<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2062267.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Kitecast</title>

  <lastBuildDate>Thu, 12 Mar 2026 00:40:55 -0400</lastBuildDate>
  <link>http://www.kiteworks.com/kitecast</link>
  <language>en-us</language>
  <copyright>© 2026 Kitecast</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>d32d8ed4-da4d-5d5d-a430-86edb88ce1df</podcast:guid>
  <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>Cybersecurity, data privacy, compliance, risk management, sensitive content communications, private content network</itunes:keywords>
  <itunes:owner>
    <itunes:name>Tim Freestone and Patrick Spencer</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/hdar42atxh6lc53cyf8xs1rtzenq?.jpg</url>
     <title>Kitecast</title>
     <link>http://www.kiteworks.com/kitecast</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/hdar42atxh6lc53cyf8xs1rtzenq?.jpg" />
  <itunes:category text="Technology" />
  <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
  <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  <item>
    <itunes:title>Aaron McCray: Ferrari Security: Speed With Guardrails</itunes:title>
    <title>Aaron McCray: Ferrari Security: Speed With Guardrails</title>
    <itunes:summary><![CDATA[Can you drive a Ferrari at 150 miles per hour without its enhanced safety package? Sure. Should you? That's the question Aaron McCray, Field CISO at CDW and retired U.S. Navy Commander with 27+ years in information warfare, poses to every CISO still white knuckling their way through 2026 with a 2021 playbook. In this episode of Kitecast, host Patrick Spencer and McCray dig into why the old way of doing security isn't just outdated—it's dangerous. McCray traces the CISO's evolution from post-C...]]></itunes:summary>
    <description><![CDATA[<p>Can you drive a Ferrari at 150 miles per hour without its enhanced safety package? Sure. Should you? That&apos;s the question Aaron McCray, Field CISO at CDW and retired U.S. Navy Commander with 27+ years in information warfare, poses to every CISO still white knuckling their way through 2026 with a 2021 playbook. In this episode of Kitecast, host Patrick Spencer and McCray dig into why the old way of doing security isn&apos;t just outdated—it&apos;s dangerous.</p><p>McCray traces the CISO&apos;s evolution from post-COVID belt-tightener—the person whose job was to consolidate tools, justify every dollar, and basically serve as the &quot;office of no&quot;—to something far more consequential. Today&apos;s CISO needs to be a strategic risk executive who speaks the language of CFOs, not just firewalls. That means understanding EBITDA, financial risk quantification, and how a $350,000 investment in multi-factor authentication can translate into $35 million in reduced risk exposure. If you can&apos;t make that pitch, McCray argues, you&apos;re getting left behind.</p><p>The conversation takes a sharp turn into the <a href='https://www.kiteworks.com/platform/simple/ai-data-gateway/'>AI landscape</a>, and McCray doesn&apos;t hold back. He&apos;s seen PCs, the internet, and mobile technology reshape the world over his career, but nothing compares to what AI is doing right now. &quot;I don&apos;t mean that to sound like hyperbole,&quot; he says. &quot;I really don&apos;t.&quot; The speed, the capability, the risk—it&apos;s all unprecedented. And while organizations scramble to harness AI&apos;s potential, many are sleepwalking past the dangers. <a href='https://www.kiteworks.com/cybersecurity-risk-management/ibm-2025-data-breach-report-ai-risks/'>Shadow AI </a>is McCray&apos;s particular concern. He describes employees accessing public AI tools through browsers, unknowingly opening backdoors that exfiltrate proprietary data and invite threats back in.</p><p>That leads to what might be the podcast&apos;s most important thread: ethics. McCray pulls no punches with real-world examples. One global organization trained AI to screen resumes and ended up systematically discriminating against qualified women. Another rushed self-driving technology to deployment before it was ready, resulting in a pedestrian&apos;s death. His message is blunt—just because you can doesn&apos;t mean you should. And without humans in the loop, governance frameworks, and genuine ethical guardrails, AI will optimize for whatever you point it at without ever asking whether it should.</p><p>McCray also makes a compelling case for <a href='https://www.kiteworks.com/cybersecurity-risk-management/dspm-vs-traditional-data-security/'>data security posture management</a>, arguing that data isn&apos;t just a cybersecurity problem—it&apos;s a business problem. His parting advice for CISOs? Stop leading with fear, uncertainty, and doubt. Stop blocking innovation. Start enabling the business to move fast—but safely. He compares it to buying a Ferrari that you can drive it stock, or you can invest in the enhanced safety package. When you&apos;re doing 150 down a two-lane road, you&apos;ll want those features.</p><p>LinkedIn: <a href='https://www.linkedin.com/in/awmccray/'>https://www.linkedin.com/in/awmccray/</a> </p><p>Website: <a href='https://www.cdw.com/'>https://www.cdw.com/</a> </p><p>Recommended Reading: Walt Powell, <a href='https://www.amazon.com/CISO-3-0-Next-Generation-Cybersecurity-Leadership/dp/1032840072/ref=sr_1_1?'><em>The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership</em></a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Can you drive a Ferrari at 150 miles per hour without its enhanced safety package? Sure. Should you? That&apos;s the question Aaron McCray, Field CISO at CDW and retired U.S. Navy Commander with 27+ years in information warfare, poses to every CISO still white knuckling their way through 2026 with a 2021 playbook. In this episode of Kitecast, host Patrick Spencer and McCray dig into why the old way of doing security isn&apos;t just outdated—it&apos;s dangerous.</p><p>McCray traces the CISO&apos;s evolution from post-COVID belt-tightener—the person whose job was to consolidate tools, justify every dollar, and basically serve as the &quot;office of no&quot;—to something far more consequential. Today&apos;s CISO needs to be a strategic risk executive who speaks the language of CFOs, not just firewalls. That means understanding EBITDA, financial risk quantification, and how a $350,000 investment in multi-factor authentication can translate into $35 million in reduced risk exposure. If you can&apos;t make that pitch, McCray argues, you&apos;re getting left behind.</p><p>The conversation takes a sharp turn into the <a href='https://www.kiteworks.com/platform/simple/ai-data-gateway/'>AI landscape</a>, and McCray doesn&apos;t hold back. He&apos;s seen PCs, the internet, and mobile technology reshape the world over his career, but nothing compares to what AI is doing right now. &quot;I don&apos;t mean that to sound like hyperbole,&quot; he says. &quot;I really don&apos;t.&quot; The speed, the capability, the risk—it&apos;s all unprecedented. And while organizations scramble to harness AI&apos;s potential, many are sleepwalking past the dangers. <a href='https://www.kiteworks.com/cybersecurity-risk-management/ibm-2025-data-breach-report-ai-risks/'>Shadow AI </a>is McCray&apos;s particular concern. He describes employees accessing public AI tools through browsers, unknowingly opening backdoors that exfiltrate proprietary data and invite threats back in.</p><p>That leads to what might be the podcast&apos;s most important thread: ethics. McCray pulls no punches with real-world examples. One global organization trained AI to screen resumes and ended up systematically discriminating against qualified women. Another rushed self-driving technology to deployment before it was ready, resulting in a pedestrian&apos;s death. His message is blunt—just because you can doesn&apos;t mean you should. And without humans in the loop, governance frameworks, and genuine ethical guardrails, AI will optimize for whatever you point it at without ever asking whether it should.</p><p>McCray also makes a compelling case for <a href='https://www.kiteworks.com/cybersecurity-risk-management/dspm-vs-traditional-data-security/'>data security posture management</a>, arguing that data isn&apos;t just a cybersecurity problem—it&apos;s a business problem. His parting advice for CISOs? Stop leading with fear, uncertainty, and doubt. Stop blocking innovation. Start enabling the business to move fast—but safely. He compares it to buying a Ferrari that you can drive it stock, or you can invest in the enhanced safety package. When you&apos;re doing 150 down a two-lane road, you&apos;ll want those features.</p><p>LinkedIn: <a href='https://www.linkedin.com/in/awmccray/'>https://www.linkedin.com/in/awmccray/</a> </p><p>Website: <a href='https://www.cdw.com/'>https://www.cdw.com/</a> </p><p>Recommended Reading: Walt Powell, <a href='https://www.amazon.com/CISO-3-0-Next-Generation-Cybersecurity-Leadership/dp/1032840072/ref=sr_1_1?'><em>The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership</em></a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/18830708-aaron-mccray-ferrari-security-speed-with-guardrails.mp3" length="33556242" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18830708</guid>
    <pubDate>Wed, 11 Mar 2026 11:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/18830708/transcript" type="text/html" />
    <itunes:duration>2794</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>50</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/awmccray/" img="https://storage.buzzsprout.com/67hvq7kd3lg16p4ivwsonal2v7qx">Aaron McCray</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Justin Greis: AI Meets Cybersecurity</itunes:title>
    <title>Justin Greis: AI Meets Cybersecurity</title>
    <itunes:summary><![CDATA[Most organizations are racing to adopt AI without considering the security implications. Justin Greis, former leader of McKinsey's cybersecurity practice and founder of an AI-powered consulting firm Acceligence, explains why this approach creates risk and how security leaders can change the conversation. Companies are deploying AI at different maturity levels. Some distribute AI tools to business units and wait for use cases to emerge. Others push boundaries with advanced algorithms. Few cons...]]></itunes:summary>
    <description><![CDATA[<p>Most organizations are racing to adopt AI without considering the security implications. Justin Greis, former leader of McKinsey&apos;s cybersecurity practice and founder of an AI-powered consulting firm Acceligence, explains why this approach creates risk and how security leaders can change the conversation.</p><p>Companies are deploying AI at different maturity levels. Some distribute AI tools to business units and wait for use cases to emerge. Others push boundaries with advanced algorithms. Few consider the associated risks. The right stakeholders often aren&apos;t in the room when AI decisions are made, either because organizations want to move fast or because security teams are underfunded and focused on daily operations. Technology companies are making AI capabilities available at unprecedented speeds, leaving organizations uncertain about securing and deploying these tools responsibly.</p><p>Security should be the foundation of trust, not an afterthought. McKinsey research found that customers make buying decisions based on product security when companies can demonstrate testing and rigor. A secure, certified product materially influences purchasing choices compared to alternatives without visible security standards.</p><p>Greis emphasizes that compliance certifications like <a href='https://www.kiteworks.com/platform/compliance/soc-2-compliance/'>SOC 2</a> or <a href='https://www.kiteworks.com/platform/compliance/iso-compliance/'>ISO</a> represent minimum requirements, not security maturity. Organizations secure enough to meet business objectives naturally achieve compliance. The goal is translating business initiatives into security requirements that exceed baseline standards.</p><p>The Chief Information Security Officer position has shifted from back-office administrator to business enabler. AI has accelerated this change by converging infrastructure, technology, and cybersecurity into unified platforms. CISOs now have opportunities to demonstrate how they understand business context and can help organizations move faster and safer.</p><p>The challenge for security leaders is communication and relationship building. Years of underfunding forced CISOs to focus on survival rather than strategy. As security functions reach parity with other departments, more leaders can engage at the executive and board level. This shift requires CISOs to develop storytelling skills that contextualize security metrics for business audiences rather than overwhelming boards with technical details.</p><p>As AI agents begin making decisions without human oversight, organizations face new risks. The push to remove humans from decision loops creates efficiency but introduces vulnerabilities, particularly when <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-data-privacy-risks-stanford-index-report-2025/'>AI accesses data</a> it shouldn&apos;t process or makes decisions affecting vulnerable populations. Companies need frameworks to identify where human oversight remains necessary and mechanisms to monitor those boundaries.</p><p>Organizations implementing AI successfully have thought through secure development lifecycles, DevSecOps, and product operating models. Those starting from scratch face larger organizational changes to incorporate security, privacy, and responsible AI practices into development workflows.</p><p>LinkedIn: <a href='https://www.linkedin.com/in/justingreis/'>https://www.linkedin.com/in/justingreis/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Most organizations are racing to adopt AI without considering the security implications. Justin Greis, former leader of McKinsey&apos;s cybersecurity practice and founder of an AI-powered consulting firm Acceligence, explains why this approach creates risk and how security leaders can change the conversation.</p><p>Companies are deploying AI at different maturity levels. Some distribute AI tools to business units and wait for use cases to emerge. Others push boundaries with advanced algorithms. Few consider the associated risks. The right stakeholders often aren&apos;t in the room when AI decisions are made, either because organizations want to move fast or because security teams are underfunded and focused on daily operations. Technology companies are making AI capabilities available at unprecedented speeds, leaving organizations uncertain about securing and deploying these tools responsibly.</p><p>Security should be the foundation of trust, not an afterthought. McKinsey research found that customers make buying decisions based on product security when companies can demonstrate testing and rigor. A secure, certified product materially influences purchasing choices compared to alternatives without visible security standards.</p><p>Greis emphasizes that compliance certifications like <a href='https://www.kiteworks.com/platform/compliance/soc-2-compliance/'>SOC 2</a> or <a href='https://www.kiteworks.com/platform/compliance/iso-compliance/'>ISO</a> represent minimum requirements, not security maturity. Organizations secure enough to meet business objectives naturally achieve compliance. The goal is translating business initiatives into security requirements that exceed baseline standards.</p><p>The Chief Information Security Officer position has shifted from back-office administrator to business enabler. AI has accelerated this change by converging infrastructure, technology, and cybersecurity into unified platforms. CISOs now have opportunities to demonstrate how they understand business context and can help organizations move faster and safer.</p><p>The challenge for security leaders is communication and relationship building. Years of underfunding forced CISOs to focus on survival rather than strategy. As security functions reach parity with other departments, more leaders can engage at the executive and board level. This shift requires CISOs to develop storytelling skills that contextualize security metrics for business audiences rather than overwhelming boards with technical details.</p><p>As AI agents begin making decisions without human oversight, organizations face new risks. The push to remove humans from decision loops creates efficiency but introduces vulnerabilities, particularly when <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-data-privacy-risks-stanford-index-report-2025/'>AI accesses data</a> it shouldn&apos;t process or makes decisions affecting vulnerable populations. Companies need frameworks to identify where human oversight remains necessary and mechanisms to monitor those boundaries.</p><p>Organizations implementing AI successfully have thought through secure development lifecycles, DevSecOps, and product operating models. Those starting from scratch face larger organizational changes to incorporate security, privacy, and responsible AI practices into development workflows.</p><p>LinkedIn: <a href='https://www.linkedin.com/in/justingreis/'>https://www.linkedin.com/in/justingreis/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/18025762-justin-greis-ai-meets-cybersecurity.mp3" length="35007307" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/57oeyy7qdi793i73lhm1pocm06rc?.jpg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18025762</guid>
    <pubDate>Mon, 27 Oct 2025 10:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/18025762/transcript" type="text/html" />
    <itunes:duration>2914</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>49</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/justingreis/" img="https://storage.buzzsprout.com/1m65cleu6gzmqmcu6w05nb1dffxv">Justin Greis</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Kevin Powers: From Academic to Practical Cybersecurity</itunes:title>
    <title>Kevin Powers: From Academic to Practical Cybersecurity</title>
    <itunes:summary><![CDATA[Kevin Powers, Faculty Director of the Masters of Legal Studies in Cybersecurity Risk and Governance at Boston College Law School, began his professional and academic journey when he volunteered for a task force exploring cybersecurity education at Boston College. Rather than developing a purely technical curriculum, he advocated for an interdisciplinary approach that would integrate law, business, and risk management. "Cybersecurity is not just a technical issue," Powers explained during the ...]]></itunes:summary>
    <description><![CDATA[<p>Kevin Powers, Faculty Director of the Masters of Legal Studies in Cybersecurity Risk and Governance at Boston College Law School, began his professional and academic journey when he volunteered for a task force exploring cybersecurity education at Boston College. Rather than developing a purely technical curriculum, he advocated for an interdisciplinary approach that would integrate law, business, and risk management. &quot;Cybersecurity is not just a technical issue,&quot; Powers explained during the podcast episode. Working with stakeholders from the White House, FBI, major financial institutions, and technology companies, the team built a curriculum designed to produce well-rounded cybersecurity professionals.</p><p>The program launched in 2015 and recently transitioned to BC Law School, offering 10 courses taught entirely by practitioners actively working in the field. Students include FBI agents, financial compliance officers, and executives from Fortune 50 companies, with an average age of 33.</p><p>A central theme of Powers&apos; program is bridging the communication divide between technical teams and business leadership. With recent SEC regulations and requirements like New York&apos;s DFS Part 500 mandating board-level cybersecurity oversight, organizations need professionals who understand both technical controls and business implications.</p><p>&quot;Boards are recognizing cybersecurity as a core business function,&quot; Powers noted, emphasizing that every company operating on networks faces operational risk when systems go down. The program prepares students to communicate cyber risk in business terms and develop governance frameworks aligned with regulatory requirements like <a href='https://www.kiteworks.com/platform/compliance/cmmc-compliance/'>CMMC 2.0</a>, <a href='https://www.kiteworks.com/platform/compliance/fedramp-authorization/'>FedRAMP</a>, and the NIST Cybersecurity Framework.</p><p>The program has evolved rapidly to address artificial intelligence governance. Powers redesigned his coursework after discovering AI tools could complete assignments in minutes, shifting 70% of grading to oral presentations that emphasize critical thinking over output.</p><p>Looking ahead, Powers identified cloud security and data sovereignty as critical concerns. Many organizations mistakenly believe SaaS platforms automatically back up their data, leaving them vulnerable during incidents. The CDK Global attack on car dealerships illustrated how unprepared businesses can be when cloud services fail.</p><p>Beyond academics, Powers emphasizes creating networks. Graduates maintain connections with government agencies, financial institutions, and technology companies, facilitating collaboration across sectors. The program hosts the annual <a href='https://www.bc.edu/bc-web/schools/law/sites/boston-conference-on-cyber-security.html'>Boston Conference on Cybersecurity</a>, which draws hundreds of attendees including CISOs from major sports franchises and law enforcement leaders.</p><p>For organizations navigating increasingly complex regulatory landscapes, Powers&apos; message is clear: cybersecurity expertise must extend beyond technical skills to encompass governance, compliance, and strategic business alignment. As cyber threats evolve, professionals need frameworks like NIST to demonstrate reasonable security practices to regulators while protecting operational continuity.</p><p><b>LinkedIn:</b> <a href='https://www.linkedin.com/in/kevin-powers-54893a8/'>https://www.linkedin.com/in/kevin-powers-54893a8/</a> </p><p><b>Boston College School of Law:</b> <a href='https://www.bc.edu/bc-web/schools/law.html'>https://www.bc.edu/bc-web/schools/law.html</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Kevin Powers, Faculty Director of the Masters of Legal Studies in Cybersecurity Risk and Governance at Boston College Law School, began his professional and academic journey when he volunteered for a task force exploring cybersecurity education at Boston College. Rather than developing a purely technical curriculum, he advocated for an interdisciplinary approach that would integrate law, business, and risk management. &quot;Cybersecurity is not just a technical issue,&quot; Powers explained during the podcast episode. Working with stakeholders from the White House, FBI, major financial institutions, and technology companies, the team built a curriculum designed to produce well-rounded cybersecurity professionals.</p><p>The program launched in 2015 and recently transitioned to BC Law School, offering 10 courses taught entirely by practitioners actively working in the field. Students include FBI agents, financial compliance officers, and executives from Fortune 50 companies, with an average age of 33.</p><p>A central theme of Powers&apos; program is bridging the communication divide between technical teams and business leadership. With recent SEC regulations and requirements like New York&apos;s DFS Part 500 mandating board-level cybersecurity oversight, organizations need professionals who understand both technical controls and business implications.</p><p>&quot;Boards are recognizing cybersecurity as a core business function,&quot; Powers noted, emphasizing that every company operating on networks faces operational risk when systems go down. The program prepares students to communicate cyber risk in business terms and develop governance frameworks aligned with regulatory requirements like <a href='https://www.kiteworks.com/platform/compliance/cmmc-compliance/'>CMMC 2.0</a>, <a href='https://www.kiteworks.com/platform/compliance/fedramp-authorization/'>FedRAMP</a>, and the NIST Cybersecurity Framework.</p><p>The program has evolved rapidly to address artificial intelligence governance. Powers redesigned his coursework after discovering AI tools could complete assignments in minutes, shifting 70% of grading to oral presentations that emphasize critical thinking over output.</p><p>Looking ahead, Powers identified cloud security and data sovereignty as critical concerns. Many organizations mistakenly believe SaaS platforms automatically back up their data, leaving them vulnerable during incidents. The CDK Global attack on car dealerships illustrated how unprepared businesses can be when cloud services fail.</p><p>Beyond academics, Powers emphasizes creating networks. Graduates maintain connections with government agencies, financial institutions, and technology companies, facilitating collaboration across sectors. The program hosts the annual <a href='https://www.bc.edu/bc-web/schools/law/sites/boston-conference-on-cyber-security.html'>Boston Conference on Cybersecurity</a>, which draws hundreds of attendees including CISOs from major sports franchises and law enforcement leaders.</p><p>For organizations navigating increasingly complex regulatory landscapes, Powers&apos; message is clear: cybersecurity expertise must extend beyond technical skills to encompass governance, compliance, and strategic business alignment. As cyber threats evolve, professionals need frameworks like NIST to demonstrate reasonable security practices to regulators while protecting operational continuity.</p><p><b>LinkedIn:</b> <a href='https://www.linkedin.com/in/kevin-powers-54893a8/'>https://www.linkedin.com/in/kevin-powers-54893a8/</a> </p><p><b>Boston College School of Law:</b> <a href='https://www.bc.edu/bc-web/schools/law.html'>https://www.bc.edu/bc-web/schools/law.html</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/18025399-kevin-powers-from-academic-to-practical-cybersecurity.mp3" length="36496273" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18025399</guid>
    <pubDate>Thu, 16 Oct 2025 15:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/18025399/transcript" type="text/html" />
    <itunes:duration>3039</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>48</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/kevin-powers-54893a8/" img="https://storage.buzzsprout.com/c7exbmigz6btk10x7ky09v2lqurp">Kevin Powers</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>AI and Third-Party Security &quot;Danger Zone&quot;: 2025 Annual Data Security and Compliance Risk Report</itunes:title>
    <title>AI and Third-Party Security &quot;Danger Zone&quot;: 2025 Annual Data Security and Compliance Risk Report</title>
    <itunes:summary><![CDATA[Cybersecurity experts Heather Noggle and Dr. Arun DeSouza discussed Kiteworks' Data Security and Compliance Risk: 2025 Annual Survey Report, which introduces the industry's first quantitative risk scoring algorithm. The comprehensive study of 461 organizations reveals that 46% now operate in high- to critical-risk territory, with the median enterprise scoring 4.84 on a 10-point scale—dangerously close to the high-risk threshold of 5.0. The experts analyzed a counterintuitive finding about thi...]]></itunes:summary>
    <description><![CDATA[<p>Cybersecurity experts Heather Noggle and Dr. Arun DeSouza discussed Kiteworks&apos; <a href='https://www.kiteworks.com/data-security-compliance-risk-annual-report/'>Data Security and Compliance Risk: 2025 Annual Survey Report</a>, which introduces the industry&apos;s first quantitative risk scoring algorithm. The comprehensive study of 461 organizations reveals that 46% now operate in high- to critical-risk territory, with the median enterprise scoring 4.84 on a 10-point scale—dangerously close to the high-risk threshold of 5.0.</p><p>The experts analyzed a counterintuitive finding about <a href='https://www.kiteworks.com/risk-compliance-glossary/'>third-party risk management</a>: Organizations managing 1,001-5,000 external partners face the highest security risk (average score 5.19), surpassing enterprises with over 5,000 third-party relationships. Dr. DeSouza explained this &quot;danger zone&quot; phenomenon: &quot;By nature, managing over 5,000 means you&apos;re a much bigger organization with more resources ... Many times you&apos;ve got a platform-based approach.&quot; These larger enterprises can monitor risks in real time, while mid-sized partner ecosystems struggle with enterprise-level complexity on mid-market budgets—resulting in 24% experiencing 7+ annual security incidents.</p><p>Industry-specific findings revealed surprising risk disparities. Energy topped the risk charts due to legacy IoT devices and 30-year-old technologies vulnerable to exploitation. Technology ranked second, which Noggle attributed to the &quot;overconfidence factor&quot; and rapid employee turnover. &quot;Tech companies are losing people so fast, they want to implement things so fast. That to me is a perfect storm,&quot; DeSouza noted. Conversely, heavily regulated sectors like life sciences demonstrated lower risk scores due to compliance-driven security investments.</p><p>The report exposed a dangerous &quot;confidence paradox&quot; where organizations claiming to be &quot;somewhat confident&quot; in data governance showed 19% higher risk scores than those acknowledging uncertainty. &quot;Without governance you can&apos;t manage,&quot; Noggle emphasized, adding that overconfidence breeds complacency in rapidly evolving threat landscapes.</p><p><a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-data-privacy-risks-stanford-index-report-2025/'>AI governance</a> emerged as a critical vulnerability. While 64% of enterprises track AI-generated content (up from 28% in 2024), only 17% have deployed technical governance frameworks. The stakes are high—the <a href='https://www.kiteworks.com/cybersecurity-risk-management/ibm-2025-data-breach-report-ai-risks/'>IBM Cost of a Data Breach Report</a> found that 97% of AI-related breaches lacked proper controls, with AI breaches costing $670,000 more than average. DeSouza warned about inherited risks like &quot;Echo Leak,&quot; a zero-click vulnerability exploiting AI&apos;s use of historical data, demonstrating that organizations must secure not just AI models but their entire operational environment.</p><p>Poor data visibility creates cascading failures: Organizations unable to count their third parties showed 46% correlation with unknown breach frequency, while 31% of those with 5,000+ partners take over 90 days to detect breaches. As Noggle noted, &quot;If we&apos;re back at identify and we&apos;re at detect, detect should not be that difficult if identify is done well.&quot;</p><p><b>Heather Noggle LinkedIn: </b><a href='https://www.linkedin.com/in/heathernoggle/'>https://www.linkedin.com/in/heathernoggle/</a> </p><p><b>Arun DeSouza LinkedIn: </b><a href='https://www.linkedin.com/in/arundesouza/'>https://www.linkedin.com/in/arundesouza/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Cybersecurity experts Heather Noggle and Dr. Arun DeSouza discussed Kiteworks&apos; <a href='https://www.kiteworks.com/data-security-compliance-risk-annual-report/'>Data Security and Compliance Risk: 2025 Annual Survey Report</a>, which introduces the industry&apos;s first quantitative risk scoring algorithm. The comprehensive study of 461 organizations reveals that 46% now operate in high- to critical-risk territory, with the median enterprise scoring 4.84 on a 10-point scale—dangerously close to the high-risk threshold of 5.0.</p><p>The experts analyzed a counterintuitive finding about <a href='https://www.kiteworks.com/risk-compliance-glossary/'>third-party risk management</a>: Organizations managing 1,001-5,000 external partners face the highest security risk (average score 5.19), surpassing enterprises with over 5,000 third-party relationships. Dr. DeSouza explained this &quot;danger zone&quot; phenomenon: &quot;By nature, managing over 5,000 means you&apos;re a much bigger organization with more resources ... Many times you&apos;ve got a platform-based approach.&quot; These larger enterprises can monitor risks in real time, while mid-sized partner ecosystems struggle with enterprise-level complexity on mid-market budgets—resulting in 24% experiencing 7+ annual security incidents.</p><p>Industry-specific findings revealed surprising risk disparities. Energy topped the risk charts due to legacy IoT devices and 30-year-old technologies vulnerable to exploitation. Technology ranked second, which Noggle attributed to the &quot;overconfidence factor&quot; and rapid employee turnover. &quot;Tech companies are losing people so fast, they want to implement things so fast. That to me is a perfect storm,&quot; DeSouza noted. Conversely, heavily regulated sectors like life sciences demonstrated lower risk scores due to compliance-driven security investments.</p><p>The report exposed a dangerous &quot;confidence paradox&quot; where organizations claiming to be &quot;somewhat confident&quot; in data governance showed 19% higher risk scores than those acknowledging uncertainty. &quot;Without governance you can&apos;t manage,&quot; Noggle emphasized, adding that overconfidence breeds complacency in rapidly evolving threat landscapes.</p><p><a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-data-privacy-risks-stanford-index-report-2025/'>AI governance</a> emerged as a critical vulnerability. While 64% of enterprises track AI-generated content (up from 28% in 2024), only 17% have deployed technical governance frameworks. The stakes are high—the <a href='https://www.kiteworks.com/cybersecurity-risk-management/ibm-2025-data-breach-report-ai-risks/'>IBM Cost of a Data Breach Report</a> found that 97% of AI-related breaches lacked proper controls, with AI breaches costing $670,000 more than average. DeSouza warned about inherited risks like &quot;Echo Leak,&quot; a zero-click vulnerability exploiting AI&apos;s use of historical data, demonstrating that organizations must secure not just AI models but their entire operational environment.</p><p>Poor data visibility creates cascading failures: Organizations unable to count their third parties showed 46% correlation with unknown breach frequency, while 31% of those with 5,000+ partners take over 90 days to detect breaches. As Noggle noted, &quot;If we&apos;re back at identify and we&apos;re at detect, detect should not be that difficult if identify is done well.&quot;</p><p><b>Heather Noggle LinkedIn: </b><a href='https://www.linkedin.com/in/heathernoggle/'>https://www.linkedin.com/in/heathernoggle/</a> </p><p><b>Arun DeSouza LinkedIn: </b><a href='https://www.linkedin.com/in/arundesouza/'>https://www.linkedin.com/in/arundesouza/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/17793454-ai-and-third-party-security-danger-zone-2025-annual-data-security-and-compliance-risk-report.mp3" length="40048904" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17793454</guid>
