<?xml version="1.0" encoding="UTF-8"?>

<!-- must include xmlns:itunes tag -->

<rss xmlns:itunes="http://www.itunes.com/DTDs/Podcast-1.0.dtd" version="2.0">


<channel>

 
<title>Adventures in Security</title>

<itunes:author>Tom Olzak</itunes:author>

<description> Commentary, reviews, and tips relevant to anyone responsible for information security.  Additional episodes are available at AdventuresinSecurity.com</description>

<link>http://adventuresinsecurity.com/</link>

<itunes:subtitle>Information Security Tips and Commentary</itunes:subtitle>

<itunes:summary>This is a weekly podcast.  Each week we present commentary, reviews, and tips relevant to anyone responsible for information security.  Additional episodes are available at AdventuresinSecurity.com.</itunes:summary>

<lastBuildDate>Thu, 23 Feb 2006 21:10:00 EST</lastBuildDate>

<language>en-us</language>

<copyright>&#x2117; &amp; &#xA9; 2005 Erudio Security, LLC </copyright>

<itunes:category text="Technology"> 
	<itunes:category text="Security"/>
</itunes:category>


<itunes:explicit>No</itunes:explicit> 


<generator>Tom Olzak</generator>

<itunes:owner>

    <itunes:name>Tom Olzak</itunes:name>

    <itunes:email>podcasts@adventuresinsecurity.com</itunes:email>

</itunes:owner>

 

<!-- iTunes prefers square images 300x300 pixels or larger -->

<itunes:image href="http://adventuresinsecurity.com/Podcasts/AISSeries/ErudioLogo-Small.jpg" />


<item>

<title>Episode 4 - Outsourcing Due Diligence</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topic is the responsibility of organizations to protect their outsourced data and applications.</description>  

    <itunes:subtitle>The importance of due diligence when ensuring the safety of outsourced information and applications</itunes:subtitle>

    <itunes:summary>The importance of due diligence when ensuring the safety of outsourced information and applications</itunes:summary>

    <enclosure url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode4_December_11_2005.mp3" length="14513026" type="audio/x-m4a" />

    <a href="http://odeo.com/claim/feed/a05fbd98297ae266">My Odeo Channel</a> (odeo/a05fbd98297ae266)
    
    <pubDate>Sun, 11 Dec 2005 15:30:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>15:07</itunes:duration>

    <itunes:keywords>security,management,business,compliance,hipaa,sox,sarbanes,layered,access,configuration</itunes:keywords>

</item>

<item>

<title>Episode 5 - Preparing for Incident Response</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topic is the preparation step in the development of an effective Incident Management Program </description>  

    <itunes:subtitle>Initiating an effective Incident Management Program</itunes:subtitle>

    <itunes:summary>The featured topic is the preparation step in the development of an effective Incident Management Program</itunes:summary>

    <enclosure url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode5_December_18_2005.mp3" length="17802435" type="audio/x-m4a" />

    <a href="http://odeo.com/claim/feed/a05fbd98297ae266">My Odeo Channel</a> (odeo/a05fbd98297ae266)
    
    <pubDate>Sun, 18 Dec 2005 21:30:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>18:32</itunes:duration>

    <itunes:keywords>security,management,business,compliance,hipaa,sox,sarbanes,layered,access,configuration,incident management,incident response</itunes:keywords>

</item>

<item>

<title>Episode 6 - Analysis, Detection, and Containment in Incident Response</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topics include the analysis, detection, and containment actitivies in an Incident Management Program </description>  

    <itunes:subtitle>Initiating an effective Incident Management Program</itunes:subtitle>

    <itunes:summary>The featured topics include analysis, detection, and containment actitivies in an Incident Management Program</itunes:summary>

    <enclosure url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode6_December_25_2005.mp3" length="19377612" type="audio/x-m4a" />

    <pubDate>Sun, 25 Dec 2005 16:45:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>20:11</itunes:duration>

    <itunes:keywords>security,management,business,compliance,hipaa,sox,sarbanes,layered,access,configuration,incident management,incident response</itunes:keywords>

</item>

<item>

<title>Episode 7 - Eradication, Recovery, and Control in Incident Response</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topics include eradication, recovery, and control actitivies in an Incident Management Program </description>  

    <itunes:subtitle>Initiating an effective Incident Management Program</itunes:subtitle>

    <itunes:summary>The featured topics include eradication, recovery, and control actitivies in an Incident Management Program</itunes:summary>

    <enclosure url="http://adventuresinsecurity.com/Podcasts/AISSeries/Adventures_in_Security_Episode7_January_01_2006.mp3" length="14209402" type="audio/x-m4a" />

    <pubDate>Sun, 01 Jan 2006 16:45:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>14:47</itunes:duration>

    <itunes:keywords>security,management,business,compliance,hipaa,sox,sarbanes,layered,access,configuration,incident management,incident response</itunes:keywords>

</item>

<item>

<title>Episode 8 - Securing Instant Messaging</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topic - how to meet the security challenges posed by the growth in Instant Messaging. </description>  

    <itunes:subtitle>How to meet the security challenges posed by the growth in Instant Messaging.</itunes:subtitle>

    <itunes:summary>The featured topic - how to meet the security challenges posed by the growth in Instant Messaging.</itunes:summary>

