<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://media.rss.com/style.xsl"?>
<rss xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom" xml:lang="en" version="2.0">
  <channel>
    <title><![CDATA[CISO Talks]]></title>
    <link>https://www.lepide.com/data-security-platform/</link>
    <atom:link href="https://media.rss.com/ciso-talks/feed.xml" rel="self" type="application/rss+xml"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <description><![CDATA[<p><strong>CISO Talks</strong> is a <strong>weekly show</strong> which is tailored for <strong>CISOs and I.T. professionals</strong> but can also appeal to anyone with an interest in cybersecurity. We discuss a number of topics regarding the CISO and I.T. professional role and how certain scenarios, changes and trends are shaping the role(s) as well as the cybersecurity industry. <strong>If you are a CISO or an I.T. professional or if you just have an interesting topic to discuss on our show </strong>then please send an email: ciso.talks@lepide.com <strong>Watch/listen on your favourite platforms: </strong><a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a> Copyright ©️ <em>2024 Lepide. All Rights Reserved.</em></p>]]></description>
    <generator>RSS.com v4.1.0</generator>
    <lastBuildDate>Mon, 11 Aug 2025 11:30:23 GMT</lastBuildDate>
    <language>en</language>
    <copyright><![CDATA[All rights reserved]]></copyright>
    <itunes:image href="https://media.rss.com/ciso-talks/20240515_100553_0ec1568c1c7ed67a92321d8db6357013.png"/>
    <podcast:guid>fd503dee-4ccd-595c-a501-214e9a719885</podcast:guid>
    <image>
      <url>https://media.rss.com/ciso-talks/20240515_100553_0ec1568c1c7ed67a92321d8db6357013.png</url>
      <title>CISO Talks</title>
      <link>https://www.lepide.com/data-security-platform/</link>
    </image>
    <podcast:locked>yes</podcast:locked>
    <podcast:license>All rights reserved</podcast:license>
    <itunes:author>CISO Talks</itunes:author>
    <itunes:owner>
      <itunes:name>CISO Talks</itunes:name>
    </itunes:owner>
    <itunes:explicit>false</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <podcast:medium>podcast</podcast:medium>
    <item>
      <title><![CDATA[Building Trust in a Digital World: Insights from a CISO]]></title>
      <itunes:title><![CDATA[Building Trust in a Digital World: Insights from a CISO]]></itunes:title>
      <description><![CDATA[<p>In this episode of Lepide CISO Talks, Chris Borkenhagen, CDO and CISO at Authentic ID, shares his unique journey from military service to the forefront of cybersecurity. He discusses the evolution of fraud in the digital age, the implications of AI in both offensive and defensive roles, and the future of digital identity verification. Chris emphasizes the importance of trust and data ownership in an increasingly digital world, while also reflecting on the lessons learned from his military background that shape his leadership style today. </p><p></p><p>💡 Sponsored by Magic Mind Lately, we’ve been starting our days with Magic Mind—and it’s been a game-changer. Whether we’re deep in cybersecurity work or just powering through stacked schedules, it helps us stay focused and energised. If your days are packed and your brain’s on overdrive, we seriously recommend checking it out.</p><p></p><p> 👉 Try it for yourself at <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.magicmind.com/CISOJUNE">https://www.magicmind.com/CISOJUNE</a> </p><p>💬 Don't forget to use the code CISOJUNE at checkout for a special discount!</p><p> -------------------------------------------------------------------------------------------------------</p><p>🎉 Shoutout to MillionPodcasts! We're proud to share that CISO Talks has been featured by MillionPodcasts ! including their 100 Best Chief Information Security Officer (CISO) Podcasts and 100 Best Zero Trust Podcasts lists. </p><p>Check it out and discover more top-tier cybersecurity content: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.millionpodcasts.com/cyber-security-podcasts/">https://www.millionpodcasts.com/cyber-security-podcasts/</a> </p><p>Thanks to the MillionPodcasts team for the recognition! </p><p>--------------------------------------------------------------------------------------------------------</p><p>We’re also proud to share that CISO Talks has been selected by Feedspot as one of the Top 25 Chief Information Security Officer (CISO) Podcasts on the web! </p><p>Check out the full list here: <a target="_blank" rel="noopener noreferrer nofollow" href="https://podcast.feedspot.com/ciso_podcasts">https://podcast.feedspot.com/ciso_podcasts</a> </p><p>A huge thank you to everyone who’s tuned in, shared episodes, and supported the show. Your support helps us keep bringing real, in-depth conversations with cybersecurity leaders to the forefront. Stay with us—there’s so much more to come. </p><p>#fraud prevention #cybersecurity #digital identity</p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/2091818</link>
      <enclosure url="https://content.rss.com/episodes/207971/2091818/ciso-talks/2025_06_27_15_49_43_f7686b96-2852-4795-8aeb-1a39cf394c04.mp3" length="48665121" type="audio/mpeg"/>
      <guid isPermaLink="false">5c3fe96a-7b30-437e-bf1a-c52c41f4285f</guid>
      <itunes:duration>3041</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 27 Jun 2025 15:58:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20250627_030622_dec9bc700ca8b3001c1adcac2e8b905e.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/2091818/transcript" type="application/x-subrip"/>
      <podcast:chapters url="https://apollo.rss.com/chapters/2091818" type="application/json+chapters"/>
      <psc:chapters>
        <psc:chapter start="0" title="Introduction to Chris Borkenhagen"/>
        <psc:chapter start="7:53" title="Military Influence on Leadership"/>
        <psc:chapter start="13:22" title="Journey into Technology and Cybersecurity"/>
        <psc:chapter start="18:23" title="Defining Modern Fraud"/>
        <psc:chapter start="24:14" title="AI's Role in Cybersecurity and Fraud Prevention"/>
        <psc:chapter start="29:26" title="Trust and Security in Banking"/>
        <psc:chapter start="30:31" title="Consumer vs. Corporate Identity Verification"/>
        <psc:chapter start="31:36" title="Supply Chain Vulnerabilities"/>
        <psc:chapter start="32:37" title="Biometrics and Digital Identity"/>
        <psc:chapter start="34:16" title="The Future of Digital Payments"/>
        <psc:chapter start="36:06" title="Data Ownership and Privacy Concerns"/>
        <psc:chapter start="38:09" title="Trust Issues with Data Security"/>
        <psc:chapter start="40:05" title="The Role of AI in Cybersecurity"/>
        <psc:chapter start="42:00" title="Marketing in the Cybersecurity Space"/>
        <psc:chapter start="45:33" title="Final Thoughts on Security and Trust"/>
      </psc:chapters>
    </item>
    <item>
      <title><![CDATA[Why Fear Based Cybersecurity Training Fails — And What Actually Works]]></title>
      <itunes:title><![CDATA[Why Fear Based Cybersecurity Training Fails — And What Actually Works]]></itunes:title>
      <description><![CDATA[<p>In this episode of Lepide CISO Talks, Craig Taylor, co-founder and CISO of CyberHoot, discusses the evolving landscape of cybersecurity, focusing on the importance of positive reinforcement in training, the persistent threat of phishing, and the role of virtual CISOs in helping organizations build a robust cybersecurity culture. </p><p></p><p>He emphasizes the need for effective password management and the significance of storytelling in raising awareness about cyber threats. The conversation also touches on emerging threats and the necessity for continuous education in cybersecurity practices.</p><p></p><p>💡 <strong>Sponsored by Magic Mind</strong> </p><p></p><p>We've been using Magic Mind for a few weeks now, and it's made a real difference to our focus and energy. Especially on busy days filled with back to back meetings and intense work. If you're in cybersecurity (or just juggling a lot), we highly recommend giving it a try.</p><p>👉 Try it for yourself at <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.magicmind.com/CISOAPR">https://www.magicmind.com/CISOAPR</a> </p><p>💬 Use the code <strong>CISOAPR</strong> at checkout for a special discount.</p><p></p><p>🎉 <strong>Shoutout to MillionPodcasts</strong>!</p><p></p><p>We're proud to share that CISO Talks has been featured by MillionPodcasts ! including their 100 Best Chief Information Security Officer (CISO) Podcasts and 100 Best Zero Trust Podcasts lists.</p><p></p><p>Check it out and discover more top-tier cybersecurity content: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.millionpodcasts.com/cyber-security-podcasts/">https://www.millionpodcasts.com/cyber-security-podcasts/</a></p><p></p><p>Thanks to the MillionPodcasts team for the recognition!</p><p></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/2045564</link>
      <enclosure url="https://content.rss.com/episodes/207971/2045564/ciso-talks/2025_05_26_17_05_14_46eceb58-cc2d-4fc9-8ba3-5283dc91525f.mp3" length="45009650" type="audio/mpeg"/>
      <guid isPermaLink="false">6e30dc2a-38d3-4cbf-935f-1aa41ee9c2e2</guid>
      <itunes:duration>2813</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 26 May 2025 17:18:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20250526_050554_55b4ac4961f9b7489eae8cca78c6e534.png"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/2045564/transcript" type="application/x-subrip"/>
      <podcast:chapters url="https://apollo.rss.com/chapters/2045564" type="application/json+chapters"/>
      <psc:chapters>
        <psc:chapter start="0" title="Introduction to Cybersecurity Challenges"/>
        <psc:chapter start="1:49" title="The Flaws in Traditional Cybersecurity Training"/>
        <psc:chapter start="3:29" title=" The Psychology of Phishing Attacks"/>
        <psc:chapter start="7:31" title="Understanding Human Behavior in Cybersecurity"/>
        <psc:chapter start="11:28" title="The Role of Positive Reinforcement in Training"/>
        <psc:chapter start="12:36" title="The Evolution of Phishing Tactics"/>
        <psc:chapter start="16:14" title="Password Management and Authentication Strategies"/>
        <psc:chapter start="18:20" title="The Importance of Virtual CISOs for SMBs"/>
        <psc:chapter start="23:13" title="Collaboration Among Virtual CISOs"/>
        <psc:chapter start="25:34" title="Understanding Cybersecurity Gaps in SMBs"/>
        <psc:chapter start="26:59" title=" Creating a Culture of Cyber Awareness"/>
        <psc:chapter start="30:09" title="Gamification in Cybersecurity Training"/>
        <psc:chapter start="34:03" title="The Rise of Smishing and Phishing Attacks"/>
        <psc:chapter start="37:41" title="New Threats in Cybersecurity: Polymorphic Attacks"/>
        <psc:chapter start="45:02" title="Conclusion and Resources for Cyber Awareness Training"/>
      </psc:chapters>
    </item>
    <item>
      <title><![CDATA[Debunking Pen Testing Myths & Addressing Security Skill Gaps | CISO Talks]]></title>
      <itunes:title><![CDATA[Debunking Pen Testing Myths & Addressing Security Skill Gaps | CISO Talks]]></itunes:title>
      <description><![CDATA[<p>In this episode of Lepide CISO Talks, we discuss with Greg Hatcher and John Stigerwalt the founding of White Knight Labs, their unique approach to cybersecurity, and the importance of education and certifications in the field. </p><p></p><p>They delve into misconceptions about penetration testing, the significance of translating findings into actionable security improvements, and the common weaknesses they encounter in organizations. </p><p></p><p>The conversation also covers the challenges of physical security assessments and the gaps in skills and knowledge that security teams face today. </p><p></p><p>Think your team is ready? Think again. </p><p></p><p>🪄 Magic Mind 🧠 You have a limited offer you can use now, that gets you up to 48% off your first subscription or 20% off one time purchases with code 'CISO' at checkout. </p><p></p><p>You can claim it at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.magicmind.com/CISO">https://www.magicmind.com/CISO</a> </p><p></p><p>🎉 Shoutout to MillionPodcasts! </p><p></p><p>We're proud to share that CISO Talks has been featured by MillionPodcasts ! including their 100 Best Chief Information Security Officer (CISO) Podcasts and 100 Best Zero Trust Podcasts lists. </p><p></p><p>Check it out and discover more top-tier cybersecurity content: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.millionpodcasts.com/cyber-security-podcasts/">https://www.millionpodcasts.com/cyber-security-podcasts/</a> </p><p></p><p>Thanks to the MillionPodcasts team for the recognition!</p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1989499</link>
      <enclosure url="https://content.rss.com/episodes/207971/1989499/ciso-talks/2025_04_16_11_37_37_8ae33344-36c4-4c38-9fe7-76696b8d257d.mp3" length="44592945" type="audio/mpeg"/>
      <guid isPermaLink="false">06845163-65d1-47be-818f-c50f77ea3bea</guid>
      <itunes:duration>2787</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Apr 2025 15:30:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20250416_110415_f49cb282cf02717d97482811f641e98a.png"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1989499/transcript" type="text/vtt"/>
      <podcast:chapters url="https://apollo.rss.com/chapters/1989499" type="application/json+chapters"/>
      <psc:chapters>
        <psc:chapter start="0" title="Introduction to White Knight Labs"/>
        <psc:chapter start="3:04" title="Founding Stories and Backgrounds"/>
        <psc:chapter start="6:12" title="Company Culture and Structure"/>
        <psc:chapter start="10:04" title="CISO Insights and Misconceptions"/>
        <psc:chapter start="12:45" title="Active Directory Challenges"/>
        <psc:chapter start="15:58" title="Certification vs. Real-World Experience"/>
        <psc:chapter start="18:49" title="Translating Findings into Action"/>
        <psc:chapter start="21:41" title=" Creative Attack Techniques"/>
        <psc:chapter start="24:56" title="Common Vulnerabilities in Organizations"/>
        <psc:chapter start="26:49" title="Identifying Vulnerabilities in Internal Systems"/>
        <psc:chapter start="29:09" title="The Importance of Process Validation"/>
        <psc:chapter start="30:55" title="Physical Security Assessments and Break-ins"/>
        <psc:chapter start="35:56" title="Understanding Insider Threats and Supply Chain Risks"/>
        <psc:chapter start="39:58" title="Bridging the Skills Gap in Cybersecurity"/>
        <psc:chapter start="44:48" title=" Resources for Further Learning and Engagement"/>
      </psc:chapters>
    </item>
    <item>
      <title><![CDATA[Building the Future of Cybersecurity Talent]]></title>
      <itunes:title><![CDATA[Building the Future of Cybersecurity Talent]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, Matt Walker, CISO of Goosehead Insurance, discusses the challenges of building a proficient cybersecurity team amidst a talent shortage. He emphasizes the importance of nurturing entry-level talent and the various pathways into cybersecurity. Matt shares insights on career progression, the necessity of continuous learning, and adapting to budget constraints by leveraging cross-departmental collaboration. He also explores the balance between technical skills and business processes for CISOs, effective communication of technical risks, and the importance of delegation and responsibility in leadership roles. </p><p></p><p>👍 Like, Share, and Subscribe for more in-depth discussions on cybersecurity and technology trends! </p><p></p><p>Follow the link below to watch/listen on your favorite platforms: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lnkd.in/esHNX4hj">https://lnkd.in/esHNX4hj</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1882671</link>
      <enclosure url="https://content.rss.com/episodes/207971/1882671/ciso-talks/2025_02_05_16_39_24_4882d130-980f-4712-a196-53a9ca4bec5a.mp3" length="45939191" type="audio/mpeg"/>
      <guid isPermaLink="false">373dbcb7-174f-457b-9198-f79f24c9f9f9</guid>
      <itunes:duration>2871</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 Feb 2025 16:47:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20250205_040204_bb2a768cdefac20be383ec470b5fad97.jpg"/>
      <podcast:transcript url="https://apollo.rss.com/transcriptions/1882671" type="text/plain"/>
      <podcast:chapters url="https://apollo.rss.com/chapters/1882671" type="application/json+chapters"/>
      <psc:chapters>
        <psc:chapter start="0" title="Introduction and Overview"/>
        <psc:chapter start="1:01" title="Continuous Learning and Certifications"/>
        <psc:chapter start="7:40" title="Progression from Junior Roles to Senior Roles"/>
        <psc:chapter start="14:19" title="Building and Managing a Cybersecurity Team"/>
        <psc:chapter start="22:42" title="Balancing Technical Proficiency and Business Processes"/>
        <psc:chapter start="23:45" title="Does a CISO Need to Be Technical?"/>
        <psc:chapter start="30:55" title="Effective Communication of Technical Topics"/>
        <psc:chapter start="35:40" title="Delegating Tasks as a CISO"/>
      </psc:chapters>
    </item>
    <item>
      <title><![CDATA[Restoring Trust Within Your Organization After a Cyber Attack]]></title>
      <itunes:title><![CDATA[Restoring Trust Within Your Organization After a Cyber Attack]]></itunes:title>
      <description><![CDATA[<p>In this episode of Lepide CISO Talks, Omer Cohen, Chief Information Security Officer at Descope, discusses the critical aspects of incident response, particularly focusing on restoring trust after a cyber attack. He emphasizes the importance of communication, transparency, and the balance between security and productivity. Omer shares best practices for managing breaches, the role of compliance in startups, and how a cloud-first strategy can enhance security. He also offers insights on future-proofing security careers in an evolving technological landscape. </p><p></p><p>Guest in this episode: Omer Cohen | CISO - Descope </p><p></p><p>🪄 Magic Mind 🧠 You have a limited offer you can use now, that gets you up to 48% off your first subscription or 20% off one time purchases with code: CISOTALKS20 at checkout. </p><p></p><p>You can claim it at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.magicmind.com/cisotalks">https://www.magicmind.com/cisotalks</a> </p><p></p><p>👍 Like, Share, and Subscribe for more in-depth discussions on cybersecurity and technology trends! </p><p></p><p>Follow the link below to watch/listen on your favorite platforms: <a target="_blank" rel="noopener noreferrer nofollow" href="https://lnkd.in/esHNX4hj">https://lnkd.in/esHNX4hj</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1796543</link>
      <enclosure url="https://content.rss.com/episodes/207971/1796543/ciso-talks/2024_12_11_13_33_29_cdc9cf59-f50e-4144-bb73-fe1aff08462f.mp3" length="34547714" type="audio/mpeg"/>
      <guid isPermaLink="false">9c5df831-b2f6-4c72-8b22-5f971197c611</guid>
      <itunes:duration>2159</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Dec 2024 15:54:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20241211_011209_65f91f41993a989f620cc53e59efcf1a.jpg"/>
    </item>
    <item>
      <title><![CDATA[Aligning with Company Strategy Effectively as a CISO]]></title>
      <itunes:title><![CDATA[Aligning with Company Strategy Effectively as a CISO]]></itunes:title>
      <description><![CDATA[<p>In this conversation, Brent Deterding, a CISO, discusses various aspects of the role and what makes it enjoyable. He emphasizes the importance of aligning personal satisfaction with professional success and the need for CISOs to have a diverse background. </p><p></p><p>Brent also highlights the evolving nature of the CISO role, which now combines technical and strategic responsibilities. He emphasizes the need for CISOs to speak the language of the business and break down complex concepts into simple terms. </p><p></p><p>Additionally, Brent discusses the importance of finding the right fit for both the CISO and the organization, as well as the need for collaboration with the C-suite. In this conversation, Brent Deterding shares insights on the role of a CISO and the importance of aligning with the company's strategy. He emphasizes the need for collaboration and open communication within the organization. </p><p></p><p>Brent also discusses the state of vulnerability management and the role of AI in cybersecurity. He highlights the importance of simplicity and prioritizing solutions that address the core problems. </p><p></p><p>Lastly, he provides three key priorities for aspiring CISOs: managing stress, aligning with their desired role, and developing empathy and integrity. </p><p></p><p><strong>Guest in this episode: Brent Deterding | CISO - Afni, Inc. </strong></p><p></p><p>🪄 <strong>Magic Mind</strong> 🧠 You have a limited offer you can use now, that gets you up to 48% off your first subscription or 20% off one time purchases with code: CISOTALKS20 at checkout </p><p>You can claim it at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.magicmind.com/cisotalks">https://www.magicmind.com/cisotalks</a> </p><p></p><p>👍 Like, Share, and Subscribe for more in-depth discussions on cybersecurity and technology trends! </p><p></p><p>Follow the link below to watch/listen on your favorite platforms: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://lnkd.in/esHNX4hj">https://lnkd.in/esHNX4hj</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1751087</link>
      <enclosure url="https://content.rss.com/episodes/207971/1751087/ciso-talks/2024_11_13_14_18_01_00bd90da-f4bd-4542-8427-031452eca825.mp3" length="48583619" type="audio/mpeg"/>
      <guid isPermaLink="false">7b8966ca-2408-4dd0-9d55-ce36ddb13c18</guid>
      <itunes:duration>3036</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Nov 2024 16:00:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20241113_021141_e290cb21841791e24573858e3dc76a94.jpg"/>
      <podcast:transcript url="https://apollo.rss.com/transcriptions/1751087" type="text/plain"/>
      <podcast:chapters url="https://apollo.rss.com/chapters/1751087" type="application/json+chapters"/>
      <psc:chapters>
        <psc:chapter start="0" title="Introduction and Enjoyable Aspects of Being a CISO" href="https://www.magicmind.com/cisotalks"/>
        <psc:chapter start="9:00" title="The Evolving Nature of the CISO Role"/>
        <psc:chapter start="15:26" title="Finding the Right Fit as a CISO"/>
        <psc:chapter start="29:03" title="Simplicity in Cybersecurity: Prioritizing Core Problems"/>
        <psc:chapter start="36:33" title="The Importance of Effective Communication in Cybersecurity"/>
      </psc:chapters>
    </item>
    <item>
      <title><![CDATA[Cyber Resilience 101: Preparing Your Business for the Digital Age]]></title>
      <itunes:title><![CDATA[Cyber Resilience 101: Preparing Your Business for the Digital Age]]></itunes:title>
      <description><![CDATA[<p>In this episode, we dive into the world of cyber resilience and explore what it means for small to medium-sized businesses (SMBs). As cyber threats continue to evolve, businesses need more than just strong defences—they need to ensure they can recover quickly and minimize downtime. </p><p>We discuss: </p><p>● What cyber resilience is and why it’s critical for today’s businesses. </p><p>● Whether SMBs are keeping up with resilience standards. </p><p>● Practical steps to assess your business’s current state of cyber resilience. </p><p>● The importance of tracking detection and resolution times in response to cyber incidents. </p><p>● Key strategies for backing up your data and ensuring your systems stay operational in the face of threats. </p><p>Join us as we break down the essentials of cyber resilience and share actionable tips to strengthen your business’s defences in the digital age.</p><p></p><p>Guest in this episode: Bob Turner | Co-Founder &amp; Advisory Board Chair - The Cyber Hero vCISO Network</p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1698310</link>
      <enclosure url="https://content.rss.com/episodes/207971/1698310/ciso-talks/2024_10_11_12_46_37_4d0d1890-1728-4c63-9818-add14d16e223.mp3" length="30256945" type="audio/mpeg"/>
      <guid isPermaLink="false">567acfdc-41af-4606-8b6b-0d9a94eb707c</guid>
      <itunes:duration>1891</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 11 Oct 2024 14:50:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20241011_121015_4b76429f74ce219f99eed82e8892909e.png"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1698310/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Starting Strong in Cybersecurity: How to Hit the Ground Running in Your New Role]]></title>
      <itunes:title><![CDATA[Starting Strong in Cybersecurity: How to Hit the Ground Running in Your New Role]]></itunes:title>
      <description><![CDATA[<p>In this episode, we break down the essential strategies to help you hit the ground running in your new cybersecurity role. Whether you're transitioning into cybersecurity or stepping into a new position within the field, we'll cover everything from mastering the technical skills to building strong relationships with your team. Learn how to set clear priorities, stay ahead of emerging threats, and make an immediate impact in your new role. Tune in for actionable advice that will boost your confidence and help you excel from day one! </p><p></p><p><strong>Guest in this episode: </strong></p><p>Lee Morton | Head of Cyber Security - GBG Plc </p><p><strong>🪄 Magic Mind 🧠 </strong></p><p>You have a limited offer you can use now, that gets you up to 48% off your first subscription or 20% off one time purchases with code: </p><p><strong>CISOTALKS20</strong> at checkout </p><p>You can claim it at: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.magicmind.com/cisotalks">https://www.magicmind.com/cisotalks</a> </p><p>👍 Like, Share, and Subscribe for more in-depth discussions on cybersecurity and technology trends! </p><p>Follow the link below to watch/listen on your favorite platforms: <a target="_blank" rel="noopener noreferrer nofollow" href="https://lnkd.in/esHNX4hj">https://lnkd.in/esHNX4hj</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1652255</link>
      <enclosure url="https://content.rss.com/episodes/207971/1652255/ciso-talks/2024_09_11_12_48_58_83416c28-59ab-43b3-a471-e26824fa9760.mp3" length="39512233" type="audio/mpeg"/>
      <guid isPermaLink="false">b6e585f4-9eaf-49a2-9292-79a8528ce27c</guid>
      <itunes:duration>2469</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Sep 2024 14:12:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20240911_120931_a0a8c48a3b0e4d30f1630ec0d3d91093.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1652255/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Are We Actually Getting ANYTHING RIGHT in Cybersecurity?]]></title>
      <itunes:title><![CDATA[Are We Actually Getting ANYTHING RIGHT in Cybersecurity?]]></itunes:title>
      <description><![CDATA[<p>Are we actually making progress in cybersecurity, or are we just fighting a losing battle? In this video, we dive deep into the current state of cybersecurity, examining both the successes and the ongoing challenges. From the latest security technologies to the persistent threats and vulnerabilities, we discuss what the industry is doing right, where we're falling short, and what the future might hold. Whether you're a cybersecurity professional, an IT enthusiast, or just curious about the digital world's safety, this video will give you valuable insights into the state of cybersecurity today.</p><p></p><p>🔐 Key Topics Covered:</p><p>- Overview of current cybersecurity strategies</p><p>- The effectiveness of modern security technologies</p><p>- Common mistakes and failures in cybersecurity</p><p>- The evolving threat landscape</p><p>- What can be done to improve digital security</p><p></p><p>👍 Like, Share, and Subscribe for more in-depth discussions on cybersecurity and technology trends!</p><p></p><p>Guest in this episode: Richard Hollis | Director - Risk Crew </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/riskexpertrichardhollis/">https://www.linkedin.com/in/riskexpertrichardhollis/</a> </p><p>Follow the link below to watch/listen on your favorite platforms: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1603371</link>
      <enclosure url="https://content.rss.com/episodes/207971/1603371/ciso-talks/2024_08_08_15_51_53_0dea801c-38b1-4dec-849c-4b0945a0d1e4.mp3" length="47005081" type="audio/mpeg"/>
      <guid isPermaLink="false">ed1c24c8-1f9d-4de0-bbd8-ff6c5d263638</guid>
      <itunes:duration>2937</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 08 Aug 2024 15:53:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20240808_030824_deab47e82ccf7dbf6f438455a4974fb9.png"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1603371/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Navigating the Cybersecurity landscape Successfully]]></title>
      <itunes:title><![CDATA[Navigating the Cybersecurity landscape Successfully]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, we discuss the evolving Cybersecurity landscape and how to navigate it best. CISO of Neptune Media, Charles Payne explains how he can help organizations thrive in the face of evolving cyber threats and build unwavering trust with their stakeholders. </p><p>We also discuss strategies to ensure effective governance, risk management, and compliance (GRC) within your organization.</p><p>Lastly, we discuss balancing technical aspects with business-oriented considerations as a CISO and the importance of Industry networking and inspiring future Cyber Security experts.</p><p></p><p>Guest in this episode: Charles Payne | CISO/CTO - Neptune Media</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/nylcharlespayne/">https://www.linkedin.com/in/nylcharlespayne/</a></p><p></p><p>Follow the link below to watch/listen on your favorite platforms: <a target="_blank" rel="noopener noreferrer nofollow" href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1531069</link>
      <enclosure url="https://content.rss.com/episodes/207971/1531069/ciso-talks/2024_06_19_13_34_01_d0baa498-2145-4f43-beae-96da7548b0f6.mp3" length="36014333" type="audio/mpeg"/>
      <guid isPermaLink="false">2c923eb2-37fa-4964-9041-5e7d57526467</guid>
      <itunes:duration>2250</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 19 Jun 2024 14:50:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20240619_010634_7d1456a938bf9618b29db206aca755e6.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1531069/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Strategies for CISOs and CIOs to Work Together Effectively]]></title>
      <itunes:title><![CDATA[Strategies for CISOs and CIOs to Work Together Effectively]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, we talk with Michael Armer (CISO) and Ashu Varshney (CIO) of global software company, RingCentral. We discuss the role of the CISO and CIO within the business and how they have an effective working partnership with each other. We talk about why this relationship is so effective and how it greatly benefits the organization when it comes to securing sensitive data. </p><p></p><p>Guests in this episode: Michael Armer | CISO - RingCentral </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/marmer/">https://www.linkedin.com/in/marmer/</a> </p><p></p><p>Ashu Varshney | CIO - RingCentral </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/ashu-varshney-50a9818/">https://www.linkedin.com/in/ashu-varshney-50a9818/</a> </p><p></p><p>Follow the link below to watch/listen on your favorite platforms: <a target="_blank" rel="noopener noreferrer nofollow" href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1480372</link>
      <enclosure url="https://content.rss.com/episodes/207971/1480372/ciso-talks/2024_05_15_14_00_03_322e0a2e-da43-48a1-9076-4e76fd7f58ef.mp3" length="39293222" type="audio/mpeg"/>
      <guid isPermaLink="false">fd7858e4-4ddd-459c-a259-a53c599b459d</guid>
      <itunes:duration>2455</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 May 2024 14:00:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20240515_010535_ac1f9482ffe3d66e2102bec1088b20a2.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1480372/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[From Military to Cybersecurity - How to Make it Work]]></title>
      <itunes:title><![CDATA[From Military to Cybersecurity - How to Make it Work]]></itunes:title>
      <description><![CDATA[<p>In this episode, we welcome Dane Clackworthy, a former Royal Marine. We discuss Dane's journey into cybersecurity and why having a commando mindset is so valuable to offer businesses when it comes to cyber, operations, risk management and sales.</p><p></p><p>Guest in this episode: Dane Clackworthy | Head of Sales - Cyberprism</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/daneclackworthy/">https://www.linkedin.com/in/daneclackworthy/</a></p><p></p><p>Follow the link below to watch/listen on your favorite platforms: <a target="_blank" rel="noopener noreferrer nofollow" href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1431565</link>
      <enclosure url="https://content.rss.com/episodes/207971/1431565/ciso-talks/2024_04_10_15_03_24_c7b898ce-4379-439f-90e0-a293e0786696.mp3" length="40433833" type="audio/mpeg"/>
      <guid isPermaLink="false">eb5343d0-196f-469a-843d-8777894c3aec</guid>