    <pubDate>Thu, 04 Sep 2025 21:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/17793454/transcript" type="text/html" />
    <itunes:duration>3335</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>47</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/arundesouza/" img="https://storage.buzzsprout.com/z2ysaazfgb3x9wsn2nuzp4jqnp97">Arun DeSouza</podcast:person>
    <podcast:person role="guest" href="https://www.linkedin.com/in/heathernoggle/" img="https://storage.buzzsprout.com/x57zu069y3l81rhzmwv3p7uxp102">Heather Noggle</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Rick Goud: Navigating Europe’s Data Sovereignty Challenges</itunes:title>
    <title>Rick Goud: Navigating Europe’s Data Sovereignty Challenges</title>
    <itunes:summary><![CDATA[Dr. Rick Goud brings a unique perspective to the data sovereignty conversation, combining medical informatics expertise with entrepreneurial technology innovation. As co-founder and Chief Innovation Officer of Zivver, a secure digital communications platform acquired by Kiteworks in 2025, Goud's journey began with an unexpected twist – missing out on medical school in the Netherlands' lottery system led him to medical informatics, where he discovered his passion for solving healthcare's data ...]]></itunes:summary>
    <description><![CDATA[<p>Dr. Rick Goud brings a unique perspective to the data sovereignty conversation, combining medical informatics expertise with entrepreneurial technology innovation. As co-founder and Chief Innovation Officer of Zivver, a secure digital communications platform acquired by Kiteworks in 2025, Goud&apos;s journey began with an unexpected twist – missing out on medical school in the Netherlands&apos; lottery system led him to medical informatics, where he discovered his passion for solving healthcare&apos;s data security challenges. His background as a strategy consultant in healthcare, where he witnessed firsthand the alarming frequency of sensitive patient data being shared through insecure channels, sparked his mission to create solutions that balance robust security with user-friendly functionality.</p><p>The podcast reveals a fundamental tension in European <a href='https://www.kiteworks.com/platform/compliance/data-sovereignty/'>data sovereignty</a>: While Europe boasts the world&apos;s strongest data protection laws like GDPR and the upcoming <a href='https://www.kiteworks.com/eu-data-act/'>EU Data Act</a>, organizations remain heavily dependent on foreign cloud infrastructure. Goud explains that the challenge extends beyond mere infrastructure – it&apos;s the absence of true European alternatives for essential software services that creates vulnerability. He highlights recent incidents, including a French Microsoft executive&apos;s court admission that Microsoft cannot prevent U.S. government access to data without customer notification, and the shocking case of a Dutch criminal court judge whose email was blocked by Microsoft at the behest of American authorities. These examples underscore how data sovereignty encompasses not just data protection, but also continuity of service and freedom from foreign interference.</p><p>When addressing the economic realities of data sovereignty, Goud advocates for a pragmatic, risk-based approach rather than wholesale abandonment of U.S. cloud services. He emphasizes that organizations should start by identifying their specific risks – whether it&apos;s human error (the leading cause of data breaches), email interception, weak passwords, or phishing attacks. The solution often lies in implementing encryption layers where organizations maintain control of their own keys, effectively rendering data unreadable even if accessed by unauthorized parties. This approach allows organizations to continue using familiar tools like Microsoft 365 and Gmail while adding crucial security layers for sensitive information, avoiding the massive costs and behavioral changes required by complete infrastructure migration.</p><p>The conversation concludes with practical advice for organizations beginning their data sovereignty journey. Goud recommends starting with &quot;low-hanging fruit&quot; – simple security measures that can be implemented quickly, such as activating DANE (DNS-based Authentication of Named Entities) for email encryption, which despite being available for a decade, sees adoption rates of only 15% to 20%. He stresses the importance of email and file security as the primary risk points where data leaves organizational boundaries. Rather than embarking on multi-year infrastructure overhauls, organizations should focus on immediate, achievable improvements while building partnerships with trusted vendors and peer organizations facing similar challenges. This collaborative approach ensures organizations aren&apos;t navigating the complex data sovereignty landscape alone.</p><p> <b>LinkedIn: </b><a href='https://www.linkedin.com/in/rickgoud/'><b>https://www.linkedin.com/in/rickgoud/</b></a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Dr. Rick Goud brings a unique perspective to the data sovereignty conversation, combining medical informatics expertise with entrepreneurial technology innovation. As co-founder and Chief Innovation Officer of Zivver, a secure digital communications platform acquired by Kiteworks in 2025, Goud&apos;s journey began with an unexpected twist – missing out on medical school in the Netherlands&apos; lottery system led him to medical informatics, where he discovered his passion for solving healthcare&apos;s data security challenges. His background as a strategy consultant in healthcare, where he witnessed firsthand the alarming frequency of sensitive patient data being shared through insecure channels, sparked his mission to create solutions that balance robust security with user-friendly functionality.</p><p>The podcast reveals a fundamental tension in European <a href='https://www.kiteworks.com/platform/compliance/data-sovereignty/'>data sovereignty</a>: While Europe boasts the world&apos;s strongest data protection laws like GDPR and the upcoming <a href='https://www.kiteworks.com/eu-data-act/'>EU Data Act</a>, organizations remain heavily dependent on foreign cloud infrastructure. Goud explains that the challenge extends beyond mere infrastructure – it&apos;s the absence of true European alternatives for essential software services that creates vulnerability. He highlights recent incidents, including a French Microsoft executive&apos;s court admission that Microsoft cannot prevent U.S. government access to data without customer notification, and the shocking case of a Dutch criminal court judge whose email was blocked by Microsoft at the behest of American authorities. These examples underscore how data sovereignty encompasses not just data protection, but also continuity of service and freedom from foreign interference.</p><p>When addressing the economic realities of data sovereignty, Goud advocates for a pragmatic, risk-based approach rather than wholesale abandonment of U.S. cloud services. He emphasizes that organizations should start by identifying their specific risks – whether it&apos;s human error (the leading cause of data breaches), email interception, weak passwords, or phishing attacks. The solution often lies in implementing encryption layers where organizations maintain control of their own keys, effectively rendering data unreadable even if accessed by unauthorized parties. This approach allows organizations to continue using familiar tools like Microsoft 365 and Gmail while adding crucial security layers for sensitive information, avoiding the massive costs and behavioral changes required by complete infrastructure migration.</p><p>The conversation concludes with practical advice for organizations beginning their data sovereignty journey. Goud recommends starting with &quot;low-hanging fruit&quot; – simple security measures that can be implemented quickly, such as activating DANE (DNS-based Authentication of Named Entities) for email encryption, which despite being available for a decade, sees adoption rates of only 15% to 20%. He stresses the importance of email and file security as the primary risk points where data leaves organizational boundaries. Rather than embarking on multi-year infrastructure overhauls, organizations should focus on immediate, achievable improvements while building partnerships with trusted vendors and peer organizations facing similar challenges. This collaborative approach ensures organizations aren&apos;t navigating the complex data sovereignty landscape alone.</p><p> <b>LinkedIn: </b><a href='https://www.linkedin.com/in/rickgoud/'><b>https://www.linkedin.com/in/rickgoud/</b></a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/17731692-rick-goud-navigating-europe-s-data-sovereignty-challenges.mp3" length="31937496" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17731692</guid>
    <pubDate>Mon, 25 Aug 2025 14:00:00 -0700</pubDate>
    <itunes:duration>2659</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>46</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/rickgoud/" img="https://storage.buzzsprout.com/qnu7dbu2ke7ncyyxe4lza3zaw53t">Dr. Rick Goud</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Scott McCrady: MSPs and Identity-first Security</itunes:title>
    <title>Scott McCrady: MSPs and Identity-first Security</title>
    <itunes:summary><![CDATA[Scott McCrady's path to becoming CEO of SolCyber started in the server rooms of the early 2000s. Back then, he was installing Nokia security appliances and building some of the first security operations centers for major corporations. McCrady spent years at companies like Symantec and FireEye, where he learned that keeping businesses safe requires more than just technical know-how. He built Symantec's security services across Asia Pacific, managing teams in multiple countries and learning how...]]></itunes:summary>
    <description><![CDATA[<p>Scott McCrady&apos;s path to becoming CEO of <a href='https://solcyber.com/'>SolCyber</a> started in the server rooms of the early 2000s. Back then, he was installing Nokia security appliances and building some of the first security operations centers for major corporations. McCrady spent years at companies like Symantec and FireEye, where he learned that keeping businesses safe requires more than just technical know-how. He built Symantec&apos;s security services across Asia Pacific, managing teams in multiple countries and learning how different businesses approach security challenges. Later at FireEye, he helped launch their partner strategy during the rise of nation-state attacks. Today, he runs SolCyber with a simple mission: help companies protect themselves from identity-based attacks that bypass traditional security tools.</p><p>McCrady explained something that might surprise you: hackers don&apos;t break into networks the way they used to. Twenty years ago, they looked for open ports and vulnerable servers. Ten years ago, they targeted employee laptops and phones. Today? They steal usernames and passwords, especially administrative accounts. Insurance companies tell McCrady that nine out of ten breaches happen because someone&apos;s login credentials got compromised. The problem gets worse because IT teams often give employees more system access than they need. Why? Because it&apos;s easier than figuring out the exact permissions each person requires. McCrady shared a real example: a company with 500 employees had over 70 administrative accounts. Some hadn&apos;t been used in nine months, then suddenly started browsing the internet—a clear sign that hackers had taken control.</p><p>McCrady works with organizations that can&apos;t answer simple questions like &quot;Where are all our security logs stored?&quot; or &quot;Who can access our customer data?&quot; These aren&apos;t startups or small businesses—these are established companies with IT departments and security budgets. They have data scattered across different systems, some going to one security vendor, some to another, and some not being monitored at all. While vendors push artificial intelligence and machine learning solutions, most businesses just need help organizing what they already have. As McCrady put it, they need to get their house in order before worrying about advanced threats.</p><p>So what actually works? McCrady keeps it simple with five must-haves. First, turn on multi-factor authentication everywhere, even though software companies charge extra for it. Second, add email security beyond what Microsoft or Google provides because business email compromise is how most attacks start. Third, install endpoint detection software that catches modern malware. Fourth, run security awareness training so employees recognize phishing emails (and to keep your cyber insurance valid). Fifth, buy cyber insurance now while it&apos;s affordable. McCrady&apos;s company, SolCyber, packages these essentials into what they call &quot;foundational coverage&quot;—basically, outsourced security for businesses that need protection but can&apos;t afford a full security team. For larger companies, they handle the complex stuff like managing security logs from dozens of systems and responding to attacks in real-time.</p><p><b>LinkedIn Profile:</b> <a href='https://www.linkedin.com/in/scottmccrady/'>https://www.linkedin.com/in/scottmccrady/</a> </p><p><b>SolCyber Website: </b><a href='https://solcyber.com/'>https://solcyber.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Scott McCrady&apos;s path to becoming CEO of <a href='https://solcyber.com/'>SolCyber</a> started in the server rooms of the early 2000s. Back then, he was installing Nokia security appliances and building some of the first security operations centers for major corporations. McCrady spent years at companies like Symantec and FireEye, where he learned that keeping businesses safe requires more than just technical know-how. He built Symantec&apos;s security services across Asia Pacific, managing teams in multiple countries and learning how different businesses approach security challenges. Later at FireEye, he helped launch their partner strategy during the rise of nation-state attacks. Today, he runs SolCyber with a simple mission: help companies protect themselves from identity-based attacks that bypass traditional security tools.</p><p>McCrady explained something that might surprise you: hackers don&apos;t break into networks the way they used to. Twenty years ago, they looked for open ports and vulnerable servers. Ten years ago, they targeted employee laptops and phones. Today? They steal usernames and passwords, especially administrative accounts. Insurance companies tell McCrady that nine out of ten breaches happen because someone&apos;s login credentials got compromised. The problem gets worse because IT teams often give employees more system access than they need. Why? Because it&apos;s easier than figuring out the exact permissions each person requires. McCrady shared a real example: a company with 500 employees had over 70 administrative accounts. Some hadn&apos;t been used in nine months, then suddenly started browsing the internet—a clear sign that hackers had taken control.</p><p>McCrady works with organizations that can&apos;t answer simple questions like &quot;Where are all our security logs stored?&quot; or &quot;Who can access our customer data?&quot; These aren&apos;t startups or small businesses—these are established companies with IT departments and security budgets. They have data scattered across different systems, some going to one security vendor, some to another, and some not being monitored at all. While vendors push artificial intelligence and machine learning solutions, most businesses just need help organizing what they already have. As McCrady put it, they need to get their house in order before worrying about advanced threats.</p><p>So what actually works? McCrady keeps it simple with five must-haves. First, turn on multi-factor authentication everywhere, even though software companies charge extra for it. Second, add email security beyond what Microsoft or Google provides because business email compromise is how most attacks start. Third, install endpoint detection software that catches modern malware. Fourth, run security awareness training so employees recognize phishing emails (and to keep your cyber insurance valid). Fifth, buy cyber insurance now while it&apos;s affordable. McCrady&apos;s company, SolCyber, packages these essentials into what they call &quot;foundational coverage&quot;—basically, outsourced security for businesses that need protection but can&apos;t afford a full security team. For larger companies, they handle the complex stuff like managing security logs from dozens of systems and responding to attacks in real-time.</p><p><b>LinkedIn Profile:</b> <a href='https://www.linkedin.com/in/scottmccrady/'>https://www.linkedin.com/in/scottmccrady/</a> </p><p><b>SolCyber Website: </b><a href='https://solcyber.com/'>https://solcyber.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/17440111-scott-mccrady-msps-and-identity-first-security.mp3" length="28666077" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-17440111</guid>
    <pubDate>Wed, 02 Jul 2025 13:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/17440111/transcript" type="text/html" />
    <itunes:duration>2386</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>45</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/scottmccrady" img="https://storage.buzzsprout.com/4vpho0or6impo979guhsv9f72jk6">Scott McCrady</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Chris Pogue: Digital Forensics in the Modern Threat Landscape</itunes:title>
    <title>Chris Pogue: Digital Forensics in the Modern Threat Landscape</title>
    <itunes:summary><![CDATA[This Kitecast episode features Chris Pogue, Director of Digital Forensics at CyberCX, a cybersecurity veteran with 25 years of experience. Chris brings unique insights from his extensive background spanning penetration testing, executive leadership, and military instruction. As an adjunct professor at Oklahoma State University, he teaches both international business and digital forensics, emphasizing the critical importance of communication between technical and non-technical stakeholders. Ch...]]></itunes:summary>
    <description><![CDATA[<p>This Kitecast episode features Chris Pogue, Director of Digital Forensics at CyberCX, a cybersecurity veteran with 25 years of experience. Chris brings unique insights from his extensive background spanning penetration testing, executive leadership, and military instruction. As an adjunct professor at Oklahoma State University, he teaches both international business and digital forensics, emphasizing the critical importance of communication between technical and non-technical stakeholders.</p><p>Chris introduces CyberCX as &quot;the biggest cybersecurity company you&apos;ve never heard of&quot;—a pure-play security firm with 1,500 professionals globally. Founded in Australia through the acquisition of 24 boutique security firms, CyberCX stands apart by focusing exclusively on cybersecurity expertise without the distractions of hardware sales or software development. With specialized teams including 200 penetration testers and 40 <a href='https://www.kiteworks.com/risk-compliance-glossary/incident-response/'>incident responders</a>, they offer comprehensive security solutions tailored to each client&apos;s unique risk profile.</p><p>The conversation reveals alarming trends in the threat landscape, including the surprising resurgence of SQL injection attacks targeting forgotten systems and unpatched vulnerabilities. Chris explains that once an exploit is announced, threat actors typically begin targeting it within 24 to 48 hours, yet organizations often take 60 to 90 days to implement patches. The podcast also explores how <a href='https://www.kiteworks.com/risk-compliance-glossary/ransomware-attacks/'>ransomware</a> tactics are evolving from simple <a href='https://www.kiteworks.com/risk-compliance-glossary/encryption/'>data encryption</a> to targeting operational technology and critical infrastructure, creating more leverage by disrupting business continuity rather than just threatening data exposure.</p><p><a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>Third-party risk management</a> emerges as a critical concern, with Chris noting that the traditional &quot;castle and moat&quot; security model has become obsolete in today&apos;s interconnected business environment. He describes how Business Email Compromise attacks frequently move laterally across <a href='https://www.kiteworks.com/risk-compliance-glossary/supply-chain/'>supply chains</a>, with compromised trusted partners becoming vectors for invoice fraud and malware distribution. The conversation also touches on the emerging role of AI in creating more convincing phishing campaigns and voice synthesis attacks.</p><p>Drawing on decades of experience, Chris offers this compelling perspective on security investment: &quot;In my career, I have yet to find an organization who under-invested in cybersecurity and was thankful that they did later.&quot; With data breach costs <a href='https://www.kiteworks.com/cybersecurity-risk-management/data-security-compliance-insights-ibm-2024-cost-data-breach/'>averaging $4.5 million globally</a> and $9 million in the United States, the economic argument for proactive security becomes increasingly clear. Don&apos;t miss this eye-opening discussion on the frontlines of cybersecurity defense.</p><p> LinkedIn Profile: <a href='https://www.linkedin.com/in/christopher-pogue-msis-6148441/'>https://www.linkedin.com/in/christopher-pogue-msis-6148441/</a> </p><p> CyberCX: <a href='https://cybercx.com/'>https://cybercx.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>This Kitecast episode features Chris Pogue, Director of Digital Forensics at CyberCX, a cybersecurity veteran with 25 years of experience. Chris brings unique insights from his extensive background spanning penetration testing, executive leadership, and military instruction. As an adjunct professor at Oklahoma State University, he teaches both international business and digital forensics, emphasizing the critical importance of communication between technical and non-technical stakeholders.</p><p>Chris introduces CyberCX as &quot;the biggest cybersecurity company you&apos;ve never heard of&quot;—a pure-play security firm with 1,500 professionals globally. Founded in Australia through the acquisition of 24 boutique security firms, CyberCX stands apart by focusing exclusively on cybersecurity expertise without the distractions of hardware sales or software development. With specialized teams including 200 penetration testers and 40 <a href='https://www.kiteworks.com/risk-compliance-glossary/incident-response/'>incident responders</a>, they offer comprehensive security solutions tailored to each client&apos;s unique risk profile.</p><p>The conversation reveals alarming trends in the threat landscape, including the surprising resurgence of SQL injection attacks targeting forgotten systems and unpatched vulnerabilities. Chris explains that once an exploit is announced, threat actors typically begin targeting it within 24 to 48 hours, yet organizations often take 60 to 90 days to implement patches. The podcast also explores how <a href='https://www.kiteworks.com/risk-compliance-glossary/ransomware-attacks/'>ransomware</a> tactics are evolving from simple <a href='https://www.kiteworks.com/risk-compliance-glossary/encryption/'>data encryption</a> to targeting operational technology and critical infrastructure, creating more leverage by disrupting business continuity rather than just threatening data exposure.</p><p><a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>Third-party risk management</a> emerges as a critical concern, with Chris noting that the traditional &quot;castle and moat&quot; security model has become obsolete in today&apos;s interconnected business environment. He describes how Business Email Compromise attacks frequently move laterally across <a href='https://www.kiteworks.com/risk-compliance-glossary/supply-chain/'>supply chains</a>, with compromised trusted partners becoming vectors for invoice fraud and malware distribution. The conversation also touches on the emerging role of AI in creating more convincing phishing campaigns and voice synthesis attacks.</p><p>Drawing on decades of experience, Chris offers this compelling perspective on security investment: &quot;In my career, I have yet to find an organization who under-invested in cybersecurity and was thankful that they did later.&quot; With data breach costs <a href='https://www.kiteworks.com/cybersecurity-risk-management/data-security-compliance-insights-ibm-2024-cost-data-breach/'>averaging $4.5 million globally</a> and $9 million in the United States, the economic argument for proactive security becomes increasingly clear. Don&apos;t miss this eye-opening discussion on the frontlines of cybersecurity defense.</p><p> LinkedIn Profile: <a href='https://www.linkedin.com/in/christopher-pogue-msis-6148441/'>https://www.linkedin.com/in/christopher-pogue-msis-6148441/</a> </p><p> CyberCX: <a href='https://cybercx.com/'>https://cybercx.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/17075713-chris-pogue-digital-forensics-in-the-modern-threat-landscape.mp3" length="34981025" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17075713</guid>
    <pubDate>Mon, 05 May 2025 06:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/17075713/transcript" type="text/html" />
    <itunes:duration>2913</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>44</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/christopher-pogue-msis-6148441/" img="https://storage.buzzsprout.com/jcdfph21ed7lbmm3z4l1brxj04qh">Chris Pogue</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Analysis and Lessons from Kiteworks Top 11 Data Breaches in 2024 Report</itunes:title>
    <title>Analysis and Lessons from Kiteworks Top 11 Data Breaches in 2024 Report</title>
    <itunes:summary><![CDATA[In this insightful episode, cybersecurity experts Mike Crandall and Arun DeSouza join host Patrick Spencer to analyze Kiteworks' Top 11 Data Breaches in 2024 Report. Rather than just focusing on the number of records breached, the report introduces a sophisticated algorithm with seven key factors to score breaches on a scale of 1-10. This method provides a more comprehensive understanding of breach severity by evaluating financial impact, data sensitivity, regulatory compliance implications, ...]]></itunes:summary>
    <description><![CDATA[<p>In this insightful episode, cybersecurity experts Mike Crandall and Arun DeSouza join host Patrick Spencer to analyze Kiteworks&apos; <a href='https://www.kiteworks.com/risk-exposure-index/'>Top 11 Data Breaches in 2024 Report</a>. Rather than just focusing on the number of records breached, the report introduces a sophisticated algorithm with seven key factors to score breaches on a scale of 1-10. This method provides a more comprehensive understanding of breach severity by evaluating financial impact, data sensitivity, regulatory compliance implications, ransomware involvement, supply chain impact, and attack vector sophistication. National Public Data topped the list with a score of 8.93, followed by Change Healthcare and Ticketmaster, both scoring 8.7.</p><p>A significant finding discussed by the experts is the shift in industry targeting patterns, with financial services overtaking healthcare as the most breached sector. The conversation emphasizes how credential theft continues to plague organizations despite sophisticated controls. Five of the top 11 breaches resulted from <a href='https://www.kiteworks.com/risk-compliance-glossary/credential-theft-attacks/'>credential compromises</a>, including attacks that bypassed <a href='https://www.kiteworks.com/risk-compliance-glossary/multifactor-authentication-mfa/'>multifactor authentication</a>. Arun highlights that despite years of security awareness training, approximately 25% of incidents remain attributable to human error. He warns of the growing sophistication of social engineering with AI-generated <a href='https://www.kiteworks.com/risk-compliance-glossary/phishing-attacks/'>phishing</a> that will soon include voice modulation and deepfakes, making attacks increasingly difficult to detect. Mike recommends leveraging AI defensively to detect anomalous behaviors that humans might miss.</p><p>Both experts stress the critical importance of <a href='https://www.kiteworks.com/risk-compliance-glossary/'>data protection</a> and classification. Arun advocates for AI-powered data characterization and <a href='https://www.kiteworks.com/risk-compliance-glossary/'>governance</a> platforms that can proactively identify sensitive information requiring protection. Mike emphasizes the need for proper <a href='https://www.kiteworks.com/secure-file-transfer/data-classification/'>data classification</a>, noting that organizations often struggle to differentiate between critical and non-critical data. He recommends data minimization strategies including cold storage for inactive data to reduce the potential attack surface. The experts agree that building enterprise-wide risk awareness requires collaboration across departments rather than treating security as an isolated IT function.</p><p>The panel concludes that organizations must prioritize zero-trust architecture implementation, adopt data minimization strategies, and enhance incident response capabilities. Arun frames this as a comprehensive coalition of &quot;people, process, and technology safeguards all working together.&quot; Mike adds a sobering perspective for businesses that might not see themselves as targets: &quot;These weren&apos;t the 11 hacks of 2024. These were the top hacks... there are literally hundreds of thousands, if not millions more. And that&apos;s you.&quot; </p><p><b>Top 11 Data Breaches in 2024 Report</b>: <a href='https://www.kiteworks.com/top-data-breaches-report/'>https://www.kiteworks.com/top-data-breaches-report</a></p><p><b>Arun DeSouza LinkedIn: </b><a href='https://www.linkedin.com/in/arundesouza/'>https://www.linkedin.com/in/arundesouza/</a></p><p><b>Mike Crandall LinkedIn:</b> <a href='https://www.linkedin.com/in/crandallmike/'>https://www.linkedin.com/in/crandallmike/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>In this insightful episode, cybersecurity experts Mike Crandall and Arun DeSouza join host Patrick Spencer to analyze Kiteworks&apos; <a href='https://www.kiteworks.com/risk-exposure-index/'>Top 11 Data Breaches in 2024 Report</a>. Rather than just focusing on the number of records breached, the report introduces a sophisticated algorithm with seven key factors to score breaches on a scale of 1-10. This method provides a more comprehensive understanding of breach severity by evaluating financial impact, data sensitivity, regulatory compliance implications, ransomware involvement, supply chain impact, and attack vector sophistication. National Public Data topped the list with a score of 8.93, followed by Change Healthcare and Ticketmaster, both scoring 8.7.</p><p>A significant finding discussed by the experts is the shift in industry targeting patterns, with financial services overtaking healthcare as the most breached sector. The conversation emphasizes how credential theft continues to plague organizations despite sophisticated controls. Five of the top 11 breaches resulted from <a href='https://www.kiteworks.com/risk-compliance-glossary/credential-theft-attacks/'>credential compromises</a>, including attacks that bypassed <a href='https://www.kiteworks.com/risk-compliance-glossary/multifactor-authentication-mfa/'>multifactor authentication</a>. Arun highlights that despite years of security awareness training, approximately 25% of incidents remain attributable to human error. He warns of the growing sophistication of social engineering with AI-generated <a href='https://www.kiteworks.com/risk-compliance-glossary/phishing-attacks/'>phishing</a> that will soon include voice modulation and deepfakes, making attacks increasingly difficult to detect. Mike recommends leveraging AI defensively to detect anomalous behaviors that humans might miss.</p><p>Both experts stress the critical importance of <a href='https://www.kiteworks.com/risk-compliance-glossary/'>data protection</a> and classification. Arun advocates for AI-powered data characterization and <a href='https://www.kiteworks.com/risk-compliance-glossary/'>governance</a> platforms that can proactively identify sensitive information requiring protection. Mike emphasizes the need for proper <a href='https://www.kiteworks.com/secure-file-transfer/data-classification/'>data classification</a>, noting that organizations often struggle to differentiate between critical and non-critical data. He recommends data minimization strategies including cold storage for inactive data to reduce the potential attack surface. The experts agree that building enterprise-wide risk awareness requires collaboration across departments rather than treating security as an isolated IT function.</p><p>The panel concludes that organizations must prioritize zero-trust architecture implementation, adopt data minimization strategies, and enhance incident response capabilities. Arun frames this as a comprehensive coalition of &quot;people, process, and technology safeguards all working together.&quot; Mike adds a sobering perspective for businesses that might not see themselves as targets: &quot;These weren&apos;t the 11 hacks of 2024. These were the top hacks... there are literally hundreds of thousands, if not millions more. And that&apos;s you.&quot; </p><p><b>Top 11 Data Breaches in 2024 Report</b>: <a href='https://www.kiteworks.com/top-data-breaches-report/'>https://www.kiteworks.com/top-data-breaches-report</a></p><p><b>Arun DeSouza LinkedIn: </b><a href='https://www.linkedin.com/in/arundesouza/'>https://www.linkedin.com/in/arundesouza/</a></p><p><b>Mike Crandall LinkedIn:</b> <a href='https://www.linkedin.com/in/crandallmike/'>https://www.linkedin.com/in/crandallmike/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/16985835-analysis-and-lessons-from-kiteworks-top-11-data-breaches-in-2024-report.mp3" length="37285986" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16985835</guid>
