<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://csis.org" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/">
<channel>
 <title>Program Related Multimedia Feeds</title>
 <link>http://csis.org/program/22851/related/multimedia</link>
 <description>A list of multimedia related to this Program</description>
 <language>en</language>
<item>
 <title>Audio: Estonia’s Modern Digital Governance: A Conversation with Andres Kütt and Liina Areng</title>
 <link>http://csis.org/multimedia/audio-estonias-modern-digital-governance-conversation-andres-kuett-and-liina-areng</link>
 <description>&lt;p&gt;Will Carter and Dan Paltiel of CSIS speak with Andres K&amp;uuml;tt, Architect and Adviser for the Estonian Information System&#039;s Authority (EISA), and Liina Areng, Head of International Relations for EISA, about Estonia&amp;rsquo;s modern system of digital governance and its implications for cybersecurity and privacy.&lt;/p&gt;
</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <media:content url="http://bcb00a7666726d641bc6-220d4b0b5cdf0c1e8f7bb69019803187.r39.cf2.rackcdn.com/150611_strattech_pod_02.mp3" fileSize="24815079" type="audio/mp3"> <media:thumbnail url="http://csis.org/files/150611_cyber_estonia_a_0_0.jpg" />
</media:content>
 <enclosure url="http://bcb00a7666726d641bc6-220d4b0b5cdf0c1e8f7bb69019803187.r39.cf2.rackcdn.com/150611_strattech_pod_02.mp3" length="24815079" type="audio/mp3" />
 <pubDate>Mon, 15 Jun 2015 16:12:33 -0400</pubDate>
 <dc:creator>sellis</dc:creator>
 <guid isPermaLink="false">56263 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Talking Cyber Norms with China: A Conversation with Martin Libicki and Scott Harold</title>
 <link>http://csis.org/multimedia/audio-talking-cyber-norms-china-conversation-martin-libicki-and-scott-harold</link>
 <description>&lt;p&gt;Dan Paltiel and Will Carter of CSIS speak with Martin Libicki and Scott Harold of the RAND Corporation about their recent trip to China, where they interviewed Chinese officials and experts about potential areas where progress can be made in U.S.-China cyber relations.&lt;/p&gt;
</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://bcb00a7666726d641bc6-220d4b0b5cdf0c1e8f7bb69019803187.r39.cf2.rackcdn.com/150603_strattech_pod_01.mp3" fileSize="22248222" type="audio/mp3"> <media:thumbnail url="http://csis.org/files/thumb_1.jpg" />
</media:content>
 <enclosure url="http://bcb00a7666726d641bc6-220d4b0b5cdf0c1e8f7bb69019803187.r39.cf2.rackcdn.com/150603_strattech_pod_01.mp3" length="22248222" type="audio/mp3" />
 <pubDate>Thu, 04 Jun 2015 14:41:11 -0400</pubDate>
 <dc:creator>sellis</dc:creator>
 <guid isPermaLink="false">56076 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Cybersecurity Podcast Series, Dr. John Mulvenon</title>
 <link>http://csis.org/multimedia/audio-cyber-security-podcast-series-dr-john-mulvenon</link>
 <description>&lt;p&gt;This CSIS podcast series, funded by FireEye, interviews cybersecurity experts from different sectors to explore the effectiveness of cyber red lines and the different roles the government and private sectors have in cybersecurity policy.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-cyber-security-podcast-series-dr-john-mulvenon&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/military-technology">Military Technology</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Mulvenon.mp3" fileSize="14382810" type="audio/mp3"> <media:thumbnail url="http://csis.org/files/140314_cyber_security_0.jpg" />
</media:content>
 <enclosure url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Mulvenon.mp3" length="14382810" type="audio/mp3" />
 <pubDate>Fri, 21 Mar 2014 12:30:28 -0400</pubDate>
 <dc:creator />
 <guid isPermaLink="false">48986 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Cybersecurity Podcast Series, John Gilligan </title>
 <link>http://csis.org/multimedia/audio-cyber-security-podcast-series-john-gilligan</link>
 <description>&lt;p&gt;This CSIS podcast series, funded by FireEye, interviews cybersecurity experts from different sectors to explore the effectiveness of cyber red lines and the different roles the government and private sectors have in cybersecurity policy.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-cyber-security-podcast-series-john-gilligan&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology-and-cybersecurity/technology-and-innovation">Technology and Innovation</category>
 <media:content url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Gilligan.mp3" fileSize="13440000" type="audio/mp3"> <media:thumbnail url="http://csis.org/files/140314_cyber_security_8.jpg" />
</media:content>
 <enclosure url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Gilligan.mp3" length="13440000" type="audio/mp3" />
 <pubDate>Fri, 21 Mar 2014 12:01:56 -0400</pubDate>