      <itunes:duration>2527</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Apr 2024 15:06:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20240410_020450_72d0fef8adca609b27b0665863ce30f7.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1431565/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[How To Greatly Improve Your Cybersecurity Awareness Training Ft. Amy Stokes-Waters | CEO - ESC.]]></title>
      <itunes:title><![CDATA[How To Greatly Improve Your Cybersecurity Awareness Training Ft. Amy Stokes-Waters | CEO - ESC.]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, we tackle the ongoing issue of <strong>cybersecurity awareness training</strong>. Why is it so lacklustre? How can you greatly improve your training methods to make it more compelling, impactful &amp; memorable? Everything is covered in this episode. </p><p></p><p>Guest in this episode: Amy Stokes-Waters | CEO - The Cyber Escape Room Co. <a href="https://www.linkedin.com/in/amystokeswaters/">https://www.linkedin.com/in/amystokeswaters/</a> </p><p></p><p>Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1386164</link>
      <enclosure url="https://content.rss.com/episodes/207971/1386164/ciso-talks/2024_03_12_16_04_41_6033f8a7-2a4d-4d27-a605-b352101b3790.mp3" length="38854783" type="audio/mpeg"/>
      <guid isPermaLink="false">12bde2b5-a2d3-4da3-994b-9989b41a4542</guid>
      <itunes:duration>2428</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Mar 2024 15:30:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20240312_040316_ad7d8ebf5dda60cd0514232e086ac4da.png"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1386164/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[What Key Factors are Changing the CISO Role? Ft. Helen Rabe | CISO - BBC]]></title>
      <itunes:title><![CDATA[What Key Factors are Changing the CISO Role? Ft. Helen Rabe | CISO - BBC]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, we talk with BBC CISO, Helen Rabe, about the key factors that have shaped and changed the role of the CISO in recent years. </p><p></p><p>we also discuss the importance of the CISOs team and what the future of the role looks like. </p><p></p><p>Guest in this episode: Helen Rabe - CISO - BBC <a href="https://www.linkedin.com/in/helenrabe">https://www.linkedin.com/in/helenrabe </a></p><p></p><p>Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1338911</link>
      <enclosure url="https://content.rss.com/episodes/207971/1338911/ciso-talks/2024_02_09_17_29_46_9c02ed0a-bbfb-4626-9109-7c5ca0e947a4.mp3" length="26660918" type="audio/mpeg"/>
      <guid isPermaLink="false">c8001ada-bb1f-49e5-991d-fd479735550e</guid>
      <itunes:duration>1666</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 09 Feb 2024 17:39:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20240209_050225_c61e8869d965a1ca09ec9cd3adf3b0ae.png"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1338911/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Role of a CISO – Start-up vs SMB vs Large Company]]></title>
      <itunes:title><![CDATA[Role of a CISO – Start-up vs SMB vs Large Company]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, we discuss the differences in strategy, approach and practice with a seasoned veteran CISO who has been involved with each stage of a business as a CISO. What are some of the key differences aside from the obvious? What challenges arise when making the switch? </p><p>Guest in this episode: Michael Scott - CISO @ Immuta <a href="https://www.linkedin.com/in/mikescottcissp/">https://www.linkedin.com/in/mikescottcissp/</a> </p><p>Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1292621</link>
      <enclosure url="https://content.rss.com/episodes/207971/1292621/ciso-talks/2024_01_08_14_19_18_22727fe7-6eb3-4480-afa5-e756e4f045ff.mp3" length="13868859" type="audio/mpeg"/>
      <guid isPermaLink="false">09b21efc-984a-415b-a17c-ab170c518651</guid>
      <itunes:duration>866</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Jan 2024 15:30:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20240108_020110_d12e3962164b3c1f658f3bdb1ba7a890.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1292621/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Cybersecurity Risk has Changed the CISO's Role]]></title>
      <itunes:title><![CDATA[Cybersecurity Risk has Changed the CISO's Role]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, we discuss the everchanging role of the CISO in the modern landscape compared to the past. How has it changed? Former CISO of Wendy's, Michael Scott gives his insight from his extensive experience as a successful CISO. </p><p>Guest in this episode: Michael Scott - CISO @ Immuta <a href="https://www.linkedin.com/in/mikescottcissp/">https://www.linkedin.com/in/mikescottcissp/</a> </p><p>Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1264271</link>
      <enclosure url="https://content.rss.com/episodes/207971/1264271/ciso-talks/2023_12_13_13_07_00_e2b3d27e-740e-4d0c-8749-2a8717cf1fc6.mp3" length="7244206" type="audio/mpeg"/>
      <guid isPermaLink="false">f98705d9-a130-4146-a6fa-eb77f9d35a2d</guid>
      <itunes:duration>452</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Dec 2023 15:30:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20231213_011255_9997d30ec3fd5ef1391ee7700be8dfab.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1264271/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[The Keys to CISO Role Success Ft. Former Wendy's CISO - Michael Scott]]></title>
      <itunes:title><![CDATA[The Keys to CISO Role Success Ft. Former Wendy's CISO - Michael Scott]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, we talk with former Wendy's CISO of 7+ years, Michael Scott. We discuss his role at Wendy's in depth, how it differed being a CISO then as opposed to present day. What challenges were faced and how Michael overcame these challenges in one of the worlds most renown fast food restaurant chains. </p><p>Guest in this episode: Michael Scott - CISO @ Immuta <a href="https://www.linkedin.com/in/mikescottcissp/">https://www.linkedin.com/in/mikescottcissp/</a> </p><p>Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1238296</link>
      <enclosure url="https://content.rss.com/episodes/207971/1238296/ciso-talks/2023_11_24_14_31_38_c026a662-0cce-4eef-940f-21d7f5003e1d.mp3" length="13786103" type="audio/mpeg"/>
      <guid isPermaLink="false">2a5f7494-076a-4e43-9569-b0ef966dd68c</guid>
      <itunes:duration>861</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 24 Nov 2023 14:40:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20231124_021126_b0667f0f21ccb3ac58bdc995f803ec78.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1238296/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[The Early Days of the CISO Role]]></title>
      <itunes:title><![CDATA[The Early Days of the CISO Role]]></itunes:title>
      <description><![CDATA[<p>In this episode, we talk with Michael Scott, a seasoned veteran in the CISO role and cybersecurity space. We discuss the early days of the CISO role and how different it was compared to the role today.</p><p>Guest in this episode:</p><p>Michael Scott - CISO @ Immuta</p><p><a href="https://www.linkedin.com/in/mikescottcissp/">https://www.linkedin.com/in/mikescottcissp/</a></p><p>Follow the link below to watch/listen on your favourite platforms:</p><p><a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1213965</link>
      <enclosure url="https://content.rss.com/episodes/207971/1213965/ciso-talks/2023_11_10_13_40_30_6de3c91a-63ca-4cff-a5f2-93df47af8d24.mp3" length="7397597" type="audio/mpeg"/>
      <guid isPermaLink="false">5967951c-326f-480f-ad53-1779cd534aca</guid>
      <itunes:duration>462</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 10 Nov 2023 13:42:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20231110_011124_ea9d054bf5bf9c18982d2f3081f226aa.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1213965/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Don't Keep Your Data Longer Than You Need To]]></title>
      <itunes:title><![CDATA[Don't Keep Your Data Longer Than You Need To]]></itunes:title>
      <description><![CDATA[In this short episode of CISO Talks, Kevin explains the importance of organising your sensitive data and the fact that you should not keep hold of any data that is no longer needed for any longer than you need to in order to reduce overall risk. Guest in this episode: Kevin Coppins - President and CEO - Spirion <a href="https://www.linkedin.com/in/ktcoppins/">https://www.linkedin.com/in/ktcoppins/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1196647</link>
      <enclosure url="https://content.rss.com/episodes/207971/1196647/ciso-talks/2023_10_31_11_56_37_26734f2c-5763-4112-9e81-17b415e3726d.mp3" length="3908474" type="audio/mpeg"/>
      <guid isPermaLink="false">19118e1f-3e1b-451a-a201-0fd6388e45bb</guid>
      <itunes:duration>244</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 01 Nov 2023 15:30:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20231031_111034_516ac8befd5033d1e974288a94f15c63.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1196647/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Streamlining and Improving your Cybersecurity]]></title>
      <itunes:title><![CDATA[Streamlining and Improving your Cybersecurity]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss a few different use cases where cloud security and cybersecurity in general has been exploited and the reasons why said occurrences happened in the first place. We talk about how the processes are a lot of the time just getting in the way of people just wanting to do their jobs. How can organizations streamline the security process and make it easier for employees to complete their day to day tasks? Guest in this episode: Kevin Coppins - President and CEO - Spirion <a href="https://www.linkedin.com/in/ktcoppins/">https://www.linkedin.com/in/ktcoppins/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1190691</link>
      <enclosure url="https://content.rss.com/episodes/207971/1190691/ciso-talks/2023_10_26_15_49_40_b45fcde2-1233-4b7c-8b9f-094ba5372ea8.mp3" length="7339501" type="audio/mpeg"/>
      <guid isPermaLink="false">cb21fe91-a119-43c2-8b30-67006b0a351c</guid>
      <itunes:duration>458</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 Oct 2023 15:51:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20231026_031034_c94029d7315b26a64aa9a4f2d2524eaa.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1190691/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Don't Confuse Compliance with Security]]></title>
      <itunes:title><![CDATA[Don't Confuse Compliance with Security]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about the risks associated with confusing compliance with security. It occurs more often than you think within organizations. Why does this happen and how can it be mitigated? Guest in this episode: Kevin Coppins - President and CEO - Spirion <a href="https://www.linkedin.com/in/ktcoppins/">https://www.linkedin.com/in/ktcoppins/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1174674</link>
      <enclosure url="https://content.rss.com/episodes/207971/1174674/ciso-talks/2023_10_16_13_03_14_2c397153-31ce-4cf6-822e-a4eb008efb57.mp3" length="6687070" type="audio/mpeg"/>
      <guid isPermaLink="false">c4c51c94-33e9-452a-9535-199e2129aec5</guid>
      <itunes:duration>417</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 Oct 2023 15:50:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20231016_011008_5a9d42140986429320d675bf6bc0ad1e.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1174674/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Do You Know Where Your Sensitive Data Is?]]></title>
      <itunes:title><![CDATA[Do You Know Where Your Sensitive Data Is?]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about sensitive data. How can you locate your most sensitive data within your organization and how do you protect it against outside and insider threats? Most companies do not know where their sensitive data is. Security starts with the data. Guest in this episode: Kevin Coppins - President and CEO - Spirion <a href="https://www.linkedin.com/in/ktcoppins/">https://www.linkedin.com/in/ktcoppins/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1161763</link>
      <enclosure url="https://content.rss.com/episodes/207971/1161763/ciso-talks/2023_10_08_19_22_23_930b68cf-25ca-4d62-bcf8-b11d65f7c424.mp3" length="9265875" type="audio/mpeg"/>
      <guid isPermaLink="false">5a65fea7-f8c1-4a51-ab8f-2485b0b89e6c</guid>
      <itunes:duration>579</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Oct 2023 14:30:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20231008_071017_c9224de74081ae04e7ac422ac47a86fb.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1161763/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Protecting Your Digital Identity]]></title>
      <itunes:title><![CDATA[Protecting Your Digital Identity]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the dangers of identity theft in todays society, how attackers can steal and utilise your digital identity and why. Guest in this episode: Kevin Coppins - President and CEO - Spirion <a href="https://www.linkedin.com/in/ktcoppins/">https://www.linkedin.com/in/ktcoppins/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1142285</link>
      <enclosure url="https://content.rss.com/episodes/207971/1142285/ciso-talks/2023_09_26_12_41_28_e2b5a669-afc7-4d47-89cf-eea6875a2085.mp3" length="8161209" type="audio/mpeg"/>
      <guid isPermaLink="false">62193834-d1b4-4dd5-b8ab-2e8d03ec9288</guid>
      <itunes:duration>510</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 Sep 2023 14:30:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230926_120920_88f9d14f09a82cd7bc8e80e34fb22b7d.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1142285/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[How The Cybersecurity Market is Evolving]]></title>
      <itunes:title><![CDATA[How The Cybersecurity Market is Evolving]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the future of the industry. How is the market evolving? What will be the standout trends in the coming months or even years?Guest in this episode:Justin Beals - CEO &amp; Co-Founder at Strike Graph<a href="https://www.linkedin.com/in/jubeals/">https://www.linkedin.com/in/jubeals/</a>Follow the link below to watch/listen on your favourite platforms:<a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>#Lepide #datasecurity #CISOTalks #cyberchallenges #CISO #dataprotection #sensitivedata #cybersecuritypodcast #datasecuritypodcast #CISOadvice #cybersecuritysolutions #cyberattacks #cyberthreats #datacentricsecurity #securitystrategies #cisochallenges #cisoadvice #infosec #insiderthreats #cybersecurity #cybersecurity2023 #cybersecuritychallenges2023 #problemsincybersecurity #commonproblemsincybersecurity #datasecurity2023 #cybersecurityhelp]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1113478</link>
      <enclosure url="https://content.rss.com/episodes/207971/1113478/ciso-talks/2023_09_12_11_45_54_51f7f231-8d63-4b34-a119-07ac5ba7fefe.mp3" length="9917891" type="audio/mpeg"/>
      <guid isPermaLink="false">74727e0d-3d89-4dbd-a7eb-a0b96622ed29</guid>
      <itunes:duration>619</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Sep 2023 14:30:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230912_110949_0ee651d7282328b093c454d0b06ec9f7.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1113478/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Cybersecurity Audit Challenges in 2023]]></title>
      <itunes:title><![CDATA[Cybersecurity Audit Challenges in 2023]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the challenges that Audit companies face today in Cybersecurity. The importance of accurately identifying and communicating a business’s risk exposure has never been more critical. This is particularly true for audit and security managers who undertake cybersecurity audits. Guest in this episode: Justin Beals - CEO &amp; Co-Founder at Strike Graph <a href="https://www.linkedin.com/in/jubeals/">https://www.linkedin.com/in/jubeals/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1101036</link>
      <enclosure url="https://content.rss.com/episodes/207971/1101036/ciso-talks/2023_09_04_13_04_45_6f589bed-c2f5-4ff1-b6e8-c0046948e95b.mp3" length="10085075" type="audio/mpeg"/>
      <guid isPermaLink="false">3f07c9de-0cc8-4f89-99aa-fd0f69913175</guid>
      <itunes:duration>630</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 Sep 2023 14:30:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230904_010939_f6cdfe2a32071271a18d652c5972a92f.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1101036/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[How Can CISOs Solve Security Compliance Requirements Effectively?]]></title>
      <itunes:title><![CDATA[How Can CISOs Solve Security Compliance Requirements Effectively?]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we look at solving compliance issues in cybersecurity from a CISOs perspective. What are some potentially good strategies to solve these issues in the most effective way? Guest in this episode: Justin Beals - CEO &amp; Co-Founder at Strike Graph <a href="https://www.linkedin.com/in/jubeals/">https://www.linkedin.com/in/jubeals/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1095524</link>
      <enclosure url="https://content.rss.com/episodes/207971/1095524/ciso-talks/2023_08_30_11_33_52_2f987aee-3719-4389-b279-f6faf47bc26b.mp3" length="9833048" type="audio/mpeg"/>
      <guid isPermaLink="false">902a994f-21d6-4918-a9cb-e7f49dc9632e</guid>
      <itunes:duration>614</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 30 Aug 2023 14:30:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230830_110846_3026d96e1a8629e2c4db893a96cf42ec.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1095524/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[The Big Compliance Challenges in Cybersecurity]]></title>
      <itunes:title><![CDATA[The Big Compliance Challenges in Cybersecurity]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the big compliance challenges in Cybersecurity. What are they? How can we overcome these challenges as well as strategizing vigilance when it comes to future compliance changes. Guest in this episode: Justin Beals - CEO &amp; Co-Founder at Strike Graph <a href="https://www.linkedin.com/in/jubeals/">https://www.linkedin.com/in/jubeals/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1087208</link>
      <enclosure url="https://content.rss.com/episodes/207971/1087208/ciso-talks/2023_08_23_14_46_19_5331f7e0-d150-4e63-b314-ceb714d9d5a8.mp3" length="9740258" type="audio/mpeg"/>
      <guid isPermaLink="false">432420ef-673b-4889-8026-93abdccfc013</guid>
      <itunes:duration>608</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Aug 2023 14:51:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230823_020813_eea3e89bca5245a11f3c671a36fac008.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1087208/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[How To Successfully Identify & Prevent API Security Breaches]]></title>
      <itunes:title><![CDATA[How To Successfully Identify & Prevent API Security Breaches]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how organizations can quickly target and prevent API security breaches. What are some of the best practices in doing so? Guest in this episode: Pat Clawson - Chief Executive Officer at CheckRed <a href="https://www.linkedin.com/in/patclawson/">https://www.linkedin.com/in/patclawson/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1080885</link>
      <enclosure url="https://content.rss.com/episodes/207971/1080885/ciso-talks/2023_08_18_12_44_41_6567f7d2-d39a-41d0-956e-aca5fbdcf624.mp3" length="9856451" type="audio/mpeg"/>
      <guid isPermaLink="false">56f15ead-e1e7-428e-811b-d30b5d678221</guid>
      <itunes:duration>615</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 18 Aug 2023 12:48:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230818_120835_f160fc4fe1ad69491b8ab659a6da9c99.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1080885/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Building A Modern Revenue Engine in Cybersecurity]]></title>
      <itunes:title><![CDATA[Building A Modern Revenue Engine in Cybersecurity]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the building process of a revenue engine, especially for an early stage company. Where do you start? How do you scale the revenue engine? Guest in this episode: Pat Clawson - Chief Executive Officer at CheckRed <a href="https://www.linkedin.com/in/patclawson/">https://www.linkedin.com/in/patclawson/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1061597</link>
      <enclosure url="https://content.rss.com/episodes/207971/1061597/ciso-talks/2023_08_02_12_50_04_91c67fb1-670a-4a80-951f-ec8ecf4ac235.mp3" length="6456353" type="audio/mpeg"/>
      <guid isPermaLink="false">e9df0d6d-dbf2-4dd5-9196-5703c73a423d</guid>
      <itunes:duration>403</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Aug 2023 14:30:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230802_120800_f6c7699a2714685475ef10461a4aa3a6.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1061597/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[The Evolution of Cybersecurity Solutions & Threats]]></title>
      <itunes:title><![CDATA[The Evolution of Cybersecurity Solutions & Threats]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we delve into the past, comparing cybersecurity threats &amp; solutions with what we see today. How much has changed? How much is going to change moving forward? Guest in this episode: Pat Clawson - Chief Executive Officer at CheckRed <a href="https://www.linkedin.com/in/patclawson/">https://www.linkedin.com/in/patclawson/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1054067</link>
      <enclosure url="https://content.rss.com/episodes/207971/1054067/ciso-talks/2023_07_27_12_31_52_3edd9185-05ec-4b36-8694-d2e1aa1754d6.mp3" length="7918792" type="audio/mpeg"/>
      <guid isPermaLink="false">877d1fa7-933c-4db4-a5d9-15311e269f75</guid>
      <itunes:duration>494</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 27 Jul 2023 14:30:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230727_120747_63bff33a90ba914ac6aaeebd80b11a4d.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1054067/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[What Does the Future of Cloud Security Look Like? ]]></title>
      <itunes:title><![CDATA[What Does the Future of Cloud Security Look Like? ]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss what the future of cloud security may look like alongside API security. How much will it change in the next 2-3 years and what is most likely to change? Guest in this episode: Jeremy Snyder - Chief Executive Officer &amp; Founder at <a href="http://FireTail.io">FireTail.io</a> <a href="https://www.linkedin.com/in/jeremysnyder/">https://www.linkedin.com/in/jeremysnyder/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1044054</link>
      <enclosure url="https://content.rss.com/episodes/207971/1044054/ciso-talks/2023_07_19_12_35_19_e451c404-8152-4192-9398-6805f2d7a21d.mp3" length="8832033" type="audio/mpeg"/>
      <guid isPermaLink="false">df7d0cf7-520a-4c61-95f7-047faba60786</guid>
      <itunes:duration>551</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 19 Jul 2023 14:30:34 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230719_120712_afb12fd7b11be97b5ff7a7c3f82fde6e.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1044054/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Top 3 API Security Strategies in 2023]]></title>
      <itunes:title><![CDATA[Top 3 API Security Strategies in 2023]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the top 3 best and most common practices for API security in 2023 and how and why organizations need to understand their API sprawl. Guest in this episode: Jeremy Snyder - Chief Executive Officer &amp; Founder at <a href="http://FireTail.io">FireTail.io</a> <a href="https://www.linkedin.com/in/jeremysnyder/">https://www.linkedin.com/in/jeremysnyder/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1025371</link>
      <enclosure url="https://content.rss.com/episodes/207971/1025371/ciso-talks/2023_07_05_12_53_13_910fd7ce-6e2c-43d6-882e-a302c37fd12b.mp3" length="8007400" type="audio/mpeg"/>
      <guid isPermaLink="false">aafb54bb-7361-4bfd-bf7d-f09ac13bf057</guid>
      <itunes:duration>500</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 Jul 2023 14:30:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230705_120708_f5dce31ccf0b4ae6b528ff660aa3b17a.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1025371/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[API Security Best Practices And Where to Begin]]></title>
      <itunes:title><![CDATA[API Security Best Practices And Where to Begin]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks with talk about the vast landscape when it comes to API security. What are some of the best practices/strategies and where do you begin on your API security journey. Guest in this episode: Jeremy Snyder - Chief Executive Officer &amp; Founder at <a href="http://FireTail.io">FireTail.io</a> <a href="https://www.linkedin.com/in/jeremysnyder/">https://www.linkedin.com/in/jeremysnyder/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1016852</link>
      <enclosure url="https://content.rss.com/episodes/207971/1016852/ciso-talks/2023_06_28_14_02_12_21809b0c-6f14-4fee-a987-4ab8f7c8a90f.mp3" length="7344098" type="audio/mpeg"/>
      <guid isPermaLink="false">4deec690-2f36-4fcf-a791-1b1c2d5bd6b0</guid>
      <itunes:duration>458</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 28 Jun 2023 16:34:34 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230628_020607_09375029e89281c2621066413e49be70.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Biggest Cloud Security Changes in Cybersecurity]]></title>
      <itunes:title><![CDATA[The Biggest Cloud Security Changes in Cybersecurity]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss some of the major changes to cloud security especially post-pandemic. We talk about how these changes have altered the adoption rate of cloud security as well as organizations' approach to cloud security as a whole. Guest in this episode: Jeremy Snyder - Chief Executive Officer &amp; Founder at <a href="http://FireTail.io">FireTail.io</a> <a href="https://www.linkedin.com/in/jeremysnyder/">https://www.linkedin.com/in/jeremysnyder/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/1006402</link>
      <enclosure url="https://content.rss.com/episodes/207971/1006402/ciso-talks/2023_06_21_12_32_13_796e2854-1288-4e91-b7d1-6c62bf2b710b.mp3" length="10115586" type="audio/mpeg"/>
      <guid isPermaLink="false">033a07f8-a80a-45c6-940d-c014cf7c88bd</guid>
      <itunes:duration>632</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 21 Jun 2023 14:30:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230621_120607_f9b81d97526a78d345710c7d1a825017.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/1006402/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Organizations are Making This Big Mistake with their Cybersecurity]]></title>
      <itunes:title><![CDATA[Organizations are Making This Big Mistake with their Cybersecurity]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about a vital area in most organizations cybersecurity approach and why this is a pivotal mistake. Guest in this episode: Chris Lehman - Chief Executive Officer at SafeGuard Cyber <a href="https://www.linkedin.com/in/christopher-lehman-1a2a73/">https://www.linkedin.com/in/christopher-lehman-1a2a73/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/997374</link>
      <enclosure url="https://content.rss.com/episodes/207971/997374/ciso-talks/2023_06_14_12_02_48_3239437c-29bb-4298-9e23-ac587d8f4f5e.mp3" length="7279733" type="audio/mpeg"/>
      <guid isPermaLink="false">aa323639-3c7f-41cb-aa56-cd70e2204e00</guid>
      <itunes:duration>454</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 14 Jun 2023 14:30:29 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230614_120643_65471b76cd83c12e6e673b38ccef849a.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/997374/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[How Can CISOs Balance Human Interaction with a Secure Environment?]]></title>
      <itunes:title><![CDATA[How Can CISOs Balance Human Interaction with a Secure Environment?]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the issues that CISOs have with creating a secure environment whilst also promoting human interaction and employee choice of engagement. We talk personal devices, business owned devices and even touch on the impact of artificial intelligence such as the rise of ChatGPT. Guest in this episode: Chris Lehman - Chief Executive Officer at SafeGuard Cyber <a href="https://www.linkedin.com/in/christopher-lehman-1a2a73/">https://www.linkedin.com/in/christopher-lehman-1a2a73/</a> Follow the link below to watch/listen on your favourite platforms: <a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/974971</link>
      <enclosure url="https://content.rss.com/episodes/207971/974971/ciso-talks/2023_05_31_15_00_05_9ec6f3e8-4aea-4150-90d0-2477c2e980ce.mp3" length="5826907" type="audio/mpeg"/>
      <guid isPermaLink="false">2f765cb8-302b-4783-8c5f-7cab0a5bed0d</guid>
      <itunes:duration>364</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 31 May 2023 15:18:39 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230531_020559_cbb189a7729a418811a13face60d3e19.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/974971/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Business Communication Risk: What are the Big Challenges?]]></title>
      <itunes:title><![CDATA[Business Communication Risk: What are the Big Challenges?]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about some of the <strong>key challenges</strong> associated with <strong>business communication risk</strong>. What are the <strong>negative consequences</strong> of business communication risk, and how are the <strong>regulatory bodies</strong> affecting <strong>growth and digital transformation?</strong> How do<strong> automated compliance</strong> and<strong> contextual analysis</strong> change the game for making business communications <strong>secure and compliant?</strong><strong>Guest in this episode:</strong><strong>Chris Lehman - </strong>Chief Executive Officer at SafeGuard Cyber<a href="https://www.linkedin.com/in/christopher-lehman-1a2a73/">https://www.linkedin.com/in/christopher-lehman-1a2a73/</a><a href="https://linktr.ee/cisotalks"><strong>Follow the link below to watch/listen on your favourite platforms:</strong></a><a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/966216</link>
      <enclosure url="https://content.rss.com/episodes/207971/966216/ciso-talks/2023_05_24_16_19_46_a68110f0-d95b-4039-be4d-b8e8ff1bbaa0.mp3" length="9652905" type="audio/mpeg"/>
      <guid isPermaLink="false">b75e9479-e867-43ff-9647-9699907bfcb1</guid>
      <itunes:duration>603</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 May 2023 16:34:49 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230524_040538_668aa6f3a2ac2fa9ab82fc7d28f039dc.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/966216/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[3 Key Areas To Focus on to Improve Your Organization's Cybersecurity]]></title>
      <itunes:title><![CDATA[3 Key Areas To Focus on to Improve Your Organization's Cybersecurity]]></itunes:title>
      <description><![CDATA[<p>In this episode of CISO Talks, we discuss <strong>3 big strategic areas of a cybersecurity </strong>model that if focused on, can <strong>greatly improve </strong>your overall defence as well as <strong>increasing awareness</strong> within your organization by <strong>reduce human vulnerability</strong> to both outside and insider threats. </p><p><strong>Guest in this episode:</strong></p><p><strong>Taylor Hersom </strong>- Founder and CEO of Eden Data</p><p><a href="https://www.linkedin.com/in/taylorhersom/">https://</a><a href="http://www.linkedin.com/in/taylorhersom/">www.linkedin.com/in/taylorhersom/</a></p><p><a href="https://linktr.ee/cisotalks"><strong>Follow the link below to watch/listen on your favourite platforms:</strong></a></p><p><a href="https://linktr.ee/cisotalks">https://linktr.ee/cisotalks</a></p>]]></description>
      <link>https://rss.com/podcasts/ciso-talks/948888</link>
      <enclosure url="https://content.rss.com/episodes/207971/948888/ciso-talks/2023_05_12_14_42_28_bd679030-3e73-480c-ad89-a357b905c5ff.mp3" length="5267259" type="audio/mpeg"/>
      <guid isPermaLink="false">f1c32f34-a292-4576-a147-52741169d164</guid>
      <itunes:duration>329</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 12 May 2023 14:43:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/ep_cover_20230512_020524_b04c7496804008bdb320e73f18e76f4b.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/207971/948888/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[Human Vulnerability - How to Counter its Impact on Cybersecurity]]></title>
      <itunes:title><![CDATA[Human Vulnerability - How to Counter its Impact on Cybersecurity]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we take a deep dive into human vulnerability within cybersecurity. How large and complex is the impact it has had on the industry? Is there a strategy to permanently solve this issues associated?