    <pubDate>Tue, 15 Apr 2025 15:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/16985835/transcript" type="text/html" />
    <itunes:duration>3105</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>43</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Dominic Bowen: Geopolitical Risk Planning &amp; Management</itunes:title>
    <title>Dominic Bowen: Geopolitical Risk Planning &amp; Management</title>
    <itunes:summary><![CDATA[This insightful Kitecast episode features Dominic Bowen, Partner and Head of Strategic Advisory at 2Secure in Stockholm, Sweden. With over 20 years of experience supporting business leaders, boards, and executives, Dominic brings valuable perspective from his work across cybersecurity, generative AI, risk management, and crisis response. His background spans strategic leadership positions in humanitarian organizations, military service with Special Operations Command, and law enforcement—prov...]]></itunes:summary>
    <description><![CDATA[<p>This insightful Kitecast episode features Dominic Bowen, Partner and Head of Strategic Advisory at 2Secure in Stockholm, Sweden. With over 20 years of experience supporting business leaders, boards, and executives, Dominic brings valuable perspective from his work across cybersecurity, <a href='https://www.kiteworks.com/kitecast/cybersecurity-and-incident-response-in-the-face-of-genai/'>generative AI</a>, risk management, and crisis response. His background spans strategic leadership positions in humanitarian organizations, military service with Special Operations Command, and law enforcement—providing him unique insights into risk management across diverse environments.</p><p>Many risks facing organizations today are predictable, not &quot;black swan&quot; events. Dominic emphasizes that effective risk management begins with understanding the business environment before identifying, analyzing, and mitigating threats. Companies that neglect this approach face potential disruptions, as demonstrated by European and North American businesses that expanded into China without adequate risk assessment or those slow to withdraw from Russia after its invasion of Ukraine. Businesses must recognize that events like inflation spikes, terrorist attacks, or regional conflicts aren&apos;t unpredictable—proper planning and preparation can help organizations navigate these challenges.</p><p>Cybersecurity represents one of the most pressing concerns for business leaders globally. Dominic notes that <a href='https://www.kiteworks.com/risk-exposure-index/'>cyber threats</a> have evolved into warfare weapons, with European officials warning businesses and citizens to prepare for heightened threats. This reality is demonstrated by the Russian attacks on Ukrainian financial institutions before the 2022 invasion and ongoing attacks against energy infrastructure throughout Europe. For businesses, this necessitates not just <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>regulatory compliance</a> but leveraging security frameworks as competitive advantages that enable boards and executives to move forward confidently despite increasing threats.</p><p>Artificial intelligence offers transformative benefits for risk management—when properly implemented. Organizations can gain significant advantages through <a href='https://www.kiteworks.com/brief-embedded-managed-detection-and-response/'>AI-powered predictive analytics</a>, automated threat detection, improved decision-making capabilities, and scenario development. Those organizations leveraging AI for fraud detection, identifying <a href='https://www.kiteworks.com/risk-compliance-glossary/insider-risk/'>insider threats</a>, and recognizing suspicious transactions position themselves ahead of competitors who fail to adopt these tools.</p><p>Effective risk management requires methodical approaches regardless of organizational context. Whether operating in conflict zones, developing humanitarian responses, or expanding business operations, Dominic emphasizes that the process remains consistent: understand the environment before attempting to identify or mitigate risks. Organizations that invest time in thoroughly understanding cultural, linguistic, political, and historical contexts before implementing risk mitigation strategies achieve substantially better outcomes. </p><p>LinkedIn Profile: <a href='https://www.linkedin.com/in/dominic-bowen/'>https://www.linkedin.com/in/dominic-bowen/</a> </p><p>2Secure: <a href='https://2securecorp.com/'>https://2securecorp.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>This insightful Kitecast episode features Dominic Bowen, Partner and Head of Strategic Advisory at 2Secure in Stockholm, Sweden. With over 20 years of experience supporting business leaders, boards, and executives, Dominic brings valuable perspective from his work across cybersecurity, <a href='https://www.kiteworks.com/kitecast/cybersecurity-and-incident-response-in-the-face-of-genai/'>generative AI</a>, risk management, and crisis response. His background spans strategic leadership positions in humanitarian organizations, military service with Special Operations Command, and law enforcement—providing him unique insights into risk management across diverse environments.</p><p>Many risks facing organizations today are predictable, not &quot;black swan&quot; events. Dominic emphasizes that effective risk management begins with understanding the business environment before identifying, analyzing, and mitigating threats. Companies that neglect this approach face potential disruptions, as demonstrated by European and North American businesses that expanded into China without adequate risk assessment or those slow to withdraw from Russia after its invasion of Ukraine. Businesses must recognize that events like inflation spikes, terrorist attacks, or regional conflicts aren&apos;t unpredictable—proper planning and preparation can help organizations navigate these challenges.</p><p>Cybersecurity represents one of the most pressing concerns for business leaders globally. Dominic notes that <a href='https://www.kiteworks.com/risk-exposure-index/'>cyber threats</a> have evolved into warfare weapons, with European officials warning businesses and citizens to prepare for heightened threats. This reality is demonstrated by the Russian attacks on Ukrainian financial institutions before the 2022 invasion and ongoing attacks against energy infrastructure throughout Europe. For businesses, this necessitates not just <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>regulatory compliance</a> but leveraging security frameworks as competitive advantages that enable boards and executives to move forward confidently despite increasing threats.</p><p>Artificial intelligence offers transformative benefits for risk management—when properly implemented. Organizations can gain significant advantages through <a href='https://www.kiteworks.com/brief-embedded-managed-detection-and-response/'>AI-powered predictive analytics</a>, automated threat detection, improved decision-making capabilities, and scenario development. Those organizations leveraging AI for fraud detection, identifying <a href='https://www.kiteworks.com/risk-compliance-glossary/insider-risk/'>insider threats</a>, and recognizing suspicious transactions position themselves ahead of competitors who fail to adopt these tools.</p><p>Effective risk management requires methodical approaches regardless of organizational context. Whether operating in conflict zones, developing humanitarian responses, or expanding business operations, Dominic emphasizes that the process remains consistent: understand the environment before attempting to identify or mitigate risks. Organizations that invest time in thoroughly understanding cultural, linguistic, political, and historical contexts before implementing risk mitigation strategies achieve substantially better outcomes. </p><p>LinkedIn Profile: <a href='https://www.linkedin.com/in/dominic-bowen/'>https://www.linkedin.com/in/dominic-bowen/</a> </p><p>2Secure: <a href='https://2securecorp.com/'>https://2securecorp.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/16918639-dominic-bowen-geopolitical-risk-planning-management.mp3" length="26964345" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16918639</guid>
    <pubDate>Fri, 04 Apr 2025 12:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/16918639/transcript" type="text/html" />
    <itunes:duration>2244</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>42</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" img="https://storage.buzzsprout.com/whufyyig7haykaofoazj7i0ffz9i">Dominic Bowen</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Arun DeSouza: Becoming a Transformation CISO</itunes:title>
    <title>Arun DeSouza: Becoming a Transformation CISO</title>
    <itunes:summary><![CDATA[Arun DeSouza, the Managing Director at Profortis Solutions, brings over two decades of experience as a CISO, having developed and implemented award-winning programs in identity lifecycle management and IoT security. His impressive career includes induction into the CISO Hall of Fame by the Global Cyber Startup Observatory and recognition as a top CISO by Cyber Defense Magazine. Arun’s expertise, combined with his academic background—a Ph.D. in Chemical Engineering from Vanderbilt—offers liste...]]></itunes:summary>
    <description><![CDATA[<p>Arun DeSouza, the Managing Director at Profortis Solutions, brings over two decades of experience as a <a href='https://www.kiteworks.com/solutions/ciso/'>CISO</a>, having developed and implemented award-winning programs in identity lifecycle management and IoT security. His impressive career includes induction into the CISO Hall of Fame by the Global Cyber Startup Observatory and recognition as a top CISO by Cyber Defense Magazine. Arun’s expertise, combined with his academic background—a Ph.D. in Chemical Engineering from Vanderbilt—offers listeners a unique perspective on navigating today’s complex cybersecurity landscape.</p><p><b>From Chemical Engineering to Cybersecurity Leadership</b><br/> Arun’s journey into cybersecurity is as unconventional as it is inspiring. Initially trained as a chemical engineer, he transitioned to cybersecurity through hands-on experience and a fearless approach to problem-solving. Faced with the challenge of managing global security for a French company, Arun built a strategic plan that not only upgraded systems but also delivered significant savings. His approach, which he calls the “power of federation,” involved collaborating with partners for discounted pricing and consolidating resources.</p><p><b>Navigating Cybersecurity Threats: IoT, Ransomware, and AI</b><br/> Arun sheds light on the evolving cybersecurity threat landscape, particularly the rapid proliferation of IoT devices. With an estimated 75 billion IoT devices by 2025, the risks associated with insecure software, vulnerable cloud communications, and expanded attack surfaces are more significant than ever. He highlights specific challenges in manufacturing and OT security, where ransomware and supply chain attacks can cripple operations. Arun also warns of the impending threat of AI-powered <a href='https://www.kiteworks.com/cybersecurity-risk-management/cleo-harmony-data-breach/'>supply chain attacks</a>, which could amplify the scale and sophistication of breaches. His insights reinforce the need for robust <a href='https://www.kiteworks.com/platform/advanced-governance/'>data governance</a> and the adoption of <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-data-exchange/'>Zero Trust</a> security models to mitigate these risks effectively.</p><p><b>Critical Role of Identity Management and Leadership</b><br/> Central to Arun’s security philosophy is the concept of <a href='https://www.kiteworks.com/risk-compliance-glossary/identity-access-management/'>identity access management (IAM)</a> as a strategic cornerstone. He introduces the idea of the “identity coin,” which blends physical security (person, device, location) with logical security (attributes, behavior, context). Arun emphasizes that security is not just about technology but also about strong leadership and communication. He advises CISOs to build relationships with senior leaders, use storytelling to convey risks, and align security initiatives with business objectives. His analogy of the CISO as the “captain of the good ship cyber” encapsulates his forward-thinking approach to navigating cybersecurity challenges.</p><p><b>Technical Acumen and Strategic Vision</b><br/> Arun’s expertise and leadership offer actionable insights for anyone looking to strengthen their cybersecurity strategy. His forward-thinking approach to risk management, identity governance, and embracing change provides a valuable blueprint for both cybersecurity professionals and business leaders. </p><p><b>LinkedIn</b>: <a href='https://www.linkedin.com/in/arundesouza/'>https://www.linkedin.com/in/arundesouza/</a></p><p><b>Profotis Solutions:</b> <a href='https://profortissolutions.com/'>https://profortissolutions.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Arun DeSouza, the Managing Director at Profortis Solutions, brings over two decades of experience as a <a href='https://www.kiteworks.com/solutions/ciso/'>CISO</a>, having developed and implemented award-winning programs in identity lifecycle management and IoT security. His impressive career includes induction into the CISO Hall of Fame by the Global Cyber Startup Observatory and recognition as a top CISO by Cyber Defense Magazine. Arun’s expertise, combined with his academic background—a Ph.D. in Chemical Engineering from Vanderbilt—offers listeners a unique perspective on navigating today’s complex cybersecurity landscape.</p><p><b>From Chemical Engineering to Cybersecurity Leadership</b><br/> Arun’s journey into cybersecurity is as unconventional as it is inspiring. Initially trained as a chemical engineer, he transitioned to cybersecurity through hands-on experience and a fearless approach to problem-solving. Faced with the challenge of managing global security for a French company, Arun built a strategic plan that not only upgraded systems but also delivered significant savings. His approach, which he calls the “power of federation,” involved collaborating with partners for discounted pricing and consolidating resources.</p><p><b>Navigating Cybersecurity Threats: IoT, Ransomware, and AI</b><br/> Arun sheds light on the evolving cybersecurity threat landscape, particularly the rapid proliferation of IoT devices. With an estimated 75 billion IoT devices by 2025, the risks associated with insecure software, vulnerable cloud communications, and expanded attack surfaces are more significant than ever. He highlights specific challenges in manufacturing and OT security, where ransomware and supply chain attacks can cripple operations. Arun also warns of the impending threat of AI-powered <a href='https://www.kiteworks.com/cybersecurity-risk-management/cleo-harmony-data-breach/'>supply chain attacks</a>, which could amplify the scale and sophistication of breaches. His insights reinforce the need for robust <a href='https://www.kiteworks.com/platform/advanced-governance/'>data governance</a> and the adoption of <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-data-exchange/'>Zero Trust</a> security models to mitigate these risks effectively.</p><p><b>Critical Role of Identity Management and Leadership</b><br/> Central to Arun’s security philosophy is the concept of <a href='https://www.kiteworks.com/risk-compliance-glossary/identity-access-management/'>identity access management (IAM)</a> as a strategic cornerstone. He introduces the idea of the “identity coin,” which blends physical security (person, device, location) with logical security (attributes, behavior, context). Arun emphasizes that security is not just about technology but also about strong leadership and communication. He advises CISOs to build relationships with senior leaders, use storytelling to convey risks, and align security initiatives with business objectives. His analogy of the CISO as the “captain of the good ship cyber” encapsulates his forward-thinking approach to navigating cybersecurity challenges.</p><p><b>Technical Acumen and Strategic Vision</b><br/> Arun’s expertise and leadership offer actionable insights for anyone looking to strengthen their cybersecurity strategy. His forward-thinking approach to risk management, identity governance, and embracing change provides a valuable blueprint for both cybersecurity professionals and business leaders. </p><p><b>LinkedIn</b>: <a href='https://www.linkedin.com/in/arundesouza/'>https://www.linkedin.com/in/arundesouza/</a></p><p><b>Profotis Solutions:</b> <a href='https://profortissolutions.com/'>https://profortissolutions.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/16670184-arun-desouza-becoming-a-transformation-ciso.mp3" length="32287662" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16670184</guid>
    <pubDate>Thu, 27 Feb 2025 07:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/16670184/transcript" type="text/html" />
    <itunes:duration>2688</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/arundesouza/" img="https://storage.buzzsprout.com/z2ysaazfgb3x9wsn2nuzp4jqnp97">Arun DeSouza</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Chad Lorenc: Security as a Practice in the Cloud</itunes:title>
    <title>Chad Lorenc: Security as a Practice in the Cloud</title>
    <itunes:summary><![CDATA[With over two decades of experience in the cybersecurity domain, Chad Lorenc stands as a prominent voice in cloud security and enterprise security strategy. Currently serving as a security leader at Amazon Web Services (AWS), Chad has contributed significantly to advancing cloud architecture best practices and building robust security frameworks for some of the world’s most dynamic organizations. In this insightful Kitecast episode, Chad shares his expertise on cloud security, the evolving ro...]]></itunes:summary>
    <description><![CDATA[<p>With over two decades of experience in the cybersecurity domain, Chad Lorenc stands as a prominent voice in cloud security and enterprise security strategy. Currently serving as a security leader at Amazon Web Services (AWS), Chad has contributed significantly to advancing cloud architecture best practices and building robust security frameworks for some of the world’s most dynamic organizations. In this insightful Kitecast episode, Chad shares his expertise on cloud security, the evolving role of <a href='https://www.kiteworks.com/solutions/ciso/'>CISOs</a>, and the integration of <a href='https://www.kiteworks.com/cybersecurity-risk-management/executive-order-ai/'>artificial intelligence (AI)</a> into enterprise security strategies.</p><p><b>Evolution of Cloud Security: From Apprehension to Opportunity</b></p><p>In the early days of cloud adoption, organizations often hesitated to migrate their operations due to concerns over security and control. Chad reflects on this initial apprehension and explains how the cloud security paradigm has matured over the years. Many companies attempted to replicate on-premises security models in the cloud, often facing challenges with patching, incident management, and compliance. Cloud environments require unique security approaches, with a focus on building specific controls and aligning them with broader security operations and compliance requirements.</p><p><b>CISOs: Leading the Charge in Cloud and AI Adoption</b></p><p>A recurring theme in the podcast is the critical role of CISOs in driving cloud and AI strategies. Chad offers valuable advice to CISOs, encouraging them to lead cloud adoption initiatives rather than being pulled into projects at the last minute. He highlights the tangible security benefits of cloud environments, such as the ease of implementing encryption and other advanced security controls. By taking a proactive approach, CISOs can not only enhance security but also achieve cost savings and operational efficiencies.</p><p><b>Embracing AI and Navigating Regulatory Challenges</b></p><p>As organizations increasingly integrate AI into their operations, compliance and security become critical considerations. Chad discusses how the shift to data lakes and the acceleration of AI adoption have transformed cloud security conversations from traditional security measures to compliance and audit readiness. The conversation also touches on the complexities of shadow AI—where unsanctioned AI tools are used within companies—and how security leaders can address these challenges by aligning internal strategies with business demands. In addition, Chad sheds light on the <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>regulatory landscape</a>, including the growing importance of <a href='https://www.kiteworks.com/platform/compliance/fedramp-authorization/'>FedRAMP compliance</a> for federal clients and the balance between rapid cloud innovation and regulatory adherence.</p><p><b>Charting the Future of Cloud Security with Chad Lorenc</b></p><p>The podcast concludes with Chad’s forward-looking perspective on the evolving cybersecurity landscape. He believes that while AI remains a dominant topic, true innovation lies in optimizing security operations and embracing technologies that drive business outcomes. Chad sees an emerging trend where CISOs are not only security experts but also strategic business leaders who contribute to overall organizational success. His parting advice to security professionals is clear: embrace new technologies like AI and cloud solutions with a strategic mindset to remain relevant and impactful.</p><p><b>LinkedIn: </b>https://www.linkedin.com/in/chadlorenc/</p><p><b>Amazon Web Services: </b>https://www.linkedin.com/company/amazon-web-services/</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>With over two decades of experience in the cybersecurity domain, Chad Lorenc stands as a prominent voice in cloud security and enterprise security strategy. Currently serving as a security leader at Amazon Web Services (AWS), Chad has contributed significantly to advancing cloud architecture best practices and building robust security frameworks for some of the world’s most dynamic organizations. In this insightful Kitecast episode, Chad shares his expertise on cloud security, the evolving role of <a href='https://www.kiteworks.com/solutions/ciso/'>CISOs</a>, and the integration of <a href='https://www.kiteworks.com/cybersecurity-risk-management/executive-order-ai/'>artificial intelligence (AI)</a> into enterprise security strategies.</p><p><b>Evolution of Cloud Security: From Apprehension to Opportunity</b></p><p>In the early days of cloud adoption, organizations often hesitated to migrate their operations due to concerns over security and control. Chad reflects on this initial apprehension and explains how the cloud security paradigm has matured over the years. Many companies attempted to replicate on-premises security models in the cloud, often facing challenges with patching, incident management, and compliance. Cloud environments require unique security approaches, with a focus on building specific controls and aligning them with broader security operations and compliance requirements.</p><p><b>CISOs: Leading the Charge in Cloud and AI Adoption</b></p><p>A recurring theme in the podcast is the critical role of CISOs in driving cloud and AI strategies. Chad offers valuable advice to CISOs, encouraging them to lead cloud adoption initiatives rather than being pulled into projects at the last minute. He highlights the tangible security benefits of cloud environments, such as the ease of implementing encryption and other advanced security controls. By taking a proactive approach, CISOs can not only enhance security but also achieve cost savings and operational efficiencies.</p><p><b>Embracing AI and Navigating Regulatory Challenges</b></p><p>As organizations increasingly integrate AI into their operations, compliance and security become critical considerations. Chad discusses how the shift to data lakes and the acceleration of AI adoption have transformed cloud security conversations from traditional security measures to compliance and audit readiness. The conversation also touches on the complexities of shadow AI—where unsanctioned AI tools are used within companies—and how security leaders can address these challenges by aligning internal strategies with business demands. In addition, Chad sheds light on the <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>regulatory landscape</a>, including the growing importance of <a href='https://www.kiteworks.com/platform/compliance/fedramp-authorization/'>FedRAMP compliance</a> for federal clients and the balance between rapid cloud innovation and regulatory adherence.</p><p><b>Charting the Future of Cloud Security with Chad Lorenc</b></p><p>The podcast concludes with Chad’s forward-looking perspective on the evolving cybersecurity landscape. He believes that while AI remains a dominant topic, true innovation lies in optimizing security operations and embracing technologies that drive business outcomes. Chad sees an emerging trend where CISOs are not only security experts but also strategic business leaders who contribute to overall organizational success. His parting advice to security professionals is clear: embrace new technologies like AI and cloud solutions with a strategic mindset to remain relevant and impactful.</p><p><b>LinkedIn: </b>https://www.linkedin.com/in/chadlorenc/</p><p><b>Amazon Web Services: </b>https://www.linkedin.com/company/amazon-web-services/</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/16667084-chad-lorenc-security-as-a-practice-in-the-cloud.mp3" length="26770296" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16667084</guid>
    <pubDate>Thu, 20 Feb 2025 21:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/16667084/transcript" type="text/html" />
    <itunes:duration>2228</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/chadlorenc/" img="https://storage.buzzsprout.com/z13rcol0cdmsewr1d66tp1a05gth">Chad Lorenc</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Howard Holton: Weighing AI Cyber Hype and Risks</itunes:title>
    <title>Howard Holton: Weighing AI Cyber Hype and Risks</title>
    <itunes:summary><![CDATA[Unveiling AI, Data Security, and Innovation Howard Holton, the Chief Technology Officer of GigaOm, explores some of the most pressing topics in technology today. With over two decades of experience spanning roles as CTO, CISO, CIO, and consultant, Howard brings a wealth of knowledge to the conversation. His background includes leadership positions at Rheem Manufacturing, Hitachi Vantara, and Precision Discovery, where he honed his expertise in digital transformation, data science, and operati...]]></itunes:summary>
    <description><![CDATA[<p><b>Unveiling AI, Data Security, and Innovation</b></p><p>Howard Holton, the Chief Technology Officer of <a href='https://gigaom.com/'>GigaOm</a>, explores some of the most pressing topics in technology today. With over two decades of experience spanning roles as CTO, CISO, CIO, and consultant, Howard brings a wealth of knowledge to the conversation. His background includes leadership positions at Rheem Manufacturing, Hitachi Vantara, and Precision Discovery, where he honed his expertise in digital transformation, data science, and operational strategy. At GigaOm, Howard combines his technical acumen with a passion for helping organizations navigate the complexities of modern technology landscapes.</p><p><b>Generative AI: Hype vs. Reality</b></p><p>The conversation delves into the rapid rise of <a href='https://www.kiteworks.com/cybersecurity-risk-management/protecting-sensitive-content-communications-is-more-important/'>generative AI</a> (GenAI) and the realities beyond the hype. Howard explains how businesses are grappling with this transformative technology, which, while promising, is rife with complexities. Many organizations rushed into adopting AI without fully understanding its implications, leading to inefficiencies and unexpected risks. He points out that generative AI is a powerful tool but cautions against treating it as a catch-all solution. The conversation highlights how improper use can lead to issues like misinformation, inaccurate outputs, and even legal challenges, underscoring the need for deliberate strategy in deploying AI tools.</p><p><b>Tackling AI Governance and Risks</b></p><p>Howard also provides an unvarnished look at <a href='https://www.kiteworks.com/platform/simple/ai-data-gateway/'>AI governance</a> and its associated risks. With generative AI being a relatively young technology, governance frameworks are still in their infancy. Organizations often lack cohesive tools to manage the risks associated with AI deployments. This leads to challenges in ensuring compliance with data privacy regulations and safeguarding sensitive information.</p><p><b>Shadow AI: The Hidden Risk</b></p><p><a href='https://www.kiteworks.com/cybersecurity-risk-management/data-security-compliance-insights-ibm-2024-cost-data-breach/'>Shadow AI</a> emerged as another critical topic in the discussion. Howard describes Shadow AI as the unauthorized use of AI tools by employees, often without the knowledge or approval of management. While employees leverage these tools to improve productivity or efficiency, this practice introduces significant risks to data security and compliance. Sensitive company data may unknowingly be exposed to public large language models (LLMs), creating vulnerabilities and potential regulatory breaches.</p><p><b>Advice for the Tech Community</b></p><p>Closing the episode, Howard offers invaluable advice for professionals navigating the ever-changing tech landscape. He underscores the importance of mentorship, curiosity, and collaboration in driving innovation. “It’s our job to help people,” he says, emphasizing the need for tech leaders to share their knowledge and foster growth within their communities. Howard also encourages organizations to adopt a mindset of continuous learning, particularly as emerging technologies like AI continue to evolve.</p><p>LinkedIn: <a href='https://www.linkedin.com/in/howardholton/'>https://www.linkedin.com/in/howardholton/</a> </p><p>GigaOm: <a href='https://gigaom.com/'>https://gigaom.com/</a> </p><p> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p><b>Unveiling AI, Data Security, and Innovation</b></p><p>Howard Holton, the Chief Technology Officer of <a href='https://gigaom.com/'>GigaOm</a>, explores some of the most pressing topics in technology today. With over two decades of experience spanning roles as CTO, CISO, CIO, and consultant, Howard brings a wealth of knowledge to the conversation. His background includes leadership positions at Rheem Manufacturing, Hitachi Vantara, and Precision Discovery, where he honed his expertise in digital transformation, data science, and operational strategy. At GigaOm, Howard combines his technical acumen with a passion for helping organizations navigate the complexities of modern technology landscapes.</p><p><b>Generative AI: Hype vs. Reality</b></p><p>The conversation delves into the rapid rise of <a href='https://www.kiteworks.com/cybersecurity-risk-management/protecting-sensitive-content-communications-is-more-important/'>generative AI</a> (GenAI) and the realities beyond the hype. Howard explains how businesses are grappling with this transformative technology, which, while promising, is rife with complexities. Many organizations rushed into adopting AI without fully understanding its implications, leading to inefficiencies and unexpected risks. He points out that generative AI is a powerful tool but cautions against treating it as a catch-all solution. The conversation highlights how improper use can lead to issues like misinformation, inaccurate outputs, and even legal challenges, underscoring the need for deliberate strategy in deploying AI tools.</p><p><b>Tackling AI Governance and Risks</b></p><p>Howard also provides an unvarnished look at <a href='https://www.kiteworks.com/platform/simple/ai-data-gateway/'>AI governance</a> and its associated risks. With generative AI being a relatively young technology, governance frameworks are still in their infancy. Organizations often lack cohesive tools to manage the risks associated with AI deployments. This leads to challenges in ensuring compliance with data privacy regulations and safeguarding sensitive information.</p><p><b>Shadow AI: The Hidden Risk</b></p><p><a href='https://www.kiteworks.com/cybersecurity-risk-management/data-security-compliance-insights-ibm-2024-cost-data-breach/'>Shadow AI</a> emerged as another critical topic in the discussion. Howard describes Shadow AI as the unauthorized use of AI tools by employees, often without the knowledge or approval of management. While employees leverage these tools to improve productivity or efficiency, this practice introduces significant risks to data security and compliance. Sensitive company data may unknowingly be exposed to public large language models (LLMs), creating vulnerabilities and potential regulatory breaches.</p><p><b>Advice for the Tech Community</b></p><p>Closing the episode, Howard offers invaluable advice for professionals navigating the ever-changing tech landscape. He underscores the importance of mentorship, curiosity, and collaboration in driving innovation. “It’s our job to help people,” he says, emphasizing the need for tech leaders to share their knowledge and foster growth within their communities. Howard also encourages organizations to adopt a mindset of continuous learning, particularly as emerging technologies like AI continue to evolve.</p><p>LinkedIn: <a href='https://www.linkedin.com/in/howardholton/'>https://www.linkedin.com/in/howardholton/</a> </p><p>GigaOm: <a href='https://gigaom.com/'>https://gigaom.com/</a> </p><p> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/16406480-howard-holton-weighing-ai-cyber-hype-and-risks.mp3" length="30403717" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16406480</guid>