 <dc:creator />
 <guid isPermaLink="false">48983 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Cybersecurity Podcast Series, John Nagengast</title>
 <link>http://csis.org/multimedia/audio-cyber-security-podcast-series-john-nagengast</link>
 <description>&lt;p&gt;This CSIS podcast series, funded by FireEye, interviews cybersecurity experts from different sectors to explore the effectiveness of cyber red lines and the different roles the government and private sectors have in cybersecurity policy.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-cyber-security-podcast-series-john-nagengast&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology-and-cybersecurity/technology-and-innovation">Technology and Innovation</category>
 <media:content url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Nagengast.mp3" fileSize="9478144" type="audio/mp3"> <media:thumbnail url="http://csis.org/files/140314_cyber_security_10.jpg" />
</media:content>
 <enclosure url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Nagengast.mp3" length="9478144" type="audio/mp3" />
 <pubDate>Fri, 21 Mar 2014 11:57:38 -0400</pubDate>
 <dc:creator />
 <guid isPermaLink="false">48977 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Cybersecurity Podcast Series, Ellen Nakashima</title>
 <link>http://csis.org/multimedia/audio-cyber-security-podcast-series-ellen-nakashima</link>
 <description>&lt;p&gt;This CSIS podcast series, funded by FireEye, interviews cybersecurity experts from different sectors to explore the effectiveness of cyber red lines and the different roles the government and private sectors have in cybersecurity policy.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-cyber-security-podcast-series-ellen-nakashima&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Nakashima.mp3" fileSize="8668890" type="audio/mp3"> <media:thumbnail url="http://csis.org/files/140314_cyber_security_12.jpg" />
</media:content>
 <enclosure url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Nakashima.mp3" length="8668890" type="audio/mp3" />
 <pubDate>Fri, 21 Mar 2014 11:05:05 -0400</pubDate>
 <dc:creator />
 <guid isPermaLink="false">48970 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Cybersecurity Podcast Series, Stewart Baker</title>
 <link>http://csis.org/multimedia/audio-cyber-security-expert-stewart-baker-podcast</link>
 <description>&lt;p&gt;This CSIS podcast series, funded by FireEye, interviews cybersecurity experts from different sectors to explore the effectiveness of cyber red lines and the different roles the government and private sectors have in cybersecurity policy.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-cyber-security-expert-stewart-baker-podcast&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology-and-cybersecurity/intelligence-surveillance-and-privacy">Intelligence, Surveillance, and Privacy</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Baker.mp3" fileSize="16334261" type="audio/mp3"> <media:thumbnail url="http://csis.org/files/140314_cyber_security_14.jpg" />
</media:content>
 <enclosure url="http://946d02147e6ceea118d6-b8988e53f7150d03e35b68af2656c7ba.r66.cf2.rackcdn.com/131113_Baker.mp3" length="16334261" type="audio/mp3" />
 <pubDate>Fri, 21 Mar 2014 10:54:39 -0400</pubDate>
 <dc:creator />
 <guid isPermaLink="false">48969 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with Teri Takai, DoD Chief Information Officer</title>
 <link>http://csis.org/multimedia/audio-interview-teri-takai-dod-chief-information-officer</link>
 <description>&lt;p&gt;&lt;strong&gt;Teri Takai&lt;/strong&gt; is the &lt;em&gt;Acting Assistant Secretary of Defense for Networks and Information Integration &lt;/em&gt;and&lt;em&gt; the Department of Defense Chief Information Officer&lt;/em&gt; (ASD (NII) / DoD CIO).&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-interview-teri-takai-dod-chief-information-officer&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/defense-and-security">Defense and Security</category>
 <category domain="http://csis.org/category/topics/defense-and-security/international-security">Geopolitics and International Security</category>
 <category domain="http://csis.org/category/topics/military-technology">Military Technology</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/podcast/110505_takai_podcast.mp3" fileSize="4619676" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/takai.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/podcast/110505_takai_podcast.mp3" length="4619676" type="audio/mpeg" />
 <pubDate>Thu, 05 May 2011 13:58:40 -0400</pubDate>
 <dc:creator />
 <guid isPermaLink="false">30264 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with Stewart Baker on Critical Cyber Threats</title>