Guest in this episode: 
Taylor Hersom - Founder and CEO of Eden Data
https://www.linkedin.com/in/taylorhersom/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942679</link>
      <enclosure url="https://content.rss.com/episodes/207971/942679/ciso-talks/asset_e1f5afefe6a47ba579c7e66c4a7c7121.mp3" length="9205968" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1507216600</guid>
      <itunes:duration>575</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 05 May 2023 14:08:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e1f5afefe6a47ba579c7e66c4a7c7121.jpg"/>
    </item>
    <item>
      <title><![CDATA[Human Vulnerability - Deep look into the impact of Human Vulnerabilities on Cybersecurity]]></title>
      <itunes:title><![CDATA[Human Vulnerability - Deep look into the impact of Human Vulnerabilities on Cybersecurity]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the impact of automation and how that is interchanging with the issues of human vulnerability within the cybersecurity space. Could automation help mitigate human vulnerability? Or is it simply too complex a task? 

Guest in this episode: 
Taylor Hersom - Founder and CEO of Eden Data
https://www.linkedin.com/in/taylorhersom/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942680</link>
      <enclosure url="https://content.rss.com/episodes/207971/942680/ciso-talks/asset_d2a33febdb071daa259fe8190bd0ed26.mp3" length="7883127" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1497757780</guid>
      <itunes:duration>492</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 21 Apr 2023 18:50:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_d2a33febdb071daa259fe8190bd0ed26.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Big Challenges CISOs Face in 2023 | CISO Talks]]></title>
      <itunes:title><![CDATA[The Big Challenges CISOs Face in 2023 | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we look at the challenges in which CISOs are facing this year. How can CISOs effectively integrate their strategies to adhere to environments that are evolving faster than ever before? We also look at what the future of the role may look like and how that will have an effect on existing challenges and what new ones may arise. 

Guest in this episode: 
Amit Modi - Chief Technology Officer, CISO at Movius
https://www.linkedin.com/in/amit-modi-5b1644/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942681</link>
      <enclosure url="https://content.rss.com/episodes/207971/942681/ciso-talks/asset_2bc41d048aadd1609f1f0e3744120499.mp3" length="8184057" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1492577671</guid>
      <itunes:duration>511</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 14 Apr 2023 16:28:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_2bc41d048aadd1609f1f0e3744120499.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Pandemic's Lasting Effects on Cybersecurity: How Much Has Changed? | CISO Talks]]></title>
      <itunes:title><![CDATA[The Pandemic's Lasting Effects on Cybersecurity: How Much Has Changed? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the overall changes that have happened rapidly since the global pandemic. How much has actually changed and how are organizations doing in regards to mitigating the myriad of cyber threats emerging post Covid-19. 

Guest in this episode: 
Amit Modi - Chief Technology Officer, CISO at Movius
https://www.linkedin.com/in/amit-modi-5b1644/

Also available on:
IGTV: http://www.instagram.com/instalepide
SoundCloud: http://bit.ly/2MYHwxR
Spotify: http://spoti.fi/2N0XGXR
iTunes: http://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue

#Lepide #datasecurity #CISOTalks #cyberchallenges #CISO #dataprotection #sensitivedata #cybersecuritypodcast #datasecuritypodcast #CISOadvice #cybersecuritysolutions #cyberattacks #cyberthreats #datacentricsecurity #securitystrategies #cisochallenges #cisoadvice #infosec #insiderthreats #cybersecurity #cybersecurity2021 #cybersecuritychallenges2021 #problemsincybersecurity #commonproblemsincybersecurity #datasecurity2022 #cybersecurityhelp]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942682</link>
      <enclosure url="https://content.rss.com/episodes/207971/942682/ciso-talks/asset_6ee2e9e6629982cf1e1da7a0dca2fdf4.mp3" length="4793990" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1482032233</guid>
      <itunes:duration>299</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 31 Mar 2023 15:44:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6ee2e9e6629982cf1e1da7a0dca2fdf4.jpg"/>
    </item>
    <item>
      <title><![CDATA[CISO Explains Why the Disconnect Between CISOs & the Business is Increasing | CISO Talks]]></title>
      <itunes:title><![CDATA[CISO Explains Why the Disconnect Between CISOs & the Business is Increasing | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how the CISO role is become less aligned with the business in terms of their interests. There has always been conflict, but why is the disconnect getting worse?

Guest in this episode: 
Amit Modi - Chief Technology Officer, CISO at Movius
https://www.linkedin.com/in/amit-modi-5b1644/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942683</link>
      <enclosure url="https://content.rss.com/episodes/207971/942683/ciso-talks/asset_5a88285c21227267070fd2bd60f38952.mp3" length="4079280" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1476689743</guid>
      <itunes:duration>254</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 24 Mar 2023 17:01:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_5a88285c21227267070fd2bd60f38952.jpg"/>
    </item>
    <item>
      <title><![CDATA[Cyber Recovery and Disaster Recovery Strategies | CISO Talks]]></title>
      <itunes:title><![CDATA[Cyber Recovery and Disaster Recovery Strategies | CISO Talks]]></itunes:title>
      <description><![CDATA[Disaster recovery and cybersecurity are two of the most important objectives for any organization. In disaster recovery, you have what is arguably the most important aspect of business continuity.

Some experts might recommend planning cybersecurity and disaster recovery initiatives independent of one another. After all, they're two entirely different strategies managed by different teams within your organization. However, there is enough correlation to make one activity critical to the overall effectiveness of the other. When all else fails and there seems to be no stopping that crippling attack, your DR plan could be the answer to restoring your data and system to a secure state as the last line of defence!

Guest in this episode: 
W. Curtis Preston - "Mr. Backup" & Chief Technical Evangelist at Druva
https://www.linkedin.com/in/mrbackup/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942684</link>
      <enclosure url="https://content.rss.com/episodes/207971/942684/ciso-talks/asset_6094a3528de8217dfe1c208cedff48cc.mp3" length="10326098" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1465996333</guid>
      <itunes:duration>645</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 10 Mar 2023 15:34:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6094a3528de8217dfe1c208cedff48cc.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is it Impossible to Secure an On-Premise Backup System? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is it Impossible to Secure an On-Premise Backup System? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we explore the idea of securing your on-premise cloud backup solution. Is it possible at all? What are some of the potential avenues in which we can venture through in order to make this somewhat possible? 

Guest in this episode: 
W. Curtis Preston - "Mr. Backup" & Chief Technical Evangelist at Druva
https://www.linkedin.com/in/mrbackup/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942685</link>
      <enclosure url="https://content.rss.com/episodes/207971/942685/ciso-talks/asset_f9e18fe0adf8a2d32b67763c98d96db6.mp3" length="6235950" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1460475541</guid>
      <itunes:duration>389</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 03 Mar 2023 15:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_f9e18fe0adf8a2d32b67763c98d96db6.jpg"/>
    </item>
    <item>
      <title><![CDATA[How Can Backups Be Secured Against Cyber Attacks? | CISO Talks]]></title>
      <itunes:title><![CDATA[How Can Backups Be Secured Against Cyber Attacks? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the mitigation process for securing backups. What is the most efficient yet effective way to secure your backups? Can they actually be fully secured? Find out here, on CISO Talks. 

Guest in this episode: 
W. Curtis Preston - "Mr. Backup" & Chief Technical Evangelist at Druva
https://www.linkedin.com/in/mrbackup/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942686</link>
      <enclosure url="https://content.rss.com/episodes/207971/942686/ciso-talks/asset_4957695fc5e72755ab4eb29f9a52e52e.mp3" length="10626193" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1449323161</guid>
      <itunes:duration>664</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 24 Feb 2023 15:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_4957695fc5e72755ab4eb29f9a52e52e.jpg"/>
    </item>
    <item>
      <title><![CDATA[Are Backups Vulnerable To Cyber Attacks? | CISO Talks]]></title>
      <itunes:title><![CDATA[Are Backups Vulnerable To Cyber Attacks? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we explore the vulnerability of backups. Are they truly at risk? If so, why? How can we mitigate said risks?

Guest in this episode: 
W. Curtis Preston - "Mr. Backup" & Chief Technical Evangelist at Druva
https://www.linkedin.com/in/mrbackup/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942687</link>
      <enclosure url="https://content.rss.com/episodes/207971/942687/ciso-talks/asset_9a4bb365ab82a3cd0bfd795d525a8dbb.mp3" length="9869269" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1449293632</guid>
      <itunes:duration>616</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 17 Feb 2023 16:51:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_9a4bb365ab82a3cd0bfd795d525a8dbb.jpg"/>
    </item>
    <item>
      <title><![CDATA[Navigating Risk When Adopting MTTP Solutions | CISO Talks]]></title>
      <itunes:title><![CDATA[Navigating Risk When Adopting MTTP Solutions | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how you can reduce your MTTR with federated risk management. What are the hurdles for enterprises to adopt this solution?

Guest in this episode: 
Fausto Lendeborg - | Co-Founder & CCO at Secberus | CSA Advisory member, CxO Trust Council
https://www.linkedin.com/in/faustolendeborg/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942688</link>
      <enclosure url="https://content.rss.com/episodes/207971/942688/ciso-talks/asset_03342329c04bc3a25094c6e6176d4aa7.mp3" length="4470908" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1444042567</guid>
      <itunes:duration>279</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 10 Feb 2023 15:30:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_03342329c04bc3a25094c6e6176d4aa7.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is the Elimination of Alert Fatigue Really Possible? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is the Elimination of Alert Fatigue Really Possible? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the idea of eliminating alert fatigue. We discuss how we can reduce the chances of missing important alerts/slowed response times whilst also minimalizing fatigue and burnout. 

Guest in this episode: 
Fausto Lendeborg - | Co-Founder & CCO at Secberus | CSA Advisory member, CxO Trust Council
https://www.linkedin.com/in/faustolendeborg/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942689</link>
      <enclosure url="https://content.rss.com/episodes/207971/942689/ciso-talks/asset_6af91e0830e037581e2ded6ca27870e9.mp3" length="6486307" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1439092978</guid>
      <itunes:duration>405</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 03 Feb 2023 15:57:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6af91e0830e037581e2ded6ca27870e9.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Do Enterprises Need A Cloud Governance Solution? | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Do Enterprises Need A Cloud Governance Solution? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss cloud governance solutions. Why do enterprises need one? What does that mean and what does it
add to the plethora of tools and solutions on the market today?

Guest in this episode: 
Fausto Lendeborg - Global CISO | Co-Founder & CCO at Secberus | CSA Advisory member, CxO Trust Council
https://www.linkedin.com/in/faustolendeborg/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942690</link>
      <enclosure url="https://content.rss.com/episodes/207971/942690/ciso-talks/asset_f681c02c148ada7b039a196def309dce.mp3" length="8119274" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1432153450</guid>
      <itunes:duration>507</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 27 Jan 2023 15:30:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_f681c02c148ada7b039a196def309dce.jpg"/>
    </item>
    <item>
      <title><![CDATA[Advice for CISOs & Aspiring CISOs Ft. Gary Hayslip | CISO Talks]]></title>
      <itunes:title><![CDATA[Advice for CISOs & Aspiring CISOs Ft. Gary Hayslip | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, Gary discusses CISO strategies in parallel with tenures and how the evolving climate has been affecting the averages and strategies as a whole. Whether you are a well established CISO or an aspiring CISO, this discussion will hopefully be of interest to you. 

Guest in this episode: 
Gary Hayslip - Global CISO | Board Member | Investor | Mentor | Servant Leader
https://www.linkedin.com/in/ghayslip/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942691</link>
      <enclosure url="https://content.rss.com/episodes/207971/942691/ciso-talks/asset_91bc1b94e15e07a2c8e244a70a6b204d.mp3" length="10224534" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1428666277</guid>
      <itunes:duration>639</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 20 Jan 2023 14:57:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_91bc1b94e15e07a2c8e244a70a6b204d.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Growing Complexity of the CISO Role Ft. Gary Hayslip | CISO Talks]]></title>
      <itunes:title><![CDATA[The Growing Complexity of the CISO Role Ft. Gary Hayslip | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the growing complexities of the CISO role over time. What is becoming more complex and how are CISOs coping/adapting with these changes. We also touch on the mentoring aspects for CISOs and how mentors need to adapt to stay parallel with the evolving role of the CISO. 

Guest in this episode: 
Gary Hayslip - Global CISO | Board Member | Investor | Mentor | Servant Leader
https://www.linkedin.com/in/ghayslip/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942692</link>
      <enclosure url="https://content.rss.com/episodes/207971/942692/ciso-talks/asset_ac956977a948681a4818eaefa7ae0473.mp3" length="10865683" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1423125865</guid>
      <itunes:duration>679</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 13 Jan 2023 15:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_ac956977a948681a4818eaefa7ae0473.jpg"/>
    </item>
    <item>
      <title><![CDATA[How The CISO Role is Changing Ft. Gary Hayslip | CISO Talks]]></title>
      <itunes:title><![CDATA[How The CISO Role is Changing Ft. Gary Hayslip | CISO Talks]]></itunes:title>
      <description><![CDATA[In this very special episode of CISO Talks, we sit down with global CISO, Gary Hayslip. We discuss the ever changing role of the CISO and what some of the biggest changes and challenges CISOs are faced with today. 

Guest in this episode: 
Gary Hayslip - Global CISO | Board Member | Investor | Mentor | Servant Leader
https://www.linkedin.com/in/ghayslip/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942693</link>
      <enclosure url="https://content.rss.com/episodes/207971/942693/ciso-talks/asset_dafe7b36774ab708666fd503e414bbe9.mp3" length="10088279" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1417975759</guid>
      <itunes:duration>630</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 06 Jan 2023 14:18:34 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_dafe7b36774ab708666fd503e414bbe9.jpg"/>
    </item>
    <item>
      <title><![CDATA[Implementing Zero Trust in Stages - Streamlining the Process | CISO Talks]]></title>
      <itunes:title><![CDATA[Implementing Zero Trust in Stages - Streamlining the Process | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the implementation process of zero trust strategies. What are the stages of implementation? We also talk about how many organizations already have some pieces in place, they just need to tie them together. 

Guest in this episode: 
Matt Graves - VP @ MajorKey Technologies
https://www.linkedin.com/in/mattlgraves/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942694</link>
      <enclosure url="https://content.rss.com/episodes/207971/942694/ciso-talks/asset_4e819f8c64edcab3fa4d9462dce42a36.mp3" length="9774392" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1401111595</guid>
      <itunes:duration>610</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 12 Dec 2022 15:30:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_4e819f8c64edcab3fa4d9462dce42a36.jpg"/>
    </item>
    <item>
      <title><![CDATA[Building An Effective Zero Trust Program | CISO Talks]]></title>
      <itunes:title><![CDATA[Building An Effective Zero Trust Program | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss ways in which organizations can strategize and build effective zero trust solutions from the ground up to maximize their cybersecurity.

Guest in this episode: 
Matt Graves - VP @ MajorKey Technologies
https://www.linkedin.com/in/mattlgraves/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942695</link>
      <enclosure url="https://content.rss.com/episodes/207971/942695/ciso-talks/asset_09c943402e88828eee3ae9ac521bbda7.mp3" length="8902947" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1394790325</guid>
      <itunes:duration>556</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 02 Dec 2022 15:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_09c943402e88828eee3ae9ac521bbda7.jpg"/>
    </item>
    <item>
      <title><![CDATA[Thinking About Zero Trust as a Program and Not Individual Projects | CISO Talks]]></title>
      <itunes:title><![CDATA[Thinking About Zero Trust as a Program and Not Individual Projects | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss Zero trust strategies. We talk about the benefits of treating zero trust as a program instead of individual projects. 

Guest in this episode: 
Matt Graves - VP @ MajorKey Technologies
https://www.linkedin.com/in/mattlgraves/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942696</link>
      <enclosure url="https://content.rss.com/episodes/207971/942696/ciso-talks/asset_1abb1c7053a3d9ad9cbcc1efb1ab1c7f.mp3" length="9463430" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1390327507</guid>
      <itunes:duration>591</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 25 Nov 2022 14:00:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_1abb1c7053a3d9ad9cbcc1efb1ab1c7f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Biggest Risk Factors For CISOs Today | CISO Talks]]></title>
      <itunes:title><![CDATA[The Biggest Risk Factors For CISOs Today | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss risk factors in the cybersecurity industry today. IT Helpdesks and Customer Support call centres are your biggest risk factor. Your CS reps are not identity detectives and asking them to be is an unrealistic expectation that leaves the door open to fraud and impersonation.

Is there a better solution? What’s working and what’s not?

Guest in this episode: 
Aaron Painter - CEO @ Nametag
https://www.linkedin.com/in/aaronpainter/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942697</link>
      <enclosure url="https://content.rss.com/episodes/207971/942697/ciso-talks/asset_2ced68e5dfa4e386d18413ad1dfd4cca.mp3" length="5795003" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1380964210</guid>
      <itunes:duration>362</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 11 Nov 2022 15:22:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_2ced68e5dfa4e386d18413ad1dfd4cca.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Benefits of Getting Both Convenience & Cybersecurity Right | CISO Talks]]></title>
      <itunes:title><![CDATA[The Benefits of Getting Both Convenience & Cybersecurity Right | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss what is the holy grail in the cybersecurity space. Making your security not only A) secure but to also be convenient. Why is this so hard to achieve? How can we achieve such synergy? 

Guest in this episode: 
Aaron Painter - CEO @ Nametag
https://www.linkedin.com/in/aaronpainter/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942698</link>
      <enclosure url="https://content.rss.com/episodes/207971/942698/ciso-talks/asset_4be46a54f5009c8d4b5ef4d07a7a0cb0.mp3" length="5261269" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1371183040</guid>
      <itunes:duration>328</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 28 Oct 2022 14:30:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_4be46a54f5009c8d4b5ef4d07a7a0cb0.jpg"/>
    </item>
    <item>
      <title><![CDATA[What is Wrong With the Way People Access Online Accounts Today? | CISO Talks]]></title>
      <itunes:title><![CDATA[What is Wrong With the Way People Access Online Accounts Today? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the problems with accessing user accounts. How can we make it more secure, but also more convenient for users? The struggle to find the correct balance is currently still an ongoing issue in cybersecurity. What is the best solution for this? 

Guest in this episode: 
Aaron Painter - CEO @ Nametag
https://www.linkedin.com/in/aaronpainter/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942699</link>
      <enclosure url="https://content.rss.com/episodes/207971/942699/ciso-talks/asset_edffed6766f33b6617f42e7d74646b33.mp3" length="6468753" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1366687588</guid>
      <itunes:duration>404</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 21 Oct 2022 14:30:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_edffed6766f33b6617f42e7d74646b33.jpg"/>
    </item>
    <item>
      <title><![CDATA[User Journeys Explained and How to Implement This Strategy | CISO Talks]]></title>
      <itunes:title><![CDATA[User Journeys Explained and How to Implement This Strategy | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss user journeys. What are they? How can they help your business and to better shape your cybersecurity strategies. 

Guest in this episode: 
Doron Hendler - CEO and Co-Founder @ RevealSecurity
https://www.linkedin.com/in/doron-hendler-63135/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942700</link>
      <enclosure url="https://content.rss.com/episodes/207971/942700/ciso-talks/asset_0e3d156246522b6705c1b768c5823f26.mp3" length="5906180" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1354280470</guid>
      <itunes:duration>369</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 30 Sep 2022 13:35:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_0e3d156246522b6705c1b768c5823f26.jpg"/>
    </item>
    <item>
      <title><![CDATA[Identifying and Mitigating Application Level Threats in Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Identifying and Mitigating Application Level Threats in Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the process of identifying and mitigating application level security threats. What is the process like, how can it be made easier and what are we doing wrong as a whole? 

Guest in this episode: 
Doron Hendler - CEO and Co-Founder @ RevealSecurity
https://www.linkedin.com/in/doron-hendler-63135/

Also available on:
IGTV: http://www.instagram.com/instalepide
SoundCloud: http://bit.ly/2MYHwxR
Spotify: http://spoti.fi/2N0XGXR
iTunes: http://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942701</link>
      <enclosure url="https://content.rss.com/episodes/207971/942701/ciso-talks/asset_a274a84bca2ac924a0ab5327665e6144.mp3" length="6691525" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1349589892</guid>
      <itunes:duration>418</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 23 Sep 2022 13:19:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_a274a84bca2ac924a0ab5327665e6144.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why is There a Huge Gap in the Market for Application Security? | CISO Talks]]></title>
      <itunes:title><![CDATA[Why is There a Huge Gap in the Market for Application Security? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about application security and why there is such a huge void in the market for this kind of technology.

Guest in this episode: 
Doron Hendler - CEO and Co-Founder @ RevealSecurity
https://www.linkedin.com/in/doron-hendler-63135/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942702</link>
      <enclosure url="https://content.rss.com/episodes/207971/942702/ciso-talks/asset_d11e4316c50bc367bba2757ac34286ff.mp3" length="7712599" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1345056883</guid>
      <itunes:duration>482</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 16 Sep 2022 12:48:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_d11e4316c50bc367bba2757ac34286ff.jpg"/>
    </item>
    <item>
      <title><![CDATA[How Will Cybersecurity of the Near Future Differ in Approach | CISO Talks]]></title>
      <itunes:title><![CDATA[How Will Cybersecurity of the Near Future Differ in Approach | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we focus on the future of cybersecurity. How will organizations differ their approach to current strategies? How can YOU get ahead of the curve? Find out here, on CISO Talks. 

Guest in this episode: 
Nick Lumsden - Co-Founder & CTO @ Tenacity
https://www.linkedin.com/in/nicklumsden/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942703</link>
      <enclosure url="https://content.rss.com/episodes/207971/942703/ciso-talks/asset_e8fb66df592eb0dd91c3f678b7a9864a.mp3" length="4590026" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1340796961</guid>
      <itunes:duration>286</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 09 Sep 2022 15:22:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e8fb66df592eb0dd91c3f678b7a9864a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Same Problems STILL Exist in Cybersecurity - What Needs to Change? | CISO Talks]]></title>
      <itunes:title><![CDATA[The Same Problems STILL Exist in Cybersecurity - What Needs to Change? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the fact that the same problems have existed in cybersecurity for decades. How can we begin to make a shift to not keep solving the same problems anymore. 

Guest in this episode: 
Nick Lumsden - Co-Founder & CTO @ Tenacity
https://www.linkedin.com/in/nicklumsden/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942704</link>
      <enclosure url="https://content.rss.com/episodes/207971/942704/ciso-talks/asset_d7d8daf542cb6f7ea35e97fe2019a279.mp3" length="6725380" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1334922529</guid>
      <itunes:duration>420</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 31 Aug 2022 14:30:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_d7d8daf542cb6f7ea35e97fe2019a279.jpg"/>
    </item>
    <item>
      <title><![CDATA[Detection and Response: Have We Given up on Protection? | CISO Talks]]></title>
      <itunes:title><![CDATA[Detection and Response: Have We Given up on Protection? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss why there is such a huge focus on detection and response in cybersecurity however there is a large percentage that suggests that we are neglecting the protection aspects of security our data. 