    <pubDate>Fri, 10 Jan 2025 08:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/16406480/transcript" type="text/html" />
    <itunes:duration>2531</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/howardholton/" img="https://storage.buzzsprout.com/i47erkpf0kpq84rtnyxqg60ec5sy">Howard Holton</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Luigi Lenguito: Getting Proactive About Your Cybersecurity</itunes:title>
    <title>Luigi Lenguito: Getting Proactive About Your Cybersecurity</title>
    <itunes:summary><![CDATA[Luigi Lenguito, a pioneering figure in predictive cybersecurity, brings an extraordinary background to his role as founder and CEO of BforeAI. Before revolutionizing cyber threat prevention in 2018, Lenguito's 18-year tenure at Dell and Quest Software encompassed 26 diverse executive positions. His unconventional journey from Formula Three racing champion in Italy to tech industry innovator showcases his adaptability and vision. At Dell, Lenguito's entrepreneurial spirit shone through his cre...]]></itunes:summary>
    <description><![CDATA[<p><a href='https://www.linkedin.com/in/llenguito/'>Luigi Lenguito</a>, a pioneering figure in predictive cybersecurity, brings an extraordinary background to his role as founder and CEO of <a href='https://bfore.ai/'>BforeAI</a>. Before revolutionizing cyber threat prevention in 2018, Lenguito&apos;s 18-year tenure at Dell and Quest Software encompassed 26 diverse executive positions. His unconventional journey from Formula Three racing champion in Italy to tech industry innovator showcases his adaptability and vision. At Dell, Lenguito&apos;s entrepreneurial spirit shone through his creation of a groundbreaking program that bridged the gap between corporate employees and startups, demonstrating his talent for fostering innovation and maximizing human potential.<br/><br/><b>Building a Bridge Between Corporates and Startups</b> </p><p>One of Lenguito’s most impactful achievements at Dell was creating an innovative entrepreneurship program that connected Dell employees with early-stage startups. The program grew to involve over 400 Dell employees mentoring 10 to 20 startups at any given time. Rather than following traditional corporate-startup engagement models, Lenguito’s program focused on unleashing the untapped potential of Dell employees, allowing them to utilize skills from their past experiences that weren’t being used in their current roles. This unique approach not only benefited the startups but also significantly improved employee satisfaction and retention.<br/><br/><b>From Intrapreneur to Entrepreneur</b></p><p>Lenguito’s exposure to entrepreneurs through the Dell program eventually inspired his own entrepreneurial journey. In 2018, he founded BforeAI after discovering research that aligned with his long-held vision of predictive cybersecurity. Inspired by the concept of “pre-crime” from the movie Minority Report, Lenguito saw the potential to transform cybersecurity from reactive to proactive that relies on <a href='https://www.kiteworks.com/cybersecurity-risk-management/cybersecurity-continuous-monitoring-and-adaptability/'>continuous monitoring</a>. His company now prevents an average of 20 million potential cyberattack victims daily, with the ability to predict threats up to nine months in advance.</p><p><b>Insights on Building Corporate Innovation Programs</b> </p><p>Drawing from his experience, Lenguito shares three key principles for organizations looking to build successful corporate entrepreneurship programs. First, clearly define your purpose--understanding why you’re creating the program is crucial. Second, set clear boundaries and expectations upfront about what the program will and won&apos;t do to avoid frustration on both sides. Third, secure appropriate funding by identifying who benefits from the program’s secondary outcomes, as they should be the ones sponsoring it.<br/><br/><b>Future of Cybersecurity<br/><br/></b>Lenguito’s vision for the future of cybersecurity challenges the industry’s current “assume breach” mentality and <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>zero trust security principles</a>. His experience with <a href='https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-for-insurance-companies-protecting-consumer-privacy/'>cyber insurance</a> providers has led to innovative hybrid models that combine traditional insurance with predictive security measures. This forward-thinking approach has earned recognition from industry leaders, with BforeAI recently being named a Gartner Cool Vendor in AI and GenAI for banking and financial services.<br/><br/>LinkedIn Profile: <a href='https://www.linkedin.com/in/llenguito/'>https://www.linkedin.com/in/llenguito/</a><br/><br/>BforeAI: <a href='https://bfore.ai/'>https://bfore.ai/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p><a href='https://www.linkedin.com/in/llenguito/'>Luigi Lenguito</a>, a pioneering figure in predictive cybersecurity, brings an extraordinary background to his role as founder and CEO of <a href='https://bfore.ai/'>BforeAI</a>. Before revolutionizing cyber threat prevention in 2018, Lenguito&apos;s 18-year tenure at Dell and Quest Software encompassed 26 diverse executive positions. His unconventional journey from Formula Three racing champion in Italy to tech industry innovator showcases his adaptability and vision. At Dell, Lenguito&apos;s entrepreneurial spirit shone through his creation of a groundbreaking program that bridged the gap between corporate employees and startups, demonstrating his talent for fostering innovation and maximizing human potential.<br/><br/><b>Building a Bridge Between Corporates and Startups</b> </p><p>One of Lenguito’s most impactful achievements at Dell was creating an innovative entrepreneurship program that connected Dell employees with early-stage startups. The program grew to involve over 400 Dell employees mentoring 10 to 20 startups at any given time. Rather than following traditional corporate-startup engagement models, Lenguito’s program focused on unleashing the untapped potential of Dell employees, allowing them to utilize skills from their past experiences that weren’t being used in their current roles. This unique approach not only benefited the startups but also significantly improved employee satisfaction and retention.<br/><br/><b>From Intrapreneur to Entrepreneur</b></p><p>Lenguito’s exposure to entrepreneurs through the Dell program eventually inspired his own entrepreneurial journey. In 2018, he founded BforeAI after discovering research that aligned with his long-held vision of predictive cybersecurity. Inspired by the concept of “pre-crime” from the movie Minority Report, Lenguito saw the potential to transform cybersecurity from reactive to proactive that relies on <a href='https://www.kiteworks.com/cybersecurity-risk-management/cybersecurity-continuous-monitoring-and-adaptability/'>continuous monitoring</a>. His company now prevents an average of 20 million potential cyberattack victims daily, with the ability to predict threats up to nine months in advance.</p><p><b>Insights on Building Corporate Innovation Programs</b> </p><p>Drawing from his experience, Lenguito shares three key principles for organizations looking to build successful corporate entrepreneurship programs. First, clearly define your purpose--understanding why you’re creating the program is crucial. Second, set clear boundaries and expectations upfront about what the program will and won&apos;t do to avoid frustration on both sides. Third, secure appropriate funding by identifying who benefits from the program’s secondary outcomes, as they should be the ones sponsoring it.<br/><br/><b>Future of Cybersecurity<br/><br/></b>Lenguito’s vision for the future of cybersecurity challenges the industry’s current “assume breach” mentality and <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>zero trust security principles</a>. His experience with <a href='https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-for-insurance-companies-protecting-consumer-privacy/'>cyber insurance</a> providers has led to innovative hybrid models that combine traditional insurance with predictive security measures. This forward-thinking approach has earned recognition from industry leaders, with BforeAI recently being named a Gartner Cool Vendor in AI and GenAI for banking and financial services.<br/><br/>LinkedIn Profile: <a href='https://www.linkedin.com/in/llenguito/'>https://www.linkedin.com/in/llenguito/</a><br/><br/>BforeAI: <a href='https://bfore.ai/'>https://bfore.ai/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/16299241-luigi-lenguito-getting-proactive-about-your-cybersecurity.mp3" length="32836889" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16299241</guid>
    <pubDate>Wed, 18 Dec 2024 10:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/16299241/transcript" type="text/html" />
    <itunes:duration>2734</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/llenguito/" img="https://storage.buzzsprout.com/5nz6khsk46elkon2qxsv08il3r6o">Luigi Lenguito</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>2025 Exposure Risk Report: Key Insights</itunes:title>
    <title>2025 Exposure Risk Report: Key Insights</title>
    <itunes:summary><![CDATA[The Kiteworks 2025 Forecast for Managing Private Content Exposure Risk Report offers a comprehensive analysis of emerging cybersecurity and compliance trends shaping the year ahead. The report identifies 12 pivotal trends affecting how organizations manage private content exposure risk, highlighting critical areas like data privacy regulations, software supply chain security, AI governance, and quantum computing threats. With 75% of the world's population expected to have their personal data ...]]></itunes:summary>
    <description><![CDATA[<p>The Kiteworks <a href='https://www.kiteworks.com/forecast-report/'>2025 Forecast for Managing Private Content Exposure Risk Report</a> offers a comprehensive analysis of emerging cybersecurity and compliance trends shaping the year ahead. The report identifies 12 pivotal trends affecting how organizations manage private content exposure risk, highlighting critical areas like data privacy regulations, <a href='https://www.kiteworks.com/cybersecurity-risk-management/dropbox-sign-breach/'>software supply chain security</a>, <a href='https://www.kiteworks.com/platform/simple/ai-data-gateway/'>AI governance</a>, and quantum computing threats. With 75% of the world&apos;s population expected to have their personal data protected under privacy laws by 2025, organizations must implement robust strategies to <a href='https://www.kiteworks.com/company/press-releases/kiteworks-unveils-groundbreaking-risk-exposure-index-revealing-true-impact-of-the-top-11-data-breaches-in-2024/'>mitigate risks and ensure compliance</a>.</p><p>During the Kitecast episode, cybersecurity experts Alexandre Blanc and Evgeniy Kharam discussed the alarming rise in software supply chain attacks. These attacks are projected to spiral and the associated cost. The experts emphasized that while compliance frameworks like <a href='https://www.kiteworks.com/risk-compliance-glossary/soc-2/'>SOC 2</a> and <a href='https://www.kiteworks.com/risk-compliance-glossary/iso-27000-standards/'>ISO 27000 standards</a> provide baseline guidance, organizations must move beyond mere checkbox security compliance. &quot;Alexandre explained, “Organizations often view SOC 2 or ISO certification as the end goal, but that&apos;s just the starting point. What matters is building a comprehensive security program that actually addresses real risks and maintains security posture over time.&quot;</p><p>The discussion delved deep into <a href='https://www.kiteworks.com/platform/compliance/cmmc-compliance/'>CMMC 2.0 compliance</a> challenges facing defense contractors. While surveys indicate most organizations believe they&apos;re prepared for certification, the reality is starkly different: the actual number of organizations ready to pass certification requirements is quite low. Evgeniy noted, &quot;Don&apos;t wait to start your CMMC preparation. This isn&apos;t just about checking boxes. Organizations need to understand their environment, document their processes, and implement required controls - all of which takes significant time and resources.&quot;</p><p>The Kitecast conversation highlighted growing concerns about employees inadvertently exposing sensitive data through public large language models (LLMs) and other AI tools. Rather than focusing solely on technical controls, the experts emphasized the need for comprehensive governance frameworks that include clear policies, regular training, and approved platforms for business use. You cannot just block ChatGPT and think you&apos;ve solved the problem. New AI tools emerge constantly. Organizations need to educate employees about the risks and provide secure alternatives for legitimate business needs.</p><p><b>2025 Forecast Report</b></p><p><a href='https://www.kiteworks.com/forecast-report/'>https://www.kiteworks.com/forecast-report/</a> </p><p><b>LinkedIn Profile for Evgeniy Kharam</b></p><p><a href='https://www.linkedin.com/in/ekharam/'>https://www.linkedin.com/in/ekharam/</a></p><p><b>LinkedIn Profile for Alexandre Blanc</b></p><p><a href='https://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022/'>https://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>The Kiteworks <a href='https://www.kiteworks.com/forecast-report/'>2025 Forecast for Managing Private Content Exposure Risk Report</a> offers a comprehensive analysis of emerging cybersecurity and compliance trends shaping the year ahead. The report identifies 12 pivotal trends affecting how organizations manage private content exposure risk, highlighting critical areas like data privacy regulations, <a href='https://www.kiteworks.com/cybersecurity-risk-management/dropbox-sign-breach/'>software supply chain security</a>, <a href='https://www.kiteworks.com/platform/simple/ai-data-gateway/'>AI governance</a>, and quantum computing threats. With 75% of the world&apos;s population expected to have their personal data protected under privacy laws by 2025, organizations must implement robust strategies to <a href='https://www.kiteworks.com/company/press-releases/kiteworks-unveils-groundbreaking-risk-exposure-index-revealing-true-impact-of-the-top-11-data-breaches-in-2024/'>mitigate risks and ensure compliance</a>.</p><p>During the Kitecast episode, cybersecurity experts Alexandre Blanc and Evgeniy Kharam discussed the alarming rise in software supply chain attacks. These attacks are projected to spiral and the associated cost. The experts emphasized that while compliance frameworks like <a href='https://www.kiteworks.com/risk-compliance-glossary/soc-2/'>SOC 2</a> and <a href='https://www.kiteworks.com/risk-compliance-glossary/iso-27000-standards/'>ISO 27000 standards</a> provide baseline guidance, organizations must move beyond mere checkbox security compliance. &quot;Alexandre explained, “Organizations often view SOC 2 or ISO certification as the end goal, but that&apos;s just the starting point. What matters is building a comprehensive security program that actually addresses real risks and maintains security posture over time.&quot;</p><p>The discussion delved deep into <a href='https://www.kiteworks.com/platform/compliance/cmmc-compliance/'>CMMC 2.0 compliance</a> challenges facing defense contractors. While surveys indicate most organizations believe they&apos;re prepared for certification, the reality is starkly different: the actual number of organizations ready to pass certification requirements is quite low. Evgeniy noted, &quot;Don&apos;t wait to start your CMMC preparation. This isn&apos;t just about checking boxes. Organizations need to understand their environment, document their processes, and implement required controls - all of which takes significant time and resources.&quot;</p><p>The Kitecast conversation highlighted growing concerns about employees inadvertently exposing sensitive data through public large language models (LLMs) and other AI tools. Rather than focusing solely on technical controls, the experts emphasized the need for comprehensive governance frameworks that include clear policies, regular training, and approved platforms for business use. You cannot just block ChatGPT and think you&apos;ve solved the problem. New AI tools emerge constantly. Organizations need to educate employees about the risks and provide secure alternatives for legitimate business needs.</p><p><b>2025 Forecast Report</b></p><p><a href='https://www.kiteworks.com/forecast-report/'>https://www.kiteworks.com/forecast-report/</a> </p><p><b>LinkedIn Profile for Evgeniy Kharam</b></p><p><a href='https://www.linkedin.com/in/ekharam/'>https://www.linkedin.com/in/ekharam/</a></p><p><b>LinkedIn Profile for Alexandre Blanc</b></p><p><a href='https://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022/'>https://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/16216842-2025-exposure-risk-report-key-insights.mp3" length="24003597" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16216842</guid>
    <pubDate>Tue, 03 Dec 2024 12:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/16216842/transcript" type="text/html" />
    <itunes:duration>1998</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="http://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022" img="https://storage.buzzsprout.com/gqewbq3pzcfbh3ny4lpwgikrziez">Alexandre Blanc</podcast:person>
    <podcast:person role="guest" href="https://www.linkedin.com/in/ekharam/" img="https://storage.buzzsprout.com/nlo6v6rgjz7c3k68e3yyd5upaa1w">Evgeniy Kharam</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Jerod Brennen: From Music Educator to Cybersecurity Consultant and Mentor</itunes:title>
    <title>Jerod Brennen: From Music Educator to Cybersecurity Consultant and Mentor</title>
    <itunes:summary><![CDATA[Jerod Brennen, VP of Cybersecurity Services at SideChannel, brings a unique perspective to cybersecurity leadership. Originally pursuing a career in music education, Brennen's journey led him through various IT roles before landing in cybersecurity at a public utility. Today, he serves as a vCISO for multiple organizations while also creating educational content for LinkedIn Learning, where he has developed over 40 courses covering topics from application security to ethics in technology. His...]]></itunes:summary>
    <description><![CDATA[<p><a href='https://www.linkedin.com/in/jerodbrennen/'>Jerod Brennen</a>, VP of Cybersecurity Services at <a href='https://sidechannel.com/'>SideChannel</a>, brings a unique perspective to cybersecurity leadership. Originally pursuing a career in music education, Brennen&apos;s journey led him through various IT roles before landing in cybersecurity at a public utility. Today, he serves as a vCISO for multiple organizations while also creating educational content for LinkedIn Learning, where he has developed over 40 courses covering topics from application security to ethics in technology. His unconventional path from music to technology has shaped his approach to security leadership, emphasizing the importance of both technical expertise and human understanding.<br/><br/>As a vCISO, Brennen emphasizes the importance of tailored security approaches for small and medium-sized businesses. His work at SideChannel involves helping organizations across various sectors—from <a href='https://www.kiteworks.com/solutions/healthcare/'>healthcare</a> technology to <a href='https://www.kiteworks.com/solutions/manufacturing/'>manufacturing</a>—build resilient security programs that align with their specific needs and capabilities. He highlights that while many of these businesses may not have the resources for a full-time <a href='https://www.kiteworks.com/solutions/ciso/'>CISO</a>, they still require sophisticated security leadership to protect their digital assets and maintain compliance with industry standards. Brennen’s approach focuses on building security programs that enable business growth rather than simply implementing restrictions, ensuring that security measures support rather than hinder organizational objectives.<br/><br/>A significant portion of the conversation focused on the challenges of data security in modern business environments. Brennen discusses the complexities of managing data access, particularly in cloud environments, and emphasizes the importance of proper tenant separation for different environments (development, testing, production). He notes that while cost often drives initial cloud decisions, mature organizations eventually shift their focus to building stable, secure infrastructure that aligns with their business goals. The discussion delved into the increasing importance of <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> frameworks such as <a href='https://www.kiteworks.com/platform/compliance/soc-2-compliance/'>SOC 2</a> and <a href='https://www.kiteworks.com/platform/compliance/cmmc-compliance/'>CMMC</a>, with Brennen sharing insights on how organizations can effectively prepare for and maintain these certifications while avoiding common pitfalls. <br/><br/>The discussion also touched on emerging technologies, particularly the challenges and opportunities presented by AI. Brennen addresses the growing concern among organizations about the secure use of <a href='https://www.kiteworks.com/platform/simple/ai-data-gateway/'>generative AI</a> tools, highlighting the need for clear policies around data sharing with these platforms. He emphasizes the importance of considering long-term implications of AI adoption, drawing parallels with recent events in the tech industry to illustrate the potential risks of data handling by emerging technology companies. His perspective on AI security is particularly relevant given the current landscape where many employees are already using these tools without formal organizational guidance. <br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/jerodbrennen/'>https://www.linkedin.com/in/jerodbrennen/</a> <br/><br/>SideChannel: <a href='https://sidechannel.com/'>https://sidechannel.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p><a href='https://www.linkedin.com/in/jerodbrennen/'>Jerod Brennen</a>, VP of Cybersecurity Services at <a href='https://sidechannel.com/'>SideChannel</a>, brings a unique perspective to cybersecurity leadership. Originally pursuing a career in music education, Brennen&apos;s journey led him through various IT roles before landing in cybersecurity at a public utility. Today, he serves as a vCISO for multiple organizations while also creating educational content for LinkedIn Learning, where he has developed over 40 courses covering topics from application security to ethics in technology. His unconventional path from music to technology has shaped his approach to security leadership, emphasizing the importance of both technical expertise and human understanding.<br/><br/>As a vCISO, Brennen emphasizes the importance of tailored security approaches for small and medium-sized businesses. His work at SideChannel involves helping organizations across various sectors—from <a href='https://www.kiteworks.com/solutions/healthcare/'>healthcare</a> technology to <a href='https://www.kiteworks.com/solutions/manufacturing/'>manufacturing</a>—build resilient security programs that align with their specific needs and capabilities. He highlights that while many of these businesses may not have the resources for a full-time <a href='https://www.kiteworks.com/solutions/ciso/'>CISO</a>, they still require sophisticated security leadership to protect their digital assets and maintain compliance with industry standards. Brennen’s approach focuses on building security programs that enable business growth rather than simply implementing restrictions, ensuring that security measures support rather than hinder organizational objectives.<br/><br/>A significant portion of the conversation focused on the challenges of data security in modern business environments. Brennen discusses the complexities of managing data access, particularly in cloud environments, and emphasizes the importance of proper tenant separation for different environments (development, testing, production). He notes that while cost often drives initial cloud decisions, mature organizations eventually shift their focus to building stable, secure infrastructure that aligns with their business goals. The discussion delved into the increasing importance of <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> frameworks such as <a href='https://www.kiteworks.com/platform/compliance/soc-2-compliance/'>SOC 2</a> and <a href='https://www.kiteworks.com/platform/compliance/cmmc-compliance/'>CMMC</a>, with Brennen sharing insights on how organizations can effectively prepare for and maintain these certifications while avoiding common pitfalls. <br/><br/>The discussion also touched on emerging technologies, particularly the challenges and opportunities presented by AI. Brennen addresses the growing concern among organizations about the secure use of <a href='https://www.kiteworks.com/platform/simple/ai-data-gateway/'>generative AI</a> tools, highlighting the need for clear policies around data sharing with these platforms. He emphasizes the importance of considering long-term implications of AI adoption, drawing parallels with recent events in the tech industry to illustrate the potential risks of data handling by emerging technology companies. His perspective on AI security is particularly relevant given the current landscape where many employees are already using these tools without formal organizational guidance. <br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/jerodbrennen/'>https://www.linkedin.com/in/jerodbrennen/</a> <br/><br/>SideChannel: <a href='https://sidechannel.com/'>https://sidechannel.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/16047976-jerod-brennen-from-music-educator-to-cybersecurity-consultant-and-mentor.mp3" length="38479995" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16047976</guid>
    <pubDate>Mon, 04 Nov 2024 13:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/16047976/transcript" type="text/html" />
    <itunes:duration>3204</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/jerodbrennen/" img="https://storage.buzzsprout.com/s9tfamqg05njd8hit1lxfb0igz28">Jerod Brennen</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Evgeniy Kharam: Architecting Success With Soft Skills</itunes:title>
    <title>Evgeniy Kharam: Architecting Success With Soft Skills</title>
    <itunes:summary><![CDATA[Evgeniy Kharam is the founder of a cybersecurity consulting company and an industry veteran with extensive expertise in cybersecurity. He advises clients on navigating the complexities of the cybersecurity landscape and co-hosts two popular podcasts focused on cybersecurity architecture and business insights. Evgeniy is also a board advisor for the Canadian Cybersecurity Network, the largest technology group in Canada. Outside of his professional life, he is an active family man with four chi...]]></itunes:summary>
    <description><![CDATA[<p>Evgeniy Kharam is the founder of a cybersecurity consulting company and an industry veteran with extensive expertise in cybersecurity. He advises clients on navigating the complexities of the cybersecurity landscape and co-hosts two popular podcasts focused on cybersecurity architecture and business insights. Evgeniy is also a board advisor for the Canadian Cybersecurity Network, the largest technology group in Canada. Outside of his professional life, he is an active family man with four children, including twins, and enjoys organizing snowboarding events for networking in the cybersecurity community.<br/><br/>Evgeniy joined the Kitecast podcast to discuss his new book, <em>Architecting Success: The Art of Soft Skills in Technical Sales</em>. It is a reflection on the evolution of sales engineering, especially in the cybersecurity field. Evgeniy draws from his personal experiences to address the increasingly complex nature of technical sales and the gap between technical knowledge and the ability to communicate it effectively in business terms. The book also serves as a personal challenge for Evgeniy, as he admits that writing is outside his comfort zone, and he believes that improving soft skills is often about doing what you dislike most.<br/><br/>During the podcast interview, one of the key topics Evgeniy discusses is the importance of soft skills in cybersecurity sales. He emphasizes the need for adaptability, listening, and the ability to connect with clients. He points out that successful cybersecurity sales professionals must adjust their approach based on the client’s mood, energy, and current situation, moving from transactional interactions to building genuine relationships. <br/><br/>Evgeniy also explores the dynamics between sales professionals and sales engineers. He suggests that the sales engineer’s role is not just to support the sales team but to engage in a more collaborative manner, asking the right questions to help the sales team qualify deals effectively. This dynamic allows for a smoother sales process, where both parties respect each other&apos;s expertise and play to their strengths, without crossing into each other&apos;s responsibilities.<br/><br/>Another major point of discussion is the impact of virtual sales in a post-COVID world. Evgeniy stresses the importance of maintaining professionalism in virtual environments, from investing in proper equipment like cameras and microphones to ensuring a polished appearance. He also highlights the growing reliance on voice communication and the need to train one&apos;s voice for better delivery, as <a href='https://www.kiteworks.com/cybersecurity-risk-management/ncsc-remote-work/'>remote work</a> has made verbal communication a primary tool for client interactions.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/ekharam/'>https://www.linkedin.com/in/ekharam/</a><br/><br/><em>Architecting Success: </em><a href='https://www.softskillstech.ca/'><em>https://www.softskillstech.ca/</em></a><em> </em></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Evgeniy Kharam is the founder of a cybersecurity consulting company and an industry veteran with extensive expertise in cybersecurity. He advises clients on navigating the complexities of the cybersecurity landscape and co-hosts two popular podcasts focused on cybersecurity architecture and business insights. Evgeniy is also a board advisor for the Canadian Cybersecurity Network, the largest technology group in Canada. Outside of his professional life, he is an active family man with four children, including twins, and enjoys organizing snowboarding events for networking in the cybersecurity community.<br/><br/>Evgeniy joined the Kitecast podcast to discuss his new book, <em>Architecting Success: The Art of Soft Skills in Technical Sales</em>. It is a reflection on the evolution of sales engineering, especially in the cybersecurity field. Evgeniy draws from his personal experiences to address the increasingly complex nature of technical sales and the gap between technical knowledge and the ability to communicate it effectively in business terms. The book also serves as a personal challenge for Evgeniy, as he admits that writing is outside his comfort zone, and he believes that improving soft skills is often about doing what you dislike most.<br/><br/>During the podcast interview, one of the key topics Evgeniy discusses is the importance of soft skills in cybersecurity sales. He emphasizes the need for adaptability, listening, and the ability to connect with clients. He points out that successful cybersecurity sales professionals must adjust their approach based on the client’s mood, energy, and current situation, moving from transactional interactions to building genuine relationships. <br/><br/>Evgeniy also explores the dynamics between sales professionals and sales engineers. He suggests that the sales engineer’s role is not just to support the sales team but to engage in a more collaborative manner, asking the right questions to help the sales team qualify deals effectively. This dynamic allows for a smoother sales process, where both parties respect each other&apos;s expertise and play to their strengths, without crossing into each other&apos;s responsibilities.<br/><br/>Another major point of discussion is the impact of virtual sales in a post-COVID world. Evgeniy stresses the importance of maintaining professionalism in virtual environments, from investing in proper equipment like cameras and microphones to ensuring a polished appearance. He also highlights the growing reliance on voice communication and the need to train one&apos;s voice for better delivery, as <a href='https://www.kiteworks.com/cybersecurity-risk-management/ncsc-remote-work/'>remote work</a> has made verbal communication a primary tool for client interactions.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/ekharam/'>https://www.linkedin.com/in/ekharam/</a><br/><br/><em>Architecting Success: </em><a href='https://www.softskillstech.ca/'><em>https://www.softskillstech.ca/</em></a><em> </em></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/15763447-evgeniy-kharam-architecting-success-with-soft-skills.mp3" length="23798302" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15763447</guid>