    <enclosure url="http://download01.blastpodcast.com/adventuresinsecurity/15702_1140749400.mp3" length="15883747" type="audio/x-m4a" />

    <pubDate>Sun, 08 Jan 2006 13:40:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>16:32</itunes:duration>

    <itunes:keywords>security,management,business,compliance,hipaa,sox,sarbanes,layered,access,configuration,incident management,incident response, messaging, secure messaging</itunes:keywords>

</item>

<item>

<title>Episode 9 - Securing Stored Data</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topic - How to protect data at rest. </description>  

    <itunes:subtitle>How to meet the security challenges posed by the growing amount of stored personal and business information.</itunes:subtitle>

    <itunes:summary>The featured topic - How to protect data at rest.</itunes:summary>

    <enclosure url="http://download01.blastpodcast.com/adventuresinsecurity/15702_1140748602.mp3" length="17315675" type="audio/x-m4a" />

    <pubDate>Sun, 15 Jan 2006 19:30:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>18:01</itunes:duration>

    <itunes:keywords>security,management,business,compliance,hipaa,sox,sarbanes,layered,access,configuration,incident management,incident response, messaging,storage,encryption,storage encryption</itunes:keywords>

</item>

<item>

<title>Episode 10 - Blended Threats</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topic - Network defense strategies to combat blended threats. </description>  

    <itunes:subtitle>What are blended threats?  How do they differ from traditional attacks?  How must defensive strategies evolve?</itunes:subtitle>

    <itunes:summary>The featured topic - Network defense strategies to combat blended threats.</itunes:summary>

    <enclosure url="http://download01.blastpodcast.com/adventuresinsecurity/15702_1140748000.mp3" length="16554298" type="audio/x-m4a" />

    <pubDate>Sun, 22 Jan 2006 09:45:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>17:14</itunes:duration>

    <itunes:keywords>security,management,business,compliance,hipaa,sox,sarbanes,layered,access,configuration,incident management,incident response,messaging,blended threat,proactive,proactive defense</itunes:keywords>

</item>

<item>

<title>Episode 11 - VoIP Security</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topic - A high-level look at VoIP security challenges </description>  

    <itunes:subtitle>A high-level look at VoIP security challenges</itunes:subtitle>

    <itunes:summary>The featured topic - A high-level look at VoIP security challenges</itunes:summary>

    <enclosure url="http://download01.blastpodcast.com/adventuresinsecurity/15702_1140747378.mp3" length="16820811" type="audio/x-m4a" />

    <pubDate>Sun, 29 Jan 2006 09:15:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>17:31</itunes:duration>

    <itunes:keywords>security,management,business,compliance,hipaa,sox,sarbanes,layered,access,configuration,incident management,messaging,voip,ipt</itunes:keywords>

</item>

<item>

<title>Episode 12 - Designing Intrusion Defense</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topic - Designing Intrusion Defense </description>  

    <itunes:subtitle>An Intrusion Defense Case Study</itunes:subtitle>

    <itunes:summary>The featured topic - Designing Intrusion Defense</itunes:summary>

    <enclosure url="http://download01.blastpodcast.com/adventuresinsecurity/15702_1140746538.mp3" length="49541164" type="audio/x-m4a" />

    <pubDate>Sun, 05 Feb 2006 18:30:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>51:36</itunes:duration>

    <itunes:keywords>security,management,business,compliance,intrusion detection,intrusion prevention,ids,ips,layered,access,configuration,incident management,messaging,voip</itunes:keywords>

</item>

<item>

<title>Episode 13 - Botnets</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> The featured topic - Botnets </description>  

    <itunes:subtitle>Bots, Botnets, and rootkits</itunes:subtitle>

    <itunes:summary>The featured topic - Botnets</itunes:summary>

    <enclosure url="http://download01.blastpodcast.com/adventuresinsecurity/15702_1140745401.mp3" length="29806803" type="audio/x-m4a" />

    <pubDate>Sun, 12 Feb 2006 21:00:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>31:02</itunes:duration>

    <itunes:keywords>security,management,business,compliance,intrusion detection,layered,access,configuration,incident management,messaging, bot,botnet,rootkit,zombie</itunes:keywords>

</item>

<item>

<title>Episode 14 - Google Desktop V3</title>

    <itunes:author>Tom Olzak</itunes:author>

    <description> Electronic Discovery, Goodmail's CertifiedEmail, and Google's Desktop V3 Beta </description>  

    <itunes:subtitle>Electronic Discovery, Goodmail's CertifiedEmail, and Google's Desktop V3 Beta</itunes:subtitle>

    <itunes:summary>Electronic Discovery, Goodmail's CertifiedEmail, and Google's Desktop V3 Beta</itunes:summary>

    <enclosure url="http://download01.blastpodcast.com/adventuresinsecurity/15702_1140390798.mp3" length="33679613 " type="audio/x-m4a" />

    <pubDate>Sun, 19 Feb 2006 17:45:00 EST</pubDate>

    <itunes:category text="Information Security"></itunes:category>

    <itunes:duration>31:02</itunes:duration>

    <itunes:keywords>security,management,business,compliance,ediscovery,google desktop,goodmail,certifiedemail,certified email,messaging</itunes:keywords>

</item>

</channel>

</rss>