Guest in this episode: 
Nick Lumsden - Co-Founder & CTO @ Tenacity
https://www.linkedin.com/in/nicklumsden/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942705</link>
      <enclosure url="https://content.rss.com/episodes/207971/942705/ciso-talks/asset_7c95638373905f14444041ae7257bb90.mp3" length="6725380" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1330377418</guid>
      <itunes:duration>420</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Aug 2022 14:30:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_7c95638373905f14444041ae7257bb90.jpg"/>
    </item>
    <item>
      <title><![CDATA[How Do Early Stage Organizations Get Started On The Right Path With Cybersecurity? | CISO Talks]]></title>
      <itunes:title><![CDATA[How Do Early Stage Organizations Get Started On The Right Path With Cybersecurity? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how early stage organizations can get started on the right path with their cybersecurity. Obviously there are funding challenges, different product priorities, a focus on product market fit over building a secure solution. But we talk about how these organizations can help structure their approach to prioritize the solution, first. 

Guest in this episode: 
Nick Lumsden - Co-Founder & CTO @ Tenacity
https://www.linkedin.com/in/nicklumsden/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942706</link>
      <enclosure url="https://content.rss.com/episodes/207971/942706/ciso-talks/asset_74b2edc206ac255f0fc6c7e688eb20bf.mp3" length="8541830" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1322138659</guid>
      <itunes:duration>533</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 11 Aug 2022 14:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_74b2edc206ac255f0fc6c7e688eb20bf.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why is Foundational Cybersecurity So hard to Get Right? | CISO Talks]]></title>
      <itunes:title><![CDATA[Why is Foundational Cybersecurity So hard to Get Right? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about foundational security. Why do most organizations struggle to get this fundamental approach to cybersecurity? We see breaches and attacks all over the news everyday. 

Guest in this episode: 
Nick Lumsden - Co-Founder & CTO @ Tenacity
https://www.linkedin.com/in/nicklumsden/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942707</link>
      <enclosure url="https://content.rss.com/episodes/207971/942707/ciso-talks/asset_770c899688f0594c1f1e9046591ed200.mp3" length="7840913" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1317187336</guid>
      <itunes:duration>490</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 03 Aug 2022 14:11:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_770c899688f0594c1f1e9046591ed200.jpg"/>
    </item>
    <item>
      <title><![CDATA[Are We Overcomplicating Things When Choosing a Cybersecurity Solution? | CISO Talks]]></title>
      <itunes:title><![CDATA[Are We Overcomplicating Things When Choosing a Cybersecurity Solution? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss whether finding a cybersecurity solution is a business problem or an I.T. problem. We then move on to debating whether organizations overcomplicate their search for a solution as there are a multitude of different solutions for different aspects of security. How can this be improved from a vendor level and a business level. 

Guest in this episode: 
Javier Diaz Evans - Chief Revenue Officer @ A3Sec
https://www.linkedin.com/in/javier-diaz-evans-2945272a/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942708</link>
      <enclosure url="https://content.rss.com/episodes/207971/942708/ciso-talks/asset_e13feadc12d70e8fc54743efa0fd2c27.mp3" length="5263777" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1312781179</guid>
      <itunes:duration>328</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 Jul 2022 14:16:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e13feadc12d70e8fc54743efa0fd2c27.jpg"/>
    </item>
    <item>
      <title><![CDATA[Biggest Common Cybersecurity Risks for Organizations | CISO Talks]]></title>
      <itunes:title><![CDATA[Biggest Common Cybersecurity Risks for Organizations | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the most common cybersecurity risks for organizations and how locate key areas to efficiently protect. 

Guest in this episode: 
Javier Diaz Evans - Chief Revenue Officer @ A3Sec
https://www.linkedin.com/in/javier-diaz-evans-2945272a/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942709</link>
      <enclosure url="https://content.rss.com/episodes/207971/942709/ciso-talks/asset_226d65857aa13fa177ca238b860153d6.mp3" length="6246817" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1307972287</guid>
      <itunes:duration>390</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 19 Jul 2022 15:08:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_226d65857aa13fa177ca238b860153d6.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Zero Trust is Impossible to Implement | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Zero Trust is Impossible to Implement | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss zero trust and how it is impossible to implement across all organizations. We also talk more about cybersecurity models. But this time, we delve into the process of deciding which threats to prioritize when building said model and how to effectively locate and strategize the most appropriate plan of action.

Guest in this episode: 
Javier Diaz Evans - Chief Revenue Officer @ A3Sec
https://www.linkedin.com/in/javier-diaz-evans-2945272a/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942710</link>
      <enclosure url="https://content.rss.com/episodes/207971/942710/ciso-talks/asset_880385f94c01a9743d0459b3d8509090.mp3" length="8531799" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1295868946</guid>
      <itunes:duration>533</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 29 Jun 2022 14:30:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_880385f94c01a9743d0459b3d8509090.jpg"/>
    </item>
    <item>
      <title><![CDATA[Common Cybersecurity Models and the Challenges Involved | CISO Talks]]></title>
      <itunes:title><![CDATA[Common Cybersecurity Models and the Challenges Involved | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss in depth about cybersecurity models. What are the challenges associated with the evolution threat landscape when designing your cybersecurity model? 

Market researchers, such as Gartner and Forrester are defining new models as Security Adaptive and Zero Trust. Should those options be considered to be implemented in every organization?

Guest in this episode: 
Javier Diaz Evans - Chief Revenue Officer @ A3Sec
https://www.linkedin.com/in/javier-diaz-evans-2945272a/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942711</link>
      <enclosure url="https://content.rss.com/episodes/207971/942711/ciso-talks/asset_c5e5fc771bce1815cdb059b90b7f7692.mp3" length="7651159" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1288060315</guid>
      <itunes:duration>478</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 Jun 2022 16:44:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c5e5fc771bce1815cdb059b90b7f7692.jpg"/>
    </item>
    <item>
      <title><![CDATA[How to Ensure Security During Cloud Migration | CISO Talks]]></title>
      <itunes:title><![CDATA[How to Ensure Security During Cloud Migration | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss that even though many organizations are near enough ready to move to the cloud, there is much apprehension and worry associated with the risks in doing so. How can you put your mind at ease and feel safe when moving to the cloud? Find out here, on CISO Talks. 

Guest in this episode: 
Varun Vij - Regional Infosec Lead @ Serco
https://www.linkedin.com/in/varun-vij-cism-cissp/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942712</link>
      <enclosure url="https://content.rss.com/episodes/207971/942712/ciso-talks/asset_6192327970259781bfda148432f49b7d.mp3" length="2801161" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1284858409</guid>
      <itunes:duration>175</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 10 Jun 2022 11:33:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6192327970259781bfda148432f49b7d.jpg"/>
    </item>
    <item>
      <title><![CDATA[Implementing an Effective Cloud Security Strategy | CISO Talks]]></title>
      <itunes:title><![CDATA[Implementing an Effective Cloud Security Strategy | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, instead of focusing on the obvious reasons as to why adopting cloud security is the best thing for the future - we focus on how you can implement an effective cloud security program within your organization to better prepare for the future. 

Guest in this episode: 
Varun Vij - Regional Infosec Lead @ Serco
https://www.linkedin.com/in/varun-vij-cism-cissp/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942713</link>
      <enclosure url="https://content.rss.com/episodes/207971/942713/ciso-talks/asset_b35f00139ea15dda7ac826ec29f8d6f8.mp3" length="5122924" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1278857188</guid>
      <itunes:duration>320</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 01 Jun 2022 14:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_b35f00139ea15dda7ac826ec29f8d6f8.jpg"/>
    </item>
    <item>
      <title><![CDATA[Top Cybersecurity Design Principles | CISO Talks]]></title>
      <itunes:title><![CDATA[Top Cybersecurity Design Principles | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss in depth the order in which you should layer your cybersecurity strategy. How can you maximize your cybersecurity and how to make these changes effectively.

Guest in this episode: 
Varun Vij - Regional Infosec Lead @ Serco
https://www.linkedin.com/in/varun-vij-cism-cissp/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942714</link>
      <enclosure url="https://content.rss.com/episodes/207971/942714/ciso-talks/asset_e10487cc7d711e1933dafbdc3398db4b.mp3" length="4992939" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1275629749</guid>
      <itunes:duration>312</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 May 2022 14:26:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e10487cc7d711e1933dafbdc3398db4b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Red Teaming Will Improve Your Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Red Teaming Will Improve Your Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss a very hot topic at the moment in red teaming. What is red teaming? Why should you utilise this approach and how can it help improve your data protection? Find out here, on CISO Talks.

Guest in this episode: 
Varun Vij - Regional Infosec Lead @ Serco
https://www.linkedin.com/in/varun-vij-cism-cissp/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942715</link>
      <enclosure url="https://content.rss.com/episodes/207971/942715/ciso-talks/asset_cf60b44c3c12557aabb9330c6807abd4.mp3" length="7039685" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1271206786</guid>
      <itunes:duration>439</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 May 2022 10:18:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_cf60b44c3c12557aabb9330c6807abd4.jpg"/>
    </item>
    <item>
      <title><![CDATA[Fantastic Cybersecurity Academies and Where to Find Them | CISO Talks]]></title>
      <itunes:title><![CDATA[Fantastic Cybersecurity Academies and Where to Find Them | CISO Talks]]></itunes:title>
      <description><![CDATA[Training people from a young age about cybersecurity can really help build the future of the industry. In this episode, we discuss why cybersecurity academies are imperative for the future of cybersecurity and how you can get involved with these institutes. 

Guest in this episode: 
Delisha Hodo - Senior Student Advisor at SANS.edu
https://www.linkedin.com/in/delishahodo/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942716</link>
      <enclosure url="https://content.rss.com/episodes/207971/942716/ciso-talks/asset_c976748498cea81457a662c04370cf7e.mp3" length="2132426" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1261549048</guid>
      <itunes:duration>133</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 May 2022 14:30:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c976748498cea81457a662c04370cf7e.jpg"/>
    </item>
    <item>
      <title><![CDATA[How Can We Bring More Diversity into Cybersecurity? | CISO Talks]]></title>
      <itunes:title><![CDATA[How Can We Bring More Diversity into Cybersecurity? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about the ongoing issue of diversity n cybersecurity. Although it has improved in recent years, it still isn't where it should be. We discuss current strategies and movements in place to improve diversity in cybersecurity.

Guest in this episode: 
Delisha Hodo - Senior Student Advisor at SANS.edu
https://www.linkedin.com/in/delishahodo/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942717</link>
      <enclosure url="https://content.rss.com/episodes/207971/942717/ciso-talks/asset_faa4b0cae16dae1956b8376d993f699a.mp3" length="3495391" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1261548370</guid>
      <itunes:duration>218</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 04 May 2022 14:30:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_faa4b0cae16dae1956b8376d993f699a.jpg"/>
    </item>
    <item>
      <title><![CDATA[Pushing For Diversity in Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Pushing For Diversity in Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we are joined by the wonderful Delisha Hodo as she talks us through the amazing services she offers to really push for more diversity within the cybersecurity industry. 

Guest in this episode: 
Delisha Hodo - Senior Student Advisor at SANS.edu
https://www.linkedin.com/in/delishahodo/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942718</link>
      <enclosure url="https://content.rss.com/episodes/207971/942718/ciso-talks/asset_5831d903d717d308f126a2d397893876.mp3" length="3201148" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1253717560</guid>
      <itunes:duration>200</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Apr 2022 15:43:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_5831d903d717d308f126a2d397893876.jpg"/>
    </item>
    <item>
      <title><![CDATA[What Does the Future of Serverless Security Look Like? | CISO Talks]]></title>
      <itunes:title><![CDATA[What Does the Future of Serverless Security Look Like? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the reasons as to why serverless security will be standardized and what a serverless future would look like for organizations across the globe. 

Guest in this episode: 
Jeff Williams - Co-Founder and CTO at Contrast - DevSecOps
https://www.linkedin.com/in/planetlevel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942719</link>
      <enclosure url="https://content.rss.com/episodes/207971/942719/ciso-talks/asset_7816ca074e43744eb3c304984f9a5e20.mp3" length="7275414" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1249443679</guid>
      <itunes:duration>454</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Apr 2022 14:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_7816ca074e43744eb3c304984f9a5e20.jpg"/>
    </item>
    <item>
      <title><![CDATA[What are the Risks Associated with Serverless Security? | CISO Talks]]></title>
      <itunes:title><![CDATA[What are the Risks Associated with Serverless Security? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the risks and vulnerabilities associated with serverless security. Although it is a brilliant prospect, it does carry its risks like all things of course within cybersecurity. But how can we avoid them and deal with these problems? Tune in to find out more with serverless security expert, Jeff Williams. 

Guest in this episode: 
Jeff Williams - Co-Founder and CTO at Contrast - DevSecOps
https://www.linkedin.com/in/planetlevel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942720</link>
      <enclosure url="https://content.rss.com/episodes/207971/942720/ciso-talks/asset_00e86f63f9fc234256361634dd0c0c1e.mp3" length="4116897" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1244725510</guid>
      <itunes:duration>257</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 Apr 2022 14:30:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_00e86f63f9fc234256361634dd0c0c1e.jpg"/>
    </item>
    <item>
      <title><![CDATA[How to Safely Migrate to Serverless Security | CISO Talks]]></title>
      <itunes:title><![CDATA[How to Safely Migrate to Serverless Security | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the risks involved when migrating to a serverless security infrastructure. How can you mitigate these vulnerabilities effectively? Find out here on CISO Talks. 

Guest in this episode: 
Jeff Williams - Co-Founder and CTO at Contrast - DevSecOps
https://www.linkedin.com/in/planetlevel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942721</link>
      <enclosure url="https://content.rss.com/episodes/207971/942721/ciso-talks/asset_2b5ef6c9fbab69068fb4f3cb5305492d.mp3" length="5123760" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1241371861</guid>
      <itunes:duration>320</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 30 Mar 2022 14:46:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_2b5ef6c9fbab69068fb4f3cb5305492d.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Benefits of Serverless Security | CISO Talks]]></title>
      <itunes:title><![CDATA[The Benefits of Serverless Security | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss the overall concept of serverless security. Why is it becoming more popular? What are the benefits associated with going serverless? Tune in to learn more!

Guest in this episode: 
Jeff Williams - Co-Founder and CTO at Contrast - DevSecOps
https://www.linkedin.com/in/planetlevel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942722</link>
      <enclosure url="https://content.rss.com/episodes/207971/942722/ciso-talks/asset_75e7f85590baf76bec1307d010361bc2.mp3" length="5777866" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1237365253</guid>
      <itunes:duration>361</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Mar 2022 15:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_75e7f85590baf76bec1307d010361bc2.jpg"/>
    </item>
    <item>
      <title><![CDATA[Retaining Cybersecurity Talent in Your Organization | CISO Talks]]></title>
      <itunes:title><![CDATA[Retaining Cybersecurity Talent in Your Organization | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the best ways to retain cybersecurity professionals in your organization. What are the best ways to make your work environment, their positions etc. more appealing and supported to ensure that they don't go elsewhere to seek out a better opportunity?

Guest in this episode: 
Kevin Fielder - Chief Information Security Officer at FNZ Group
https://www.linkedin.com/in/kevinfielder/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942723</link>
      <enclosure url="https://content.rss.com/episodes/207971/942723/ciso-talks/asset_6bd48bbe919e32f449059c637a78b60d.mp3" length="5471084" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1233371500</guid>
      <itunes:duration>341</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Mar 2022 15:57:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6bd48bbe919e32f449059c637a78b60d.jpg"/>
    </item>
    <item>
      <title><![CDATA[Dealing With Bullying in Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Dealing With Bullying in Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the problems with bullying in cybersecurity. Bullying on social media platforms and within security teams in the workplace. We speak with CISO, Kevin Fielder, who has some advice on how to mitigate these issues. 

Guest in this episode: 
Kevin Fielder - Chief Information Security Officer at FNZ Group
https://www.linkedin.com/in/kevinfielder/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942724</link>
      <enclosure url="https://content.rss.com/episodes/207971/942724/ciso-talks/asset_2ec33f300b4d01dba3ad24c9d3e569dd.mp3" length="3631228" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1229217796</guid>
      <itunes:duration>226</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 09 Mar 2022 16:00:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_2ec33f300b4d01dba3ad24c9d3e569dd.jpg"/>
    </item>
    <item>
      <title><![CDATA[Hiring Security Talent & Structuring Security Teams | CISO Talks]]></title>
      <itunes:title><![CDATA[Hiring Security Talent & Structuring Security Teams | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how to effectively structure data security teams. What is the ideal structure? We also talk about the process of hiring security talent. What are some good indicators when hiring people who will fit into your team?

Guest in this episode: 
Kevin Fielder - Chief Information Security Officer at FNZ Group
https://www.linkedin.com/in/kevinfielder/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942725</link>
      <enclosure url="https://content.rss.com/episodes/207971/942725/ciso-talks/asset_58b329ae7345c4a38019f02757945855.mp3" length="5181857" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1225103149</guid>
      <itunes:duration>323</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Mar 2022 16:11:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_58b329ae7345c4a38019f02757945855.jpg"/>
    </item>
    <item>
      <title><![CDATA[Are We Prepared For a Global Cybersecurity Disaster? CISO Talks]]></title>
      <itunes:title><![CDATA[Are We Prepared For a Global Cybersecurity Disaster? CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss whether or not we are effectively prepared for a global cybersecurity crisis. Can we mitigate a disaster on a global scale? 

Guest in this episode: 
Jeff Williams - Co-Founder and CTO at Contrast - DevSecOps
https://www.linkedin.com/in/planetlevel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942726</link>
      <enclosure url="https://content.rss.com/episodes/207971/942726/ciso-talks/asset_d62e69d694e908c24b7253e0a3e5d9b3.mp3" length="5159287" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1221215341</guid>
      <itunes:duration>322</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Feb 2022 16:44:38 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_d62e69d694e908c24b7253e0a3e5d9b3.jpg"/>
    </item>
    <item>
      <title><![CDATA[Choosing the Best Cybersecurity Solution For Your Business | CISO Talks]]></title>
      <itunes:title><![CDATA[Choosing the Best Cybersecurity Solution For Your Business | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with Jeff Williams (CTO @ Contrast Security) on the dense cybersecurity market and how you can choose a solution that is best for your organization. 

Guest in this episode: 
Jeff Williams - Co-Founder and CTO at Contrast - DevSecOps
https://www.linkedin.com/in/planetlevel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942727</link>
      <enclosure url="https://content.rss.com/episodes/207971/942727/ciso-talks/asset_666922b4e9d33ce15cb605ae42a59a6b.mp3" length="5749445" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1216893052</guid>
      <itunes:duration>359</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Feb 2022 15:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_666922b4e9d33ce15cb605ae42a59a6b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why is the Software Market in Cybersecurity So Broken? | CISO Talks]]></title>
      <itunes:title><![CDATA[Why is the Software Market in Cybersecurity So Broken? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we delve into the software market and discuss why it is one of the biggest problems in the cybersecurity industry today. 

Guest in this episode: 
Jeff Williams - Co-Founder and CTO at Contrast - DevSecOps
https://www.linkedin.com/in/planetlevel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942728</link>
      <enclosure url="https://content.rss.com/episodes/207971/942728/ciso-talks/asset_ec689f3e03b3adb3eef01f3b8b611ad6.mp3" length="3943443" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1213379632</guid>
      <itunes:duration>246</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 10 Feb 2022 16:30:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_ec689f3e03b3adb3eef01f3b8b611ad6.jpg"/>
    </item>
    <item>
      <title><![CDATA[Automating Application Security Effectively | CISO Talks]]></title>
      <itunes:title><![CDATA[Automating Application Security Effectively | CISO Talks]]></itunes:title>
      <description><![CDATA[This episode of CISO Talks delves into the realms of application security automation and how to improve its effectiveness with advice from an industry expert. 

Guest in this episode: 
Jeff Williams - Co-Founder and CTO at Contrast - DevSecOps
https://www.linkedin.com/in/planetlevel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942729</link>
      <enclosure url="https://content.rss.com/episodes/207971/942729/ciso-talks/asset_46cd89f765d8eb7b862f03d245b23ee8.mp3" length="5754043" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1208354818</guid>
      <itunes:duration>359</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Feb 2022 15:30:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_46cd89f765d8eb7b862f03d245b23ee8.jpg"/>
    </item>
    <item>
      <title><![CDATA[Would Teaching Kids Cybersecurity Make us More Secure in the Future? | CISO Talks]]></title>
      <itunes:title><![CDATA[Would Teaching Kids Cybersecurity Make us More Secure in the Future? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss how teaching kids cybersecurity is imperative for protecting future generations. We also talk about some of the work being done to try and push forward the implementation of this idea.

Guest in this episode:
Dan Nadir - Chief Product Officer at Theta Lake
https://www.linkedin.com/in/dnadir/

Also available on:
IGTV: http://www.instagram.com/instalepide
SoundCloud: http://bit.ly/2MYHwxR
Spotify: http://spoti.fi/2N0XGXR
iTunes: http://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942730</link>
      <enclosure url="https://content.rss.com/episodes/207971/942730/ciso-talks/asset_868dd3eb1d0949c7309d73ffc37ee759.mp3" length="5979741" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1204099990</guid>
      <itunes:duration>373</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 Jan 2022 16:07:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_868dd3eb1d0949c7309d73ffc37ee759.jpg"/>
    </item>
    <item>
      <title><![CDATA[Reducing Employee Negligence in the Cybersecurity Workspace | CISO Talks]]></title>
      <itunes:title><![CDATA[Reducing Employee Negligence in the Cybersecurity Workspace | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss the recent concerns over communication/collaborative platforms within organizations. How can companies reduce employee negligence to create a safer, more positive working environment. 

Guest in this episode: 
Dan Nadir - Chief Product Officer at Theta Lake
https://www.linkedin.com/in/dnadir/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942731</link>
      <enclosure url="https://content.rss.com/episodes/207971/942731/ciso-talks/asset_92aa52fa043b362dde08f63d1f155e52.mp3" length="5659166" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1200985492</guid>
      <itunes:duration>353</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 21 Jan 2022 15:40:38 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_92aa52fa043b362dde08f63d1f155e52.jpg"/>
    </item>
    <item>
      <title><![CDATA[Popular Methods For Mitigating Data Leaks | CISO Talks]]></title>
      <itunes:title><![CDATA[Popular Methods For Mitigating Data Leaks | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with a seasoned industry professional about what some of the key strategies are to try to reduce data leaks within an SMB/large organization. 

Guest in this episode: 
Dan Nadir - Chief Product Officer at Theta Lake
https://www.linkedin.com/in/dnadir/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942732</link>
      <enclosure url="https://content.rss.com/episodes/207971/942732/ciso-talks/asset_7567829bf37c495271da1ee5a89f2d79.mp3" length="4385226" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1195143331</guid>
      <itunes:duration>274</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 12 Jan 2022 16:46:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_7567829bf37c495271da1ee5a89f2d79.jpg"/>
    </item>
    <item>
      <title><![CDATA[5 Reasons Legacy SIEMs No Longer Work | CISO Talks]]></title>
      <itunes:title><![CDATA[5 Reasons Legacy SIEMs No Longer Work | CISO Talks]]></itunes:title>
      <description><![CDATA[Happy new year everyone! 

We're kicking off to a flying start by completely taking apart Legacy SIEM platforms. Why are they so ineffective today? Join in with the discussion on CISO Talks. 

Guest in this episode: 
Jack Naglieri - Founder & CEO @ Panther Labs
https://www.linkedin.com/in/jacknaglieri/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942733</link>
      <enclosure url="https://content.rss.com/episodes/207971/942733/ciso-talks/asset_62348c6c459303534b6742486974946a.mp3" length="7654921" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1191416947</guid>
      <itunes:duration>478</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Jan 2022 15:11:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_62348c6c459303534b6742486974946a.jpg"/>
    </item>
    <item>
      <title><![CDATA[What Should Be Your Main Focus for Cybersecurity? | CISO Talks]]></title>
      <itunes:title><![CDATA[What Should Be Your Main Focus for Cybersecurity? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss what organizations should be focusing their core efforts on within the cybersecurity space. How can they focus on this and why should they? 

Guest in this episode: 
Jack Naglieri - Founder & CEO @ Panther Labs
https://www.linkedin.com/in/jacknaglieri/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942734</link>
      <enclosure url="https://content.rss.com/episodes/207971/942734/ciso-talks/asset_0ce0cce1abf483c11a7119d3ef8875a2.mp3" length="6971140" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1181243149</guid>
      <itunes:duration>435</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 22 Dec 2021 15:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_0ce0cce1abf483c11a7119d3ef8875a2.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Detection-as-Code is So Important | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Detection-as-Code is So Important | CISO Talks]]></itunes:title>
      <description><![CDATA[Over the past decade, threat detection has become business-critical and even more complicated. As businesses move to the cloud, manual threat detection processes are no longer able to keep up. How can teams automate security analysis at scale and address the challenges that threaten business objectives? The answer lies in treating threat detections like software or detection-as-code. Tune in to find out more!

Guest in this episode: 
Jack Naglieri - Founder & CEO @ Panther Labs
https://www.linkedin.com/in/jacknaglieri/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942735</link>
      <enclosure url="https://content.rss.com/episodes/207971/942735/ciso-talks/asset_2b8ac99a1c6a24dac26dab89e3653246.mp3" length="5361161" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1178352763</guid>
      <itunes:duration>335</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 Dec 2021 15:29:29 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_2b8ac99a1c6a24dac26dab89e3653246.jpg"/>
    </item>
    <item>
      <title><![CDATA[An Insight into Starting Your Own Cybersecurity Business | CISO Talks]]></title>
      <itunes:title><![CDATA[An Insight into Starting Your Own Cybersecurity Business | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about making the jump from a large cybersecurity organization to founding your own cybersecurity business. What are some of the key ideas and lessons to take into your own business? Even if you don't have experience working in a large cybersecurity organization, this is a really valuable chat! 

Guest in this episode: 
Jack Naglieri - Founder & CEO @ Panther Labs
https://www.linkedin.com/in/jacknaglieri/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue

#Lepide #data #datasecurity #cybersecurity #cybersecuritypodcast #security #DCAP #enterprisebusiness #CIO #CISOTalks #Businesschallenges #cyberchallenges #LepideAuditor #databreach #GDPR #CCPA #DataPrivacy #CISO #alerting #dataprotection #CISOStrategies #CISOHelp #CISOAdvice #CISOChallenges #Infosec #InsiderThreats]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942736</link>
      <enclosure url="https://content.rss.com/episodes/207971/942736/ciso-talks/asset_eafce22ff3dd04cc518475138487f83e.mp3" length="8650082" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1174118854</guid>
      <itunes:duration>540</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 08 Dec 2021 15:47:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_eafce22ff3dd04cc518475138487f83e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Biggest Challenges For Passwordless Security | CISO Talks]]></title>
      <itunes:title><![CDATA[The Biggest Challenges For Passwordless Security | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the major challenges that are preventing passwordless security from becoming the absolute norm worldwide. 

Guest in this episode: 
Will LaSala - Director of Security Solutions, Security Evangelist @ OneSpan
https://www.linkedin.com/in/wlasala/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942737</link>
      <enclosure url="https://content.rss.com/episodes/207971/942737/ciso-talks/asset_8bfd192d92a23bd907a0e3348a03561d.mp3" length="5802526" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1165982398</guid>
      <itunes:duration>362</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Nov 2021 15:30:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_8bfd192d92a23bd907a0e3348a03561d.jpg"/>
    </item>
    <item>
      <title><![CDATA[Can We Trust Mobile App Security? | CISO Talks]]></title>
      <itunes:title><![CDATA[Can We Trust Mobile App Security? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about mobile app authentication on both a trust level and geographical level. Who is adopting passwordless security faster? The U.S. or Europe? Do we really know enough about app security to be able to put our trust into it? 

Find out here, on CISO Talks.

