweek.com/russia-linked-pipedreamincontroller-ics-malware-designed-target-energy-facilities'>malware known as Pipedream/Incontroller</a>, which is capable of doing damage to ICS/SCADA installations.</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p><b>[Breaking News Podcast] </b>Sergio Caltagirone, VP of Threat Intelligence at industrial cybersecurity firm Dragos, discusses the U.S. government&apos;s joint advisory on the discovery of rare custom <a href='https://www.securityweek.com/russia-linked-pipedreamincontroller-ics-malware-designed-target-energy-facilities'>malware known as Pipedream/Incontroller</a>, which is capable of doing damage to ICS/SCADA installations.</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="9010451" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/11982970-news-podcast-pipedream-incontroller-ics-malware-designed-to-target-ics.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11982970</guid>
    <pubDate>Thu, 14 Apr 2022 13:00:00 -0400</pubDate>
    <itunes:duration>744</itunes:duration>
    <itunes:keywords>ICS, Pipedream, Dragos, Incontroller, SCADA</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>[Breaking News Podcast] Sergio Caltagirone, VP of Threat Intelligence at industrial cybersecurity firm Dragos, discusses the U.S. government&amp;apos;s joint advisory on the discovery of rare custom malware known as Pipedream/Incontroller, which is capable of doing damage to ICS/SCADA installations. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Fireside Chat With McDonald’s CISO Shaun Marion</itunes:title>
    <title>Fireside Chat With McDonald’s CISO Shaun Marion</title>
    <itunes:summary><![CDATA[In this security leadership fireside chat, McDonald’s CISO Shaun Marion joins SecurityWeek’s Ryan Naraine to discuss the role of the modern CISO, the challenges of building a mature risk management program, securing multi-cloud deployments, supply chain anxieties, and much more. (Source: SecurityWeek’s 2022 Attack Surface Management Summit) Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[<p>In this security leadership fireside chat, <b>McDonald’s CISO Shaun Marion </b>joins SecurityWeek’s Ryan Naraine to discuss the role of the modern CISO, the challenges of building a mature risk management program, securing multi-cloud deployments, supply chain anxieties, and much more. (<b>Source:</b> <a href='https://www.securitysummits.com/event/attack-surface-management-summit/'>SecurityWeek’s 2022 Attack Surface Management Summit</a>)</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this security leadership fireside chat, <b>McDonald’s CISO Shaun Marion </b>joins SecurityWeek’s Ryan Naraine to discuss the role of the modern CISO, the challenges of building a mature risk management program, securing multi-cloud deployments, supply chain anxieties, and much more. (<b>Source:</b> <a href='https://www.securitysummits.com/event/attack-surface-management-summit/'>SecurityWeek’s 2022 Attack Surface Management Summit</a>)</p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="28861479" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/12264087-fireside-chat-with-mcdonald-s-ciso-shaun-marion.mp3"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12264087</guid>
    <pubDate>Thu, 31 Mar 2022 00:00:00 -0400</pubDate>
    <itunes:duration>2398</itunes:duration>
    <itunes:keywords/>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>In this security leadership fireside chat, McDonald’s CISO Shaun Marion joins SecurityWeek’s Ryan Naraine to discuss the role of the modern CISO, the challenges of building a mature risk management program, securing multi-cloud deployments, supply chain anxieties, and much more. (Source: SecurityWeek’s 2022 Attack Surface Management Summit) Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Spotlight Podcast: F5's Corey Marshall Discusses Zero Trust</itunes:title>
    <title>Spotlight Podcast: F5's Corey Marshall Discusses Zero Trust</title>