    <pubDate>Mon, 16 Sep 2024 15:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/15763447/transcript" type="text/html" />
    <itunes:duration>1981</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/ekharam/" img="https://storage.buzzsprout.com/nlo6v6rgjz7c3k68e3yyd5upaa1w">Evgeniy Kharam</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>John Christly: Demystifying CMMC to Protect the DIB</itunes:title>
    <title>John Christly: Demystifying CMMC to Protect the DIB</title>
    <itunes:summary><![CDATA[John Christly, VP of Services for Blue Team Alpha, and author of two cybersecurity books, brings his wealth of experience to this episode of Kitecast. With a background spanning roles such as CEO, CIO, CISO, and CTO, as well as military service, Christly offers unique insights into the world of cybersecurity compliance for Department of Defense (DoD) contractors.  In this enlightening discussion, Christly demystifies the Cybersecurity Maturity Model Certification (CMMC) process. He explains h...]]></itunes:summary>
    <description><![CDATA[<p>John Christly, VP of Services for Blue Team Alpha, and author of two cybersecurity books, brings his wealth of experience to this episode of Kitecast. With a background spanning roles such as CEO, CIO, CISO, and CTO, as well as military service, Christly offers unique insights into the world of <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>cybersecurity compliance</a> for Department of Defense (DoD) contractors.<br/><br/>In this enlightening discussion, Christly demystifies the Cybersecurity Maturity Model Certification (<a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc/'>CMMC</a>) process. He explains how many organizations are surprised to find they’re further along in compliance than they initially thought, thanks to existing frameworks like <a href='https://www.kiteworks.com/risk-compliance-glossary/dfars/'>DFARS</a> and <a href='https://www.kiteworks.com/risk-compliance-glossary/protect-cui-with-nist-800-171-compliance/'>NIST 800-171</a>. However, he cautions that self-attestation is no longer sufficient, emphasizing the need for third-party verification in the new CMMC landscape.<br/><br/>Christly also delves into the critical role of <a href='https://www.kiteworks.com/risk-compliance-glossary/fedramp/'>FedRAMP certification</a> in doing business with the government. He highlights the importance of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-sovereignty-protecting-our-digital-footprint-in-the-age-of-information/'>data sovereignty</a> and security in protecting American interests. The conversation explores the challenges of achieving “FedRAMP-like” status and the expertise required to truly build secure systems to DoD specifications.<br/><br/>The podcast doesn’t shy away from emerging threats, with Christly offering valuable insights on managing <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a>-related risks in the workplace. He stresses the importance of clear policies, employee education, and ongoing monitoring to harness the benefits of AI while protecting sensitive data. Christly’s practical advice on <a href='https://www.kiteworks.com/cybersecurity-risk-management/protecting-sensitive-content-communications-is-more-important/'>consolidating security tools</a> and gaining visibility into cloud application usage provides actionable strategies for improving organizational cybersecurity posture.<br/><br/>Whether you’re a DoD contractor or simply interested in elevating your cybersecurity practices, this episode of Kitecast is a must-listen. Tune in now and take the first step toward robust, compliant cybersecurity for your organization.</p><p><b>LinkedIn</b></p><p><a href='https://www.linkedin.com/in/johnchristly/'>https://www.linkedin.com/in/johnchristly/</a></p><p><b>Blue Team Alpha</b></p><p><a href='https://www.blueteamalpha.com/'>https://www.blueteamalpha.com</a></p><p><b>Book: NIST 800-171 Controls Made Simple: A Step by Step Guide</b></p><p><a href='https://www.udemy.com/course/nist-800-171-controls-made-simple'>https://www.udemy.com/course/nist-800-171-controls-made-simple</a> </p><p><b>Book: The Basics of Cybersecurity</b></p><p><a href='https://www.amazon.com/dp/B0CZY65DQC'>https://www.amazon.com/dp/B0CZY65DQC</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>John Christly, VP of Services for Blue Team Alpha, and author of two cybersecurity books, brings his wealth of experience to this episode of Kitecast. With a background spanning roles such as CEO, CIO, CISO, and CTO, as well as military service, Christly offers unique insights into the world of <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>cybersecurity compliance</a> for Department of Defense (DoD) contractors.<br/><br/>In this enlightening discussion, Christly demystifies the Cybersecurity Maturity Model Certification (<a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc/'>CMMC</a>) process. He explains how many organizations are surprised to find they’re further along in compliance than they initially thought, thanks to existing frameworks like <a href='https://www.kiteworks.com/risk-compliance-glossary/dfars/'>DFARS</a> and <a href='https://www.kiteworks.com/risk-compliance-glossary/protect-cui-with-nist-800-171-compliance/'>NIST 800-171</a>. However, he cautions that self-attestation is no longer sufficient, emphasizing the need for third-party verification in the new CMMC landscape.<br/><br/>Christly also delves into the critical role of <a href='https://www.kiteworks.com/risk-compliance-glossary/fedramp/'>FedRAMP certification</a> in doing business with the government. He highlights the importance of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-sovereignty-protecting-our-digital-footprint-in-the-age-of-information/'>data sovereignty</a> and security in protecting American interests. The conversation explores the challenges of achieving “FedRAMP-like” status and the expertise required to truly build secure systems to DoD specifications.<br/><br/>The podcast doesn’t shy away from emerging threats, with Christly offering valuable insights on managing <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a>-related risks in the workplace. He stresses the importance of clear policies, employee education, and ongoing monitoring to harness the benefits of AI while protecting sensitive data. Christly’s practical advice on <a href='https://www.kiteworks.com/cybersecurity-risk-management/protecting-sensitive-content-communications-is-more-important/'>consolidating security tools</a> and gaining visibility into cloud application usage provides actionable strategies for improving organizational cybersecurity posture.<br/><br/>Whether you’re a DoD contractor or simply interested in elevating your cybersecurity practices, this episode of Kitecast is a must-listen. Tune in now and take the first step toward robust, compliant cybersecurity for your organization.</p><p><b>LinkedIn</b></p><p><a href='https://www.linkedin.com/in/johnchristly/'>https://www.linkedin.com/in/johnchristly/</a></p><p><b>Blue Team Alpha</b></p><p><a href='https://www.blueteamalpha.com/'>https://www.blueteamalpha.com</a></p><p><b>Book: NIST 800-171 Controls Made Simple: A Step by Step Guide</b></p><p><a href='https://www.udemy.com/course/nist-800-171-controls-made-simple'>https://www.udemy.com/course/nist-800-171-controls-made-simple</a> </p><p><b>Book: The Basics of Cybersecurity</b></p><p><a href='https://www.amazon.com/dp/B0CZY65DQC'>https://www.amazon.com/dp/B0CZY65DQC</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/15610253-john-christly-demystifying-cmmc-to-protect-the-dib.mp3" length="35808251" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15610253</guid>
    <pubDate>Mon, 19 Aug 2024 22:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/15610253/transcript" type="text/html" />
    <itunes:duration>2981</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/johnchristly/" img="https://storage.buzzsprout.com/3ycjcn2gznxzn6fxcjrkb29znaxm">John Christly</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Kayne McGladrey: Compliance as a Critical Business Enabler</itunes:title>
    <title>Kayne McGladrey: Compliance as a Critical Business Enabler</title>
    <itunes:summary><![CDATA[Kayne McGladrey, the Field CISO at hyperproof, is a renowned cybersecurity expert with an extensive background in enhancing security landscapes across various industries. His career is marked by significant contributions in developing robust security frameworks, managing complex risk scenarios, and driving comprehensive compliance initiatives. With a deep commitment to transforming the cybersecurity field, Kayne’s insights and strategies continue to influence how organizations approach securi...]]></itunes:summary>
    <description><![CDATA[<p>Kayne McGladrey, the Field CISO at <a href='https://hyperproof.io/'>hyperproof</a>, is a renowned cybersecurity expert with an extensive background in enhancing security landscapes across various industries. His career is marked by significant contributions in developing robust security frameworks, managing complex risk scenarios, and driving comprehensive <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> initiatives. With a deep commitment to transforming the cybersecurity field, Kayne’s insights and strategies continue to influence how organizations approach security and <a href='https://www.kiteworks.com/risk-compliance-glossary/regulatory-compliance-definition/'>regulatory compliance</a>, making him a sought-after voice in the industry.<br/><br/>In this Kitecast episode, Kayne McGladrey challenges the traditional view of cybersecurity as merely a cost center, proposing instead that it acts as a critical enabler of business. He eloquently explains how effective cybersecurity measures can unlock new market opportunities and help sustain revenue streams, thus fundamentally altering the narrative from a grudging investment into a strategic asset. By integrating robust cybersecurity practices, businesses can protect their operations from potential threats while enabling smooth and secure growth and innovation.<br/><br/>Throughout the discussion, Kayne explores the evolving landscape of compliance tools, moving away from outdated methods like manual spreadsheets to more sophisticated, automated solutions. These advanced tools are designed to streamline and enhance the efficiency of compliance processes. However, Kayne points out the challenges businesses face, such as the lack of executive buy-in, which can hinder successful integration. He emphasizes the critical need for aligning security and compliance strategies with broader business objectives to ensure a cohesive and proactive approach to managing compliance.<br/><br/>Kayne delves deeper into the practical challenges faced by cybersecurity teams, especially in the realms of evidence collection and <a href='https://www.kiteworks.com/risk-compliance-glossary/risk-assessment/'>risk assessment</a>. He criticizes the persistence of outdated, manual processes that many organizations still use and advocates for a shift toward automated, more reliable methods. Such modern approaches not only save time but also improve the accuracy and effectiveness of cybersecurity measures, thereby enhancing an organization’s ability to manage and mitigate risks more efficiently.<br/><br/>Looking toward the future, Kayne discusses the development of a <a href='https://www.kiteworks.com/risk-compliance-glossary/governance-risk-compliance/'>GRC (Governance, Risk, and Compliance)</a> maturity model that he is pioneering. This model is intended to provide organizations with a clear, actionable roadmap to enhance their <a href='https://www.kiteworks.com/platform/advanced-governance/'>governance structures and compliance strategies</a>. By adopting this model, organizations can better navigate the complexities of regulatory environments, reduce risk, and cultivate a proactive, compliance-forward culture. Kayne’s vision for the future of GRC is aimed at making compliance a seamless part of business operations, thus fostering greater organizational resilience and adaptability.</p><p><b>LinkedIn Profile</b></p><p><a href='https://www.linkedin.com/in/kaynemcgladrey/'>https://www.linkedin.com/in/kaynemcgladrey/</a></p><p><b>hyperproof</b></p><p><a href='https://hyperproof.io/'>https://hyperproof.io/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Kayne McGladrey, the Field CISO at <a href='https://hyperproof.io/'>hyperproof</a>, is a renowned cybersecurity expert with an extensive background in enhancing security landscapes across various industries. His career is marked by significant contributions in developing robust security frameworks, managing complex risk scenarios, and driving comprehensive <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> initiatives. With a deep commitment to transforming the cybersecurity field, Kayne’s insights and strategies continue to influence how organizations approach security and <a href='https://www.kiteworks.com/risk-compliance-glossary/regulatory-compliance-definition/'>regulatory compliance</a>, making him a sought-after voice in the industry.<br/><br/>In this Kitecast episode, Kayne McGladrey challenges the traditional view of cybersecurity as merely a cost center, proposing instead that it acts as a critical enabler of business. He eloquently explains how effective cybersecurity measures can unlock new market opportunities and help sustain revenue streams, thus fundamentally altering the narrative from a grudging investment into a strategic asset. By integrating robust cybersecurity practices, businesses can protect their operations from potential threats while enabling smooth and secure growth and innovation.<br/><br/>Throughout the discussion, Kayne explores the evolving landscape of compliance tools, moving away from outdated methods like manual spreadsheets to more sophisticated, automated solutions. These advanced tools are designed to streamline and enhance the efficiency of compliance processes. However, Kayne points out the challenges businesses face, such as the lack of executive buy-in, which can hinder successful integration. He emphasizes the critical need for aligning security and compliance strategies with broader business objectives to ensure a cohesive and proactive approach to managing compliance.<br/><br/>Kayne delves deeper into the practical challenges faced by cybersecurity teams, especially in the realms of evidence collection and <a href='https://www.kiteworks.com/risk-compliance-glossary/risk-assessment/'>risk assessment</a>. He criticizes the persistence of outdated, manual processes that many organizations still use and advocates for a shift toward automated, more reliable methods. Such modern approaches not only save time but also improve the accuracy and effectiveness of cybersecurity measures, thereby enhancing an organization’s ability to manage and mitigate risks more efficiently.<br/><br/>Looking toward the future, Kayne discusses the development of a <a href='https://www.kiteworks.com/risk-compliance-glossary/governance-risk-compliance/'>GRC (Governance, Risk, and Compliance)</a> maturity model that he is pioneering. This model is intended to provide organizations with a clear, actionable roadmap to enhance their <a href='https://www.kiteworks.com/platform/advanced-governance/'>governance structures and compliance strategies</a>. By adopting this model, organizations can better navigate the complexities of regulatory environments, reduce risk, and cultivate a proactive, compliance-forward culture. Kayne’s vision for the future of GRC is aimed at making compliance a seamless part of business operations, thus fostering greater organizational resilience and adaptability.</p><p><b>LinkedIn Profile</b></p><p><a href='https://www.linkedin.com/in/kaynemcgladrey/'>https://www.linkedin.com/in/kaynemcgladrey/</a></p><p><b>hyperproof</b></p><p><a href='https://hyperproof.io/'>https://hyperproof.io/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/15461827-kayne-mcgladrey-compliance-as-a-critical-business-enabler.mp3" length="28586244" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15461827</guid>
    <pubDate>Tue, 23 Jul 2024 09:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/15461827/transcript" type="text/html" />
    <itunes:duration>2380</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/kaynemcgladrey/" img="https://storage.buzzsprout.com/purg7df3drcooct84zmdeyxq3g7a">Kayne McGladrey</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Jacqui Kernot: When AI, Security, and Compliance Collide</itunes:title>
    <title>Jacqui Kernot: When AI, Security, and Compliance Collide</title>
    <itunes:summary><![CDATA[Jacqui Kernot, the Security Director at Accenture for Australia and New Zealand, boasts over two decades of extensive experience in cybersecurity, spanning multiple industries. Recognized for her authoritative voice on diversity and inclusion alongside cybersecurity risk management, Jacqui is a well-regarded speaker who frequently addresses these pressing issues. She is committed to pushing the boundaries of cybersecurity and focused on integrating cutting-edge AI and technological advancemen...]]></itunes:summary>
    <description><![CDATA[<p>Jacqui Kernot, the Security Director at Accenture for Australia and New Zealand, boasts over two decades of extensive experience in cybersecurity, spanning multiple industries. Recognized for her authoritative voice on diversity and inclusion alongside <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>cybersecurity risk management</a>, Jacqui is a well-regarded speaker who frequently addresses these pressing issues. She is committed to pushing the boundaries of cybersecurity and focused on integrating cutting-edge <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a> and technological advancements into the security domain.</p><p>In her recent appearance on the Kitecast episode, Jacqui illuminated the transformative impact of AI on cybersecurity. She pointed out that although AI technology is still emerging, the foundational steps taken today by organizations to build robust infrastructures will be pivotal. Jacqui stressed that companies poised to anticipate future technological needs and begin laying the groundwork for AI integration will likely lead the industry. This strategic foresight is crucial for fully realizing AI’s potential and maintaining a competitive edge in cybersecurity.</p><p>A significant portion of Jacqui&apos;s discussion centered on the imperative of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-sovereignty-protecting-our-digital-footprint-in-the-age-of-information/'>data sovereignty</a> and stringent management practices. In an era increasingly dominated by large language models and cloud-based technologies, securing and responsibly managing data is paramount. Jacqui advocated for strict <a href='https://www.kiteworks.com/platform/advanced-governance/'>data governance</a> frameworks that ensure data is accessible only by authorized personnel, emphasizing that responsible AI deployment is fundamental to future security architectures.</p><p>Jacqui also delved deeply into the role of <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/'>Zero Trust architecture</a> in today’s cybersecurity landscape. She explained that as organizations increasingly migrate to cloud services and face more complex cyber threats, adopting a Zero Trust approach is crucial. This methodology is not only essential for blocking unauthorized access but also vital for building resilient security protocols that can robustly counteract potential breaches.</p><p>Looking forward, Jacqui shared insights on the evolving challenges and opportunities within cybersecurity. She highlighted the necessity for security strategies to remain adaptive and vigilant against new threats while also leveraging emerging technologies. The discussion touched on the need for more sophisticated security measures that can effectively safeguard against the evolving landscape of cyber threats, ensuring that organizations can protect their critical assets in an increasingly digital world.</p><p>LinkedIn Profile<br/><a href='https://gate.sc/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjkernot%2F&amp;token=1ea8dd-1-1720630289944'>www.linkedin.com/in/jkernot/</a></p><p>Accenture<br/><a href='https://gate.sc/?url=https%3A%2F%2Fwww.accenture.com%2Fus-en&amp;token=c36c57-1-1720630289944'>www.accenture.com/us-en</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Jacqui Kernot, the Security Director at Accenture for Australia and New Zealand, boasts over two decades of extensive experience in cybersecurity, spanning multiple industries. Recognized for her authoritative voice on diversity and inclusion alongside <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>cybersecurity risk management</a>, Jacqui is a well-regarded speaker who frequently addresses these pressing issues. She is committed to pushing the boundaries of cybersecurity and focused on integrating cutting-edge <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a> and technological advancements into the security domain.</p><p>In her recent appearance on the Kitecast episode, Jacqui illuminated the transformative impact of AI on cybersecurity. She pointed out that although AI technology is still emerging, the foundational steps taken today by organizations to build robust infrastructures will be pivotal. Jacqui stressed that companies poised to anticipate future technological needs and begin laying the groundwork for AI integration will likely lead the industry. This strategic foresight is crucial for fully realizing AI’s potential and maintaining a competitive edge in cybersecurity.</p><p>A significant portion of Jacqui&apos;s discussion centered on the imperative of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-sovereignty-protecting-our-digital-footprint-in-the-age-of-information/'>data sovereignty</a> and stringent management practices. In an era increasingly dominated by large language models and cloud-based technologies, securing and responsibly managing data is paramount. Jacqui advocated for strict <a href='https://www.kiteworks.com/platform/advanced-governance/'>data governance</a> frameworks that ensure data is accessible only by authorized personnel, emphasizing that responsible AI deployment is fundamental to future security architectures.</p><p>Jacqui also delved deeply into the role of <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/'>Zero Trust architecture</a> in today’s cybersecurity landscape. She explained that as organizations increasingly migrate to cloud services and face more complex cyber threats, adopting a Zero Trust approach is crucial. This methodology is not only essential for blocking unauthorized access but also vital for building resilient security protocols that can robustly counteract potential breaches.</p><p>Looking forward, Jacqui shared insights on the evolving challenges and opportunities within cybersecurity. She highlighted the necessity for security strategies to remain adaptive and vigilant against new threats while also leveraging emerging technologies. The discussion touched on the need for more sophisticated security measures that can effectively safeguard against the evolving landscape of cyber threats, ensuring that organizations can protect their critical assets in an increasingly digital world.</p><p>LinkedIn Profile<br/><a href='https://gate.sc/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjkernot%2F&amp;token=1ea8dd-1-1720630289944'>www.linkedin.com/in/jkernot/</a></p><p>Accenture<br/><a href='https://gate.sc/?url=https%3A%2F%2Fwww.accenture.com%2Fus-en&amp;token=c36c57-1-1720630289944'>www.accenture.com/us-en</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/15393167-jacqui-kernot-when-ai-security-and-compliance-collide.mp3" length="37298181" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15393167</guid>
    <pubDate>Wed, 10 Jul 2024 11:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/15393167/transcript" type="text/html" />
    <itunes:duration>3106</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Kiteworks 2024 Survey Report: Expert Panel on Data Privacy and Security</itunes:title>
    <title>Kiteworks 2024 Survey Report: Expert Panel on Data Privacy and Security</title>
    <itunes:summary><![CDATA[The Kiteworks Sensitive Content Communications Privacy and Compliance Report is an annual survey designed to delve into the pressing issues of data privacy, compliance, and cybersecurity. This comprehensive report gathers insights from IT, cybersecurity, risk, and compliance leaders around the globe, with the latest survey capturing responses from 572 leaders across 10 different countries. The report is meticulously divided into five sections: cyberattacks and data breaches, data types and cl...]]></itunes:summary>
    <description><![CDATA[<p>The Kiteworks Sensitive Content Communications Privacy and Compliance Report is an annual survey designed to delve into the pressing issues of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a>, <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a>, and cybersecurity. This comprehensive report gathers insights from IT, cybersecurity, risk, and compliance leaders around the globe, with the latest survey capturing responses from 572 leaders across 10 different countries. The report is meticulously divided into five sections: cyberattacks and data breaches, data types and classification, compliance and risk, cybersecurity and risk management, and operational procedures. These insights provide organizations with actionable intelligence to navigate the complex landscape of data security and compliance.<br/><br/>This Kitecast episode features a panel discussion, with Kitecast Co-host Patrick Spencer addressing key findings in the report and soliciting feedback from Co-host Tim Freestone and two guest panelists, Alexandre Blanc and Ranbir Bhutani. Alexandre pointed out that while the frequency of cyber incidents has decreased, the scale of each incident has grown significantly. Threat actors have become more organized, targeting larger organizations with higher impact, particularly in specific verticals like healthcare and finance. This shift is likely influenced by geopolitical tensions, using cyberattacks to disrupt trust in systems and organizations. Ranbir echoed these observations, adding that the sophistication of <a href='https://www.kiteworks.com/risk-compliance-glossary/phishing-attacks/'>phishing attacks</a> has increased, often leveraging unethical <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a> to create highly convincing fraudulent communications.<br/><br/>The conversation also explored the persistent challenge of human error in cybersecurity. Despite numerous training initiatives and advanced technologies, the human element remains a significant vulnerability. Tim, Alexandre, and Ranbir emphasized that until organizations can effectively abstract human errors from business processes, this will continue to be a weak link. Ranbir shared an anecdote about a near-miss phishing attempt, underscoring the difficulty even seasoned professionals face in recognizing sophisticated attacks. <br/><br/>Another critical insight from the discussion involved the disparity in cybersecurity maturity across industries. The podcast revealed that higher education and state government sectors are particularly vulnerable, with a high number of reported breaches. This is attributed to underfunding and a lack of stringent cybersecurity measures. In contrast, the federal government has shown better compliance due to regulatory pressures like <a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc/'>CMMC 2.0</a>. The panelists agreed that while <a href='https://www.kiteworks.com/regulatory-compliance/data-compliance/'>regulations</a> are a step in the right direction, the enforcement and practical implementation of these regulations remain a challenge, particularly for smaller organizations.<br/><br/>Finally, the podcast touched on the issue of litigation costs associated with data breaches. The long-term financial impact of breaches extends beyond immediate operational disruptions and ransom payments. Ongoing litigation can drain resources and affect an organization’s reputation and client trust. <br/><br/>Kiteworks 2024 Sensitive Content Communications Privacy and Compliance Report: https://www.kiteworks.com/sensitive-content-communications-report/</p><p>Alexandre Blanc: <a href='https://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022/'></a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>The Kiteworks Sensitive Content Communications Privacy and Compliance Report is an annual survey designed to delve into the pressing issues of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a>, <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a>, and cybersecurity. This comprehensive report gathers insights from IT, cybersecurity, risk, and compliance leaders around the globe, with the latest survey capturing responses from 572 leaders across 10 different countries. The report is meticulously divided into five sections: cyberattacks and data breaches, data types and classification, compliance and risk, cybersecurity and risk management, and operational procedures. These insights provide organizations with actionable intelligence to navigate the complex landscape of data security and compliance.<br/><br/>This Kitecast episode features a panel discussion, with Kitecast Co-host Patrick Spencer addressing key findings in the report and soliciting feedback from Co-host Tim Freestone and two guest panelists, Alexandre Blanc and Ranbir Bhutani. Alexandre pointed out that while the frequency of cyber incidents has decreased, the scale of each incident has grown significantly. Threat actors have become more organized, targeting larger organizations with higher impact, particularly in specific verticals like healthcare and finance. This shift is likely influenced by geopolitical tensions, using cyberattacks to disrupt trust in systems and organizations. Ranbir echoed these observations, adding that the sophistication of <a href='https://www.kiteworks.com/risk-compliance-glossary/phishing-attacks/'>phishing attacks</a> has increased, often leveraging unethical <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a> to create highly convincing fraudulent communications.<br/><br/>The conversation also explored the persistent challenge of human error in cybersecurity. Despite numerous training initiatives and advanced technologies, the human element remains a significant vulnerability. Tim, Alexandre, and Ranbir emphasized that until organizations can effectively abstract human errors from business processes, this will continue to be a weak link. Ranbir shared an anecdote about a near-miss phishing attempt, underscoring the difficulty even seasoned professionals face in recognizing sophisticated attacks. <br/><br/>Another critical insight from the discussion involved the disparity in cybersecurity maturity across industries. The podcast revealed that higher education and state government sectors are particularly vulnerable, with a high number of reported breaches. This is attributed to underfunding and a lack of stringent cybersecurity measures. In contrast, the federal government has shown better compliance due to regulatory pressures like <a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc/'>CMMC 2.0</a>. The panelists agreed that while <a href='https://www.kiteworks.com/regulatory-compliance/data-compliance/'>regulations</a> are a step in the right direction, the enforcement and practical implementation of these regulations remain a challenge, particularly for smaller organizations.<br/><br/>Finally, the podcast touched on the issue of litigation costs associated with data breaches. The long-term financial impact of breaches extends beyond immediate operational disruptions and ransom payments. Ongoing litigation can drain resources and affect an organization’s reputation and client trust. <br/><br/>Kiteworks 2024 Sensitive Content Communications Privacy and Compliance Report: https://www.kiteworks.com/sensitive-content-communications-report/</p><p>Alexandre Blanc: <a href='https://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022/'></a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/15306101-kiteworks-2024-survey-report-expert-panel-on-data-privacy-and-security.mp3" length="33946910" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15306101</guid>
    <pubDate>Thu, 27 Jun 2024 05:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/15306101/transcript" type="text/html" />
    <itunes:duration>2826</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="http://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022" img="https://storage.buzzsprout.com/gqewbq3pzcfbh3ny4lpwgikrziez">Alexandre Blanc</podcast:person>
    <podcast:person role="guest" href="https://www.linkedin.com/in/ranbir-b-725286175/" img="https://storage.buzzsprout.com/ckwbqin8hxsq3jmuv8e047tdqkkj">Ranbir Bhutani</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Betania Allo: Using Cyber Policy to Mitigate Risk</itunes:title>
    <title>Betania Allo: Using Cyber Policy to Mitigate Risk</title>