Guest in this episode: 
Will LaSala - Director of Security Solutions, Security Evangelist @ OneSpan
https://www.linkedin.com/in/wlasala/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942738</link>
      <enclosure url="https://content.rss.com/episodes/207971/942738/ciso-talks/asset_66b28347233de6af3bca51a6a3030022.mp3" length="8454059" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1161880345</guid>
      <itunes:duration>528</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 17 Nov 2021 15:30:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_66b28347233de6af3bca51a6a3030022.jpg"/>
    </item>
    <item>
      <title><![CDATA[Everything You Need to Know About Digital Identity Verification | CISO Talks]]></title>
      <itunes:title><![CDATA[Everything You Need to Know About Digital Identity Verification | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk with Will LaSala about digital identity verification. Are we utilising it effectively within the cybersecurity space? Why are we still using passwords even though the technology is already available? What does the future of DIV look like? These are all questions, answered here, on CISO Talks. 

Guest in this episode: 
Will LaSala - Director of Security Solutions, Security Evangelist @ OneSpan
https://www.linkedin.com/in/wlasala/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942739</link>
      <enclosure url="https://content.rss.com/episodes/207971/942739/ciso-talks/asset_3b5b790a13d4a621ed2a3ba2ac5ff7fa.mp3" length="8934294" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1157544787</guid>
      <itunes:duration>558</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Nov 2021 15:47:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_3b5b790a13d4a621ed2a3ba2ac5ff7fa.jpg"/>
    </item>
    <item>
      <title><![CDATA[How can we Move Faster into a Passwordless Future? CISO Talks]]></title>
      <itunes:title><![CDATA[How can we Move Faster into a Passwordless Future? CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the potential strategies in which we as an industry can adopt to move into a passwordless future quicker. It should only be a matter of time before passwords become obsolete but why is the process so slow at the moment?

Guest in this episode: 
Andrew Shikiar - Executive Director & CMO @ FIDO Alliance
https://www.linkedin.com/in/andrewshikiar/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942740</link>
      <enclosure url="https://content.rss.com/episodes/207971/942740/ciso-talks/asset_1f516578630fb9646a6fc03ec9e1c3cf.mp3" length="4090147" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1153134250</guid>
      <itunes:duration>255</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 03 Nov 2021 15:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_1f516578630fb9646a6fc03ec9e1c3cf.jpg"/>
    </item>
    <item>
      <title><![CDATA[How the Pandemic has Changed Passwordless Security | CISO Talks]]></title>
      <itunes:title><![CDATA[How the Pandemic has Changed Passwordless Security | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how the global pandemic has affected the way in which we have had to rethink our security strategies with employees working from home. How has the pandemic changed the thinking behind authentication? Has the pandemic accelerated the want/need for passwordless security? 

Guest in this episode: 
Andrew Shikiar - Executive Director & CMO @ FIDO Alliance
https://www.linkedin.com/in/andrewshi...

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942741</link>
      <enclosure url="https://content.rss.com/episodes/207971/942741/ciso-talks/asset_0053ff3bca79452953f44e45b0dfa2ae.mp3" length="4975803" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1148954656</guid>
      <itunes:duration>310</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 Oct 2021 14:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_0053ff3bca79452953f44e45b0dfa2ae.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Going Passwordless Would Reduce Risk | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Going Passwordless Would Reduce Risk | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss the benefits of passwordless authentication and how it can reduce data breaches not just for large organizations but for anyone. 

Guest in this episode: 
Andrew Shikiar - Executive Director & CMO @ FIDO Alliance
https://www.linkedin.com/in/andrewshikiar/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942742</link>
      <enclosure url="https://content.rss.com/episodes/207971/942742/ciso-talks/asset_11777d425156ff991cf8ff9aaab9cca5.mp3" length="6751711" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1144954684</guid>
      <itunes:duration>421</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Oct 2021 14:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_11777d425156ff991cf8ff9aaab9cca5.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Benefits of Being a Cybersecurity Startup | CISO Talks]]></title>
      <itunes:title><![CDATA[The Benefits of Being a Cybersecurity Startup | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the benefits of operating as a startup in the Cybersecurity industry and what advantages there are compared to a large, established organization. How does being a startup affect the way of thinking and is the process of making change along the journey differ?

Guest in this episode: 
Evan Reiser - CEO @ Abnormal Security
https://www.linkedin.com/in/evanreiser/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942743</link>
      <enclosure url="https://content.rss.com/episodes/207971/942743/ciso-talks/asset_28cbc47cc1e3e6e0853aa85a54b67da7.mp3" length="7213974" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1141099069</guid>
      <itunes:duration>450</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Oct 2021 14:30:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_28cbc47cc1e3e6e0853aa85a54b67da7.jpg"/>
    </item>
    <item>
      <title><![CDATA[Cybersecurity: Marketing Vs Tech - Which is More Important? CISO Talks]]></title>
      <itunes:title><![CDATA[Cybersecurity: Marketing Vs Tech - Which is More Important? CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the sheer amount of marketing noise filling the cyberspace. Buzzwords, acronyms and all sorts are being thrown around manically. A lot of organizations benefit from a marketing focus especially SMBs but this is often prioritized above the technology/product. The aim of this debate is to understand what level of focus should be attained on both a marketing and tech level for your business.

Guest in this episode: 
Evan Reiser - CEO @ Abnormal Security
https://www.linkedin.com/in/evanreiser/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942744</link>
      <enclosure url="https://content.rss.com/episodes/207971/942744/ciso-talks/asset_91fdea754efa6e221987d469593b9b03.mp3" length="7190986" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1136952223</guid>
      <itunes:duration>449</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 Oct 2021 14:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_91fdea754efa6e221987d469593b9b03.jpg"/>
    </item>
    <item>
      <title><![CDATA[Advantages of Being in Cybersecurity Without a Cyber Background | CISO Talks]]></title>
      <itunes:title><![CDATA[Advantages of Being in Cybersecurity Without a Cyber Background | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the advantages of focusing on the problems in cybersecurity without any preconceptions and how this benefits the overall process. This episode is really insightful not just to anyone looking to join the cybersecurity space at any level. But also to existing cybersecurity professionals with an extensive background in cyber as you may just see a different perspective to approaching your day to day work.

Guest in this episode: 
Evan Reiser - CEO @ Abnormal Security
https://www.linkedin.com/in/evanreiser/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942745</link>
      <enclosure url="https://content.rss.com/episodes/207971/942745/ciso-talks/asset_e91e4773ca521a82c6eb62e459a7ddc6.mp3" length="8693968" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1133038747</guid>
      <itunes:duration>543</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 29 Sep 2021 14:34:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e91e4773ca521a82c6eb62e459a7ddc6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Biggest Cybersecurity Challenges in 2021 | CISO Talks]]></title>
      <itunes:title><![CDATA[The Biggest Cybersecurity Challenges in 2021 | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the biggest challenges faced in the industry today. What are the best strategies for mitigating these problems and how?

Guest in this episode: 
Ferdinand Hamada - Managing Director @ MorganFranklin Consulting
https://www.linkedin.com/in/ferdinand-hamada-b6a35040/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942746</link>
      <enclosure url="https://content.rss.com/episodes/207971/942746/ciso-talks/asset_e426d9ebfce60063495e0b9484e71d4a.mp3" length="5926660" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1129733797</guid>
      <itunes:duration>370</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 23 Sep 2021 14:00:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e426d9ebfce60063495e0b9484e71d4a.jpg"/>
    </item>
    <item>
      <title><![CDATA[Mitigating Risk for Telehealth Platforms in Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Mitigating Risk for Telehealth Platforms in Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the risks involved with telehealth platforms, especially as technology is quickly progressing. We talk about some of the most vulnerable attack points and how to mitigate these risks. 

Guest in this episode: 
Ferdinand Hamada - Managing Director @ MorganFranklin Consulting
https://www.linkedin.com/in/ferdinand-hamada-b6a35040/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942747</link>
      <enclosure url="https://content.rss.com/episodes/207971/942747/ciso-talks/asset_ba1c86b0e7718a288daa17b196d24957.mp3" length="9086013" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1125101236</guid>
      <itunes:duration>567</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 Sep 2021 14:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_ba1c86b0e7718a288daa17b196d24957.jpg"/>
    </item>
    <item>
      <title><![CDATA[Common Cybersecurity Vulnerabilities | CISO Talks]]></title>
      <itunes:title><![CDATA[Common Cybersecurity Vulnerabilities | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the common problems organizations face when protecting their most sensitive data. We base this discussion from an ethical hacking perspective. We gain this insight from ethical expert Reuven Aronashvili. 

Guest in this episode: 
Reuven Aronashvili - Founder and CEO at CYE
https://www.linkedin.com/in/reuven-aronashvili/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942748</link>
      <enclosure url="https://content.rss.com/episodes/207971/942748/ciso-talks/asset_481b42101f704a32e3e4f81760769288.mp3" length="8230869" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1116879292</guid>
      <itunes:duration>514</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 01 Sep 2021 14:30:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_481b42101f704a32e3e4f81760769288.jpg"/>
    </item>
    <item>
      <title><![CDATA[Least Privilege: Are Organizations Reducing their Risk Effectively? | CISO Talks]]></title>
      <itunes:title><![CDATA[Least Privilege: Are Organizations Reducing their Risk Effectively? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we talk all about least privilege. A lot of organizations don't really adhere to fully to a least privilege model. We discuss how this reduces risk and we determine whether organizations are reducing their risk effectively. 

Guest in this episode: 
Reuven Aronashvili - Founder and CEO at CYE
https://www.linkedin.com/in/reuven-aronashvili/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue
In this episode of CISO Talks we talk all about least privilege. A lot of organizations don't really adhere to fully to a least privilege model. We discuss how this reduces risk and we determine whether organizations are reducing their risk effectively. 

Guest in this episode: 
Reuven Aronashvili - Founder and CEO at CYE
https://www.linkedin.com/in/reuven-aronashvili/

Also available on:
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue

#Lepide #data #datasecurity #cybersecurity #cybersecuritypodcast #security #DCAP #enterprisebusiness #CIO #CISOTalks #Businesschallenges #cyberchallenges #LepideAuditor #databreach #GDPR #CCPA #DataPrivacy #CISO #alerting #dataprotection #CISOStrategies #CISOHelp #CISOAdvice #CISOChallenges #Infosec #InsiderThreats #leastprivilege #privilegedaccessmanagement]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942749</link>
      <enclosure url="https://content.rss.com/episodes/207971/942749/ciso-talks/asset_e7ea1c471e10eb4ed0ddb6a422bfa1ab.mp3" length="7377814" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1112569180</guid>
      <itunes:duration>461</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 25 Aug 2021 14:31:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e7ea1c471e10eb4ed0ddb6a422bfa1ab.jpg"/>
    </item>
    <item>
      <title><![CDATA[Top 5 Data Protection Strategies in 2021 | CISO Talks]]></title>
      <itunes:title><![CDATA[Top 5 Data Protection Strategies in 2021 | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss some good effective strategies to base your security around the data itself. This is vital as security starts with the data. We also talk about how organizations can manage least privilege effectively and we have a little bonus surprise at the end - so make sure to stick around for the whole thing. 

Guest in this episode: 
Reuven Aronashvili - Founder and CEO at CYE
https://www.linkedin.com/in/reuven-aronashvili/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942750</link>
      <enclosure url="https://content.rss.com/episodes/207971/942750/ciso-talks/asset_819ef42ed83d77aeaa5832b5953c175a.mp3" length="9902288" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1108202137</guid>
      <itunes:duration>618</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 18 Aug 2021 14:30:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_819ef42ed83d77aeaa5832b5953c175a.jpg"/>
    </item>
    <item>
      <title><![CDATA[How Effective is Ethical Hacking? | CISO Talks]]></title>
      <itunes:title><![CDATA[How Effective is Ethical Hacking? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO talks, we talk about the principles of ethical hacking. How effective is it with helping organizations solve their data security issues? 

Guest in this episode: 
Reuven Aronashvili - Founder and CEO at CYE
https://www.linkedin.com/in/reuven-aronashvili/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942751</link>
      <enclosure url="https://content.rss.com/episodes/207971/942751/ciso-talks/asset_1fe02c5ba7e0b277c22bdb4eaedfedf1.mp3" length="11167868" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1104099784</guid>
      <itunes:duration>697</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Aug 2021 14:45:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_1fe02c5ba7e0b277c22bdb4eaedfedf1.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is Cybersecurity Still a Male Dominated Industry? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is Cybersecurity Still a Male Dominated Industry? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the role of equality within the cybersecurity space. has it improved? Or is there still a lot of progress to be made? Is the cybersecurity community a nice & safe place to be? Tune in for the full debate. 

Guest in this episode: 
Amy Stokes-Waters - Artificially Unintelligent Awards
https://www.linkedin.com/in/amystokeswaters/

Also available on:
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942752</link>
      <enclosure url="https://content.rss.com/episodes/207971/942752/ciso-talks/asset_a9cc565048b0b323dac30a2ec4f2b4d4.mp3" length="3878242" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1099954252</guid>
      <itunes:duration>242</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 04 Aug 2021 13:31:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_a9cc565048b0b323dac30a2ec4f2b4d4.jpg"/>
    </item>
    <item>
      <title><![CDATA[Fake Cybersecurity Awards are Ridiculous | CISO Talks]]></title>
      <itunes:title><![CDATA[Fake Cybersecurity Awards are Ridiculous | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss this whole pay to play culture that a lot of cybersecurity organizations take part in. It is completely ridiculous and unethical. 

However, there is a very exciting movement occurring that will hopefully change this negative culture. Our guest this week, Amy Stokes-Waters, tells us all about the Artificially Unintelligent Awards. 

Guest in this episode: 
Amy Stokes-Waters - Artificially Unintelligent Awards
https://www.linkedin.com/in/amystokeswaters/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942753</link>
      <enclosure url="https://content.rss.com/episodes/207971/942753/ciso-talks/asset_46958fbb016d03860d4bb855f3e5256a.mp3" length="6886294" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1095606463</guid>
      <itunes:duration>430</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 28 Jul 2021 14:30:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_46958fbb016d03860d4bb855f3e5256a.jpg"/>
    </item>
    <item>
      <title><![CDATA[Implementing New Security Structures | Passwordless Future | CISO Talks]]></title>
      <itunes:title><![CDATA[Implementing New Security Structures | Passwordless Future | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about the difficulty that many organizations have on both a financial and practical level when implementing a new security structure. A lot of organizations still run a lot of legacy systems and software for these very reasons which is simply not secure enough in the world we live in today.

We also discuss the very likely prospect of passwords becoming a thing of the past in the not so distant future!

Guest in this episode: 
Or Finkelshtein - VP @ EitanMedical
https://www.linkedin.com/in/orfinkel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue

#Lepide #data #datasecurity #cybersecurity #cybersecuritypodcast #security #DCAP #enterprisebusiness #CIO #CISOTalks #Businesschallenges #cyberchallenges #LepideAuditor #databreach #GDPR #CCPA #DataPrivacy #CISO #alerting #dataprotection #CISOStrategies #CISOHelp #CISOAdvice #CISOChallenges #Infosec #InsiderThreats]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942754</link>
      <enclosure url="https://content.rss.com/episodes/207971/942754/ciso-talks/asset_79bdcd30c9cb69e5813a673b590c0770.mp3" length="4199234" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1091524768</guid>
      <itunes:duration>262</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 21 Jul 2021 14:38:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_79bdcd30c9cb69e5813a673b590c0770.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is Biometric Security Really The Future? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is Biometric Security Really The Future? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss biometric security. How safe is it really for large organizations to adopt on a mainstream basis? Can it provide enough protection to be confidently relied upon going into the future?

Guest in this episode: 
Or Finkelshtein - VP @ EitanMedical
https://www.linkedin.com/in/orfinkel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942755</link>
      <enclosure url="https://content.rss.com/episodes/207971/942755/ciso-talks/asset_6f40eba29ba43b45f2368b98a54d0ddf.mp3" length="6638444" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1087270582</guid>
      <itunes:duration>414</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 14 Jul 2021 14:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6f40eba29ba43b45f2368b98a54d0ddf.jpg"/>
    </item>
    <item>
      <title><![CDATA[Solving Authentication Problems in Large Enterprises | CISO Talks]]></title>
      <itunes:title><![CDATA[Solving Authentication Problems in Large Enterprises | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk all about authentication. How can it evolve? How can we add security whilst making the process simple and effective. Tune in for the full debate. 

Guest in this episode: 
Or Finkelshtein - VP @ EitanMedical
https://www.linkedin.com/in/orfinkel/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue

#Lepide #data #datasecurity #cybersecurity #cybersecuritypodcast #security #DCAP #enterprisebusiness #CIO #CISOTalks #Businesschallenges #cyberchallenges #LepideAuditor #databreach #GDPR #CCPA #DataPrivacy #CISO #alerting #dataprotection #CISOStrategies #CISOHelp #CISOAdvice #CISOChallenges #Infosec #InsiderThreats #Passwords #PasswordSecurity #PasswordProtection #Authentication]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942756</link>
      <enclosure url="https://content.rss.com/episodes/207971/942756/ciso-talks/asset_a5b06cfda78137641807758c79c6514f.mp3" length="10194859" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1083259837</guid>
      <itunes:duration>637</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 07 Jul 2021 15:22:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_a5b06cfda78137641807758c79c6514f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Checking The Integrity & Security of Your Suppliers Is Vital | CISO Talks]]></title>
      <itunes:title><![CDATA[Checking The Integrity & Security of Your Suppliers Is Vital | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss the importance of knowing the security & integrity of your suppliers to minimise risk. Simply not enough organizations are proactive with their security.

Guest in this episode: 
Tim Callahan - CISO @ Aflac
https://www.linkedin.com/in/tim-callahan-4b39241/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue

#Lepide #data #datasecurity #cybersecurity #cybersecuritypodcast #security #DCAP #enterprisebusiness #CIO #CISOTalks #Businesschallenges #cyberchallenges #LepideAuditor #databreach #GDPR #CCPA #DataPrivacy #CISO #alerting #dataprotection #CISOStrategies #CISOHelp #CISOAdvice #CISOChallenges #Infosec #InsiderThreats]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942757</link>
      <enclosure url="https://content.rss.com/episodes/207971/942757/ciso-talks/asset_1f479ec071ee8926504ee2f5b8a586b2.mp3" length="6401879" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1078825423</guid>
      <itunes:duration>400</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 30 Jun 2021 14:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_1f479ec071ee8926504ee2f5b8a586b2.jpg"/>
    </item>
    <item>
      <title><![CDATA[So Many Startups, So Little Security | CISO Talks]]></title>
      <itunes:title><![CDATA[So Many Startups, So Little Security | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the large quantity of startups that don't quite make the cut when it comes to their security structure. We talk about why this is a problem and how this can be improved going forward. 

Guest in this episode: 
Tim Callahan - CISO @ Aflac
https://www.linkedin.com/in/tim-callahan-4b39241/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942758</link>
      <enclosure url="https://content.rss.com/episodes/207971/942758/ciso-talks/asset_43051268051f9b38fe5e205115e88a54.mp3" length="5290526" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1074242065</guid>
      <itunes:duration>330</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Jun 2021 14:30:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_43051268051f9b38fe5e205115e88a54.jpg"/>
    </item>
    <item>
      <title><![CDATA[Mitigating Risk: What Are We Getting Wrong? | CISO Talks]]></title>
      <itunes:title><![CDATA[Mitigating Risk: What Are We Getting Wrong? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO talks, we discuss the mitigation of risk. What are we doing right and more importantly, what are we doing wrong? Our guest is the very experienced CISO, Tim Callahan - who gives us some great insight into our mitigation of risk as an industry. 

Guest in this episode: 
Tim Callahan - CISO @ Aflac
https://www.linkedin.com/in/tim-callahan-4b39241/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue

#Lepide #data #datasecurity #cybersecurity #cybersecuritypodcast #security #DCAP #enterprisebusiness #CIO #CISOTalks #Businesschallenges #cyberchallenges #LepideAuditor #databreach #GDPR #CCPA #DataPrivacy #CISO #alerting #dataprotection #CISOStrategies #CISOHelp #CISOAdvice #CISOChallenges #Infosec #InsiderThreats]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942759</link>
      <enclosure url="https://content.rss.com/episodes/207971/942759/ciso-talks/asset_efef4d416a02e608e5138346f5bdf49b.mp3" length="9958294" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1069653262</guid>
      <itunes:duration>622</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Jun 2021 14:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_efef4d416a02e608e5138346f5bdf49b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Streamlining Processes & Tracking Your CISO Effectiveness | CISO Talks]]></title>
      <itunes:title><![CDATA[Streamlining Processes & Tracking Your CISO Effectiveness | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how difficult it is to track your progress in order to present it to the board. We also talk about how CISOs can make this process as easy as possible. 

Guest in this episode: 
Rob Newby - Founder of Procordr
https://www.linkedin.com/in/robnewby/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942760</link>
      <enclosure url="https://content.rss.com/episodes/207971/942760/ciso-talks/asset_2e0c027b803b788651afe6aef5a25934.mp3" length="9244420" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1060484416</guid>
      <itunes:duration>577</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Jun 2021 14:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_2e0c027b803b788651afe6aef5a25934.jpg"/>
    </item>
    <item>
      <title><![CDATA[What Should Your CISO 30 Day Plan Look Like? | CISO Talks]]></title>
      <itunes:title><![CDATA[What Should Your CISO 30 Day Plan Look Like? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the content of a CISOs typical 30-90 day plan and how it can be made as effective as possible.

Guest in this episode: 
Rob Newby - Founder of Procordr
https://www.linkedin.com/in/robnewby/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942761</link>
      <enclosure url="https://content.rss.com/episodes/207971/942761/ciso-talks/asset_91b3066cf018a19278ba51bae7f6157f.mp3" length="4995029" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1055979559</guid>
      <itunes:duration>312</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 May 2021 14:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_91b3066cf018a19278ba51bae7f6157f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why The CISOs Hard Work Often Goes Unnoticed | CISO Talks]]></title>
      <itunes:title><![CDATA[Why The CISOs Hard Work Often Goes Unnoticed | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss why CISOs are still having to work with old school techniques and why it is difficult to prove their hard work to the board. 

Guest in this episode: 
Rob Newby - Founder of Procordr
https://www.linkedin.com/in/robnewby/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942762</link>
      <enclosure url="https://content.rss.com/episodes/207971/942762/ciso-talks/asset_18a3d19131d8f6285118c8ed5a390dfe.mp3" length="10280123" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1051450393</guid>
      <itunes:duration>642</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 19 May 2021 14:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_18a3d19131d8f6285118c8ed5a390dfe.jpg"/>
    </item>
    <item>
      <title><![CDATA[Common Challenges When Starting Out as a CISO  | CISO Talks]]></title>
      <itunes:title><![CDATA[Common Challenges When Starting Out as a CISO  | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss some of the most common challenges faced when venturing into the CISO role for the first time. 

Guest in this episode: 
Rob Newby - Founder of Procordr
https://www.linkedin.com/in/robnewby/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942763</link>
      <enclosure url="https://content.rss.com/episodes/207971/942763/ciso-talks/asset_44e20681006d9c7db6deddf6c1ea1e6e.mp3" length="10804243" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1047457486</guid>
      <itunes:duration>675</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 12 May 2021 14:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_44e20681006d9c7db6deddf6c1ea1e6e.jpg"/>
    </item>
    <item>
      <title><![CDATA[Choosing the Right Solution for your Organization as a CISO | CISO Talks]]></title>
      <itunes:title><![CDATA[Choosing the Right Solution for your Organization as a CISO | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the best approach for CISOs when determining the best solution for their organization as well as discussing how organizations can work better with CISOs when interacting with them about their solutions.

Guest in this episode: 
Vladi Sandler: CEO @ Lightspin
https://www.linkedin.com/in/vladi-cloud-security/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942764</link>
      <enclosure url="https://content.rss.com/episodes/207971/942764/ciso-talks/asset_87db6339ebf851c25851634e2198dfcf.mp3" length="9756420" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1043142229</guid>
      <itunes:duration>609</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 May 2021 14:38:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_87db6339ebf851c25851634e2198dfcf.jpg"/>
    </item>
    <item>
      <title><![CDATA[Translating Functionality & Streamlining Workflows  | CISO Talks]]></title>
      <itunes:title><![CDATA[Translating Functionality & Streamlining Workflows  | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss ways in which CISOs can effectively translate functionality to the board and their colleagues as well as utilising time as best as possible. We also discuss collaboration between CISOs and how this could be beneficial. 

Guest in this episode: 
Vladi Sandler: CEO @ Lightspin
https://www.linkedin.com/in/vladi-cloud-security/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942765</link>
      <enclosure url="https://content.rss.com/episodes/207971/942765/ciso-talks/asset_e44e224943709be5b9f619493a6d1438.mp3" length="9089775" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1038387079</guid>
      <itunes:duration>568</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 28 Apr 2021 14:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e44e224943709be5b9f619493a6d1438.jpg"/>
    </item>
    <item>
      <title><![CDATA[Demonstrate More Value to CISOs from a Vendor Perspective | CISO Talks]]></title>
      <itunes:title><![CDATA[Demonstrate More Value to CISOs from a Vendor Perspective | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the typical approaches made to CISOs and why they are understandably not effective. We talk about some of the common enemies of the CISO and overall we discuss how demonstrating absolute value is often not achieved. 

Guest in this episode: 
Vladi Sandler: CEO @ Lightspin
https://www.linkedin.com/in/vladi-cloud-security/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942766</link>
      <enclosure url="https://content.rss.com/episodes/207971/942766/ciso-talks/asset_95fe84321ad5815f8a744a09444a8287.mp3" length="9491016" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1033926700</guid>
      <itunes:duration>593</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 21 Apr 2021 14:30:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_95fe84321ad5815f8a744a09444a8287.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Perfect Future That Data Can Allow us to Have | CISO Talks]]></title>
      <itunes:title><![CDATA[The Perfect Future That Data Can Allow us to Have | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO talks, we tale about date & IoT devices and how we can utilise them to build a safe and secure environment in the future.

Guest in this episode: 
Tim Panagos: CTO @ Microshare.io
https://www.linkedin.com/in/tpanagos/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942767</link>
      <enclosure url="https://content.rss.com/episodes/207971/942767/ciso-talks/asset_12054193187f8cdad05e716b25ad5e27.mp3" length="21278301" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1029302113</guid>
      <itunes:duration>1329</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 14 Apr 2021 14:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_12054193187f8cdad05e716b25ad5e27.jpg"/>
    </item>
    <item>
      <title><![CDATA[Eliminating Fear for Employees Returning to the Workplace | CISO Talks]]></title>
      <itunes:title><![CDATA[Eliminating Fear for Employees Returning to the Workplace | CISO Talks]]></itunes:title>
      <description><![CDATA[Guest in this episode: 
Tim Panagos: CTO @ Microshare.io
https://www.linkedin.com/in/tpanagos/

Also available on:
IGTV: www.instagram.com/instalepide
SoundCloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942768</link>
      <enclosure url="https://content.rss.com/episodes/207971/942768/ciso-talks/asset_c7eafab54c921ef43cac6535373e08dc.mp3" length="13206673" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1024450012</guid>
      <itunes:duration>825</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 07 Apr 2021 14:30:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c7eafab54c921ef43cac6535373e08dc.jpg"/>
    </item>
    <item>
      <title><![CDATA[How Data Will Help us Safely Venture Into a Post-Pandemic World | CISO Talks]]></title>
      <itunes:title><![CDATA[How Data Will Help us Safely Venture Into a Post-Pandemic World | CISO Talks]]></itunes:title>
      <description><![CDATA[In this very exciting episode of CISO Talks, we talk about the future role that data (more specifically, IoT devices) will play as we begin to transition into a post-pandemic world. Tim & Microshare are working on a brilliant solution.