 <link>http://csis.org/multimedia/audio-interview-stewart-baker-critical-cyber-threats</link>
 <description>&lt;p&gt;Stewart Baker is a partner in the Washington law firm of Steptoe &amp;amp; Johnson. From 2005 to 2009, he was assistant secretary for policy at the U.S. Department of Homeland Security. Prior to that, he served as general counsel to the Silverman-Robb Commission, investigating the failures of U.S. intelligence on Iraqi WMD. From 1992 to 1994, he was general counsel of the National Security Agency.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-interview-stewart-baker-critical-cyber-threats&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/defense-and-security/homeland-security">Counterterrorism and Homeland Security</category>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/defense-and-security">Defense and Security</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <category domain="http://csis.org/category/topics/trade-and-economics">Trade and Economics</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/podcast/110419_baker_cyber.mp3" fileSize="4548272" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/110420_baker.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/podcast/110419_baker_cyber.mp3" length="4548272" type="audio/mpeg" />
 <pubDate>Tue, 19 Apr 2011 15:39:48 -0400</pubDate>
 <dc:creator>mentman</dc:creator>
 <guid isPermaLink="false">30049 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with Tom Kellermann on Cyber Risk and Financial Institutions</title>
 <link>http://csis.org/multimedia/audio-interview-tom-kellermann-cyber-risk-and-financial-institutions</link>
 <description>&lt;p&gt;Tom Kellermann is the Vice President of Security and Government Affairs for Core Security. In this role, he is responsible for helping industry and government partners reduce risk and improve security practices and policies. He is also a Professor at American University&amp;rsquo;s School of International Service. In this podcast, Mr.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-interview-tom-kellermann-cyber-risk-and-financial-institutions&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/defense-and-security">Defense and Security</category>
 <category domain="http://csis.org/category/topics/defense-and-security/international-security">Geopolitics and International Security</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology-and-cybersecurity/technology-and-innovation">Technology and Innovation</category>
 <category domain="http://csis.org/category/topics/trade-and-economics">Trade and Economics</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/podcast/110321_tech_kellermann_final.mp3" fileSize="4400176" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/110323_CyberRisk.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/podcast/110321_tech_kellermann_final.mp3" length="4400176" type="audio/mpeg" />
 <pubDate>Wed, 23 Mar 2011 16:12:26 -0400</pubDate>
 <dc:creator>mentman</dc:creator>
 <guid isPermaLink="false">29725 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Inteview with Jody Westby on Global Cyber Security</title>
 <link>http://csis.org/multimedia/audio-inteview-jody-westby-global-cyber-security</link>
 <description>&lt;p&gt;Jody Westby is the CEO of Global Cyber Risk, where she regularly consults with governments and private sector executives, and operational personnel on the development of enterprise security programs. Prior to forming Global Cyber Risk, Ms. Westby served as senior managing director for PricewaterhouseCoopers (PwC), specializing in outsourcing and cyber security/privacy issues. Ms.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-inteview-jody-westby-global-cyber-security&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/podcast/110222_cyber_westby_final.mp3" fileSize="9288600" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/keyboard_0.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/podcast/110222_cyber_westby_final.mp3" length="9288600" type="audio/mpeg" />
 <pubDate>Mon, 28 Feb 2011 14:58:23 -0500</pubDate>
 <dc:creator />
 <guid isPermaLink="false">29320 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with John Gilligan on Cloud Computing</title>
 <link>http://csis.org/multimedia/audio-interview-john-gilligan-cloud-computing</link>
 <description>&lt;p&gt;John Gilligan, the President of the Gilligan Group, is a former CIO of both the Air Force and the Department of Energy. Recently, he was a member of the Obama &amp;ndash; Biden Transition Review Teams focused on information technology within the defense and intelligence communities. In this podcast, Mr. Gilligan discussed cybersecurity and cloud computing with Katrina Timlin.&lt;/p&gt;