    <itunes:summary><![CDATA[Betania Allo is a distinguished expert in cybersecurity law and public policy and frequently presents at international forums and events. She boasts an impressive academic background with advanced degrees from Harvard University and Syracuse University. Currently, she is pursuing a doctorate in engineering with a focus on analytics at George Washington University. Her extensive experience includes serving as a Program Management Specialist and Senior Officer at the United Nations, where she a...]]></itunes:summary>
    <description><![CDATA[<p>Betania Allo is a distinguished expert in cybersecurity law and public policy and frequently presents at international forums and events. She boasts an impressive academic background with advanced degrees from Harvard University and Syracuse University. Currently, she is pursuing a doctorate in engineering with a focus on analytics at George Washington University. Her extensive experience includes serving as a Program Management Specialist and Senior Officer at the United Nations, where she addressed complex issues related to counterterrorism and technology.<br/><br/>This Kitecast episode delves into Betania Allo’s multifaceted career journey, highlighting her transition from law and public policy to the specialized field of cybersecurity. Her decision to move from Argentina to the U.S. for graduate studies, combined with her background in international relations and law, set the stage for her focus on cybersecurity. Betania’s efforts to bridge the gap between legal experts and technologists are emphasized, underscoring the importance of understanding both domains to effectively tackle global cyber threats.<br/><br/>The podcast discussion covers Betania’s tenure at the United Nations, where she worked on counterterrorism and technology. Insights are provided on how terrorist groups exploit digital platforms for recruitment, communication, and fundraising. The challenges of safeguarding these platforms and the importance of a multi-stakeholder approach involving private sector companies, NGOs, and academia are examined. Betania’s experiences during the pandemic revealed the increased vulnerability and exploitation of digital spaces by terrorist organizations.<br/><br/>Betania also discusses the rehabilitation and reintegration of terrorists through technology. The significance of using technology in the initial screening of individuals for accurate assessments and tailored rehabilitation programs is outlined. Despite the challenges, Betania advocates for incorporating <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>artificial intelligence (AI)</a> and other technologies to enhance rehabilitation efforts. Her innovative approach aims to create unified systems for better data synchronization and resource allocation, particularly in regions with limited infrastructure.<br/><br/>Finally, Betania argues that political decision-making needs to be tapped in prioritizing technological advancements and cybersecurity investments. Continuous collaboration between governments, tech companies, and security experts is deemed essential to stay ahead of emerging threats. As such, she points out the need for engaging training programs to build a robust cyber culture within organizations and beyond.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/betaniaallo/'>https://www.linkedin.com/in/betaniaallo/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Betania Allo is a distinguished expert in cybersecurity law and public policy and frequently presents at international forums and events. She boasts an impressive academic background with advanced degrees from Harvard University and Syracuse University. Currently, she is pursuing a doctorate in engineering with a focus on analytics at George Washington University. Her extensive experience includes serving as a Program Management Specialist and Senior Officer at the United Nations, where she addressed complex issues related to counterterrorism and technology.<br/><br/>This Kitecast episode delves into Betania Allo’s multifaceted career journey, highlighting her transition from law and public policy to the specialized field of cybersecurity. Her decision to move from Argentina to the U.S. for graduate studies, combined with her background in international relations and law, set the stage for her focus on cybersecurity. Betania’s efforts to bridge the gap between legal experts and technologists are emphasized, underscoring the importance of understanding both domains to effectively tackle global cyber threats.<br/><br/>The podcast discussion covers Betania’s tenure at the United Nations, where she worked on counterterrorism and technology. Insights are provided on how terrorist groups exploit digital platforms for recruitment, communication, and fundraising. The challenges of safeguarding these platforms and the importance of a multi-stakeholder approach involving private sector companies, NGOs, and academia are examined. Betania’s experiences during the pandemic revealed the increased vulnerability and exploitation of digital spaces by terrorist organizations.<br/><br/>Betania also discusses the rehabilitation and reintegration of terrorists through technology. The significance of using technology in the initial screening of individuals for accurate assessments and tailored rehabilitation programs is outlined. Despite the challenges, Betania advocates for incorporating <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>artificial intelligence (AI)</a> and other technologies to enhance rehabilitation efforts. Her innovative approach aims to create unified systems for better data synchronization and resource allocation, particularly in regions with limited infrastructure.<br/><br/>Finally, Betania argues that political decision-making needs to be tapped in prioritizing technological advancements and cybersecurity investments. Continuous collaboration between governments, tech companies, and security experts is deemed essential to stay ahead of emerging threats. As such, she points out the need for engaging training programs to build a robust cyber culture within organizations and beyond.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/betaniaallo/'>https://www.linkedin.com/in/betaniaallo/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/15264710-betania-allo-using-cyber-policy-to-mitigate-risk.mp3" length="27347973" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15264710</guid>
    <pubDate>Mon, 17 Jun 2024 11:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/15264710/transcript" type="text/html" />
    <itunes:duration>2276</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/betaniaallo/" img="https://storage.buzzsprout.com/o6nyvpjmxl6iociehd23atjph59n">Betania Allo</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Edna Conway: Collaboration in Cybersecurity Policy and Practice</itunes:title>
    <title>Edna Conway: Collaboration in Cybersecurity Policy and Practice</title>
    <itunes:summary><![CDATA[Edna Conway, an innovative executive and thought leader with over 30 years of experience leading cybersecurity, risk management, and value chain transformation at Fortune 10 technology companies, highlights how collaboration in cybersecurity is critical for the development of and adherence to policy and practice in this Kitecast episode. Edna is currently a Senior Fellow at the Carnegie Endowment for International Peace and CEO and Founder of EMC Advisors. She currently is an advisor or board...]]></itunes:summary>
    <description><![CDATA[<p><a href='https://www.linkedin.com/in/ednaconway'>Edna Conway</a>, an innovative executive and thought leader with over 30 years of experience leading cybersecurity, risk management, and value chain transformation at Fortune 10 technology companies, highlights how collaboration in cybersecurity is critical for the development of and adherence to policy and practice in this Kitecast episode. Edna is currently a Senior Fellow at the <a href='https://carnegieendowment.org/'>Carnegie Endowment for International Peace</a> and CEO and Founder of EMC Advisors. She currently is an advisor or board member for a long list of technology and professional services startups and nonprofit organizations.<br/><br/>One theme from the discussion with Edna centered on the cybersecurity workforce shortage. She emphasized the need to look beyond traditional sources and backgrounds to find talent. This requires partnerships between companies, academia, and nonprofits focused on training and upskilling people from diverse backgrounds for cybersecurity roles. Apprenticeship and mentorship models were discussed as potential solutions.<br/><br/>The conversation then delved into <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>cybersecurity policy and regulation</a>. Edna provided her perspectives on the balance between driving security practices versus overregulation that hinders business. She noted that legislation often lags behind technology advancements, making public-private collaboration critical. Edna stressed the importance of the private sector proactively stepping up security rather than just reacting to new regulations.<br/><br/>Another key topic from the podcast touched on the crowded landscape of cybersecurity startups and the challenges they face. Beyond just having an innovative product, Edna emphasized the importance of serving a real customer need, providing a complete solution, and demonstrating value to multiple stakeholders in an organization beyond just the security team. Making customers’ lives easier is key to standing out.<br/><br/>Edna also touched on the need to embed security into business processes and objectives from the start, rather than bolting it on afterwards. She discussed the concept of “secure by design” and how leading organizations are building security into everything from their products to their supplier relationships. This proactive, holistic approach is critical to managing <a href='https://www.kiteworks.com/risk-compliance-glossary/cybersecurity-risk-management/'>cyber risk</a> in an increasingly interconnected business environment.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/ednaconway'>https://www.linkedin.com/in/ednaconway</a><br/><br/>EMC Advisors: <a href='https://www.linkedin.com/company/emcadvisors'>https://www.linkedin.com/company/emcadvisors</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p><a href='https://www.linkedin.com/in/ednaconway'>Edna Conway</a>, an innovative executive and thought leader with over 30 years of experience leading cybersecurity, risk management, and value chain transformation at Fortune 10 technology companies, highlights how collaboration in cybersecurity is critical for the development of and adherence to policy and practice in this Kitecast episode. Edna is currently a Senior Fellow at the <a href='https://carnegieendowment.org/'>Carnegie Endowment for International Peace</a> and CEO and Founder of EMC Advisors. She currently is an advisor or board member for a long list of technology and professional services startups and nonprofit organizations.<br/><br/>One theme from the discussion with Edna centered on the cybersecurity workforce shortage. She emphasized the need to look beyond traditional sources and backgrounds to find talent. This requires partnerships between companies, academia, and nonprofits focused on training and upskilling people from diverse backgrounds for cybersecurity roles. Apprenticeship and mentorship models were discussed as potential solutions.<br/><br/>The conversation then delved into <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>cybersecurity policy and regulation</a>. Edna provided her perspectives on the balance between driving security practices versus overregulation that hinders business. She noted that legislation often lags behind technology advancements, making public-private collaboration critical. Edna stressed the importance of the private sector proactively stepping up security rather than just reacting to new regulations.<br/><br/>Another key topic from the podcast touched on the crowded landscape of cybersecurity startups and the challenges they face. Beyond just having an innovative product, Edna emphasized the importance of serving a real customer need, providing a complete solution, and demonstrating value to multiple stakeholders in an organization beyond just the security team. Making customers’ lives easier is key to standing out.<br/><br/>Edna also touched on the need to embed security into business processes and objectives from the start, rather than bolting it on afterwards. She discussed the concept of “secure by design” and how leading organizations are building security into everything from their products to their supplier relationships. This proactive, holistic approach is critical to managing <a href='https://www.kiteworks.com/risk-compliance-glossary/cybersecurity-risk-management/'>cyber risk</a> in an increasingly interconnected business environment.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/ednaconway'>https://www.linkedin.com/in/ednaconway</a><br/><br/>EMC Advisors: <a href='https://www.linkedin.com/company/emcadvisors'>https://www.linkedin.com/company/emcadvisors</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/14854486-edna-conway-collaboration-in-cybersecurity-policy-and-practice.mp3" length="32295386" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14854486</guid>
    <pubDate>Mon, 15 Apr 2024 12:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/14854486/transcript" type="text/html" />
    <itunes:duration>2689</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/ednaconway" img="https://storage.buzzsprout.com/88ahn50hl0l4hnnzaxqt6ua9qeli">Edna Conway</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Debra Farber: Shifting Privacy Left With Privacy by Design</itunes:title>
    <title>Debra Farber: Shifting Privacy Left With Privacy by Design</title>
    <itunes:summary><![CDATA[Debra Farber, a globally recognized privacy, security, and ethical tech advisor with nearly two decades of experience, discusses data privacy, privacy by design, and the growing field of privacy engineering in this Kitecast episode. As the host of the Shifting Privacy Left podcast, Farber is dedicated to building a community of privacy engineers and bridging the silos between various industries and research areas.  In this Kitecast episode, Farber emphasized the importance of embedding privac...]]></itunes:summary>
    <description><![CDATA[<p>Debra Farber, a globally recognized privacy, security, and ethical tech advisor with nearly two decades of experience, discusses <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/privacy-by-design/'>privacy by design</a>, and the growing field of privacy engineering in this Kitecast episode. As the host of the <a href='https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fshiftingprivacyleft.buzzsprout.com%2F2059470&amp;data=05%7C02%7Ckendall.barnes%40kiteworks.com%7Ce747d1351f9a4b6c69e908dc5a43d1ba%7C6a5d3b3314f448dd80301dbdf1362d6f%7C0%7C0%7C638484494608149186%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=UysienEK5frMqjOiKvIr7qv50PhlnK1zpBrwsE2R%2BhI%3D&amp;reserved=0'>Shifting Privacy Left podcast</a>, Farber is dedicated to building a community of privacy engineers and bridging the silos between various industries and research areas.<br/><br/>In this Kitecast episode, Farber emphasized the importance of embedding privacy into product development from the outset. She highlighted the role of privacy engineers in assessing risks, minimizing data collection, and ensuring <a href='https://www.kiteworks.com/risk-compliance-glossary/regulatory-compliance-definition/'>compliance with regulations</a> such as <a href='https://www.kiteworks.com/risk-compliance-glossary/gdpr/'>GDPR</a>. Farber also discussed the challenges organizations face in hiring privacy engineers due to the high demand and limited supply of qualified professionals in this relatively new field.<br/><br/>Farber explained the distinction between privacy by design and privacy-enhancing technologies (PETs). Privacy by design is a set of high-level principles focused on integrating privacy into systems from the beginning, while PETs are specific tools and techniques that help achieve compliance with <a href='https://www.kiteworks.com/risk-compliance-glossary/data-loss-prevention-dlp/'>data protection principles</a>. Some examples of PETs include anonymization, homomorphic encryption, secure multi-party computing, and differential privacy.<br/><br/>The conversation also touched on the potential return on investment for organizations that prioritize privacy. By minimizing data collection and addressing privacy concerns early in the development process, companies can reduce downstream compliance costs, legal expenses, and the risk of fines associated with data breaches or privacy violations.<br/><br/>In addition to the above, Farber shared her thoughts on <a href='https://info.kiteworks.com/webinar-the-evolution-and-impact-of-ai-on-data-sec-decisions'>artificial intelligence</a> and its impact on personal privacy. While acknowledging the potential risks, she emphasized that the real threat lies in the unchecked powers of those bringing AI to market without appropriate safety measures and testing. Farber advocates for the ethical development and deployment of AI technologies, ensuring that privacy standards are applied correctly to mitigate risks and protect individuals’ rights.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/privacyguru'>https://www.linkedin.com/in/privacyguru</a> <br/><br/>Shifting Privacy Left Media: <a href='https://shiftingprivacyleft.com'>https://shiftingprivacyleft.com</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Debra Farber, a globally recognized privacy, security, and ethical tech advisor with nearly two decades of experience, discusses <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/privacy-by-design/'>privacy by design</a>, and the growing field of privacy engineering in this Kitecast episode. As the host of the <a href='https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fshiftingprivacyleft.buzzsprout.com%2F2059470&amp;data=05%7C02%7Ckendall.barnes%40kiteworks.com%7Ce747d1351f9a4b6c69e908dc5a43d1ba%7C6a5d3b3314f448dd80301dbdf1362d6f%7C0%7C0%7C638484494608149186%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=UysienEK5frMqjOiKvIr7qv50PhlnK1zpBrwsE2R%2BhI%3D&amp;reserved=0'>Shifting Privacy Left podcast</a>, Farber is dedicated to building a community of privacy engineers and bridging the silos between various industries and research areas.<br/><br/>In this Kitecast episode, Farber emphasized the importance of embedding privacy into product development from the outset. She highlighted the role of privacy engineers in assessing risks, minimizing data collection, and ensuring <a href='https://www.kiteworks.com/risk-compliance-glossary/regulatory-compliance-definition/'>compliance with regulations</a> such as <a href='https://www.kiteworks.com/risk-compliance-glossary/gdpr/'>GDPR</a>. Farber also discussed the challenges organizations face in hiring privacy engineers due to the high demand and limited supply of qualified professionals in this relatively new field.<br/><br/>Farber explained the distinction between privacy by design and privacy-enhancing technologies (PETs). Privacy by design is a set of high-level principles focused on integrating privacy into systems from the beginning, while PETs are specific tools and techniques that help achieve compliance with <a href='https://www.kiteworks.com/risk-compliance-glossary/data-loss-prevention-dlp/'>data protection principles</a>. Some examples of PETs include anonymization, homomorphic encryption, secure multi-party computing, and differential privacy.<br/><br/>The conversation also touched on the potential return on investment for organizations that prioritize privacy. By minimizing data collection and addressing privacy concerns early in the development process, companies can reduce downstream compliance costs, legal expenses, and the risk of fines associated with data breaches or privacy violations.<br/><br/>In addition to the above, Farber shared her thoughts on <a href='https://info.kiteworks.com/webinar-the-evolution-and-impact-of-ai-on-data-sec-decisions'>artificial intelligence</a> and its impact on personal privacy. While acknowledging the potential risks, she emphasized that the real threat lies in the unchecked powers of those bringing AI to market without appropriate safety measures and testing. Farber advocates for the ethical development and deployment of AI technologies, ensuring that privacy standards are applied correctly to mitigate risks and protect individuals’ rights.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/privacyguru'>https://www.linkedin.com/in/privacyguru</a> <br/><br/>Shifting Privacy Left Media: <a href='https://shiftingprivacyleft.com'>https://shiftingprivacyleft.com</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/14837509-debra-farber-shifting-privacy-left-with-privacy-by-design.mp3" length="33527310" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14837509</guid>
    <pubDate>Mon, 08 Apr 2024 07:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/14837509/transcript" type="text/html" />
    <itunes:duration>2791</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/privacyguru" img="https://storage.buzzsprout.com/ua1jsbragkwqlpntlsf6t6aat6uu">Debra Farber</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Lisa Plaggemier: Empowering Digital Safety for All</itunes:title>
    <title>Lisa Plaggemier: Empowering Digital Safety for All</title>
    <itunes:summary><![CDATA[In the latest Kitecast episode, Lisa Plaggemier, the Executive Director of the National Cybersecurity Alliance, discusses what it takes to empower digital safety for all peoples and organizations. With an extensive background in marketing, operations, and cybersecurity, including a decade at Ford Motor Company and senior roles at CDK Global and InfoSec, Lisa brings a wealth of experience and lessons learned to the topic. Her focus is on helping businesses and individuals protect themselves in...]]></itunes:summary>
    <description><![CDATA[<p>In the latest Kitecast episode, <a href='https://www.linkedin.com/in/lisaplaggemier/'>Lisa Plaggemier</a>, the Executive Director of the <a href='https://staysafeonline.org/'>National Cybersecurity Alliance</a>, discusses what it takes to empower digital safety for all peoples and organizations. With an extensive background in marketing, operations, and cybersecurity, including a decade at Ford Motor Company and senior roles at CDK Global and InfoSec, Lisa brings a wealth of experience and lessons learned to the topic. Her focus is on helping businesses and individuals protect themselves in the digital world, which enables organizations to develop better <a href='https://www.kiteworks.com/cybersecurity-risk-management/cybersecurity-risk-management-tips/'>cybersecurity risk management strategies</a>.<br/><br/>Lisa emphasizes the importance of consistent and clear communications when it comes to cybersecurity awareness. She highlights the success of <a href='https://staysafeonline.org/programs/cybersecurity-awareness-month/'>Cybersecurity Awareness Month</a>, an initiative founded by the National Cybersecurity Alliance, attributing its effectiveness to the consistency of the message over time. Lisa also stresses the need to demystify cybersecurity for the average person, making it more attractive and less intimidating to adopt safe online practices.<br/><br/>One of the key challenges Lisa identifies is the knowledge gap between IT professionals and business owners, particularly in small businesses. To address this gap, the National Cybersecurity Alliance launched a training class tailored to educate business leaders on managing cybersecurity as a function of their business. The organization also recognizes the importance of early cybersecurity education, with plans to develop age-appropriate content for children in collaboration with PBS Kids.<br/><br/>Lisa shares insights from the National Cybersecurity Alliance’s annual survey, revealing alarming trends such as the persistence of insecure password practices and the overconfidence of younger generations in their ability to navigate cybersecurity risks. She also discusses the need for widespread adoption of <a href='https://www.kiteworks.com/risk-compliance-glossary/multifactor-authentication-mfa/'>multi-factor authentication</a> (MFA) and the role of social media companies in mandating more stringent security measures.<br/><br/>In addition to the above, Lisa emphasizes the National Cybersecurity Alliance’s commitment to promoting cybersecurity awareness through various initiatives, including the creation of a comedic series called Kubikle Series to engage a broader audience. With her expertise and dedication to the cause, Lisa—and the National Cybersecurity Alliance—continue to play a crucial role in empowering individuals and organizations to stay safe in the ever-evolving digital landscape.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/lisaplaggemier/'>https://www.linkedin.com/in/lisaplaggemier/</a> <br/><br/>National Cybersecurity Alliance: <a href='https://staysafeonline.org/'>https://staysafeonline.org/</a> <br/><br/>Kubikle Series: <a href='https://kubikleseries.com/'>https://kubikleseries.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>In the latest Kitecast episode, <a href='https://www.linkedin.com/in/lisaplaggemier/'>Lisa Plaggemier</a>, the Executive Director of the <a href='https://staysafeonline.org/'>National Cybersecurity Alliance</a>, discusses what it takes to empower digital safety for all peoples and organizations. With an extensive background in marketing, operations, and cybersecurity, including a decade at Ford Motor Company and senior roles at CDK Global and InfoSec, Lisa brings a wealth of experience and lessons learned to the topic. Her focus is on helping businesses and individuals protect themselves in the digital world, which enables organizations to develop better <a href='https://www.kiteworks.com/cybersecurity-risk-management/cybersecurity-risk-management-tips/'>cybersecurity risk management strategies</a>.<br/><br/>Lisa emphasizes the importance of consistent and clear communications when it comes to cybersecurity awareness. She highlights the success of <a href='https://staysafeonline.org/programs/cybersecurity-awareness-month/'>Cybersecurity Awareness Month</a>, an initiative founded by the National Cybersecurity Alliance, attributing its effectiveness to the consistency of the message over time. Lisa also stresses the need to demystify cybersecurity for the average person, making it more attractive and less intimidating to adopt safe online practices.<br/><br/>One of the key challenges Lisa identifies is the knowledge gap between IT professionals and business owners, particularly in small businesses. To address this gap, the National Cybersecurity Alliance launched a training class tailored to educate business leaders on managing cybersecurity as a function of their business. The organization also recognizes the importance of early cybersecurity education, with plans to develop age-appropriate content for children in collaboration with PBS Kids.<br/><br/>Lisa shares insights from the National Cybersecurity Alliance’s annual survey, revealing alarming trends such as the persistence of insecure password practices and the overconfidence of younger generations in their ability to navigate cybersecurity risks. She also discusses the need for widespread adoption of <a href='https://www.kiteworks.com/risk-compliance-glossary/multifactor-authentication-mfa/'>multi-factor authentication</a> (MFA) and the role of social media companies in mandating more stringent security measures.<br/><br/>In addition to the above, Lisa emphasizes the National Cybersecurity Alliance’s commitment to promoting cybersecurity awareness through various initiatives, including the creation of a comedic series called Kubikle Series to engage a broader audience. With her expertise and dedication to the cause, Lisa—and the National Cybersecurity Alliance—continue to play a crucial role in empowering individuals and organizations to stay safe in the ever-evolving digital landscape.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/lisaplaggemier/'>https://www.linkedin.com/in/lisaplaggemier/</a> <br/><br/>National Cybersecurity Alliance: <a href='https://staysafeonline.org/'>https://staysafeonline.org/</a> <br/><br/>Kubikle Series: <a href='https://kubikleseries.com/'>https://kubikleseries.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/14818526-lisa-plaggemier-empowering-digital-safety-for-all.mp3" length="27780460" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14818526</guid>
    <pubDate>Tue, 02 Apr 2024 23:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/14818526/transcript" type="text/html" />
    <itunes:duration>2313</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/lisaplaggemier/" img="https://storage.buzzsprout.com/vzzuqboh5h9heptbafg5avsjgu3o">Lisa Plaggemier</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Alan Shimel: Separating AI Hype From Reality in Cybersecurity</itunes:title>
    <title>Alan Shimel: Separating AI Hype From Reality in Cybersecurity</title>
    <itunes:summary><![CDATA[Alan Shimel, a prominent figure in the cybersecurity industry, is the CEO and founder of Techstrong Group, a global platform that powers tech innovation and transformation across various media, research, and consulting brands. With over 25 years of experience in security, Shimel has been at the forefront of the industry, witnessing its evolution and the emergence of new technologies such as AI. In this Kitecast episode, he shares his insights on the impact of AI on cybersecurity, discussing i...]]></itunes:summary>
    <description><![CDATA[<p>Alan Shimel, a prominent figure in the cybersecurity industry, is the CEO and founder of Techstrong Group, a global platform that powers tech innovation and transformation across various media, research, and consulting brands. With over 25 years of experience in security, Shimel has been at the forefront of the industry, witnessing its evolution and the emergence of new technologies such as <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a>. In this Kitecast episode, he shares his insights on the impact of AI on cybersecurity, discussing its potential benefits and limitations while addressing the challenges faced by organizations in today’s rapidly changing landscape.<br/><br/>One of the key areas explored in the podcast is the influence of AI on application security (AppSec). Shimel notes that AI is making AppSec easier and faster, lowering the entry point for organizations to secure their applications. However, he also raises the question of whether AI is genuinely improving security or simply making it more accessible. Shimel suggests that while AI can help identify vulnerabilities in code more efficiently, it is essential to ensure that the quality of the generated code is high and that organizations do not become overly reliant on AI-driven solutions.<br/><br/>The conversation also delves into the role of cyber insurance companies in enforcing cybersecurity policies. Shimel explains that these companies are becoming the architects and auditors of security, establishing the lowest common denominator for organizations seeking coverage. While this can be beneficial in ensuring a baseline level of security, Shimel cautions that it may not always align with an organization’s specific needs or <a href='https://www.kiteworks.com/risk-compliance-glossary/risk-assessment/'>risk tolerance</a>. He also highlights the importance of understanding the implications of cyber insurance, as insurers often have the power to make decisions on behalf of the insured organization in the event of a breach or <a href='https://www.kiteworks.com/risk-compliance-glossary/ransomware-attacks/'>ransomware attack</a>.<br/><br/>Another critical topic addressed in the podcast is the cybersecurity skills gap. Shimel points out that despite the growing demand for cybersecurity professionals, many skilled individuals struggle to land their first job due to the industry’s preference for candidates with three to five years of experience. He emphasizes the need for organizations to provide opportunities for newcomers to gain practical experience and suggests that the skills gap will persist until the industry becomes more receptive to nurturing new talent.<br/><br/>Looking to the future, Shimel discusses the potential impact of quantum computing on cybersecurity. While he acknowledges that the development of stable quantum computers is still years away, he stresses the importance of preparing for the potential disruption they could bring. Shimel mentions that government agencies and regulatory bodies have already begun working on quantum-proof algorithms and certificates to ensure the continued security of encrypted data. However, he also notes that the adoption of these measures will largely depend on market demand and the willingness of organizations to invest in quantum-resistant technologies.</p><p>LinkedIn: <a href='https://www.linkedin.com/in/alanshimel/'>https://www.linkedin.com/in/alanshimel/</a>  </p><p>Techstrong Group: <a href='https://techstronggroup.com/'>https://techstronggroup.com/</a></p><p>Techstrong Podcasts: <a href='https://techstrongpodcasts.com'>https://techstrongpodcasts.com</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Alan Shimel, a prominent figure in the cybersecurity industry, is the CEO and founder of Techstrong Group, a global platform that powers tech innovation and transformation across various media, research, and consulting brands. With over 25 years of experience in security, Shimel has been at the forefront of the industry, witnessing its evolution and the emergence of new technologies such as <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a>. In this Kitecast episode, he shares his insights on the impact of AI on cybersecurity, discussing its potential benefits and limitations while addressing the challenges faced by organizations in today’s rapidly changing landscape.<br/><br/>One of the key areas explored in the podcast is the influence of AI on application security (AppSec). Shimel notes that AI is making AppSec easier and faster, lowering the entry point for organizations to secure their applications. However, he also raises the question of whether AI is genuinely improving security or simply making it more accessible. Shimel suggests that while AI can help identify vulnerabilities in code more efficiently, it is essential to ensure that the quality of the generated code is high and that organizations do not become overly reliant on AI-driven solutions.<br/><br/>The conversation also delves into the role of cyber insurance companies in enforcing cybersecurity policies. Shimel explains that these companies are becoming the architects and auditors of security, establishing the lowest common denominator for organizations seeking coverage. While this can be beneficial in ensuring a baseline level of security, Shimel cautions that it may not always align with an organization’s specific needs or <a href='https://www.kiteworks.com/risk-compliance-glossary/risk-assessment/'>risk tolerance</a>. He also highlights the importance of understanding the implications of cyber insurance, as insurers often have the power to make decisions on behalf of the insured organization in the event of a breach or <a href='https://www.kiteworks.com/risk-compliance-glossary/ransomware-attacks/'>ransomware attack</a>.<br/><br/>Another critical topic addressed in the podcast is the cybersecurity skills gap. Shimel points out that despite the growing demand for cybersecurity professionals, many skilled individuals struggle to land their first job due to the industry’s preference for candidates with three to five years of experience. He emphasizes the need for organizations to provide opportunities for newcomers to gain practical experience and suggests that the skills gap will persist until the industry becomes more receptive to nurturing new talent.<br/><br/>Looking to the future, Shimel discusses the potential impact of quantum computing on cybersecurity. While he acknowledges that the development of stable quantum computers is still years away, he stresses the importance of preparing for the potential disruption they could bring. Shimel mentions that government agencies and regulatory bodies have already begun working on quantum-proof algorithms and certificates to ensure the continued security of encrypted data. However, he also notes that the adoption of these measures will largely depend on market demand and the willingness of organizations to invest in quantum-resistant technologies.</p><p>LinkedIn: <a href='https://www.linkedin.com/in/alanshimel/'>https://www.linkedin.com/in/alanshimel/</a>  </p><p>Techstrong Group: <a href='https://techstronggroup.com/'>https://techstronggroup.com/</a></p><p>Techstrong Podcasts: <a href='https://techstrongpodcasts.com'>https://techstrongpodcasts.com</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/14774987-alan-shimel-separating-ai-hype-from-reality-in-cybersecurity.mp3" length="29969752" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14774987</guid>