Guest in this episode: 
Tim Panagos: CTO @ Microshare.io

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942769</link>
      <enclosure url="https://content.rss.com/episodes/207971/942769/ciso-talks/asset_3ce69f4fab818ef267e66fcd36a404b3.mp3" length="8821445" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1019729305</guid>
      <itunes:duration>551</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 31 Mar 2021 14:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_3ce69f4fab818ef267e66fcd36a404b3.jpg"/>
    </item>
    <item>
      <title><![CDATA[How to Quickly Become More Secure & For Less | CISO Talks]]></title>
      <itunes:title><![CDATA[How to Quickly Become More Secure & For Less | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the ways in which you can quickly create more protection around your most sensitive data and in a very cost efficient way. 

Guest in this episode: 
Robin Lennon Bylenga
https://www.linkedin.com/in/robinlbylenga/

Human Factors Analysis and Classification System:
http://hfacs-cyber.com/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942770</link>
      <enclosure url="https://content.rss.com/episodes/207971/942770/ciso-talks/asset_506e132ec26443a0f879d10c828952c3.mp3" length="9582549" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1015459210</guid>
      <itunes:duration>598</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Mar 2021 15:29:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_506e132ec26443a0f879d10c828952c3.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Do's & Dont's of Internal Threat Management | CISO Talks]]></title>
      <itunes:title><![CDATA[The Do's & Dont's of Internal Threat Management | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how to maneuver within the internal threat management landscape. What should you look out for? What should you avoid doing? How can you mitigate internal threats and become proactive at protecting your sensitive data.

Guest in this episode: 
Robin Lennon Bylenga
https://www.linkedin.com/in/robinlbylenga/

Human Factors Analysis and Classification System:
http://hfacs-cyber.com/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942771</link>
      <enclosure url="https://content.rss.com/episodes/207971/942771/ciso-talks/asset_24cbde9b1d7b9459c20ad9e4b3fcee16.mp3" length="11097233" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1009829938</guid>
      <itunes:duration>693</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 17 Mar 2021 15:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_24cbde9b1d7b9459c20ad9e4b3fcee16.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Human Factors Analysis and Classification System | CISO Talks]]></title>
      <itunes:title><![CDATA[The Human Factors Analysis and Classification System | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the Human Factors Analysis and Classification System in depth and how it can be implemented into the cybersecurity framework. 

Guest in this episode: 
Robin Lennon Bylenga
https://www.linkedin.com/in/robinlbylenga/

Human Factors Analysis and Classification System:
http://hfacs-cyber.com/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942772</link>
      <enclosure url="https://content.rss.com/episodes/207971/942772/ciso-talks/asset_484d80caa7e36b93e13c671ded1d3b4d.mp3" length="14906095" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1004156581</guid>
      <itunes:duration>931</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Mar 2021 15:31:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_484d80caa7e36b93e13c671ded1d3b4d.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Human Factors in Cybersecurity: Preventing Human Error | CISO Talks]]></title>
      <itunes:title><![CDATA[The Human Factors in Cybersecurity: Preventing Human Error | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the hot topic that is human factors in Cybersecurity and how organizations can prevent human error from within their businesses. 

Guest in this episode: 
Robin Lennon Bylenga
https://www.linkedin.com/in/robinlbylenga/

Human Factors Analysis and Classification System:
http://hfacs-cyber.com/

Also available on:
IGTV: www.instagram.com/instalepide
Sound cloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942773</link>
      <enclosure url="https://content.rss.com/episodes/207971/942773/ciso-talks/asset_cb6023b452afe3cb7fb44a7e44cf02b1.mp3" length="6759234" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/997759588</guid>
      <itunes:duration>422</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 03 Mar 2021 15:00:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_cb6023b452afe3cb7fb44a7e44cf02b1.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Principles of Ultralearning | CISO Talks]]></title>
      <itunes:title><![CDATA[The Principles of Ultralearning | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the 9 step principles of ultra learning in reference to the fantastic book by Scott H. Young which is linked below. We also discuss how the pandemic has altered the recruitment climate in cybersecurity. 

Ultralearning by Scott H. Young: https://www.scotthyoung.com/blog/ultralearning/

Check out this article for more on the key values a cyber security professional requires.

https://auricoe.com/articles/cybersecurity-experts-the-values-that-make-them-tick

Guests in this episode: 
Gerry Ashison - Co- Founder @ Auricoe
Matt Goodman - Co- Founder @ Auricoe

Visit their website: https://auricoe.com/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942774</link>
      <enclosure url="https://content.rss.com/episodes/207971/942774/ciso-talks/asset_02e06125b062215250f852a01e6fa2db.mp3" length="10201964" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/991921453</guid>
      <itunes:duration>637</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Feb 2021 15:30:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_02e06125b062215250f852a01e6fa2db.jpg"/>
    </item>
    <item>
      <title><![CDATA[Starting Your Cybersecurity Journey | CISO Talks]]></title>
      <itunes:title><![CDATA[Starting Your Cybersecurity Journey | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss some top tips to help aspiring cybersecurity professionals when entering the industry. This will also come in handy to anyone who is making a new start within the industry as well. 

Check out this article for more on the key values a cyber security professional requires.

https://auricoe.com/articles/cybersecurity-experts-the-values-that-make-them-tick

Guests in this episode: 
Gerry Ashison - Co- Founder @ Auricoe
Matt Goodman - Co- Founder @ Auricoe

Visit their website: https://auricoe.com/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942775</link>
      <enclosure url="https://content.rss.com/episodes/207971/942775/ciso-talks/asset_04c656f249fc70d3a2b59d5867ae7f1c.mp3" length="9501047" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/987438550</guid>
      <itunes:duration>593</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 17 Feb 2021 15:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_04c656f249fc70d3a2b59d5867ae7f1c.jpg"/>
    </item>
    <item>
      <title><![CDATA[CISO Burnouts & Culture mismatch | CISO Talks]]></title>
      <itunes:title><![CDATA[CISO Burnouts & Culture mismatch | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the short tenures that CISOs have in organizations and how this could be improved / make CISOs feel more comfortable and less prone to burnouts. We also discuss company cultures and how CISOs can effectively pinpoint an organization that suits them instead of facing culture mismatch. 

Check out this article for more on the key values a cyber security professional requires.

https://auricoe.com/articles/cybersecurity-experts-the-values-that-make-them-tick

Guests in this episode: 
Gerry Ashison - Co- Founder @ Auricoe
Matt Goodman - Co- Founder @ Auricoe

Visit their website: https://auricoe.com/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942776</link>
      <enclosure url="https://content.rss.com/episodes/207971/942776/ciso-talks/asset_157e835b8ded68b19d7c08041c03566b.mp3" length="9870523" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/982765888</guid>
      <itunes:duration>616</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Feb 2021 15:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_157e835b8ded68b19d7c08041c03566b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Cybersecurity Heroes & Heroines: The Values That Make Cybersecurity Experts Tick]]></title>
      <itunes:title><![CDATA[Cybersecurity Heroes & Heroines: The Values That Make Cybersecurity Experts Tick]]></itunes:title>
      <description><![CDATA[In this episode of CISO talks, we discuss some of the core values that CISOs & I.T. professionals in general can possess to make them not only the new breed of cybersecurity professionals today due to the rapid incline of technological advancements, but also, the values that will make them future-ready. 

Check out this article for more on the key values a cyber security professional requires.

https://auricoe.com/articles/cybersecurity-experts-the-values-that-make-them-tick

Guests in this episode: 
Gerry Ashison - Co- Founder @ Auricoe
Matt Goodman - Co- Founder @ Auricoe

Visit their website: https://auricoe.com/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942777</link>
      <enclosure url="https://content.rss.com/episodes/207971/942777/ciso-talks/asset_0132480064f6bc7d18225e8b474340b8.mp3" length="11938167" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/978333160</guid>
      <itunes:duration>746</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 03 Feb 2021 15:30:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_0132480064f6bc7d18225e8b474340b8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The TOP 5 Things You Should Do To Prepare For a Ransomware Attack | CISO Talks]]></title>
      <itunes:title><![CDATA[The TOP 5 Things You Should Do To Prepare For a Ransomware Attack | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the top 5 ways in which you can prepare for a ransomware attack with CryptoStopper CEO, Greg Edwards. 

Our guest in this episode: 
Greg Edwards – CEO @ CryptoStopper https://www.linkedin.com/in/gedwardswpd/​ https://www.getcryptostopper.com/​

Also available on:
IGTV: www.instagram.com/instalepide
Sound cloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942778</link>
      <enclosure url="https://content.rss.com/episodes/207971/942778/ciso-talks/asset_08b4a5af3bcfb9acb4f7dc562e1e21eb.mp3" length="6770519" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/973813609</guid>
      <itunes:duration>423</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 Jan 2021 15:49:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_08b4a5af3bcfb9acb4f7dc562e1e21eb.jpg"/>
    </item>
    <item>
      <title><![CDATA[Who is Winning the Cyber Race? The Attackers or the Defenders? | CISO Talks]]></title>
      <itunes:title><![CDATA[Who is Winning the Cyber Race? The Attackers or the Defenders? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the speed at which technology is advancing and how attackers & defenders are adopting this technology along with adapting their cyber strategies to find the most effective approach. But which side is winning the cyber race? 

Our guest in this episode: 
Greg Edwards – CEO @ CryptoStopper
https://www.linkedin.com/in/gedwardswpd/
https://www.getcryptostopper.com/

Also available on:
IGTV: www.instagram.com/instalepide
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942779</link>
      <enclosure url="https://content.rss.com/episodes/207971/942779/ciso-talks/asset_a85aa36f760817d4f06e64ca622d4e15.mp3" length="7206033" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/969233824</guid>
      <itunes:duration>450</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Jan 2021 15:29:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_a85aa36f760817d4f06e64ca622d4e15.jpg"/>
    </item>
    <item>
      <title><![CDATA[Reconfigure Your Approach to Ransomware | CISO Talks]]></title>
      <itunes:title><![CDATA[Reconfigure Your Approach to Ransomware | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the rapid rise of ransomware with CryptoStopper CEO, Greg Edwards. We talk about how many organizations are disorganised when it comes to effectively dealing with ransomware attacks and so we discuss methods and practices that will help safeguard your business from ransomware. 

Our guest in this episode: 
Greg Edwards – CEO @ CryptoStopper
https://www.linkedin.com/in/gedwardswpd/
https://www.getcryptostopper.com/

Also available on:
IGTV: www.instagram.com/instalepide
Sound cloud: bit.ly/2MYHwxR
Spotify: spoti.fi/2N0XGXR
iTunes: apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - bit.ly/2FWHKoM
Twitter - bit.ly/2FWNO0C
Instagram - bit.ly/2FWMxXj
Facebook - bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942780</link>
      <enclosure url="https://content.rss.com/episodes/207971/942780/ciso-talks/asset_9c6f0a66150b5886231db8e6046a9ec8.mp3" length="6931434" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/964843030</guid>
      <itunes:duration>433</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Jan 2021 15:29:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_9c6f0a66150b5886231db8e6046a9ec8.jpg"/>
    </item>
    <item>
      <title><![CDATA[Adapting Your Cybersecurity & Staying Safe in 2021 | CISO Talks]]></title>
      <itunes:title><![CDATA[Adapting Your Cybersecurity & Staying Safe in 2021 | CISO Talks]]></itunes:title>
      <description><![CDATA[Happy new year everyone! 

This year, we hope that data is handled with more care than ever before. We hope that more organizations are proactive in safeguarding their data instead of constantly firefighting problems after they occur. We discuss this in more depth during the episode and we also talk about adapting cybersecurity for maximum protection/efficiency as well as staying safe in general. 

May you have a data safe year.

Our guest this week: Paul Clayson - CEO @ AgilePQ https://www.linkedin.com/in/paulclayson/ 

Also available on: 
IGTV: https://www.instagram.com/instalepide 
Sound cloud: http://bit.ly/2MYHwxR 
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P 

Follow us on Social Media: 
LinkedIn - http://bit.ly/2FWHKoM 
Twitter - http://bit.ly/2FWNO0C 
Instagram - http://bit.ly/2FWMxXj 
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942781</link>
      <enclosure url="https://content.rss.com/episodes/207971/942781/ciso-talks/asset_3704629ea3ff54ea6401909435cf364c.mp3" length="9222268" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/960421117</guid>
      <itunes:duration>576</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 Jan 2021 15:31:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_3704629ea3ff54ea6401909435cf364c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Rapid Growth of IoT Devices and Properly Securing Them | CISO Talks]]></title>
      <itunes:title><![CDATA[The Rapid Growth of IoT Devices and Properly Securing Them | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the rapid growth of IoT devices as they are rising by the billions every year. With such a formidable increase, how are we going to secure them all...properly! 

⬇️ We would love to hear your thoughts on the matter
 in the comments section below. ⬇️

Our guest this week: 
Paul Clayson - CEO @ AgilePQ
https://loom.ly/VyJMf8g

Also available on:
IGTV: https://loom.ly/WyYjrV4
Sound cloud: http://bit.ly/2MYHwxR
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://loom.ly/sk2RWXs

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942782</link>
      <enclosure url="https://content.rss.com/episodes/207971/942782/ciso-talks/asset_8004820b99682e7162714406334da543.mp3" length="7919907" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/948791140</guid>
      <itunes:duration>494</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Dec 2020 16:29:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_8004820b99682e7162714406334da543.jpg"/>
    </item>
    <item>
      <title><![CDATA[Insider Threats are the Plague That Continues to Grow in 2020 | CISO Talks]]></title>
      <itunes:title><![CDATA[Insider Threats are the Plague That Continues to Grow in 2020 | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how the insider threat is still at large and perhaps stronger and more abundant than ever due to the pandemic. There are obviously so many fires for security teams to put out on a day to day basis but this is an issue that is often overlooked. The damage that can be caused is significant. We have to work as a collective to reduce the spread and power of the insider threat. 

Our guest this week:
Paul Katzoff - CEO @ WhiteCanyon Software
https://www.linkedin.com/in/paulkatzoff/

Also available on:
IGTV: https://www.instagram.com/instalepide
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942783</link>
      <enclosure url="https://content.rss.com/episodes/207971/942783/ciso-talks/asset_d7703ccb00a2333b22a4c18699cd0861.mp3" length="8793442" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/944281180</guid>
      <itunes:duration>549</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 09 Dec 2020 15:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_d7703ccb00a2333b22a4c18699cd0861.jpg"/>
    </item>
    <item>
      <title><![CDATA[How Covid-19 Changed Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[How Covid-19 Changed Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the controversial topic on whether the global pandemic has changed cybersecurity for better or worse.

Our guest this week:
Paul Katzoff - CEO @ WhiteCanyon Software
https://www.linkedin.com/in/paulkatzoff/

Also available on:
IGTV: https://www.instagram.com/instalepide
Sound cloud: http://bit.ly/2MYHwxR
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942784</link>
      <enclosure url="https://content.rss.com/episodes/207971/942784/ciso-talks/asset_9fae85992d28e53ae10ebf7ff245b554.mp3" length="11928554" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/939982975</guid>
      <itunes:duration>745</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Dec 2020 15:23:54 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_9fae85992d28e53ae10ebf7ff245b554.jpg"/>
    </item>
    <item>
      <title><![CDATA[Stop Responding And Start Preventing | CISO Talks]]></title>
      <itunes:title><![CDATA[Stop Responding And Start Preventing | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the amount of organizations that are used to responding to threats instead of being proactive and preventing these problems from happening in the first place. This is a major issue in the cybersecurity industry. Stop responding. Start preventing. 

Our guest this week:
Dominic Vogel: Cybersecurity Executive
https://www.linkedin.com/in/domvogel/

Also available on:
IGTV: https://www.instagram.com/instalepide
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942785</link>
      <enclosure url="https://content.rss.com/episodes/207971/942785/ciso-talks/asset_ac4655bb6aca62050b97bbfa6bb964aa.mp3" length="8889154" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/935830150</guid>
      <itunes:duration>555</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 25 Nov 2020 15:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_ac4655bb6aca62050b97bbfa6bb964aa.jpg"/>
    </item>
    <item>
      <title><![CDATA[Security Starts With The Data! | CISO Talks]]></title>
      <itunes:title><![CDATA[Security Starts With The Data! | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with Daniel Gallancy (CEO - Atakama) around the imperative ideology that security needs to start with the data. Build your security around your data, treat it with absolute care to maximise protection. 

Daniel Gallancy: https://www.linkedin.com/in/gallancy
Atakama: https://www.atakama.com/

Also available on:
IGTV: https://www.instagram.com/instalepide
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942786</link>
      <enclosure url="https://content.rss.com/episodes/207971/942786/ciso-talks/asset_c3a42067886a8b96b1fc67a81a3f61eb.mp3" length="7438000" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/931425040</guid>
      <itunes:duration>464</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 18 Nov 2020 15:30:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c3a42067886a8b96b1fc67a81a3f61eb.jpg"/>
    </item>
    <item>
      <title><![CDATA[Treating Data Like Gold & Implementing Zero Trust Effectively | CISO Talks]]></title>
      <itunes:title><![CDATA[Treating Data Like Gold & Implementing Zero Trust Effectively | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with Joseph Carson (Thycotic) about how a lot of organizations mistreat their data and not building their security around the data first. We also discussed zero trust and how to implement it effectively within your organization.

Joseph Carson: http://bit.ly/2FQfh1p 
Cyber Security for Dummies: http://bit.ly/2UDUHvr 

Also available on: 
IGTV: https://www.instagram.com/instalepide
Sound cloud: http://bit.ly/2MYHwxR
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media: 
LinkedIn - http://bit.ly/2FWHKoM 
Twitter - http://bit.ly/2FWNO0C 
Instagram - http://bit.ly/2FWMxXj 
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942787</link>
      <enclosure url="https://content.rss.com/episodes/207971/942787/ciso-talks/asset_2c718eda079edadc72e80a4d91945890.mp3" length="15861550" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/927301693</guid>
      <itunes:duration>991</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Nov 2020 15:30:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_2c718eda079edadc72e80a4d91945890.jpg"/>
    </item>
    <item>
      <title><![CDATA[What Impact Has Covid-19 Had on Cloud Security? | CISO Talks]]></title>
      <itunes:title><![CDATA[What Impact Has Covid-19 Had on Cloud Security? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with CEO of Orca security, Avi Shua, about the impact this global pandemic has had on cloud security in general. 

Avi Shua: https://www.linkedin.com/in/avishua/

Orca Security: https://orca.security/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Sound cloud: http://bit.ly/2MYHwxR
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942788</link>
      <enclosure url="https://content.rss.com/episodes/207971/942788/ciso-talks/asset_f57e9c0a8d7586e5aae76291118af721.mp3" length="8378826" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/923750569</guid>
      <itunes:duration>523</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 05 Nov 2020 13:32:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_f57e9c0a8d7586e5aae76291118af721.jpg"/>
    </item>
    <item>
      <title><![CDATA[Rules, Regulations & attitudes | CISO Talks]]></title>
      <itunes:title><![CDATA[Rules, Regulations & attitudes | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we take a deep dive into regulations within cybersecurity with Daniel H. Gallancy (CEO of Atakama) to discuss how people/organizations have reacted to their implementation and how there needs to be more pain/fear to drive & change behaviour. 

Daniel Gallancy:
https://www.linkedin.com/in/gallancy/

https://www.atakama.com/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942789</link>
      <enclosure url="https://content.rss.com/episodes/207971/942789/ciso-talks/asset_186b737461b5398d315c4f20f09d1119.mp3" length="13184939" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/919052317</guid>
      <itunes:duration>824</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 28 Oct 2020 15:43:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_186b737461b5398d315c4f20f09d1119.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Have Organizations Been So Slow With Adopting Data Encryption? | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Have Organizations Been So Slow With Adopting Data Encryption? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with CEO of Atakama, Daniel Gallancy about data encryption and how organizations have taken a lot of time to adopt this philosophy and bring it into the mainstream within cybersecurity. 

Daniel Gallancy:
https://www.linkedin.com/in/gallancy/

https://www.atakama.com/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942790</link>
      <enclosure url="https://content.rss.com/episodes/207971/942790/ciso-talks/asset_43937c113f5d93ac4ef5d57d55f50e79.mp3" length="11037883" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/915418204</guid>
      <itunes:duration>689</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 21 Oct 2020 14:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_43937c113f5d93ac4ef5d57d55f50e79.jpg"/>
    </item>
    <item>
      <title><![CDATA[Differentiating Between Urgent & Important | CISO Talks]]></title>
      <itunes:title><![CDATA[Differentiating Between Urgent & Important | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with Neal O'Farrell (founder of the Psyberresilience Project) about the practice of choosing between what is important and what is urgent to situate your focus towards. 

Neal O'Farrell: 
https://www.linkedin.com/in/nealofarrell/

The PsyberResilience Project: 
https://www.thepsyberproject.com/about-the-project/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942791</link>
      <enclosure url="https://content.rss.com/episodes/207971/942791/ciso-talks/asset_6f6fc2c78bf051fc75881ce2b2014e3b.mp3" length="4552828" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/910371217</guid>
      <itunes:duration>284</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 14 Oct 2020 14:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6f6fc2c78bf051fc75881ce2b2014e3b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Mental Health Is An Organizational Risk In Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Mental Health Is An Organizational Risk In Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[We spoke with Neal O'Farrell about this topic who has had his own personal battles with mental health over the years within the industry. We discuss how organizations can implement strategies to reduce the stress on not just CISOs but other industry professionals as well.

Neal O'Farrell: 
https://www.linkedin.com/in/nealofarrell/

The PsyberResilience Project: 
https://www.thepsyberproject.com/about-the-project/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942792</link>
      <enclosure url="https://content.rss.com/episodes/207971/942792/ciso-talks/asset_c167ced231f81b2e29d3261599556be2.mp3" length="6669791" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/906476425</guid>
      <itunes:duration>416</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 07 Oct 2020 14:45:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c167ced231f81b2e29d3261599556be2.jpg"/>
    </item>
    <item>
      <title><![CDATA[Managing Chronic Stress Within Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Managing Chronic Stress Within Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[Mental health within the cybersecurity industry isn't taken seriously enough. A lot of cybersecurity professionals suffer from chronic stress, depression & anxiety (not just CISOs) and it is often overlooked. 

We spoke with Neal O'Farrell who has a wealth of experience in the industry and he gives us his story on his mental health struggles over the years and what he is working on now to improve awareness and response to mental health within the industry.

Neal O'Farrell: 
https://www.linkedin.com/in/nealofarrell/

The PsyberResilience Project: 
https://www.thepsyberproject.com/about-the-project/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942793</link>
      <enclosure url="https://content.rss.com/episodes/207971/942793/ciso-talks/asset_08781c5983d9fe89ce015a30b90b4485.mp3" length="6198333" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/902161246</guid>
      <itunes:duration>387</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 30 Sep 2020 14:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_08781c5983d9fe89ce015a30b90b4485.jpg"/>
    </item>
    <item>
      <title><![CDATA[Has CCPA Made a Fundamental Difference To Data Security? | CISO Talks]]></title>
      <itunes:title><![CDATA[Has CCPA Made a Fundamental Difference To Data Security? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode, we discuss with president of Sherpa Software, Kevin Ogrodnik, whether CCPA ( California Consumer Privacy Act) has made a sizable impact to data security since its introduction. 

https://www.linkedin.com/company/sherpa-software/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942794</link>
      <enclosure url="https://content.rss.com/episodes/207971/942794/ciso-talks/asset_a79715be53b3583a22115784325703d3.mp3" length="5714337" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/898197382</guid>
      <itunes:duration>357</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Sep 2020 14:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_a79715be53b3583a22115784325703d3.jpg"/>
    </item>
    <item>
      <title><![CDATA[Taking The Next Step As a CISO | CISO Talks]]></title>
      <itunes:title><![CDATA[Taking The Next Step As a CISO | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk about the next steps for a CISO after the problem has been identified and the appropriate strategy has been decided upon with CISO of YL Ventures, Sounil Yu. 

Sounil Yu - CISO @ YL Ventures: https://www.linkedin.com/in/sounil/
YL Ventures: https://www.ylventures.com/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942795</link>
      <enclosure url="https://content.rss.com/episodes/207971/942795/ciso-talks/asset_adc250f8f8d0e10dc25a63a0648eac2a.mp3" length="4853341" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/894145225</guid>
      <itunes:duration>303</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Sep 2020 14:30:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_adc250f8f8d0e10dc25a63a0648eac2a.jpg"/>
    </item>
    <item>
      <title><![CDATA[How CISOs Can Decipher Between Fact & Fiction Effectively | CISO Talks]]></title>
      <itunes:title><![CDATA[How CISOs Can Decipher Between Fact & Fiction Effectively | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss how CISOs can effectively cut through the noise with CISO of YL Ventures, Sounil Yu. 

Sounil Yu - CISO @ YL Ventures: https://www.linkedin.com/in/sounil/
YL Ventures: https://www.ylventures.com/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942796</link>
      <enclosure url="https://content.rss.com/episodes/207971/942796/ciso-talks/asset_c9bebfecdca04d205fceed2a99efe05d.mp3" length="8497109" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/890372974</guid>
      <itunes:duration>531</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 09 Sep 2020 14:36:38 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c9bebfecdca04d205fceed2a99efe05d.jpg"/>
    </item>
    <item>
      <title><![CDATA[Improving Decision Making As A CISO | CISO Talks]]></title>
      <itunes:title><![CDATA[Improving Decision Making As A CISO | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss the decision making process with CISO of YL Ventures, Sounil Yu. We speak about some effective strategies such as the cyber defence matrix as well as improving organization and effectiveness when faced with key decisions.

Sounil Yu - CISO @ YL Ventures: https://www.linkedin.com/in/sounil/
YL Ventures: https://www.ylventures.com/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942797</link>
      <enclosure url="https://content.rss.com/episodes/207971/942797/ciso-talks/asset_003d97bb99ffcc0894d99ddcbc998e19.mp3" length="4724191" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/886276462</guid>
      <itunes:duration>295</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Sep 2020 14:30:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_003d97bb99ffcc0894d99ddcbc998e19.jpg"/>
    </item>
    <item>
      <title><![CDATA[Marketing Is Ruining Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Marketing Is Ruining Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode we speak about cybersecurity marketing with founder of Cyber.sc, Dominic Vogel. Overall, marketing strategies are doing more damage than good. 

https://cyber.sc/

Dominic Vogel: https://www.linkedin.com/in/domvogel/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942798</link>
      <enclosure url="https://content.rss.com/episodes/207971/942798/ciso-talks/asset_0b88c81431b388f21256d4cb22a29f14.mp3" length="10253791" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/882371263</guid>
      <itunes:duration>640</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 Aug 2020 14:30:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_0b88c81431b388f21256d4cb22a29f14.jpg"/>
    </item>
    <item>
      <title><![CDATA[Do Most Organizations Truly Understand Their Data?]]></title>
      <itunes:title><![CDATA[Do Most Organizations Truly Understand Their Data?]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss with Sherpa Software president, Kevin Ogrodnik whether most organizations truly understand their data.

https://www.linkedin.com/company/sher...