    <itunes:summary><![CDATA[On this special edition of SecurityWeek's spotlight podcast, Corey Marshall, Director of Security Architecture at F5, discusses how Zero Trust can be used as a powerful strategy to help businesses stay secure amidst rapid digital transformation and expanding network attack surface.   Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[<p>On this special edition of SecurityWeek&apos;s spotlight podcast, Corey Marshall, Director of Security Architecture at F5, discusses how <a href='https://www.f5.com/solutions/control-app-access-with-zero-trust'>Zero Trust</a> can be used as a powerful strategy to help businesses stay secure amidst rapid digital transformation and expanding network attack surface.</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[<p>On this special edition of SecurityWeek&apos;s spotlight podcast, Corey Marshall, Director of Security Architecture at F5, discusses how <a href='https://www.f5.com/solutions/control-app-access-with-zero-trust'>Zero Trust</a> can be used as a powerful strategy to help businesses stay secure amidst rapid digital transformation and expanding network attack surface.</p><p><br/></p><p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="9795506" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/8234002-spotlight-podcast-f5-s-corey-marshall-discusses-zero-trust.mp3"/>
    <itunes:image href="https://storage.buzzsprout.com/hfvotp1uy4oyirzm40qlm7flr1wj?.jpg"/>
    <itunes:author>SecurityWeek</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8234002</guid>
    <pubDate>Thu, 29 Apr 2021 14:00:00 -0400</pubDate>
    <itunes:duration>809</itunes:duration>
    <itunes:keywords>Zero Trust, network, security, F5</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>On this special edition of SecurityWeek&amp;apos;s spotlight podcast, Corey Marshall, Director of Security Architecture at F5, discusses how Zero Trust can be used as a powerful strategy to help businesses stay secure amidst rapid digital transformation and expanding network attack surface. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Thomas Rid on Cyberwar, Attribution and the Crypto Debate</itunes:title>
    <title>Thomas Rid on Cyberwar, Attribution and the Crypto Debate</title>
    <itunes:summary><![CDATA[Thomas Rid, Professor in the Department of War Studies at King’s College London, joins Ryan Naraine on the podcast to discuss his new book, the lack of nuance in the crypto debate and the future of global cyber conflict.
Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[Thomas Rid, Professor in the Department of War Studies at King’s College London, joins Ryan Naraine on the podcast to discuss his new book, the lack of nuance in the crypto debate and the future of global cyber conflict.
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[Thomas Rid, Professor in the Department of War Studies at King’s College London, joins Ryan Naraine on the podcast to discuss his new book, the lack of nuance in the crypto debate and the future of global cyber conflict.
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="13525120" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/383496-thomas-rid-on-cyberwar-attribution-and-the-crypto-debate.mp3"/>
    <itunes:author>Security Conversations</itunes:author>
    <guid isPermaLink="false">Buzzsprout-383496</guid>
    <pubDate>Fri, 20 May 2016 00:00:00 -0400</pubDate>
    <itunes:duration>1681</itunes:duration>
    <itunes:keywords>Cyberwar, Thomas Rid, security, attribution, APT, attacks, cybersecurity</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Thomas Rid, Professor in the Department of War Studies at King’s College London, joins Ryan Naraine on the podcast to discuss his new book, the lack of nuance in the crypto debate and the future of global cyber conflict. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Jeremiah Grossman on the Attacker-Defender Mentality</itunes:title>
    <title>Jeremiah Grossman on the Attacker-Defender Mentality</title>
    <itunes:summary><![CDATA[Infosec veteran and former CEO of WhiteHat Security Jeremiah Grossman joins Ryan Naraine on the podcast to talk about the parallels between jiu-jitsu and computer security and the ongoing cat-and-mouse game between attackers and defenders.
Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[Infosec veteran and former CEO of WhiteHat Security Jeremiah Grossman joins Ryan Naraine on the podcast to talk about the parallels between jiu-jitsu and computer security and the ongoing cat-and-mouse game between attackers and defenders.
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[Infosec veteran and former CEO of WhiteHat Security Jeremiah Grossman joins Ryan Naraine on the podcast to talk about the parallels between jiu-jitsu and computer security and the ongoing cat-and-mouse game between attackers and defenders.