    <pubDate>Tue, 26 Mar 2024 17:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/14774987/transcript" type="text/html" />
    <itunes:duration>2495</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/alanshimel/" img="https://storage.buzzsprout.com/hkv2wtz0nuewqip77la7ng6jr1cc">Alan Shimel</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Huxley Barbee: Cyber Asset Inventory Risk Management</itunes:title>
    <title>Huxley Barbee: Cyber Asset Inventory Risk Management</title>
    <itunes:summary><![CDATA[runZero provides comprehensive visibility into an organization’s cyber assets and attack surface to empower risk and exposure management. By combining external scanning, internal asset discovery, cloud inventory, and API integrations, runZero maps all devices, software, vulnerabilities, owners, and other security attributes. This integrated view across IT, IoT, OT, mobile, and cloud contextualizes risk and priorities based on asset criticality and location inside or outside the network perime...]]></itunes:summary>
    <description><![CDATA[<p>runZero provides comprehensive visibility into an organization’s cyber assets and attack surface to empower <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk and exposure management</a>. By combining external scanning, internal asset discovery, cloud inventory, and API integrations, runZero maps all devices, software, vulnerabilities, owners, and other security attributes. This integrated view across IT, IoT, OT, mobile, and cloud contextualizes risk and priorities based on asset criticality and location inside or outside the network perimeter.<br/><br/>Barbee predicts major <a href='https://www.kiteworks.com/forecast-report/'>new vulnerabilities in 2024</a> that will catch security teams off guard as they remain overburdened dealing with patching and securing fundamental gaps. Additionally, more <a href='https://www.kiteworks.com/risk-compliance-glossary/supply-chain/'>supply chain</a> attacks will emerge from <a href='https://www.kiteworks.com/risk-compliance-glossary/malware-based-attacks/'>malware</a> inserted through dependencies and software development pipelines over the last few years. He advises <a href='https://www.kiteworks.com/solutions/ciso/'>CISOs</a> to focus on security fundamentals first, like comprehensive asset management, vulnerability management, and patching rather than getting distracted by the latest headlines on <a href='https://www.kiteworks.com/risk-compliance-glossary/cybersecurity-risk-management-apt-advanced-persistent-threat/'>advanced persistent threats</a>.<br/><br/>While <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance regulations</a> provide helpful guardrails and budget for security programs, most organizations still struggle with basics like consistent vulnerability scanning, device monitoring, and patching. The smaller the company, the more they remain focused on backup, recovery, and threat detection rather than proactive security. Barbee highlights an energy company that resisted patching anything due to downtime risks, demonstrating the difficult trade-offs security teams face.<br/><br/>When submitting conference presentation proposals, clearly explain what you plan to discuss and why it matters to peers. Spend time refining the title and abstract from the selection committee’s perspective, rather than taking shortcuts. Ask colleagues or mentors to review and provide feedback to improve clarity and relevance before submitting.<br/><br/>For new security professionals, Barbee advises developing networking and communication skills instead of only focusing on individual skills development. He also encourages cementing core IT and networking fundamentals instead of only specializing in security too early in their career. He suggests considering complementary areas like <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a> to broaden perspective beyond just vulnerabilities and controls.<br/><br/><b>LinkedIn Profile: </b>https://www.linkedin.com/in/jhbarbee/<br/><br/><b>runZero:</b> <a href='https://www.runzero.com'>https://www.runzero.com</a> </p><p> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>runZero provides comprehensive visibility into an organization’s cyber assets and attack surface to empower <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk and exposure management</a>. By combining external scanning, internal asset discovery, cloud inventory, and API integrations, runZero maps all devices, software, vulnerabilities, owners, and other security attributes. This integrated view across IT, IoT, OT, mobile, and cloud contextualizes risk and priorities based on asset criticality and location inside or outside the network perimeter.<br/><br/>Barbee predicts major <a href='https://www.kiteworks.com/forecast-report/'>new vulnerabilities in 2024</a> that will catch security teams off guard as they remain overburdened dealing with patching and securing fundamental gaps. Additionally, more <a href='https://www.kiteworks.com/risk-compliance-glossary/supply-chain/'>supply chain</a> attacks will emerge from <a href='https://www.kiteworks.com/risk-compliance-glossary/malware-based-attacks/'>malware</a> inserted through dependencies and software development pipelines over the last few years. He advises <a href='https://www.kiteworks.com/solutions/ciso/'>CISOs</a> to focus on security fundamentals first, like comprehensive asset management, vulnerability management, and patching rather than getting distracted by the latest headlines on <a href='https://www.kiteworks.com/risk-compliance-glossary/cybersecurity-risk-management-apt-advanced-persistent-threat/'>advanced persistent threats</a>.<br/><br/>While <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance regulations</a> provide helpful guardrails and budget for security programs, most organizations still struggle with basics like consistent vulnerability scanning, device monitoring, and patching. The smaller the company, the more they remain focused on backup, recovery, and threat detection rather than proactive security. Barbee highlights an energy company that resisted patching anything due to downtime risks, demonstrating the difficult trade-offs security teams face.<br/><br/>When submitting conference presentation proposals, clearly explain what you plan to discuss and why it matters to peers. Spend time refining the title and abstract from the selection committee’s perspective, rather than taking shortcuts. Ask colleagues or mentors to review and provide feedback to improve clarity and relevance before submitting.<br/><br/>For new security professionals, Barbee advises developing networking and communication skills instead of only focusing on individual skills development. He also encourages cementing core IT and networking fundamentals instead of only specializing in security too early in their career. He suggests considering complementary areas like <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a> to broaden perspective beyond just vulnerabilities and controls.<br/><br/><b>LinkedIn Profile: </b>https://www.linkedin.com/in/jhbarbee/<br/><br/><b>runZero:</b> <a href='https://www.runzero.com'>https://www.runzero.com</a> </p><p> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/14542342-huxley-barbee-cyber-asset-inventory-risk-management.mp3" length="32855847" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14542342</guid>
    <pubDate>Tue, 27 Feb 2024 09:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/14542342/transcript" type="text/html" />
    <itunes:duration>2735</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/jhbarbee/" img="https://storage.buzzsprout.com/fy18ro51tsomdpguvtrl74j92n3a">Huxley Barbee</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Patrick Garrity: Safeguarding Vulnerabilities</itunes:title>
    <title>Patrick Garrity: Safeguarding Vulnerabilities</title>
    <itunes:summary><![CDATA[Patrick Garrity has over 15 years of experience spanning various marketing, sales, and product roles for high-growth cybersecurity companies. For this Kitecast episode, he delves into detail on his expertise in vulnerability management.   To start the podcast episode, Garrity discusses the rapid evolution of vulnerability management over the past few years. He notes that vulnerabilities are growing exponentially in both volume and complexity, with over 25,000 new vulnerabilities identified in...]]></itunes:summary>
    <description><![CDATA[<p>Patrick Garrity has over 15 years of experience spanning various marketing, sales, and product roles for high-growth cybersecurity companies. For this Kitecast episode, he delves into detail on his expertise in vulnerability management. <br/><br/>To start the podcast episode, Garrity discusses the rapid evolution of vulnerability management over the past few years. He notes that vulnerabilities are growing exponentially in both volume and complexity, with over 25,000 new vulnerabilities identified in 2022 compared to just 5,000 several years ago. Despite this growth, many organizations still struggle to patch even known critical vulnerabilities in a timely manner. In response, Garrity emphasizes that organizations need to focus first on addressing externally facing, actively exploited vulnerabilities before attempting to tackle everything at once with their limited resources.<br/><br/>The podcast episode also covers the role of <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a> and machine learning in vulnerability management. While emerging AI tools show promise for use cases like prioritization of vulnerabilities and automated reporting, Garrity cautions that the underlying data feeding these systems needs stringent accuracy and validation. He advocates leaning on trusted threat intelligence from established providers to help inform data-driven decisions around vulnerabilities and <a href='https://www.kiteworks.com/risk-compliance-glossary/incident-response/'>incident response</a>.<br/><br/>Shifting gears, Garrity reflects on seminal lessons learned from his experience rapidly scaling Duo Security before its $2.35 billion acquisition by Cisco in 2018. When asked by the hosts to provide career guidance to others pursuing work in the cybersecurity field, Garrity highlights the outsized importance of continually assessing the market landscape with an eye for evolution. Similarly, he stresses that individuals should embrace openness to filling a variety of roles in early-stage companies as they grow. Finally, Garrity emphasizes the urgent need for sustainable business models in cybersecurity rather than overvalued fundraising built predominantly on hype. Underpinned by this sobering perspective, he still goes on to express optimism about the industry&apos;s overall trajectory thanks to the advent of various “secure-by-design” initiatives.<br/><br/><b>LinkedIn Profile: </b><a href='https://www.linkedin.com/in/patrickmgarrity/'>https://www.linkedin.com/in/patrickmgarrity/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Patrick Garrity has over 15 years of experience spanning various marketing, sales, and product roles for high-growth cybersecurity companies. For this Kitecast episode, he delves into detail on his expertise in vulnerability management. <br/><br/>To start the podcast episode, Garrity discusses the rapid evolution of vulnerability management over the past few years. He notes that vulnerabilities are growing exponentially in both volume and complexity, with over 25,000 new vulnerabilities identified in 2022 compared to just 5,000 several years ago. Despite this growth, many organizations still struggle to patch even known critical vulnerabilities in a timely manner. In response, Garrity emphasizes that organizations need to focus first on addressing externally facing, actively exploited vulnerabilities before attempting to tackle everything at once with their limited resources.<br/><br/>The podcast episode also covers the role of <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a> and machine learning in vulnerability management. While emerging AI tools show promise for use cases like prioritization of vulnerabilities and automated reporting, Garrity cautions that the underlying data feeding these systems needs stringent accuracy and validation. He advocates leaning on trusted threat intelligence from established providers to help inform data-driven decisions around vulnerabilities and <a href='https://www.kiteworks.com/risk-compliance-glossary/incident-response/'>incident response</a>.<br/><br/>Shifting gears, Garrity reflects on seminal lessons learned from his experience rapidly scaling Duo Security before its $2.35 billion acquisition by Cisco in 2018. When asked by the hosts to provide career guidance to others pursuing work in the cybersecurity field, Garrity highlights the outsized importance of continually assessing the market landscape with an eye for evolution. Similarly, he stresses that individuals should embrace openness to filling a variety of roles in early-stage companies as they grow. Finally, Garrity emphasizes the urgent need for sustainable business models in cybersecurity rather than overvalued fundraising built predominantly on hype. Underpinned by this sobering perspective, he still goes on to express optimism about the industry&apos;s overall trajectory thanks to the advent of various “secure-by-design” initiatives.<br/><br/><b>LinkedIn Profile: </b><a href='https://www.linkedin.com/in/patrickmgarrity/'>https://www.linkedin.com/in/patrickmgarrity/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/14541675-patrick-garrity-safeguarding-vulnerabilities.mp3" length="27088310" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14541675</guid>
    <pubDate>Tue, 20 Feb 2024 13:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/14541675/transcript" type="text/html" />
    <itunes:duration>2255</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/patrickmgarrity/" img="https://storage.buzzsprout.com/0ayehdhudxkyadn2469vz929cyr9">Patrick Garrity</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Dan Lorhmann: Cybersecurity and Incident Response in the Face of GenAI</itunes:title>
    <title>Dan Lorhmann: Cybersecurity and Incident Response in the Face of GenAI</title>
    <itunes:summary><![CDATA[As an author, podcaster, and field CISO focused on the public sector, Dan Lohrmann brings a wealth of experience spanning over two decades. This Kitecast episode includes a discussion of Lohrmann’s recent book, Cyber Mayday and the Day After, that he co-authored with cybersecurity expert Shamane Tan. The book shares ransomware stories and insights from executives who have faced major cyber incidents. It covers best practices for preparation, response, and recovery before, during, and after an...]]></itunes:summary>
    <description><![CDATA[<p>As an author, podcaster, and field CISO focused on the public sector, Dan Lohrmann brings a wealth of experience spanning over two decades. This Kitecast episode includes a discussion of Lohrmann’s recent book, <em>Cyber Mayday and the Day After,</em> that he co-authored with cybersecurity expert Shamane Tan. The book shares <a href='https://www.kiteworks.com/risk-compliance-glossary/ransomware-attacks/'>ransomware</a> stories and insights from executives who have faced major cyber incidents. It covers best practices for preparation, response, and recovery before, during, and after an attack. Lohrmann notes these firsthand stories reveal valuable lessons for organizations of all types.  <br/><br/>The podcast discussion then turned to the inevitable disruption faced by today’s CISOs and cybersecurity teams. Lohrmann emphasizes the need for continuous training, tabletop exercises, and preparation for unexpected curveballs. Building an organizational culture focused on resilience rather than blame is also critical. <br/><br/>As conversation shifted to <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>artificial intelligence</a>, Lohrmann pointed out that governing and securing AI remains extremely challenging for most security teams. The proliferation of free AI tools creates substantial risk of data loss and intellectual property theft. Enterprises need much greater visibility and control over how end-users are interacting with these tools. Over the next few years, more organizations are expected to invest in enterprise-controlled AI systems focused on security and privacy.<br/><br/>In discussing predictions for 2024 and beyond, Lohrmann highlights his annual report compiling insights from leading cybersecurity vendors and researchers. With cyber threats growing in scale and sophistication, he emphasizes the importance of continuous learning for security leaders. At the same time, Lohrmann notes that while specific predictions should be taken with a grain of salt, the research reports paint an informative picture of what trends are unfolding. <br/><br/>LinkedIn Profile: <a href='https://www.linkedin.com/in/danlohrmann/'>https://www.linkedin.com/in/danlohrmann/</a><br/><br/>Presidio: <a href='https://www.presidio.com/'>https://www.presidio.com/</a> <br/><br/><em>Cyber Mayday and the Day After: </em><a href='https://www.amazon.com/Cyber-Mayday-Day-After-Disruptions/dp/1119835305/ref=sr_1_2'><em>https://www.amazon.com/Cyber-Mayday-Day-After-Disruptions/dp/1119835305/ref=sr_1_2</em></a><em> </em></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>As an author, podcaster, and field CISO focused on the public sector, Dan Lohrmann brings a wealth of experience spanning over two decades. This Kitecast episode includes a discussion of Lohrmann’s recent book, <em>Cyber Mayday and the Day After,</em> that he co-authored with cybersecurity expert Shamane Tan. The book shares <a href='https://www.kiteworks.com/risk-compliance-glossary/ransomware-attacks/'>ransomware</a> stories and insights from executives who have faced major cyber incidents. It covers best practices for preparation, response, and recovery before, during, and after an attack. Lohrmann notes these firsthand stories reveal valuable lessons for organizations of all types.  <br/><br/>The podcast discussion then turned to the inevitable disruption faced by today’s CISOs and cybersecurity teams. Lohrmann emphasizes the need for continuous training, tabletop exercises, and preparation for unexpected curveballs. Building an organizational culture focused on resilience rather than blame is also critical. <br/><br/>As conversation shifted to <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>artificial intelligence</a>, Lohrmann pointed out that governing and securing AI remains extremely challenging for most security teams. The proliferation of free AI tools creates substantial risk of data loss and intellectual property theft. Enterprises need much greater visibility and control over how end-users are interacting with these tools. Over the next few years, more organizations are expected to invest in enterprise-controlled AI systems focused on security and privacy.<br/><br/>In discussing predictions for 2024 and beyond, Lohrmann highlights his annual report compiling insights from leading cybersecurity vendors and researchers. With cyber threats growing in scale and sophistication, he emphasizes the importance of continuous learning for security leaders. At the same time, Lohrmann notes that while specific predictions should be taken with a grain of salt, the research reports paint an informative picture of what trends are unfolding. <br/><br/>LinkedIn Profile: <a href='https://www.linkedin.com/in/danlohrmann/'>https://www.linkedin.com/in/danlohrmann/</a><br/><br/>Presidio: <a href='https://www.presidio.com/'>https://www.presidio.com/</a> <br/><br/><em>Cyber Mayday and the Day After: </em><a href='https://www.amazon.com/Cyber-Mayday-Day-After-Disruptions/dp/1119835305/ref=sr_1_2'><em>https://www.amazon.com/Cyber-Mayday-Day-After-Disruptions/dp/1119835305/ref=sr_1_2</em></a><em> </em></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/14409582-dan-lorhmann-cybersecurity-and-incident-response-in-the-face-of-genai.mp3" length="28499912" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14409582</guid>
    <pubDate>Tue, 30 Jan 2024 17:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/14409582/transcript" type="text/html" />
    <itunes:duration>2372</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/danlohrmann/" img="https://storage.buzzsprout.com/hk8uht5dj1l9biw9487b7muon1q7">Dan Lorhmann</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Alexandre Blanc: Assessing Cyber Risks in the Cloud and AI Era </itunes:title>
    <title>Alexandre Blanc: Assessing Cyber Risks in the Cloud and AI Era </title>
    <itunes:summary><![CDATA[In this Kitecast episode, Alexandre Blanc, a Cybersecurity Advisor and Consultant, brings his extensive 15-year background in cybersecurity and risk management into focus. With a significant online presence established since 2018, Blanc has become a prominent LinkedIn influencer for over 70,000 followers by offering critical insights aimed at bolstering organizational resilience. During the podcast, Blanc delves into crucial cybersecurity and risk management topics, emphasizing the vital role...]]></itunes:summary>
    <description><![CDATA[<p>In this Kitecast episode, Alexandre Blanc, a Cybersecurity Advisor and Consultant, brings his extensive 15-year background in cybersecurity and <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a> into focus. With a significant online presence established since 2018, Blanc has become a prominent LinkedIn influencer for over 70,000 followers by offering critical insights aimed at bolstering organizational resilience.</p><p>During the podcast, Blanc delves into crucial cybersecurity and risk management topics, emphasizing the vital roles of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-governance/'>data governance</a>, robust <a href='https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/'>access controls</a>, and reliable backup solutions in risk mitigation and <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>regulatory compliance</a>. He points out a common oversight within many organizations—the underestimation of the business implications that outages and incidents can have.</p><p>Blanc sheds light on the predicaments that arise from the prevalent use of SaaS platforms, such as diminished control and limited visibility regarding updates. Moreover, he casts doubt on the extent of protection cyber insurance offers in the aftermath of cybersecurity events.</p><p>The discussion also ventures into the realm of emerging challenges. Blanc examines Canada’s new data privacy laws, noting how compliance is propelling security enhancements. He raises concerns about the unchecked proliferation of Internet of Things (IoT) devices and their security implications. Looking forward, he addresses the potential disruption quantum computing may pose to current encryption standards, suggesting that tighter governance and minimizing sensitive data transmissions are key to lessening future risks.</p><p>Concluding his insights, Blanc champions the cause for transparency and the cultivation of trust in the evolution of novel technologies like <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>artificial intelligence</a>. By recounting instances where companies concealed failures, resulting in costly long-term repercussions, he calls on technology leaders to acknowledge and communicate the potential adverse impacts of their innovations. His advocacy for informed public discourse stands as part of his broader commitment to providing a measured perspective amidst the swift pace of technological advancement.</p><p>LinkedIn: <a href='http://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022'>www.linkedin.com/in/alexandre-blanc-cyber-security-88569022</a> </p><p>RCGT: <a href='http://www.rcgt.com'>www.rcgt.com</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>In this Kitecast episode, Alexandre Blanc, a Cybersecurity Advisor and Consultant, brings his extensive 15-year background in cybersecurity and <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a> into focus. With a significant online presence established since 2018, Blanc has become a prominent LinkedIn influencer for over 70,000 followers by offering critical insights aimed at bolstering organizational resilience.</p><p>During the podcast, Blanc delves into crucial cybersecurity and risk management topics, emphasizing the vital roles of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-governance/'>data governance</a>, robust <a href='https://www.kiteworks.com/secure-file-sharing/secure-file-sharing-with-access-control/'>access controls</a>, and reliable backup solutions in risk mitigation and <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>regulatory compliance</a>. He points out a common oversight within many organizations—the underestimation of the business implications that outages and incidents can have.</p><p>Blanc sheds light on the predicaments that arise from the prevalent use of SaaS platforms, such as diminished control and limited visibility regarding updates. Moreover, he casts doubt on the extent of protection cyber insurance offers in the aftermath of cybersecurity events.</p><p>The discussion also ventures into the realm of emerging challenges. Blanc examines Canada’s new data privacy laws, noting how compliance is propelling security enhancements. He raises concerns about the unchecked proliferation of Internet of Things (IoT) devices and their security implications. Looking forward, he addresses the potential disruption quantum computing may pose to current encryption standards, suggesting that tighter governance and minimizing sensitive data transmissions are key to lessening future risks.</p><p>Concluding his insights, Blanc champions the cause for transparency and the cultivation of trust in the evolution of novel technologies like <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>artificial intelligence</a>. By recounting instances where companies concealed failures, resulting in costly long-term repercussions, he calls on technology leaders to acknowledge and communicate the potential adverse impacts of their innovations. His advocacy for informed public discourse stands as part of his broader commitment to providing a measured perspective amidst the swift pace of technological advancement.</p><p>LinkedIn: <a href='http://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022'>www.linkedin.com/in/alexandre-blanc-cyber-security-88569022</a> </p><p>RCGT: <a href='http://www.rcgt.com'>www.rcgt.com</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/14096321-alexandre-blanc-assessing-cyber-risks-in-the-cloud-and-ai-era.mp3" length="34929003" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14096321</guid>
    <pubDate>Tue, 05 Dec 2023 16:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/14096321/transcript" type="text/html" />
    <itunes:duration>2908</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="http://www.linkedin.com/in/alexandre-blanc-cyber-security-88569022" img="https://storage.buzzsprout.com/gqewbq3pzcfbh3ny4lpwgikrziez">Alexandre Blanc</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Jason Rebholz: Evolution of Ransomware and Other Cyber Topics</itunes:title>
    <title>Jason Rebholz: Evolution of Ransomware and Other Cyber Topics</title>
    <itunes:summary><![CDATA[This Kitecast episode features Jason Rebholz who has an extensive background in cybersecurity. He is currently the CISO at Corvus Insurance, which he joined in 2021. He also serves as an advisor for NetDiligence and MOXFIVE. Previously, Jason served as the VP of Strategic Partnerships for ICEBRG, which was acquired by Gigamon, VP of Professional Services for The Crypsis Group, and Manager at Mandiant.  Jason founded the educational initiative, “Teach Me Cyber,” that is available on YouTube an...]]></itunes:summary>
    <description><![CDATA[<p>This Kitecast episode features Jason Rebholz who has an extensive background in cybersecurity. He is currently the CISO at Corvus Insurance, which he joined in 2021. He also serves as an advisor for NetDiligence and MOXFIVE. Previously, Jason served as the VP of Strategic Partnerships for ICEBRG, which was acquired by Gigamon, VP of Professional Services for The Crypsis Group, and Manager at Mandiant.<br/><br/>Jason founded the educational initiative, “Teach Me Cyber,” that is available on YouTube and LinkedIn with the objective of making cybersecurity topics more accessible to general audiences. This was motivated by often seeing technical news coverage using jargon and screenshots that average readers would struggle to comprehend. Through short daily lessons on platforms LinkedIn and YouTube, Jason breaks down cybersecurity topics in simple terms anyone can understand. His goal is to help even one more person gain practical knowledge to improve their organization’s security.<br/><br/>In the podcast interview, Jason discussed a recent high-profile <a href='https://www.kiteworks.com/risk-compliance-glossary/ransomware-attacks/'>ransomware attack</a> and provided insight into the challenges of containing and remediating active attacks, noting that it is very difficult to fully kick attackers out of an environment within a short time frame. Jason emphasized the importance of having strong monitoring and rapid response capabilities in place.<br/> <br/><a href='https://www.kiteworks.com/risk-compliance-glossary/multifactor-authentication-mfa/'>Multi-factor authentication</a> (MFA) was another topic Jason covered. He highlighted that while MFA is crucial, organizations must be thoughtful about which types they enable, as weaker forms can still be bypassed. He advocated for the adoption of the most secure MFA options available to get the full risk reduction benefit using <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/'>zero-trust principles</a>.<br/><br/>Managing <a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>third-party cyber risk</a> was also discussed. Jason argued that current third-party assessments often provide a false sense of security. He recommended assuming vendors have poor security and mitigating the impact via actions like limiting data sharing, controlling where sensitive data goes, and ensuring you can revoke access.<br/><br/>LinkedIn: <a href='http://www.linkedin.com/in/jrebholz'>www.linkedin.com/in/jrebholz</a><br/><br/>YouTube: <a href='http://www.youtube.com/@teachmecyber'>www.youtube.com/@teachmecyber</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>This Kitecast episode features Jason Rebholz who has an extensive background in cybersecurity. He is currently the CISO at Corvus Insurance, which he joined in 2021. He also serves as an advisor for NetDiligence and MOXFIVE. Previously, Jason served as the VP of Strategic Partnerships for ICEBRG, which was acquired by Gigamon, VP of Professional Services for The Crypsis Group, and Manager at Mandiant.<br/><br/>Jason founded the educational initiative, “Teach Me Cyber,” that is available on YouTube and LinkedIn with the objective of making cybersecurity topics more accessible to general audiences. This was motivated by often seeing technical news coverage using jargon and screenshots that average readers would struggle to comprehend. Through short daily lessons on platforms LinkedIn and YouTube, Jason breaks down cybersecurity topics in simple terms anyone can understand. His goal is to help even one more person gain practical knowledge to improve their organization’s security.<br/><br/>In the podcast interview, Jason discussed a recent high-profile <a href='https://www.kiteworks.com/risk-compliance-glossary/ransomware-attacks/'>ransomware attack</a> and provided insight into the challenges of containing and remediating active attacks, noting that it is very difficult to fully kick attackers out of an environment within a short time frame. Jason emphasized the importance of having strong monitoring and rapid response capabilities in place.<br/> <br/><a href='https://www.kiteworks.com/risk-compliance-glossary/multifactor-authentication-mfa/'>Multi-factor authentication</a> (MFA) was another topic Jason covered. He highlighted that while MFA is crucial, organizations must be thoughtful about which types they enable, as weaker forms can still be bypassed. He advocated for the adoption of the most secure MFA options available to get the full risk reduction benefit using <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/'>zero-trust principles</a>.<br/><br/>Managing <a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>third-party cyber risk</a> was also discussed. Jason argued that current third-party assessments often provide a false sense of security. He recommended assuming vendors have poor security and mitigating the impact via actions like limiting data sharing, controlling where sensitive data goes, and ensuring you can revoke access.<br/><br/>LinkedIn: <a href='http://www.linkedin.com/in/jrebholz'>www.linkedin.com/in/jrebholz</a><br/><br/>YouTube: <a href='http://www.youtube.com/@teachmecyber'>www.youtube.com/@teachmecyber</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/13746763-jason-rebholz-evolution-of-ransomware-and-other-cyber-topics.mp3" length="36122063" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13746763</guid>