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942799</link>
      <enclosure url="https://content.rss.com/episodes/207971/942799/ciso-talks/asset_f58d042c27179f8d4657da5621927d1b.mp3" length="9522363" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/878446672</guid>
      <itunes:duration>595</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 19 Aug 2020 14:30:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_f58d042c27179f8d4657da5621927d1b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is Your Data Safer When Employees Aren't Working From Home? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is Your Data Safer When Employees Aren't Working From Home? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss with Sherpa Software president, Kevin Ogrodnik whether data is more vulnerable now that the majority of employees are working from home. 

https://www.linkedin.com/company/sherpa-software/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942800</link>
      <enclosure url="https://content.rss.com/episodes/207971/942800/ciso-talks/asset_047c4fe2d0fc861d788b00a0e6440e60.mp3" length="7578017" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/870530422</guid>
      <itunes:duration>473</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 Aug 2020 14:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_047c4fe2d0fc861d788b00a0e6440e60.jpg"/>
    </item>
    <item>
      <title><![CDATA[What Is Zero Trust Security? | CISO Talks]]></title>
      <itunes:title><![CDATA[What Is Zero Trust Security? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with Joseph Carson from Thycotic about his definition of zero trust and what it means for the cybersecurity industry. 

Check Joseph's profile out here: http://bit.ly/2FQfh1p
Cyber Security for Dummies: http://bit.ly/2UDUHvr

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942801</link>
      <enclosure url="https://content.rss.com/episodes/207971/942801/ciso-talks/asset_00bd726931544b76f6420bb4138f7bc5.mp3" length="11682794" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/862507849</guid>
      <itunes:duration>730</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 22 Jul 2020 14:32:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_00bd726931544b76f6420bb4138f7bc5.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Covid-19 Exploit | CISO Talks]]></title>
      <itunes:title><![CDATA[The Covid-19 Exploit | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we speak with Ian Murphy about some of the ways in which some organizations have been exploiting covid-19 to promote their products. 

We also speak about the NHS and everyone at Lepide are eternally thankful for all the hard work & hours put in to combat the pandemic. 

Ian Murphy: https://www.linkedin.com/in/ianmurphy/

For more information on COVID-19, please visit:
https://www.nhs.uk/conditions/coronavirus-covid-19/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942802</link>
      <enclosure url="https://content.rss.com/episodes/207971/942802/ciso-talks/asset_3f5ae3170f0dd9ba6d6c2e436405f4d8.mp3" length="8862405" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/854267821</guid>
      <itunes:duration>553</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 08 Jul 2020 14:30:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_3f5ae3170f0dd9ba6d6c2e436405f4d8.jpg"/>
    </item>
    <item>
      <title><![CDATA[Running An Infosec Business From Home: Is It Possible? | CISO Talks]]></title>
      <itunes:title><![CDATA[Running An Infosec Business From Home: Is It Possible? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this weeks episode, we speak with Ian Murphy (LMNTRIX) about some of the challenges faced when running an Infosec business from home. 

Ian Murphy: https://www.linkedin.com/in/ianmurphy/

For more information on COVID-19, please visit:
https://www.nhs.uk/conditions/coronavirus-covid-19/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942803</link>
      <enclosure url="https://content.rss.com/episodes/207971/942803/ciso-talks/asset_fa39ac42f6a1e78bcf28713d3710dc39.mp3" length="5838470" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/845856376</guid>
      <itunes:duration>364</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Jun 2020 14:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_fa39ac42f6a1e78bcf28713d3710dc39.jpg"/>
    </item>
    <item>
      <title><![CDATA[How COVID-19 Has Changed Cybersecurity So Far | CISO Talks]]></title>
      <itunes:title><![CDATA[How COVID-19 Has Changed Cybersecurity So Far | CISO Talks]]></itunes:title>
      <description><![CDATA[In this weeks episode, we speak with Ian Murphy (LMNTRIX) on how Covid-19 has affected the cybersecurity industry so far. 

Ian Murphy: https://www.linkedin.com/in/ianmurphy/

For more information on COVID-19, please visit:
https://www.nhs.uk/conditions/coronavirus-covid-19/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942805</link>
      <enclosure url="https://content.rss.com/episodes/207971/942805/ciso-talks/asset_6a36cba4ee6159b6ee058a83d6455231.mp3" length="6184541" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/837601165</guid>
      <itunes:duration>386</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Jun 2020 14:30:38 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6a36cba4ee6159b6ee058a83d6455231.jpg"/>
    </item>
    <item>
      <title><![CDATA[Rethinking InfoSec with Greg Van Der Gaast | CISO Talks]]></title>
      <itunes:title><![CDATA[Rethinking InfoSec with Greg Van Der Gaast | CISO Talks]]></itunes:title>
      <description><![CDATA[CISO, Greg Van Der Gaast talks to us about his new book and what inspired him to write it.

Rethinking InfoSec: https://www.amazon.co.uk/Rethinking-InfoSec-Thoughts-Information-Leadership-ebook/dp/B084KJSH92

Greg Van Der Gaast: 
https://www.linkedin.com/in/gregvandergaast/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942806</link>
      <enclosure url="https://content.rss.com/episodes/207971/942806/ciso-talks/asset_102bc86311ab9a12728c81b51c08f72a.mp3" length="11162434" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/829030552</guid>
      <itunes:duration>697</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 May 2020 14:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_102bc86311ab9a12728c81b51c08f72a.jpg"/>
    </item>
    <item>
      <title><![CDATA[A Simple Analogy That Promotes a Huge Problem in Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[A Simple Analogy That Promotes a Huge Problem in Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[CISO, Greg Van Der Gaast provides us with a simple but very effective analogy that pinpoints a large scale problem in cybersecurity. 

Greg Van Der Gaast: 
https://www.linkedin.com/in/gregvandergaast/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942807</link>
      <enclosure url="https://content.rss.com/episodes/207971/942807/ciso-talks/asset_7da5c9d0807b6b3e483477f43bbef19f.mp3" length="6648893" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/819501058</guid>
      <itunes:duration>415</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 May 2020 14:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_7da5c9d0807b6b3e483477f43bbef19f.jpg"/>
    </item>
    <item>
      <title><![CDATA[CISO Gives Honest Thoughts On Lepide Data Security Platform | CISO Talks]]></title>
      <itunes:title><![CDATA[CISO Gives Honest Thoughts On Lepide Data Security Platform | CISO Talks]]></itunes:title>
      <description><![CDATA[CISO, Greg Van Der Gaast kindly takes the time to talk about our data security platform and how it can be effectively utilized in the workplace. 

Greg Van Der Gaast: 
https://www.linkedin.com/in/gregvandergaast/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942808</link>
      <enclosure url="https://content.rss.com/episodes/207971/942808/ciso-talks/asset_cb20ad5ea2ec804a42a7c51b670c7e5a.mp3" length="10270928" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/809780437</guid>
      <itunes:duration>641</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 29 Apr 2020 14:30:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_cb20ad5ea2ec804a42a7c51b670c7e5a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Biggest Misconceptions That Enterprises Have On Security Teams | CISO Talks]]></title>
      <itunes:title><![CDATA[The Biggest Misconceptions That Enterprises Have On Security Teams | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk with CISO of Just Eat, Kevin Fielder about some of the main misconceptions that enterprises have on security teams.

Kevin Fielder (CISO - Just Eat):
https://www.linkedin.com/in/kevinfielder/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942809</link>
      <enclosure url="https://content.rss.com/episodes/207971/942809/ciso-talks/asset_7c0aab030457de1e2469da42225f53b6.mp3" length="8750392" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/799199746</guid>
      <itunes:duration>546</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 Apr 2020 14:30:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_7c0aab030457de1e2469da42225f53b6.jpg"/>
    </item>
    <item>
      <title><![CDATA[Building Strong Security Teams To Keep Your Company Safe Ft. Kevin Fielder (CISO @ Just Eat)]]></title>
      <itunes:title><![CDATA[Building Strong Security Teams To Keep Your Company Safe Ft. Kevin Fielder (CISO @ Just Eat)]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we talk with CISO of Just Eat, Kevin Fielder about security teams and the general steps to take in order to build a strong and successful security team to protect your organization. 

Kevin Fielder (CISO - Just Eat):
https://www.linkedin.com/in/kevinfielder/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942810</link>
      <enclosure url="https://content.rss.com/episodes/207971/942810/ciso-talks/asset_9f2a8840b79a5470da368d4cfd851ac5.mp3" length="6450363" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/788295979</guid>
      <itunes:duration>403</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 01 Apr 2020 14:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_9f2a8840b79a5470da368d4cfd851ac5.jpg"/>
    </item>
    <item>
      <title><![CDATA[How Will COVID-19 Impact Cybersecurity? | CISO Talks]]></title>
      <itunes:title><![CDATA[How Will COVID-19 Impact Cybersecurity? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we spoke with CISO of Just Eat, Kevin Fielder about the impact that COVID-19 will have on security teams as well as the industry in general. 

For more information on COVID-19, please visit:
https://www.nhs.uk/conditions/coronavirus-covid-19/

Kevin Fielder (CISO - Just Eat):
https://www.linkedin.com/in/kevinfielder/

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942811</link>
      <enclosure url="https://content.rss.com/episodes/207971/942811/ciso-talks/asset_8f34fa2331a9b1e398f2250a5f8fd378.mp3" length="5638686" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/778250725</guid>
      <itunes:duration>352</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 18 Mar 2020 15:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_8f34fa2331a9b1e398f2250a5f8fd378.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Top 3 Most Debated Topics on CISO Talks]]></title>
      <itunes:title><![CDATA[The Top 3 Most Debated Topics on CISO Talks]]></itunes:title>
      <description><![CDATA[Since the beginning of CISO Talks in early 2019 we have spoken to many CISOs, board members & I.T. professionals about some of the biggest challenges faced in the industry today for CISOs as well as the cybersecurity space in general. We have put together a video showcasing the common themes that came up across each episode. 

I.T. Professionals in this video:
- Joseph Carson, CISSP, CSPO - Thycotic
- James Goepel - Cybersecurity Maturity Model Certification Accrediation Body (CMMC AB)
- Jane Frankland - #CISOAdvisor
- Eliza-May Austin - th4ts3cur1ty.company
- Greg van der Gaast - Proactive InfoSec - The University of Salford
- Chris Bedel, CISM - #VirtualCISO

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942812</link>
      <enclosure url="https://content.rss.com/episodes/207971/942812/ciso-talks/asset_bdf7be4419470812eecce7bd428070e4.mp3" length="9754748" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/774482677</guid>
      <itunes:duration>609</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Mar 2020 18:00:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_bdf7be4419470812eecce7bd428070e4.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Role of A.I. for Cyber Defence and Attack | CISO Talks]]></title>
      <itunes:title><![CDATA[The Role of A.I. for Cyber Defence and Attack | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode, we talk with Joel Yonts from Malicious Streams on the prospect of A.I. How will it evolve? What can we gain/lose from its existence? Will there be an all out war between malicious and defending A.I. algorithms?

Joel Yonts: https://www.linkedin.com/in/joel-yont...

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942813</link>
      <enclosure url="https://content.rss.com/episodes/207971/942813/ciso-talks/asset_c3102610d13cad3c9ae8081c0832fe43.mp3" length="5239953" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/770648926</guid>
      <itunes:duration>327</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 04 Mar 2020 15:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c3102610d13cad3c9ae8081c0832fe43.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why CISOs Fail | CISO Talks]]></title>
      <itunes:title><![CDATA[Why CISOs Fail | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode we are joined with seasoned CISO, Joel Yonts (former long term CISO @ Advance Auto Parts). We talk about why most CISOs fail in the cybersecurity industry and what changes can be made to increase success rates. 

Joel Yonts: https://www.linkedin.com/in/joel-yont...

Also available on:
IGTV: https://www.instagram.com/instalepide...
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942814</link>
      <enclosure url="https://content.rss.com/episodes/207971/942814/ciso-talks/asset_0532d879a3ceeb9c2c1163349be8bf7c.mp3" length="4075101" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/766867384</guid>
      <itunes:duration>254</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 Feb 2020 15:35:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_0532d879a3ceeb9c2c1163349be8bf7c.jpg"/>
    </item>
    <item>
      <title><![CDATA[Keeping Up With The Evolving Threat Landscape | CISO Talks]]></title>
      <itunes:title><![CDATA[Keeping Up With The Evolving Threat Landscape | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we speak with Joel Yonts (Malicious Systems & former vice president / CISO of Advance Auto Parts) about the evolving threat landscape in cybersecurity and why it is getting increasingly harder to protect against threats today. 

Joel Yonts: https://www.linkedin.com/in/joel-yonts-91b555b/

Also available on:
IGTV: https://www.instagram.com/instalepide/channel/
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942815</link>
      <enclosure url="https://content.rss.com/episodes/207971/942815/ciso-talks/asset_28a3f39fa4998bd9c3e3c43056f49d2a.mp3" length="3792560" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/763172518</guid>
      <itunes:duration>237</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 19 Feb 2020 15:49:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_28a3f39fa4998bd9c3e3c43056f49d2a.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why The CISO Role Is So Different | CISO Talks]]></title>
      <itunes:title><![CDATA[Why The CISO Role Is So Different | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss with Joel Yonts (Malicious Systems & former vice president / CISO of Advance Auto Parts) why the role of the CISO is so different than other roles within the cybersecurity industry. 

Joel Yonts: https://www.linkedin.com/in/joel-yonts-91b555b/

Also available on:
IGTV: https://www.instagram.com/instalepide/channel/
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942816</link>
      <enclosure url="https://content.rss.com/episodes/207971/942816/ciso-talks/asset_ea5c82d76ec879a856afa74931462bdf.mp3" length="5353220" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/759293047</guid>
      <itunes:duration>334</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 12 Feb 2020 15:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_ea5c82d76ec879a856afa74931462bdf.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Virtual CISOs are Becoming More Popular / Strategy vs. Technology / Common Security Strategies]]></title>
      <itunes:title><![CDATA[Why Virtual CISOs are Becoming More Popular / Strategy vs. Technology / Common Security Strategies]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss with virtual CISO, Chris Bedel, how and why are virtual CISOs becoming more and more popular moving into the new decade. We also talk about how effective security strategies are far more important than technology in the sense that tech won't solve your problems! Lastly, we discuss common strategies that organizations utilize across the industry. Which ones are effective and which ones are, not so effective...

Chris Bedel - Virtual CISO: 
https://www.linkedin.com/in/chris-bedel-cism-22b52924/

Also available on:
IGTV: https://www.instagram.com/instalepide/channel/
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942817</link>
      <enclosure url="https://content.rss.com/episodes/207971/942817/ciso-talks/asset_267b63fe328ffe75415d7c517b3dbb29.mp3" length="8995734" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/755412721</guid>
      <itunes:duration>562</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 Feb 2020 16:00:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_267b63fe328ffe75415d7c517b3dbb29.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Virtual CISO: A Closer Look | CISO Talks]]></title>
      <itunes:title><![CDATA[The Virtual CISO: A Closer Look | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we take a deeper dive into the role of the virtual CISO with Chris Bedel and discuss how they can be beneficial to a variety of organizations. 

Chris Bedel - Virtual CISO: 
https://www.linkedin.com/in/chris-bedel-cism-22b52924/

Also available on:
IGTV: https://www.instagram.com/instalepide/channel/
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942818</link>
      <enclosure url="https://content.rss.com/episodes/207971/942818/ciso-talks/asset_8400c137e348eafb1be9718121497a3f.mp3" length="8056162" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/751653286</guid>
      <itunes:duration>503</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 29 Jan 2020 18:34:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_8400c137e348eafb1be9718121497a3f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Will Humans In Cybersecurity Be Replaced By A.I.? | CISO Talks]]></title>
      <itunes:title><![CDATA[Will Humans In Cybersecurity Be Replaced By A.I.? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode we discuss the topic of A.I. with Paul Stringfellow (CEO @ Gardner Systems plc) and whether it will completely take over the cybersecurity industry.

Paul Stringfellow: 
https://www.linkedin.com/in/paul-stringfellow/

Gardner Systems plc:
https://www.gardnersystems.co.uk/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942819</link>
      <enclosure url="https://content.rss.com/episodes/207971/942819/ciso-talks/asset_d5ace3ecf5b64747513ac318f0c9cb39.mp3" length="7245321" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/747569743</guid>
      <itunes:duration>452</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 22 Jan 2020 15:00:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_d5ace3ecf5b64747513ac318f0c9cb39.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is It Actually Safe To Switch To The Cloud? | Has GDPR Impacted Our Safety? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is It Actually Safe To Switch To The Cloud? | Has GDPR Impacted Our Safety? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode, we discuss with Paul Stringfellow (CEO @ Gardner Systems plc) whether it is actually safe for organizations to move to the cloud. We also discuss how GDPR has changed the industry from a safety standpoint. Are we safer because of it? 

Paul Stringfellow: 
https://www.linkedin.com/in/paul-stringfellow/

Gardner Systems plc:
https://www.gardnersystems.co.uk/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942820</link>
      <enclosure url="https://content.rss.com/episodes/207971/942820/ciso-talks/asset_5972371e4f93b3e4eeba8aa9e4aecbc6.mp3" length="13638007" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/743795284</guid>
      <itunes:duration>852</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 Jan 2020 15:05:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_5972371e4f93b3e4eeba8aa9e4aecbc6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The New Age of Zero Trust | CISO Talks]]></title>
      <itunes:title><![CDATA[The New Age of Zero Trust | CISO Talks]]></itunes:title>
      <description><![CDATA[First things first. Happy new year everyone! We hope you had a good Christmas and we at Lepide wish you all a successful 2020. 

In this episode, we will discuss with Paul Stringfellow (Technical Director at Gardner Systems plc) that it is a must to have a data-centric security model in place for the new age of ‘zero trust’. We will talk about GDPR, all flash storage as well as channel partners and how organizations can begin their journey with creating a strong data-centric security model. 

Paul Stringfellow: 
https://www.linkedin.com/in/paul-stringfellow/

Gardner Systems plc:
https://www.gardnersystems.co.uk/

Also available on:

Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:

LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942821</link>
      <enclosure url="https://content.rss.com/episodes/207971/942821/ciso-talks/asset_e4743afc192ef6ca74bb7c31c19997c0.mp3" length="11297017" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/740125576</guid>
      <itunes:duration>706</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 08 Jan 2020 15:00:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_e4743afc192ef6ca74bb7c31c19997c0.jpg"/>
    </item>
    <item>
      <title><![CDATA[How To Improve The CISO / Vendor Relationship | CISO Talks]]></title>
      <itunes:title><![CDATA[How To Improve The CISO / Vendor Relationship | CISO Talks]]></itunes:title>
      <description><![CDATA[Most CISO \ vendor relationships in the industry today are toxic. Many vendors struggle to form good relationships with CISOs due to their approach in effectively selling their solution to them. 

Whereas CISOs simply don't have the time to listen to the vast number of vendors and often the case, patience is lost and the idea of this broken vendor / CISO relationship is enforced.

Can this relationship be improved? We discuss this probability with Tinesh Chhaya (CEO & founder of Decipher Cyber). 

Check out Tinesh's article on the cybersecurity land of confusion: 
https://www.linkedin.com/pulse/you-lo...

Tinesh Chhaya - CEO & founder of Decipher Cyber ltd:
https://www.linkedin.com/in/tinesh-ch...

Also available on:

Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:

LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942822</link>
      <enclosure url="https://content.rss.com/episodes/207971/942822/ciso-talks/asset_6a77a5602e4365361075f1250b127197.mp3" length="5126268" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/729489091</guid>
      <itunes:duration>320</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 18 Dec 2019 13:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6a77a5602e4365361075f1250b127197.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Future of Finding The Right Vendor | CISO Talks]]></title>
      <itunes:title><![CDATA[The Future of Finding The Right Vendor | CISO Talks]]></itunes:title>
      <description><![CDATA[The cybersecurity industry is growing at an immense pace. There are thousands of vendors all wanting to be heard. But how do you cut through the noise to find the right one for your business? Tinesh Chhaya (CEO & founder of Decipher Cyber) has a fantastic solution to greatly reduce the stress and time taken to find the perfect solution. 

Check out Tinesh's article on the cybersecurity land of confusion: 
https://www.linkedin.com/pulse/you-lost-cyber-land-confusion-tinesh-chhaya/

Tinesh Chhaya - CEO & founder of Decipher Cyber ltd:
https://www.linkedin.com/in/tinesh-chhaya-07623097/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:

LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942823</link>
      <enclosure url="https://content.rss.com/episodes/207971/942823/ciso-talks/asset_2d39ce01c172ba231eb5338d3583d8fb.mp3" length="11995427" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/726179695</guid>
      <itunes:duration>749</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Dec 2019 13:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_2d39ce01c172ba231eb5338d3583d8fb.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Cyber Land of Confusion | CISO Talks]]></title>
      <itunes:title><![CDATA[The Cyber Land of Confusion | CISO Talks]]></itunes:title>
      <description><![CDATA[There are a multitude of vendors within the cybersecurity industry. There are roughly 4000+ emerging organizations who all want to be heard. Therefore creating this land of confusion where CISOs and I.T. directors etc. have immense difficulty cutting through the noise. We discuss with Tinesh Chhaya (CEO & founder of Decipher Cyber ltd), ways in which CISOs and organizations can in fact cut through the noise and target an appropriate solution. What is real and what is just 'marketing'? 

Check out Tinesh's article on the cybersecurity land of confusion: 
https://www.linkedin.com/pulse/you-lost-cyber-land-confusion-tinesh-chhaya/

Tinesh Chhaya - CEO & founder of Decipher Cyber ltd:
https://www.linkedin.com/in/tinesh-chhaya-07623097/

Also available on:

Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:

LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942824</link>
      <enclosure url="https://content.rss.com/episodes/207971/942824/ciso-talks/asset_4cdecd359b3bb1abf20d534e1e5dd384.mp3" length="10582725" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/722650156</guid>
      <itunes:duration>661</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 04 Dec 2019 15:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_4cdecd359b3bb1abf20d534e1e5dd384.jpg"/>
    </item>
    <item>
      <title><![CDATA[Cyber Attacks Will Soon Kill People | CISO Talks]]></title>
      <itunes:title><![CDATA[Cyber Attacks Will Soon Kill People | CISO Talks]]></itunes:title>
      <description><![CDATA[Cyber attacks will soon kill people, either deliberately or unintentionally. Hospitals will get shut down, A.I. assisted vehicles will be hacked and modified to venture off course. As technology advances, the avenue for cyber crime only gets larger. 

In this episode of CISO Talks we welcome Maikel Roolvink (manager security operations) from Dutch Technology eXperts. 

Visit DTX's website for more information on what they can do for you:
https://dtx.nl/

Maikel Roolvink: https://www.linkedin.com/in/twfpa2vs/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942825</link>
      <enclosure url="https://content.rss.com/episodes/207971/942825/ciso-talks/asset_a3aa5c3c5ff1315f520c81fe2180f7b4.mp3" length="5277987" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/715828096</guid>
      <itunes:duration>329</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Nov 2019 13:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_a3aa5c3c5ff1315f520c81fe2180f7b4.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is It Getting Harder To Find The Right Cybersecurity Solution? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is It Getting Harder To Find The Right Cybersecurity Solution? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we welcome Maikel Roolvink (manager security operations) from Dutch Technology eXperts. 

We discuss whether the protection of sensitive data is a business or IT problem as well as talking about companies being reluctant to switch to the cloud. Lastly, we ask the question, is it getting harder to find the right cybersecurity solution for your business? Maikel gives us his thoughts on the topics at hand!

Visit DTX's website for more information on what they can do for you:
https://dtx.nl/

Maikel Roolvink: https://www.linkedin.com/in/twfpa2vs/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942826</link>
      <enclosure url="https://content.rss.com/episodes/207971/942826/ciso-talks/asset_beb0a38b906bb2aef48ad37ac786c6b4.mp3" length="6222993" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/712159324</guid>
      <itunes:duration>388</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Nov 2019 13:30:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_beb0a38b906bb2aef48ad37ac786c6b4.jpg"/>
    </item>
    <item>
      <title><![CDATA[Mental Health Is Getting Worse In Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Mental Health Is Getting Worse In Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks we discuss the fact that mental health problems are on the rise in cybersecurity. We talk about ways in which organizations as well as employees themselves can combat a variety of problems and triggers to hopefully improve their mental health.

Check Joseph's profile out here: http://bit.ly/2FQfh1p
Cyber Security for Dummies: http://bit.ly/2UDUHvr

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942827</link>
      <enclosure url="https://content.rss.com/episodes/207971/942827/ciso-talks/asset_13cf2f83f12d799a624d6304438e4ed5.mp3" length="8924681" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/700019842</guid>
      <itunes:duration>557</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Oct 2019 12:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_13cf2f83f12d799a624d6304438e4ed5.jpg"/>
    </item>
    <item>
      <title><![CDATA[Getting The Board To Understand Cyber-Risk | CISO Talks]]></title>
      <itunes:title><![CDATA[Getting The Board To Understand Cyber-Risk | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode of CISO Talks, we discuss with Joseph Carson (from Thycotic) ways in which CISOs can effectively communicate with the board for them to understand cyber-risk. We go over some of the key questions that should be asked to increase the success rate of the process. 

Check Joseph's profile out here: http://bit.ly/2FQfh1p
Cyber Security for Dummies: http://bit.ly/2UDUHvr

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942828</link>
      <enclosure url="https://content.rss.com/episodes/207971/942828/ciso-talks/asset_bdf128339cb974b147868e33022ecb68.mp3" length="9334699" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/696871577</guid>
      <itunes:duration>583</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Oct 2019 12:30:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_bdf128339cb974b147868e33022ecb68.jpg"/>
    </item>
    <item>
      <title><![CDATA[Virtual CISOs: Are They Worth It? | CISO Talks]]></title>
      <itunes:title><![CDATA[Virtual CISOs: Are They Worth It? | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for part 1 with Joseph Carson (CSS & CISO advisory - Thycotic)as we discuss the effectiveness of a virtual CISO, weighing up the pros and cons against having a CISO in-house.

Check Joseph's profile out here: http://bit.ly/2FQfh1p
Cyber Security for Dummies: http://bit.ly/2UDUHvr

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942829</link>
      <enclosure url="https://content.rss.com/episodes/207971/942829/ciso-talks/asset_0f64f3532abef3ab831e0f119ada80d7.mp3" length="8946415" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/692744092</guid>
      <itunes:duration>559</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 09 Oct 2019 12:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_0f64f3532abef3ab831e0f119ada80d7.jpg"/>
    </item>
    <item>
      <title><![CDATA[Big Changes Are Coming To Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[Big Changes Are Coming To Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[There are big changes on the horizon within the cybersecurity industry and founder & CEO of STASH Secure Data, Janine Darling explains what these changes are and how they are going to affect the industry.

Connect with Janine: https://www.linkedin.com/in/janinedar...

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942830</link>
      <enclosure url="https://content.rss.com/episodes/207971/942830/ciso-talks/asset_f2019f3a97949614f4127248e753d2af.mp3" length="7226095" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/689918437</guid>
      <itunes:duration>451</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Oct 2019 12:30:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_f2019f3a97949614f4127248e753d2af.jpg"/>
    </item>
    <item>
      <title><![CDATA[If You Are a CISO, Watch This | CISO Talks]]></title>
      <itunes:title><![CDATA[If You Are a CISO, Watch This | CISO Talks]]></itunes:title>
      <description><![CDATA[In part 3 with CEO & founder of STASH Secure Data, Janine Darling, we discuss the role of the analyst and whether it can add any reasonable value to your organization. 