</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology-and-cybersecurity/technology-and-innovation">Technology and Innovation</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/podcast/110218_cyber_gilligan_final.mp3" fileSize="8150732" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/CCImg_0.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/podcast/110218_cyber_gilligan_final.mp3" length="8150732" type="audio/mpeg" />
 <pubDate>Mon, 28 Feb 2011 13:14:53 -0500</pubDate>
 <dc:creator />
 <guid isPermaLink="false">29311 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with General Keith B. Alexander, Director of the NSA and Commander, Cyber Command</title>
 <link>http://csis.org/multimedia/audio-interview-general-keith-b-alexander-director-nsa-and-commander-cyber-command</link>
 <description>&lt;p&gt;Denise Zheng interviewed General Keith Alexander, Director of the NSA,  Commander of U.S. Cyber Command.  General  Alexander spoke about cybersecurity and USCYBERCOM.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/defense-and-security">Defense and Security</category>
 <category domain="http://csis.org/category/topics/defense-and-security/military-strategy">Defense Strategy and Capabilities</category>
 <category domain="http://csis.org/category/topics/military-technology">Military Technology</category>
 <category domain="http://csis.org/category/topics/technology/space">Space</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/100604_alexander_nsa.mp3" fileSize="9863407" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/100603_alexander_aud_0.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/100604_alexander_nsa.mp3" length="9863407" type="audio/mpeg" />
 <pubDate>Tue, 08 Jun 2010 11:14:15 -0400</pubDate>
 <dc:creator>mentman</dc:creator>
 <guid isPermaLink="false">25524 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with Senator Sheldon Whitehouse on Cybersecurity</title>
 <link>http://csis.org/multimedia/audio-interview-senator-sheldon-whitehouse-cybersecurity</link>
 <description>&lt;p&gt;&lt;img width=&quot;166&quot; height=&quot;161&quot; align=&quot;left&quot; src=&quot;/files/images/100503_sheldon_whitehouse.jpg&quot; alt=&quot;&quot; /&gt;Senator Sheldon Whitehouse is the chair of the Cybersecurity Task Force, established by the U.S. Senate Select Committee on Intelligence to evaluate cyber threats to the United States and issue recommendations to the U.S. intelligence community. In this podcast he discusses cybersecurity issues with Denise Zheng.&lt;/p&gt;
&lt;p&gt;Interview date: April 24, 2010&lt;/p&gt;
&lt;p&gt;Total Runtime: 16:27&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-interview-senator-sheldon-whitehouse-cybersecurity&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/defense-and-security">Defense and Security</category>
 <category domain="http://csis.org/category/topics/governance">Governance and Rule of Law</category>
 <category domain="http://csis.org/category/topics/technology-and-cybersecurity/intelligence-surveillance-and-privacy">Intelligence, Surveillance, and Privacy</category>
 <category domain="http://csis.org/category/topics/economic-development-and-reconstruction">International Development</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <category domain="http://csis.org/category/topics/trade-and-economics">Trade and Economics</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/podcast/100428_senator_whitehouse_podcast.mp3" fileSize="19743002" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/interview%20with%20senator%20sheldon%20whitehouse.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/podcast/100428_senator_whitehouse_podcast.mp3" length="19743002" type="audio/mpeg" />
 <pubDate>Fri, 16 Apr 2010 18:05:00 -0400</pubDate>
 <dc:creator>ian</dc:creator>
 <guid isPermaLink="false">24897 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with Amit Yoran on Botnets and Cybersecurity</title>
 <link>http://csis.org/multimedia/interview-amit-yoran-botnets-and-cybersecurity</link>
 <description>&lt;p&gt;&lt;img width=&quot;167&quot; height=&quot;192&quot; align=&quot;left&quot; src=&quot;/files/images/100503_Amit_Yoran.jpg&quot; alt=&quot;&quot; /&gt;Amit Yoran is the CEO of NetWitness and has been since November of 2006.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/interview-amit-yoran-botnets-and-cybersecurity&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/100416_AmitYoran_podcast.mp3" fileSize="7130554" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/100406_AmitYoran.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/100416_AmitYoran_podcast.mp3" length="7130554" type="audio/mpeg" />
 <pubDate>Tue, 06 Apr 2010 11:52:36 -0400</pubDate>
 <dc:creator>sherry</dc:creator>
 <guid isPermaLink="false">24920 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with Dr. James Mulvenon on China and Cybersecurity</title>