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="14391424" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/381244-jeremiah-grossman-on-the-attacker-defender-mentality.mp3"/>
    <itunes:author>Security Conversations</itunes:author>
    <guid isPermaLink="false">Buzzsprout-381244</guid>
    <pubDate>Thu, 12 May 2016 00:00:00 -0400</pubDate>
    <itunes:duration>1790</itunes:duration>
    <itunes:keywords>Jeremiah Grossman, security, jiu-jitsu, podcast</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Infosec veteran and former CEO of WhiteHat Security Jeremiah Grossman joins Ryan Naraine on the podcast to talk about the parallels between jiu-jitsu and computer security and the ongoing cat-and-mouse game between attackers and defenders. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Podcast: Why Are Hospitals Such a Prime Ransomware Target?</itunes:title>
    <title>Podcast: Why Are Hospitals Such a Prime Ransomware Target?</title>
    <itunes:summary><![CDATA[Mike Hanley, Director of Duo Labs at Duo Security, joins Ryan Naraine on the podcast to talk about the state of security in the healthcare sector and why hospitals are such a prime target for ransomware attacks.
Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[Mike Hanley, Director of Duo Labs at Duo Security, joins Ryan Naraine on the podcast to talk about the state of security in the healthcare sector and why hospitals are such a prime target for ransomware attacks.
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[Mike Hanley, Director of Duo Labs at Duo Security, joins Ryan Naraine on the podcast to talk about the state of security in the healthcare sector and why hospitals are such a prime target for ransomware attacks.
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="10260608" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/378517-podcast-why-are-hospitals-such-a-prime-ransomware-target.mp3"/>
    <itunes:author>Security Conversations</itunes:author>
    <guid isPermaLink="false">Buzzsprout-378517</guid>
    <pubDate>Tue, 03 May 2016 00:00:00 -0400</pubDate>
    <itunes:duration>1273</itunes:duration>
    <itunes:keywords>Ransomware, Healthcare, Hospitals, malware, attacks</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Mike Hanley, Director of Duo Labs at Duo Security, joins Ryan Naraine on the podcast to talk about the state of security in the healthcare sector and why hospitals are such a prime target for ransomware attacks. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Inside the Epic Turla Cyber-Espionage Campaign</itunes:title>
    <title>Inside the Epic Turla Cyber-Espionage Campaign</title>
    <itunes:summary><![CDATA[Director of Kaspersky Lab Global Research &amp; Analysis Team Costin Raiu joins the podcast to discuss the latests discoveries surrounding the Epic Turla cyber-espionage campaign.  Raiu talks about the infection mechanisms used by the malware and provides a global look at victim data.

Disclosure:  Ryan Naraine is also a Kaspersky Lab employee.Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[Director of Kaspersky Lab Global Research &amp; Analysis Team Costin Raiu joins the podcast to discuss the latests discoveries surrounding the Epic Turla cyber-espionage campaign.  Raiu talks about the infection mechanisms used by the malware and provides a global look at victim data.

Disclosure:  Ryan Naraine is also a Kaspersky Lab employee.<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[Director of Kaspersky Lab Global Research &amp; Analysis Team Costin Raiu joins the podcast to discuss the latests discoveries surrounding the Epic Turla cyber-espionage campaign.  Raiu talks about the infection mechanisms used by the malware and provides a global look at victim data.