Connect with Janine: https://www.linkedin.com/in/janinedarling1/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942831</link>
      <enclosure url="https://content.rss.com/episodes/207971/942831/ciso-talks/asset_57d9f03019ff25d178dffb5d2b530a97.mp3" length="9434591" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/686463982</guid>
      <itunes:duration>589</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 25 Sep 2019 12:30:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_57d9f03019ff25d178dffb5d2b530a97.jpg"/>
    </item>
    <item>
      <title><![CDATA[Employee Shortages & Skill Gaps In Cybersecurity]]></title>
      <itunes:title><![CDATA[Employee Shortages & Skill Gaps In Cybersecurity]]></itunes:title>
      <description><![CDATA[In the 2nd part with CEO & founder of STASH Secure Data, Janine Darling, we discuss the current shortages of people within the industry and how skill gaps could provide reasoning for this. 

Connect with Janine: https://www.linkedin.com/in/janinedarling1/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942832</link>
      <enclosure url="https://content.rss.com/episodes/207971/942832/ciso-talks/asset_55d56c2990516f7cedbaede12362b60c.mp3" length="9800723" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/682785995</guid>
      <itunes:duration>612</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 18 Sep 2019 12:30:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_55d56c2990516f7cedbaede12362b60c.jpg"/>
    </item>
    <item>
      <title><![CDATA[Become Proactive To Protect Your Data | CISO Talks]]></title>
      <itunes:title><![CDATA[Become Proactive To Protect Your Data | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode, our CTO, Danny Murphy sits down with the founder & CEO of STASH Secure Data, Janine Darling to discuss the actual 'holy grail' of your business and ways in which you and your organization can become proactive to protect your most sensitive data. 

Connect with Janine: https://www.linkedin.com/in/janinedarling1/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942833</link>
      <enclosure url="https://content.rss.com/episodes/207971/942833/ciso-talks/asset_94485526c9597f21d4bb3d948a2138e9.mp3" length="8133066" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/679519631</guid>
      <itunes:duration>508</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Sep 2019 11:44:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_94485526c9597f21d4bb3d948a2138e9.jpg"/>
    </item>
    <item>
      <title><![CDATA[Escaping Loneliness and Finding Trust | CISO Talks]]></title>
      <itunes:title><![CDATA[Escaping Loneliness and Finding Trust | CISO Talks]]></itunes:title>
      <description><![CDATA[In this final episode with Jane Frankland, we discuss whether CISOs should be technically minded as well as great communicators. We also talk about the role of a CISO being considered as quite lonely. How can CISOs break away from loneliness and find trust within the industry especially when searching for a vendor solution. 

Follow Jane on LinkedIn: https://www.linkedin.com/in/janefrank...

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942834</link>
      <enclosure url="https://content.rss.com/episodes/207971/942834/ciso-talks/asset_01fd35ab027b19f1ca1bd9c525b84a32.mp3" length="10426826" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/676167917</guid>
      <itunes:duration>651</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 04 Sep 2019 12:00:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_01fd35ab027b19f1ca1bd9c525b84a32.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is Failure The Key To Success In Data Security? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is Failure The Key To Success In Data Security? | CISO Talks]]></itunes:title>
      <description><![CDATA[In the penultimate episode with Jane Frankland, we discuss the idea of failure in data security and how it is simply not an option. Should the idea of failure become more welcomed to achieve better results? 

Comment your thoughts, get involved with the debate!

Follow Jane on LinkedIn: https://www.linkedin.com/in/janefrank...

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942835</link>
      <enclosure url="https://content.rss.com/episodes/207971/942835/ciso-talks/asset_263fe29653e22782d8432fa566adf131.mp3" length="10399241" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/672163664</guid>
      <itunes:duration>650</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 28 Aug 2019 12:18:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_263fe29653e22782d8432fa566adf131.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Life Of The CISO Today | CISO Talks]]></title>
      <itunes:title><![CDATA[The Life Of The CISO Today | CISO Talks]]></itunes:title>
      <description><![CDATA[What is the life of a CISO really like today? Is it easier or tougher than it has been in the past? We discuss this with Jane Frankland. 

Follow Jane on LinkedIn: https://www.linkedin.com/in/janefrank...

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942836</link>
      <enclosure url="https://content.rss.com/episodes/207971/942836/ciso-talks/asset_f93ce771f792f9bd5049f12ffbff6aff.mp3" length="10682199" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/668924894</guid>
      <itunes:duration>667</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 21 Aug 2019 11:16:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_f93ce771f792f9bd5049f12ffbff6aff.jpg"/>
    </item>
    <item>
      <title><![CDATA[We Need More Female Leaders In Cybersecurity | CISO Talks]]></title>
      <itunes:title><![CDATA[We Need More Female Leaders In Cybersecurity | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode, we discuss with cybersecurity entrepreneur, Jane Frankland about the importance of women in the industry and how many organizations have seen positive effects by having female leaders.

Follow Jane on LinkedIn: https://www.linkedin.com/in/janefrankland/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942837</link>
      <enclosure url="https://content.rss.com/episodes/207971/942837/ciso-talks/asset_650f80a1df4604b809750b7288060a04.mp3" length="11303287" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/665677310</guid>
      <itunes:duration>706</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 14 Aug 2019 14:02:54 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_650f80a1df4604b809750b7288060a04.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is Data What Really Matters? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is Data What Really Matters? | CISO Talks]]></itunes:title>
      <description><![CDATA[In this episode, we continue our chat with Eliza May Austin. She is the CEO and Founder of Th4ts3cur1ty.company. In this talk, we cover whether data is the single most important factor within a business. 

Check out Eliza's Profile: https://www.linkedin.com/in/elizamayaustin/
Th4ts3cur1ty.company website: https://th4ts3cur1ty.company/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942838</link>
      <enclosure url="https://content.rss.com/episodes/207971/942838/ciso-talks/asset_5acbcadc6d0e48b41b213d1a6233c6fb.mp3" length="11225546" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/662451740</guid>
      <itunes:duration>701</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 07 Aug 2019 14:10:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_5acbcadc6d0e48b41b213d1a6233c6fb.jpg"/>
    </item>
    <item>
      <title><![CDATA[Knowledge is Power | CISO Talks]]></title>
      <itunes:title><![CDATA[Knowledge is Power | CISO Talks]]></itunes:title>
      <description><![CDATA[In the second part of our talk with Eliza, we go over the ups and downs of CISOs, the education system and finally we talk about Eliza's company.

Check out Eliza's Profile: https://www.linkedin.com/in/elizamaya...
Th4ts3cur1ty.company website: https://th4ts3cur1ty.company/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942839</link>
      <enclosure url="https://content.rss.com/episodes/207971/942839/ciso-talks/asset_9153a34c923df9dbc945fa6da90e578c.mp3" length="10950111" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/658450658</guid>
      <itunes:duration>684</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 31 Jul 2019 12:00:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_9153a34c923df9dbc945fa6da90e578c.jpg"/>
    </item>
    <item>
      <title><![CDATA[Learn Security Concepts, Not Vendor Solutions | CISO Talks]]></title>
      <itunes:title><![CDATA[Learn Security Concepts, Not Vendor Solutions | CISO Talks]]></itunes:title>
      <description><![CDATA[The next guest on our CISO Talks Podcast is Eliza May Austin, she is CEO and Founder of  Th4ts3cur1ty.company. In this talk, we talk about The Ladies of London Hacking Society, Why security has been made difficult. Also, are the big trade events all there cracked up to be, or is there more value at a smaller scale event and meetups?

Check out Eliza's Profile: https://www.linkedin.com/in/elizamayaustin/
Th4ts3cur1ty.company website: https://th4ts3cur1ty.company/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942840</link>
      <enclosure url="https://content.rss.com/episodes/207971/942840/ciso-talks/asset_c49141a95266365a2cea6fd6434f165c.mp3" length="9678679" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/655675583</guid>
      <itunes:duration>604</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Jul 2019 11:28:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c49141a95266365a2cea6fd6434f165c.jpg"/>
    </item>
    <item>
      <title><![CDATA[Security Should Be About Enabling Users | CISO Talks]]></title>
      <itunes:title><![CDATA[Security Should Be About Enabling Users | CISO Talks]]></itunes:title>
      <description><![CDATA[When data was tangible we took better care of it, now that 90% of data is digital it seems as if we have lost respect for it.

The best thing about the internet is that it gives you access to everything, but the worse thing about the internet is that it gives everything access to you!

Check out at Fraser's profile - https://www.linkedin.com/in/fraserkyne/
Bromium - https://www.bromium.com/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942841</link>
      <enclosure url="https://content.rss.com/episodes/207971/942841/ciso-talks/asset_ec626020a3272dbe022c363c83580d66.mp3" length="7969226" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/652401173</guid>
      <itunes:duration>498</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 17 Jul 2019 11:27:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_ec626020a3272dbe022c363c83580d66.jpg"/>
    </item>
    <item>
      <title><![CDATA[Start configuring your cybersecurity solutions properly | CISO Talks]]></title>
      <itunes:title><![CDATA[Start configuring your cybersecurity solutions properly | CISO Talks]]></itunes:title>
      <description><![CDATA[In the third part of our talk with Fraser, we look at how businesses should be checking their current solutions to make sure they are getting the most ROI out of them. Also how some businesses will have a brilliant security protocol but not apply it to all their employees. Also how the role of a CISO should be to make security easy for everyone.

Check out at Fraser's profile - https://www.linkedin.com/in/fraserkyne/
Bromium - https://www.bromium.com/

Also available on:
Sound cloud: http://bit.ly/2MYHwxR
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942842</link>
      <enclosure url="https://content.rss.com/episodes/207971/942842/ciso-talks/asset_c23d0123cde676840e0db90390e63073.mp3" length="10820962" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/649056812</guid>
      <itunes:duration>676</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Jul 2019 11:57:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c23d0123cde676840e0db90390e63073.jpg"/>
    </item>
    <item>
      <title><![CDATA[Multiple solutions do not work | CISO Talks]]></title>
      <itunes:title><![CDATA[Multiple solutions do not work | CISO Talks]]></itunes:title>
      <description><![CDATA[In the next part of our chat with Fraser, we hit on how being different from your competition can be a double-edged sword. How you need to review the security solutions you have to make sure they are still providing value to your business and if you going to have multiple solutions, you need to innovate to make them work together.

Check out at Fraser's profile - https://www.linkedin.com/in/fraserkyne/
Bromium - https://www.bromium.com/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942843</link>
      <enclosure url="https://content.rss.com/episodes/207971/942843/ciso-talks/asset_ee0aa8183c59e1bfee4384ece8a03533.mp3" length="10301857" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/645606717</guid>
      <itunes:duration>643</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 03 Jul 2019 12:00:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_ee0aa8183c59e1bfee4384ece8a03533.jpg"/>
    </item>
    <item>
      <title><![CDATA[How do you complete the cybersecurity puzzle | CISO Talks]]></title>
      <itunes:title><![CDATA[How do you complete the cybersecurity puzzle | CISO Talks]]></itunes:title>
      <description><![CDATA[Cybersecurity is one big jigsaw puzzle and solutions are just one piece of many. We speak with Fraser Kyne from Bromium about what we (cybersecurity) could be doing differently. Also, touch on how to build trust in the vendor relationship and how to mitigate risk. Also, how do you decide between what is urgent and what is important, when it comes to solving your cybersecurity problems.

Check out at Fraser's profile - https://www.linkedin.com/in/fraserkyne/
Bromium - https://www.bromium.com/


Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942844</link>
      <enclosure url="https://content.rss.com/episodes/207971/942844/ciso-talks/asset_78f8b3e1fa133f7a7e1b9c01c567767f.mp3" length="11074245" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/642319236</guid>
      <itunes:duration>692</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 Jun 2019 12:21:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_78f8b3e1fa133f7a7e1b9c01c567767f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why InfoSecurity Europe Needs To Change | CISO Talks]]></title>
      <itunes:title><![CDATA[Why InfoSecurity Europe Needs To Change | CISO Talks]]></itunes:title>
      <description><![CDATA[At InfoSecurity Europe 2019, we sat down with our friend Joseph Carson (advisory CISO to Thycotic) to talk through a number of hot cybersecurity topics vendors were promoting. Are vendors talking about the right things? What are we still getting wrong? And how do we fix it?

Check out LepideAuditor here: http://bit.ly/2Ic6ERb
Check Joseph's profile out here: http://bit.ly/2FQfh1p
Cyber Security for Dummies: http://bit.ly/2UDUHvr

Also available on:
Sound cloud: http://bit.ly/2MYHwxR
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media:
LinkedIn: http://bit.ly/2FWHKoM
Twitter: http://bit.ly/2FWNO0C
Instagram: http://bit.ly/2FWMxXj
Facebook: http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942845</link>
      <enclosure url="https://content.rss.com/episodes/207971/942845/ciso-talks/asset_6df7ec436fd03ad9f77d2c5325f9e4b1.mp3" length="8184000" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/635492253</guid>
      <itunes:duration>341</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 12 Jun 2019 11:24:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6df7ec436fd03ad9f77d2c5325f9e4b1.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Visibility is the Key to Security | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Visibility is the Key to Security | CISO Talks]]></itunes:title>
      <description><![CDATA[In the final part of our talk with Greg, we look at what happens to a CISO after a data breach and whether it's possible to have effective cybersecurity if you don't have visibility over your systems.

Check out Greg's profile: https://www.linkedin.com/in/gregvande...
Creative Mind Consulting Group: https://cm-infosec.co.uk/
Thanks to Rullion: https://www.rullion.co.uk/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942846</link>
      <enclosure url="https://content.rss.com/episodes/207971/942846/ciso-talks/asset_7e6bc265aadb81e27466e9c7709e146a.mp3" length="11433272" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/630837138</guid>
      <itunes:duration>714</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 Jun 2019 11:00:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_7e6bc265aadb81e27466e9c7709e146a.jpg"/>
    </item>
    <item>
      <title><![CDATA[CISOs Need to Be Curious | CISO Talks]]></title>
      <itunes:title><![CDATA[CISOs Need to Be Curious | CISO Talks]]></itunes:title>
      <description><![CDATA[Aidan and Greg dive into the details of Cybersecurity and how risks are often overlooked because no one has taken the time to look closer at the decisions being made. CISOs need to have more curiosity in their role.

Check out Greg's profile: https://www.linkedin.com/in/gregvande...
Creative Mind Consulting Group: https://cm-infosec.co.uk/
Thanks to Rullion: https://www.rullion.co.uk/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942847</link>
      <enclosure url="https://content.rss.com/episodes/207971/942847/ciso-talks/asset_89a48b89107ddae2863dc486a2802ebe.mp3" length="11855829" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/624701580</guid>
      <itunes:duration>741</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 22 May 2019 11:10:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_89a48b89107ddae2863dc486a2802ebe.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Are You Ignoring CyberSecurity Basics? | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Are You Ignoring CyberSecurity Basics? | CISO Talks]]></itunes:title>
      <description><![CDATA[On this episode of CISOTalks, we sit down with Greg van der Gaast, he is an executive advisor to CISOs and a teen hacker. We look back at how Cybersecurity has evolved but how some of the basics that weren't be addressed 10 plus years ago are still being ignored today!

Check out Greg's profile: https://www.linkedin.com/in/gregvandergaast/
Creative Mind Consulting Group: https://cm-infosec.co.uk/
Thanks to Rullion: https://www.rullion.co.uk/

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942848</link>
      <enclosure url="https://content.rss.com/episodes/207971/942848/ciso-talks/asset_74326103cf3ff2e46c3f703dc0d8f5a7.mp3" length="13077523" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/620921028</guid>
      <itunes:duration>817</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 May 2019 10:18:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_74326103cf3ff2e46c3f703dc0d8f5a7.jpg"/>
    </item>
    <item>
      <title><![CDATA[Getting a Return on Your Cybersecurity Investment | CISO Talks]]></title>
      <itunes:title><![CDATA[Getting a Return on Your Cybersecurity Investment | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for the final part of our chat with Ian Murphy. In this episode, we cover how to get ROI on your cybersecurity investment and how to show that to the board. 

Check out Ian's profile: https://www.linkedin.com/in/ianmurphy/
Check out LMNTRIX: https://www.lmntrix.com/

Also available on:
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942849</link>
      <enclosure url="https://content.rss.com/episodes/207971/942849/ciso-talks/asset_bdd8b30779fd6c57a9574ea1f7f23e7b.mp3" length="4038738" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/617445498</guid>
      <itunes:duration>252</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 08 May 2019 11:29:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_bdd8b30779fd6c57a9574ea1f7f23e7b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Selling Cybersecurity - Advice for Vendors | CISO Talks]]></title>
      <itunes:title><![CDATA[Selling Cybersecurity - Advice for Vendors | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us as this week we continue our chat with Ian Murphy (VP of EMEA at LMNTRIX). In this episode, we discuss the dos and don'ts of selling cybersecurity.

Do you think vendors need to change their approach to selling cybersecurity?]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942850</link>
      <enclosure url="https://content.rss.com/episodes/207971/942850/ciso-talks/asset_b269dd003d8145aae0089ea60adf8a34.mp3" length="7784070" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/614119971</guid>
      <itunes:duration>486</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 01 May 2019 13:29:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_b269dd003d8145aae0089ea60adf8a34.jpg"/>
    </item>
    <item>
      <title><![CDATA[Looking for that silver bullet to cybersecurity? | CISO Talks]]></title>
      <itunes:title><![CDATA[Looking for that silver bullet to cybersecurity? | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us as we speak with Ian Murphy, VP of EMEA at LMNTRIX. In this episode, we cover how vendors are often miss-selling and miss communicating their offerings. How customers should best research vendors and find out more about the kind of cybersecurity solution that there business needs. Then we touch on how prospects are looking for and are sold the silver bullet to cybersecurity when in reality that's not what they're getting. 

Check out Ian's profile: https://www.linkedin.com/in/ianmurphy/
Check out LMNTRIX: https://www.lmntrix.com/

Also available on:
Sound cloud: http://bit.ly/2MYHwxR
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942851</link>
      <enclosure url="https://content.rss.com/episodes/207971/942851/ciso-talks/asset_f31c2605a8eff9e0862e113c7e14bb49.mp3" length="8622914" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/610678050</guid>
      <itunes:duration>538</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Apr 2019 12:18:10 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_f31c2605a8eff9e0862e113c7e14bb49.jpg"/>
    </item>
    <item>
      <title><![CDATA[Privileged Access Management for Dummies | CISO Talks]]></title>
      <itunes:title><![CDATA[Privileged Access Management for Dummies | CISO Talks]]></itunes:title>
      <description><![CDATA[In our third and final part of our talk with Joseph Carson, we cover what least privilege is and what it means to have PAM in place in the business environment. We also talk about why more businesses aren't using least privilege in the workplace and finally cover Cyber Security for Dummies book that Joseph helped write.

Check Joseph's profile out here: http://bit.ly/2FQfh1p
Cyber Security for Dummies: http://bit.ly/2UDUHvr

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942852</link>
      <enclosure url="https://content.rss.com/episodes/207971/942852/ciso-talks/asset_17097919ce4e4bebbfe3143ef240a56d.mp3" length="6372204" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/607260165</guid>
      <itunes:duration>398</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 17 Apr 2019 09:28:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_17097919ce4e4bebbfe3143ef240a56d.jpg"/>
    </item>
    <item>
      <title><![CDATA[Translating Security into the Workplace | CISO Talks]]></title>
      <itunes:title><![CDATA[Translating Security into the Workplace | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for part 2 of our chat with Joseph Carson, where we dive deeper into how Security can affect the workplace. In this episode we talk about how being compliant doesn't mean you are secure, how having a good security culture is key to cybersecurity success, how security shouldn't stop or make it difficult for your employees to do their jobs and finally how you shouldn't use fear to implement security.

Let us know your thoughts below. Do you agree?

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942853</link>
      <enclosure url="https://content.rss.com/episodes/207971/942853/ciso-talks/asset_013ad33ba4031ba18fdd888e005951d9.mp3" length="8621661" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/603804699</guid>
      <itunes:duration>538</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Apr 2019 10:19:48 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_013ad33ba4031ba18fdd888e005951d9.jpg"/>
    </item>
    <item>
      <title><![CDATA[One Trick For Super Data Security | CISO Talks]]></title>
      <itunes:title><![CDATA[One Trick For Super Data Security | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us as we speak with Joseph Carson, Chief Security Scientist at Thycotic. We ask Joseph about least privilege management in businesses today, how business can better understand the risk around their data and if the role of the CISO should be more business focused. We finish this week on how the attitudes differ around the world when it comes to cybersecurity.

Check Joseph's profile out here: http://bit.ly/2FQfh1p
Thycotic: http://bit.ly/2FKAUQK

Also available on:
Sound cloud: http://bit.ly/2MYHwxR
Spotify: https://spoti.fi/2N0XGXR
iTunes: https://apple.co/2N0sO9P

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942854</link>
      <enclosure url="https://content.rss.com/episodes/207971/942854/ciso-talks/asset_d0d010ff61d2b97de67f68b0a98c5b0f.mp3" length="10634134" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/600234615</guid>
      <itunes:duration>664</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 03 Apr 2019 09:31:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_d0d010ff61d2b97de67f68b0a98c5b0f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is Cybersecurity Becoming Mainstream? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is Cybersecurity Becoming Mainstream? | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for CISO Talks Episode 8 (part 2), where we continue the discussion with cybersecurity recruiter Nathan Powell, on what makes a successful CISO. 

| Part 3 coming next week! | 
Data Security Solution for CISOs - https://www.lepide.com/cisos.html 
Connect with Nathan - https://www.linkedin.com/in/nathanpowellsecurityrecruiter

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942855</link>
      <enclosure url="https://content.rss.com/episodes/207971/942855/ciso-talks/asset_1ccf607403b8ca3722b94e45898e4e19.mp3" length="10897030" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/592969479</guid>
      <itunes:duration>681</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Mar 2019 12:32:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_1ccf607403b8ca3722b94e45898e4e19.jpg"/>
    </item>
    <item>
      <title><![CDATA[What makes A Successful CISO? | CISO Talks]]></title>
      <itunes:title><![CDATA[What makes A Successful CISO? | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for CISO Talks Episode 8 (part 1), where we discuss with cybersecurity recruiter Nathan Powell, what makes a successful CISO.]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942856</link>
      <enclosure url="https://content.rss.com/episodes/207971/942856/ciso-talks/asset_c9b150f97f352aa63d48ed955a62b4b0.mp3" length="14941039" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/589465047</guid>
      <itunes:duration>622</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Mar 2019 15:10:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_c9b150f97f352aa63d48ed955a62b4b0.jpg"/>
    </item>
    <item>
      <title><![CDATA[One Piece of Advice for CISOs | CISO Talks]]></title>
      <itunes:title><![CDATA[One Piece of Advice for CISOs | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for Part 2 of Episode 7 of CISO Talks, where we speak with Brain Contos about CISO priorities. In part 2 we look at compliance and how CISOs now have a voice at the board level. How cybersecurity has moved more into the public eye. Where should CISOs turn to when they need help! Finally, we end with Brain sharing his best advice for other CISOs.

Check out Brain - https://www.linkedin.com/in/briancontos/

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942857</link>
      <enclosure url="https://content.rss.com/episodes/207971/942857/ciso-talks/asset_df58e3e6708ae31e225c84ccacc3b99b.mp3" length="9988805" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/582159909</guid>
      <itunes:duration>624</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 Feb 2019 14:04:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_df58e3e6708ae31e225c84ccacc3b99b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Do CISOs have the right priorities? | CISO Talks]]></title>
      <itunes:title><![CDATA[Do CISOs have the right priorities? | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for Episode 7 of CISO Talks, where we speak with Brain Contos about CISO priorities as well as how CISOs can become more effective in their roles. We also touch on how CISOs can get more value out of their vendors and better prepare themselves to face the challenges that their role can bring

Check out Brain - https://www.linkedin.com/in/briancontos/

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942858</link>
      <enclosure url="https://content.rss.com/episodes/207971/942858/ciso-talks/asset_5bd1141a1629626623fe081191910a4c.mp3" length="7368201" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/582159537</guid>
      <itunes:duration>460</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 Feb 2019 14:03:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_5bd1141a1629626623fe081191910a4c.jpg"/>
    </item>
    <item>
      <title><![CDATA[Why Should Boards Care About Cybersecurity? | CISO Talks]]></title>
      <itunes:title><![CDATA[Why Should Boards Care About Cybersecurity? | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for our sixth episode of CISO Talks. This time we are tackling the subject of why the board should care about cybersecurity and what it means for them.

What are your thoughts? Comment below.

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942859</link>
      <enclosure url="https://content.rss.com/episodes/207971/942859/ciso-talks/asset_cd8883be4130d9f9cf96d93cb8d9ba1a.mp3" length="10948857" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/578449401</guid>
      <itunes:duration>684</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Feb 2019 14:55:34 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_cd8883be4130d9f9cf96d93cb8d9ba1a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Secret to CISO/Vendor Success | CISO Talks]]></title>
      <itunes:title><![CDATA[The Secret to CISO/Vendor Success | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us in our fifth episode, where we will be looking at how CISOs can engage with vendors and get the most out of the relationship. But also how vendors can engage better with CISOs from their side.

What are your thoughts? Comment below.

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942860</link>
      <enclosure url="https://content.rss.com/episodes/207971/942860/ciso-talks/asset_6d77d43871b2b64891a78737d169512a.mp3" length="11949034" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/574692660</guid>
      <itunes:duration>746</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Feb 2019 13:36:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_6d77d43871b2b64891a78737d169512a.jpg"/>
    </item>
    <item>
      <title><![CDATA[CISOs vs The Board | CISO Talks]]></title>
      <itunes:title><![CDATA[CISOs vs The Board | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us in our fourth episode, where we are joined by James Goepel a CyberSecurity and data privacy consultant and professor. In this episode we will be talking about, Do the board understand CyberSecurity and Data Privacy and the adoption for a US version of GDPR (CCPA).

What are your thoughts? Comment below.

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942861</link>
      <enclosure url="https://content.rss.com/episodes/207971/942861/ciso-talks/asset_90bdd86ab310ee22897ca4542818031f.mp3" length="11679868" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/570523443</guid>
      <itunes:duration>730</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 Feb 2019 13:00:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_90bdd86ab310ee22897ca4542818031f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Are CISOs In Danger? | CISO Talks]]></title>
      <itunes:title><![CDATA[Are CISOs In Danger? | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us in our third episode, where we will be covering the topics of why most CISOs only last 18 months in their roles, how they can get the board to better understand their role and is a CISO just a scapegoat for when things go wrong.

What are your thoughts? Comment below.

Follow us on Social Media
LinkedIn - http://bit.ly/2FWHKoM
Twitter - http://bit.ly/2FWNO0C
Instagram - http://bit.ly/2FWMxXj
Facebook - http://bit.ly/2FXb2Ue]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942862</link>
      <enclosure url="https://content.rss.com/episodes/207971/942862/ciso-talks/asset_140accd78ce0e45cc255b9720f343ee8.mp3" length="8738271" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/567090501</guid>
      <itunes:duration>546</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 30 Jan 2019 13:00:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_140accd78ce0e45cc255b9720f343ee8.jpg"/>
    </item>
    <item>
      <title><![CDATA[Is CyberSecurity Broken? | CISO Talks]]></title>
      <itunes:title><![CDATA[Is CyberSecurity Broken? | CISO Talks]]></itunes:title>
      <description><![CDATA[Join us for our second episode. This week we tackle the question, Is Cybersecurity broken?

What are your thoughts? Comment below.]]></description>
      <link>https://rss.com/podcasts/ciso-talks/942863</link>
      <enclosure url="https://content.rss.com/episodes/207971/942863/ciso-talks/asset_27354107966362f87b436b8197d533f2.mp3" length="10365804" type="audio/mpeg"/>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/563328216</guid>
      <itunes:duration>647</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Jan 2019 13:00:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/ciso-talks/cover_27354107966362f87b436b8197d533f2.jpg"/>
    </item>
  </channel>
</rss>