 <link>http://csis.org/multimedia/interview-dr-james-mulvenon-china-and-cybersecurity</link>
 <description>&lt;p&gt;&lt;img align=&quot;left&quot; width=&quot;160&quot; height=&quot;150&quot; alt=&quot;James Mulvenon&quot; src=&quot;/files/images/100504_mulvenon.jpg&quot; /&gt;James Mulvenon is Director of DGI&amp;rsquo;s Center for Intelligence Research and Analysis. A specialist on the Chinese military.  Dr. Mulvenon discusses Chinese information warfare capabilities, the internet and China&amp;rsquo;s domestic political stability, and ways in which the U.S.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/interview-dr-james-mulvenon-china-and-cybersecurity&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/podcast/100402_mulvenon.mp3" fileSize="7369554" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/interview%20with%20james%20mulvenon%20on%20china%20and%20cybersecurity.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/podcast/100402_mulvenon.mp3" length="7369554" type="audio/mpeg" />
 <pubDate>Fri, 02 Apr 2010 16:26:39 -0400</pubDate>
 <dc:creator>ian</dc:creator>
 <guid isPermaLink="false">24478 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Interview with Mr. Sachin Pilot</title>
 <link>http://csis.org/multimedia/audio-interview-mr-sachin-pilot</link>
 <description>&lt;p&gt;&lt;img width=&quot;158&quot; height=&quot;170&quot; align=&quot;left&quot; alt=&quot;&quot; src=&quot;/files/images/100503_pilot.jpg&quot; /&gt;Denise Zheng of the Technology Program interviewed&amp;nbsp; Mr.   Sachin Pilot, Member   of Indian Parliament, Minister   of State, Ministry of Communications and Technology. This was a follow up to his presentation to the event &amp;quot;India and the U.S.: Partners in a Tech-Driven World&amp;quot;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-interview-mr-sachin-pilot&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology-and-cybersecurity/technology-and-innovation">Technology and Innovation</category>
 <media:content url="http://c689426.r26.cf2.rackcdn.com/100330_sachin_interview.mp3" fileSize="8791442" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/100329_pilot-aud_0.jpg" />
</media:content>
 <enclosure url="http://c689426.r26.cf2.rackcdn.com/100330_sachin_interview.mp3" length="8791442" type="audio/mpeg" />
 <pubDate>Tue, 30 Mar 2010 13:50:21 -0400</pubDate>
 <dc:creator>pfrank</dc:creator>
 <guid isPermaLink="false">24409 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Cybersecurity Discussion on Comprehensive National Cybersecurity Initiative with Karen Evans</title>
 <link>http://csis.org/multimedia/audio-cybersecurity-discussion-comprehensive-national-cybersecurity-initiative-karen-evan</link>
 <description>&lt;p&gt;&lt;img align=&quot;left&quot; width=&quot;157&quot; height=&quot;178&quot; alt=&quot;&quot; src=&quot;/files/images/100503_karen_evans.jpg&quot; /&gt;Karen Evans is the former Administrator for E-Government and Information Technology at the Office of Management and Budget in the Executive Office of the President. Ms.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://csis.org/multimedia/audio-cybersecurity-discussion-comprehensive-national-cybersecurity-initiative-karen-evan&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <media:content url="http://c704517.r17.cf2.rackcdn.com/podcast/100303_evans.mp3 " fileSize="16395391" type="audio/mpeg"> <media:thumbnail url="http://csis.org/files/100310_Karen_Evans.jpg" />
</media:content>
 <enclosure url="http://c704517.r17.cf2.rackcdn.com/podcast/100303_evans.mp3 " length="16395391" type="audio/mpeg" />
 <pubDate>Wed, 10 Mar 2010 17:29:17 -0500</pubDate>
 <dc:creator>ian</dc:creator>
 <guid isPermaLink="false">24132 at http://csis.org</guid>
</item>
<item>
 <title>Audio: Cybersecurity Discussion on Internet Governance with Rod Beckstrom</title>
 <link>http://csis.org/multimedia/audio-cybersecurity-discussion-internet-governance-rod-beckstrom</link>
 <description>&lt;p&gt;&lt;img align=&quot;left&quot; width=&quot;170&quot; height=&quot;199&quot; alt=&quot;&quot; src=&quot;/files/images/100503_Beckstrom.jpg&quot; /&gt;Mr. Beckstrom, President and CEO of ICANN, answers questions related to the diversity of the internet, the internationalization of the domain name system, internet security and stability, and international cooperation on cybersecurity.&lt;/p&gt;
&lt;p&gt;Interview date: January 27, 2010&lt;/p&gt;
</description>
 <category domain="http://csis.org/category/topics/technology/cybersecurity">Cybersecurity</category>
 <category domain="http://csis.org/category/topics/technology">Technology and Cybersecurity</category>
 <pubDate>Wed, 10 Mar 2010 17:17:38 -0500</pubDate>
 <dc:creator>ian</dc:creator>
 <guid isPermaLink="false">24130 at http://csis.org</guid>
</item>
</channel>
</rss>