Disclosure:  Ryan Naraine is also a Kaspersky Lab employee.<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="7993472" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/194909-inside-the-epic-turla-cyber-espionage-campaign.mp3"/>
    <itunes:author>Security Conversations</itunes:author>
    <guid isPermaLink="false">http://www.buzzsprout.com/9743/194909-inside-the-epic-turla-cyber-espionage-campaign.mp3</guid>
    <pubDate>Fri, 08 Aug 2014 00:00:00 -0400</pubDate>
    <itunes:duration>990</itunes:duration>
    <itunes:keywords>Epic Turla, attacks, espionge, Snake, Kaspersky Lab</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Director of Kaspersky Lab Global Research &amp;amp; Analysis Team Costin Raiu joins the podcast to discuss the latests discoveries surrounding the Epic Turla cyber-espionage campaign. Raiu talks about the infection mechanisms used by the malware and provides a global look at victim data. Disclosure: Ryan Naraine is also a Kaspersky Lab employee. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Bluebox Labs Explains Android 'Fake ID' Vulnerability</itunes:title>
    <title>Bluebox Labs Explains Android 'Fake ID' Vulnerability</title>
    <itunes:summary><![CDATA[Chief Technology Officer at Bluebox Security Jeff Forristal joins the podcast to discuss a significant Android vulnerability that lets hackers  create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app. 
Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[Chief Technology Officer at Bluebox Security Jeff Forristal joins the podcast to discuss a significant Android vulnerability that lets hackers  create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app. 
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[Chief Technology Officer at Bluebox Security Jeff Forristal joins the podcast to discuss a significant Android vulnerability that lets hackers  create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app. 
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="7698560" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/192579-bluebox-labs-explains-android-fake-id-vulnerability.mp3"/>
    <itunes:author>Security Conversations</itunes:author>
    <guid isPermaLink="false">http://www.buzzsprout.com/9743/192579-bluebox-labs-explains-android-fake-id-vulnerability.mp3</guid>
    <pubDate>Tue, 29 Jul 2014 00:00:00 -0400</pubDate>
    <itunes:duration>953</itunes:duration>
    <itunes:keywords>Android, Vulnerability, Fake ID, security, Bluebox, Jeff Forristal</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Chief Technology Officer at Bluebox Security Jeff Forristal joins the podcast to discuss a significant Android vulnerability that lets hackers create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
  <item>
    <itunes:title>Talking 'Suits and Spooks' with Jeffrey Carr</itunes:title>
    <title>Talking 'Suits and Spooks' with Jeffrey Carr</title>
    <itunes:summary><![CDATA[Jeffrey Carr, founder of Taia Global Inc. and creator of the Suits and Spooks conference series, joins the podcast to talk about the evolution of the event and the marriage of business intelligence and cyber-security issues.
Follow SecurityWeek on LinkedIn ]]></itunes:summary>
    <description><![CDATA[Jeffrey Carr, founder of Taia Global Inc. and creator of the Suits and Spooks conference series, joins the podcast to talk about the evolution of the event and the marriage of business intelligence and cyber-security issues.
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></description>
    <content:encoded><![CDATA[Jeffrey Carr, founder of Taia Global Inc. and creator of the Suits and Spooks conference series, joins the podcast to talk about the evolution of the event and the marriage of business intelligence and cyber-security issues.
<p>Follow SecurityWeek on <a href='https://www.linkedin.com/company/securityweek/'>LinkedIn</a></p>]]></content:encoded>
    <enclosure length="10064000" type="audio/mpeg" url="https://www.buzzsprout.com/9743/episodes/310086-talking-suits-and-spooks-with-jeffrey-carr.mp3"/>
    <itunes:author>Security Conversations</itunes:author>
    <guid isPermaLink="false">310086</guid>
    <pubDate>Mon, 03 Jun 2013 00:00:00 -0400</pubDate>
    <itunes:duration>1249</itunes:duration>
    <itunes:keywords>Suits and Spooks, Cyber, Podcast, Jefrey Carr</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SecurityWeek</dc:creator><itunes:subtitle>Jeffrey Carr, founder of Taia Global Inc. and creator of the Suits and Spooks conference series, joins the podcast to talk about the evolution of the event and the marriage of business intelligence and cyber-security issues. Follow SecurityWeek on LinkedIn</itunes:subtitle></item>
</channel>
</rss>