    <pubDate>Mon, 09 Oct 2023 16:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/13746763/transcript" type="text/html" />
    <itunes:duration>3008</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="http://www.linkedin.com/in/jrebholz" img="https://storage.buzzsprout.com/tdt38cn31dkzpcvvzm1bf4f2wc40">Jason Rebholz</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Chris Rose: Getting CMMC Ready: A C3PAO’s Perspective</itunes:title>
    <title>Chris Rose: Getting CMMC Ready: A C3PAO’s Perspective</title>
    <itunes:summary><![CDATA[This Kitecast episode features an interview with Chris Rose, a Partner at Ariento, a leading cybersecurity, IT, and compliance service provider. He has extensive experience in cybersecurity, having previously served as an instructor at UCLA where he taught cybersecurity and privacy courses. Chris holds an MBA and a master’s in computer science from UCLA, as well as a bachelor’s degree from Cal Poly.  During the podcast interview, Chris provides an overview of the Cybersecurity Maturity Model ...]]></itunes:summary>
    <description><![CDATA[<p>This Kitecast episode features an interview with Chris Rose, a Partner at <a href='https://www.ariento.com/'>Ariento</a>, a leading cybersecurity, IT, and compliance service provider. He has extensive experience in cybersecurity, having previously served as an instructor at UCLA where he taught cybersecurity and privacy courses. Chris holds an MBA and a master’s in computer science from UCLA, as well as a bachelor’s degree from Cal Poly.<br/><br/>During the podcast interview, Chris provides an overview of the Cybersecurity Maturity Model Certification (<a href='https://www.kiteworks.com/platform/compliance/cmmc-compliance/'>CMMC</a>) framework and its origins within the defense industry. He explains that CMMC builds upon existing <a href='https://www.kiteworks.com/risk-compliance-glossary/protect-cui-with-nist-800-171-compliance/'>NIST 800-171</a> requirements for protecting controlled unclassified information that contractors already must comply with. However, CMMC adds a critical component—independent third-party assessments done by <a href='https://www.kiteworks.com/cmmc-compliance/uncovering-the-benefits-of-working-with-a-c3pao-organization-for-cmmc-2-0-compliance/'>C3PAOs</a> (Certified Third-party Assessment Organizations).<br/><br/>Chris believes CMMC will likely gain final approval in early 2024 based on the rulemaking process. He notes that reciprocity with frameworks like <a href='https://www.kiteworks.com/platform/compliance/fedramp-authorization/'>FedRAMP</a> could help ease the compliance burden for contractors. For companies using cloud services, Chris strongly advises leveraging solutions that have achieved FedRAMP Moderate Authorization or above.<br/><br/>When asked about readiness across the <a href='https://www.kiteworks.com/risk-compliance-glossary/defense-industrial-base/'>Defense Industrial Base</a> (DIB), Chris indicates that primes are pushing their subcontractors to get prepared. However, smaller companies are still in a wait-and-see mode in some cases, trying to weigh the costs versus risks. He emphasizes that companies should focus first on proper scoping of assets and information that will be in scope for CMMC assessments.<br/><br/>Chris also provides tips for selecting a C3PAO, noting that risk mitigation and technical competence are top evaluation criteria for most mid-market and enterprise clients. He also discusses Ariento’s experience with adjacent standards like FedRAMP, <a href='https://www.kiteworks.com/platform/compliance/iso-compliance/'>ISO</a>, and <a href='https://www.kiteworks.com/platform/compliance/itar-compliance/'>ITAR</a> that provide relevant expertise for CMMC advisory services.<br/><br/>LinkedIn: <a href='http://www.linkedin.com/in/cmmc'>www.linkedin.com/in/cmmc</a> <br/><br/>Ariento: <a href='http://www.ariento.com'>www.ariento.com</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>This Kitecast episode features an interview with Chris Rose, a Partner at <a href='https://www.ariento.com/'>Ariento</a>, a leading cybersecurity, IT, and compliance service provider. He has extensive experience in cybersecurity, having previously served as an instructor at UCLA where he taught cybersecurity and privacy courses. Chris holds an MBA and a master’s in computer science from UCLA, as well as a bachelor’s degree from Cal Poly.<br/><br/>During the podcast interview, Chris provides an overview of the Cybersecurity Maturity Model Certification (<a href='https://www.kiteworks.com/platform/compliance/cmmc-compliance/'>CMMC</a>) framework and its origins within the defense industry. He explains that CMMC builds upon existing <a href='https://www.kiteworks.com/risk-compliance-glossary/protect-cui-with-nist-800-171-compliance/'>NIST 800-171</a> requirements for protecting controlled unclassified information that contractors already must comply with. However, CMMC adds a critical component—independent third-party assessments done by <a href='https://www.kiteworks.com/cmmc-compliance/uncovering-the-benefits-of-working-with-a-c3pao-organization-for-cmmc-2-0-compliance/'>C3PAOs</a> (Certified Third-party Assessment Organizations).<br/><br/>Chris believes CMMC will likely gain final approval in early 2024 based on the rulemaking process. He notes that reciprocity with frameworks like <a href='https://www.kiteworks.com/platform/compliance/fedramp-authorization/'>FedRAMP</a> could help ease the compliance burden for contractors. For companies using cloud services, Chris strongly advises leveraging solutions that have achieved FedRAMP Moderate Authorization or above.<br/><br/>When asked about readiness across the <a href='https://www.kiteworks.com/risk-compliance-glossary/defense-industrial-base/'>Defense Industrial Base</a> (DIB), Chris indicates that primes are pushing their subcontractors to get prepared. However, smaller companies are still in a wait-and-see mode in some cases, trying to weigh the costs versus risks. He emphasizes that companies should focus first on proper scoping of assets and information that will be in scope for CMMC assessments.<br/><br/>Chris also provides tips for selecting a C3PAO, noting that risk mitigation and technical competence are top evaluation criteria for most mid-market and enterprise clients. He also discusses Ariento’s experience with adjacent standards like FedRAMP, <a href='https://www.kiteworks.com/platform/compliance/iso-compliance/'>ISO</a>, and <a href='https://www.kiteworks.com/platform/compliance/itar-compliance/'>ITAR</a> that provide relevant expertise for CMMC advisory services.<br/><br/>LinkedIn: <a href='http://www.linkedin.com/in/cmmc'>www.linkedin.com/in/cmmc</a> <br/><br/>Ariento: <a href='http://www.ariento.com'>www.ariento.com</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/13637916-chris-rose-getting-cmmc-ready-a-c3pao-s-perspective.mp3" length="28995634" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13637916</guid>
    <pubDate>Thu, 21 Sep 2023 20:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/13637916/transcript" type="text/html" />
    <itunes:duration>2414</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="http://www.linkedin.com/in/cmmc" img="https://storage.buzzsprout.com/rml9p4nz202pnxgkat4juw74wtfz">Chris Rose</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Katie Arrington: Cybersecurity in an Era of National Adversaries</itunes:title>
    <title>Katie Arrington: Cybersecurity in an Era of National Adversaries</title>
    <itunes:summary><![CDATA[Katie Arrington, former Chief Information Security Officer (CISO) for the U.S. Department of Defense and member of the US House of Representatives, discusses her experience as CISO, noting that the position was newly created in 2019 to address urgent cybersecurity threats. In the role, she aimed to establish consistent standards for cybersecurity across the Department of Defense, including weapons systems, critical infrastructure, and the defense industrial base. A key challenge was overcomin...]]></itunes:summary>
    <description><![CDATA[<p>Katie Arrington, former Chief Information Security Officer (CISO) for the U.S. Department of Defense and member of the US House of Representatives, discusses her experience as CISO, noting that the position was newly created in 2019 to address urgent cybersecurity threats. In the role, she aimed to establish consistent standards for cybersecurity across the Department of Defense, including weapons systems, critical infrastructure, and the <a href='https://www.kiteworks.com/risk-compliance-glossary/defense-industrial-base/'>defense industrial base</a>. A key challenge was overcoming the different cybersecurity approaches between military branches and establishing a unified culture.<br/><br/>Regarding the Cybersecurity Maturity Model Certification (<a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc/'>CMMC</a>), Arrington explains it was initially conceived as a unified standard for defense contractors to demonstrate implementation of <a href='https://www.kiteworks.com/risk-compliance-glossary/protect-cui-with-nist-800-171-compliance/'>NIST 800-171</a> security controls. Hundreds of industry representatives helped develop CMMC 1.0. Arrington expresses that she regrets not fully eliminating the use of Controlled Unclassified Information (<a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc-cui-and-what-it-means/'>CUI</a>) as an indicator of whether contractors needed certification, believing all defense contractors should adhere to CMMC standards given growing threats.<br/><br/>Arrington highlights the massive cyber threats posed by nation-states like China, Russia, Iran, and North Korea, which she says are targeting U.S. defense contractors to steal key technologies and intellectual property. She points out that China has a dedicated cyber army aimed at making China the world’s economic superpower. Russia has shown its cyber capabilities already in interfering with elections. These adversaries are relentless in exploiting vulnerabilities across the entire supply chain.<br/><br/>For defense contractors bidding on DoD projects, Arrington authored a white paper that estimates per-employee costs for cybersecurity based on company size. She believes contractors should build these costs into project bidding. Arrington argues CMMC is now just about verifying NIST 800-171 compliance, not evaluating maturity, so she anticipates the name changing in the future. In preparation for <a href='https://www.kiteworks.com/risk-compliance-glossary/a-guide-to-cmmc-level-2-compliance-requirements/'>CMMC 2.0 Level 2</a> compliance audits, she recommends that contractors proactively get audits now rather than waiting until CMMC becomes a DIB mandate to address urgent threats.<br/><br/>Regarding <a href='https://www.kiteworks.com/risk-compliance-glossary/supply-chain-risk-management/'>supply chain risks</a>, Arrington indicates primes cannot fully see risks beyond tier-one suppliers. She urges primes to contractually require CMMC certification from all subcontractors to improve security against threats that can enter anywhere in the supply chain.<br/><br/>Arrington stresses that cyberattacks are constant and rapidly evolving. No organization can be 100% secure. However, by implementing standards like NIST 800-171, organizations can mitigate these risks. Adherence to cybersecurity frameworks is critical today, an important focus for national security as cyber threats continue escalating.<br/><br/><b>LinkedIn Profile:</b> <a href='https://www.linkedin.com/in/katie-arrington-a6949425/'>https://www.linkedin.com/in/katie-arrington-a6949425/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Katie Arrington, former Chief Information Security Officer (CISO) for the U.S. Department of Defense and member of the US House of Representatives, discusses her experience as CISO, noting that the position was newly created in 2019 to address urgent cybersecurity threats. In the role, she aimed to establish consistent standards for cybersecurity across the Department of Defense, including weapons systems, critical infrastructure, and the <a href='https://www.kiteworks.com/risk-compliance-glossary/defense-industrial-base/'>defense industrial base</a>. A key challenge was overcoming the different cybersecurity approaches between military branches and establishing a unified culture.<br/><br/>Regarding the Cybersecurity Maturity Model Certification (<a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc/'>CMMC</a>), Arrington explains it was initially conceived as a unified standard for defense contractors to demonstrate implementation of <a href='https://www.kiteworks.com/risk-compliance-glossary/protect-cui-with-nist-800-171-compliance/'>NIST 800-171</a> security controls. Hundreds of industry representatives helped develop CMMC 1.0. Arrington expresses that she regrets not fully eliminating the use of Controlled Unclassified Information (<a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc-cui-and-what-it-means/'>CUI</a>) as an indicator of whether contractors needed certification, believing all defense contractors should adhere to CMMC standards given growing threats.<br/><br/>Arrington highlights the massive cyber threats posed by nation-states like China, Russia, Iran, and North Korea, which she says are targeting U.S. defense contractors to steal key technologies and intellectual property. She points out that China has a dedicated cyber army aimed at making China the world’s economic superpower. Russia has shown its cyber capabilities already in interfering with elections. These adversaries are relentless in exploiting vulnerabilities across the entire supply chain.<br/><br/>For defense contractors bidding on DoD projects, Arrington authored a white paper that estimates per-employee costs for cybersecurity based on company size. She believes contractors should build these costs into project bidding. Arrington argues CMMC is now just about verifying NIST 800-171 compliance, not evaluating maturity, so she anticipates the name changing in the future. In preparation for <a href='https://www.kiteworks.com/risk-compliance-glossary/a-guide-to-cmmc-level-2-compliance-requirements/'>CMMC 2.0 Level 2</a> compliance audits, she recommends that contractors proactively get audits now rather than waiting until CMMC becomes a DIB mandate to address urgent threats.<br/><br/>Regarding <a href='https://www.kiteworks.com/risk-compliance-glossary/supply-chain-risk-management/'>supply chain risks</a>, Arrington indicates primes cannot fully see risks beyond tier-one suppliers. She urges primes to contractually require CMMC certification from all subcontractors to improve security against threats that can enter anywhere in the supply chain.<br/><br/>Arrington stresses that cyberattacks are constant and rapidly evolving. No organization can be 100% secure. However, by implementing standards like NIST 800-171, organizations can mitigate these risks. Adherence to cybersecurity frameworks is critical today, an important focus for national security as cyber threats continue escalating.<br/><br/><b>LinkedIn Profile:</b> <a href='https://www.linkedin.com/in/katie-arrington-a6949425/'>https://www.linkedin.com/in/katie-arrington-a6949425/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/13484815-katie-arrington-cybersecurity-in-an-era-of-national-adversaries.mp3" length="38157447" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13484815</guid>
    <pubDate>Mon, 28 Aug 2023 11:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/13484815/transcript" type="text/html" />
    <itunes:duration>3177</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/katie-arrington-a6949425/" img="https://storage.buzzsprout.com/6v241vhkh5t0p3ugj5mc7wyvn2sx">Katie Arrington</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Jean Bernier: Quantum AI: The Future of Cybersecurity</itunes:title>
    <title>Jean Bernier: Quantum AI: The Future of Cybersecurity</title>
    <itunes:summary><![CDATA[CEO and Entrepreneur Jean Phillip Bernier, the CEO of AnniQ and Spin Quantum Tech, shares his enthusiasm for AI and Quantum Computing technology advances. Bernier tracks the progress of Quantum Computing, especially IBM’s rapid development from a 5-qubit machine in 2017 to a prediction of a 100,000-qubit machine by 2033. The staggering quantum processing power, he believes, could unlock problem-solving potential beyond our current imagination.  Bernier spotlights the role of cloud computing i...]]></itunes:summary>
    <description><![CDATA[<p>CEO and Entrepreneur Jean Phillip Bernier, the CEO of AnniQ and Spin Quantum Tech, shares his enthusiasm for AI and Quantum Computing technology advances. Bernier tracks the progress of Quantum Computing, especially IBM’s rapid development from a 5-qubit machine in 2017 to a prediction of a 100,000-qubit machine by 2033. The staggering quantum processing power, he believes, could unlock problem-solving potential beyond our current imagination.<br/><br/>Bernier spotlights the role of cloud computing in democratizing technology. He reminisces about the early computing era when Sun Microsystems’ technologies were out of reach for many due to high costs. Cloud computing has flipped this narrative, transforming sophisticated, expensive technology tools to something affordable to organizations of virtually any size. Anyone with a credit card can delve into Quantum Computing capabilities. This, in turn, fosters a thriving community of quantum algorithm enthusiasts and learners.<br/><br/>Bernier explores three real-world applications of Quantum Computing: 1) business operations optimization, 2) AI algorithm acceleration, and 3) most significantly, a unique encryption method known as “entropic encryption.” This approach is a game-changer for <a href='https://www.kiteworks.com/cybersecurity-risk-management/rsa-2024-conference-eight-takeaways/'>data security</a>. Traditional encryption relies on the secrecy of a single key, which is under threat with quantum technology’s ability to consider all possible solutions simultaneously. Entropic encryption offers a fresh perspective by harnessing the inherent chaos and entropy of quantum states, hiding data in a sea of what appears to be random noise. The data is unreadable without the correct pattern, providing a new layer of security and a multiplicity of decryption avenues.<br/><br/>To make sense of the complex Quantum Computing world, Bernier draws parallels between Newton’s concept of gravity and the superposition principle in quantum mechanics. Just as gravity influenced falling objects before Newton quantified it, Quantum Computing uncovers existing, yet previously unexplored data patterns. At the same time, Bernier acknowledges the nascent state of Quantum Computing, referring to recent incidents of broken algorithms as a part of the technology’s learning curve.<br/><br/>When it comes to cybersecurity, Bernier predicts a convergence of AI and Quantum Computing. He shares about an ongoing project Spin Quantum Tech is managing with a U.S. company, where they are leveraging both Quantum Computing and AI to develop a novel anti-ransomware solution. The team is capitalizing on the power of Quantum Computing to rapidly explore a multitude of decryption keys, paired with AI’s predictive and learning capabilities, to swiftly identify and implement the correct decryption pattern. This fusion of technologies is expected to create a dynamic solution, capable of not only recovering information held ransom but doing so in a manner that eliminates the necessity for victims to negotiate with cybercriminals. The project is pioneering in its approach and could radically reshape the cybersecurity landscape, providing robust defenses against the ever-evolving threat of ransomware.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/jean-phillip-bernier-artificial-intelligenge-marketing-analytics-quantum-computing/'>https://www.linkedin.com/in/jean-phillip-bernier-artificial-intelligenge-marketing-analytics-quantum-computing/</a> <br/><br/>AnniQ: <a href='https://www.anniq.ai'>https://www.anniq.ai</a> <br/><br/>Spin Quantum Tech: <a href='https://spinqtech.com/'>https://spinqtech.com/</a> </p><p> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>CEO and Entrepreneur Jean Phillip Bernier, the CEO of AnniQ and Spin Quantum Tech, shares his enthusiasm for AI and Quantum Computing technology advances. Bernier tracks the progress of Quantum Computing, especially IBM’s rapid development from a 5-qubit machine in 2017 to a prediction of a 100,000-qubit machine by 2033. The staggering quantum processing power, he believes, could unlock problem-solving potential beyond our current imagination.<br/><br/>Bernier spotlights the role of cloud computing in democratizing technology. He reminisces about the early computing era when Sun Microsystems’ technologies were out of reach for many due to high costs. Cloud computing has flipped this narrative, transforming sophisticated, expensive technology tools to something affordable to organizations of virtually any size. Anyone with a credit card can delve into Quantum Computing capabilities. This, in turn, fosters a thriving community of quantum algorithm enthusiasts and learners.<br/><br/>Bernier explores three real-world applications of Quantum Computing: 1) business operations optimization, 2) AI algorithm acceleration, and 3) most significantly, a unique encryption method known as “entropic encryption.” This approach is a game-changer for <a href='https://www.kiteworks.com/cybersecurity-risk-management/rsa-2024-conference-eight-takeaways/'>data security</a>. Traditional encryption relies on the secrecy of a single key, which is under threat with quantum technology’s ability to consider all possible solutions simultaneously. Entropic encryption offers a fresh perspective by harnessing the inherent chaos and entropy of quantum states, hiding data in a sea of what appears to be random noise. The data is unreadable without the correct pattern, providing a new layer of security and a multiplicity of decryption avenues.<br/><br/>To make sense of the complex Quantum Computing world, Bernier draws parallels between Newton’s concept of gravity and the superposition principle in quantum mechanics. Just as gravity influenced falling objects before Newton quantified it, Quantum Computing uncovers existing, yet previously unexplored data patterns. At the same time, Bernier acknowledges the nascent state of Quantum Computing, referring to recent incidents of broken algorithms as a part of the technology’s learning curve.<br/><br/>When it comes to cybersecurity, Bernier predicts a convergence of AI and Quantum Computing. He shares about an ongoing project Spin Quantum Tech is managing with a U.S. company, where they are leveraging both Quantum Computing and AI to develop a novel anti-ransomware solution. The team is capitalizing on the power of Quantum Computing to rapidly explore a multitude of decryption keys, paired with AI’s predictive and learning capabilities, to swiftly identify and implement the correct decryption pattern. This fusion of technologies is expected to create a dynamic solution, capable of not only recovering information held ransom but doing so in a manner that eliminates the necessity for victims to negotiate with cybercriminals. The project is pioneering in its approach and could radically reshape the cybersecurity landscape, providing robust defenses against the ever-evolving threat of ransomware.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/jean-phillip-bernier-artificial-intelligenge-marketing-analytics-quantum-computing/'>https://www.linkedin.com/in/jean-phillip-bernier-artificial-intelligenge-marketing-analytics-quantum-computing/</a> <br/><br/>AnniQ: <a href='https://www.anniq.ai'>https://www.anniq.ai</a> <br/><br/>Spin Quantum Tech: <a href='https://spinqtech.com/'>https://spinqtech.com/</a> </p><p> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/13294348-jean-bernier-quantum-ai-the-future-of-cybersecurity.mp3" length="32836575" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13294348</guid>
    <pubDate>Wed, 26 Jul 2023 08:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/13294348/transcript" type="text/html" />
    <itunes:duration>2734</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/jean-phillip-bernier-artificial-intelligenge-marketing-analytics-quantum-computing/" img="https://storage.buzzsprout.com/47zchv47ey2cvd8earobp7sjkmws">Jean Phillip Bernier</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Billy Spears: Reciprocal and Cross-functional Cybersecurity Learning and Engagement</itunes:title>
    <title>Billy Spears: Reciprocal and Cross-functional Cybersecurity Learning and Engagement</title>
    <itunes:summary><![CDATA[Billy Spears, Teradata’s CISO since 2021, stresses reciprocal learning and community in cybersecurity in a Kitecast episode. He believes each interaction offers learning potential and guides his volunteering decisions based on potential mutual benefits.  Spears discusses the evolution of cybersecurity standards since his time at the Department of Homeland Security. Initial efforts focused on creating policies and frameworks, while today's challenge is managing an overabundance of inconsistent...]]></itunes:summary>
    <description><![CDATA[<p>Billy Spears, Teradata’s CISO since 2021, stresses reciprocal learning and community in cybersecurity in a Kitecast episode. He believes each interaction offers learning potential and guides his volunteering decisions based on potential mutual benefits.<br/><br/>Spears discusses the evolution of cybersecurity standards since his time at the Department of Homeland Security. Initial efforts focused on creating policies and frameworks, while today&apos;s challenge is managing an overabundance of inconsistent frameworks. Companies need to navigate from the least to most restrictive frameworks, factoring in their needs, risk tolerance, global economic influences, regional regulations, and data handling practices. Spears highlights that compliance, while important, is not the sole determinant of strong security.<br/><br/>Spears emphasizes resource and cost management in implementing new cybersecurity technologies. As a CISO, he believes in cross-functional thinking across IT systems, including product, engineering, and marketing. The impact of technology solutions on business decisions must be considered holistically, assessing financial aspects with procurement teams for a comprehensive impact evaluation.<br/><br/>The cybersecurity skills shortage continues, and Spears suggests three mitigation strategies. First, avoid bias in recruitment towards candidates who reflect hiring managers. Second, dispel the misconception that cybersecurity is solely technical and hire non-technical roles like auditors, project managers, and governance professionals. Finally, combat the retirement of senior leaders by thinking creatively in recruitment, promoting cross-training, community engagement, university partnerships, and succession planning.<br/><br/>Spears emphasizes understanding the variety in <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a>. It’s not a single product but an array of algorithms and models used for different outcomes. Awareness of these differences is critical in cybersecurity to discern the benefits and risks of each AI model, like understanding blockchain. He advocates for education as key to navigating AI’s advantages and potential hazards.<br/><br/>LinkedIn: <a href='https://gate.sc/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fbillyjspears%2F&amp;token=77217e-1-1689896284224'>www.linkedin.com/in/billyjspears/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Billy Spears, Teradata’s CISO since 2021, stresses reciprocal learning and community in cybersecurity in a Kitecast episode. He believes each interaction offers learning potential and guides his volunteering decisions based on potential mutual benefits.<br/><br/>Spears discusses the evolution of cybersecurity standards since his time at the Department of Homeland Security. Initial efforts focused on creating policies and frameworks, while today&apos;s challenge is managing an overabundance of inconsistent frameworks. Companies need to navigate from the least to most restrictive frameworks, factoring in their needs, risk tolerance, global economic influences, regional regulations, and data handling practices. Spears highlights that compliance, while important, is not the sole determinant of strong security.<br/><br/>Spears emphasizes resource and cost management in implementing new cybersecurity technologies. As a CISO, he believes in cross-functional thinking across IT systems, including product, engineering, and marketing. The impact of technology solutions on business decisions must be considered holistically, assessing financial aspects with procurement teams for a comprehensive impact evaluation.<br/><br/>The cybersecurity skills shortage continues, and Spears suggests three mitigation strategies. First, avoid bias in recruitment towards candidates who reflect hiring managers. Second, dispel the misconception that cybersecurity is solely technical and hire non-technical roles like auditors, project managers, and governance professionals. Finally, combat the retirement of senior leaders by thinking creatively in recruitment, promoting cross-training, community engagement, university partnerships, and succession planning.<br/><br/>Spears emphasizes understanding the variety in <a href='https://www.kiteworks.com/cybersecurity-risk-management/ai-for-the-good-and-bad-in-cybersecurity/'>AI</a>. It’s not a single product but an array of algorithms and models used for different outcomes. Awareness of these differences is critical in cybersecurity to discern the benefits and risks of each AI model, like understanding blockchain. He advocates for education as key to navigating AI’s advantages and potential hazards.<br/><br/>LinkedIn: <a href='https://gate.sc/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fbillyjspears%2F&amp;token=77217e-1-1689896284224'>www.linkedin.com/in/billyjspears/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/13260606-billy-spears-reciprocal-and-cross-functional-cybersecurity-learning-and-engagement.mp3" length="29310401" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13260606</guid>
    <pubDate>Thu, 20 Jul 2023 16:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/13260606/transcript" type="text/html" />
    <itunes:duration>2440</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/billyjspears/" img="https://storage.buzzsprout.com/omq7wk9r94jobz92xlb7hb2yrd8n">Billy Spears</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Eddie Doyle: Cybersecurity Evolutions: From the Network to Blockchains</itunes:title>
    <title>Eddie Doyle: Cybersecurity Evolutions: From the Network to Blockchains</title>
    <itunes:summary><![CDATA[Eddie Doyle, a renowned Security Strategist and Speaker at Check Point Software, has a fascinating career journey in the fast-paced field of cybersecurity. Doyle first understood the importance of cybersecurity in 2007 when he joined Check Point Software. Back then, it was a transformative phase; IT departments were just beginning to comprehend the concept of data centers to deal with the data influx post the dot-com era.   Interestingly, Doyle noticed that while these data centers were physi...]]></itunes:summary>
    <description><![CDATA[<p>Eddie Doyle, a renowned Security Strategist and Speaker at Check Point Software, has a fascinating career journey in the fast-paced field of cybersecurity. Doyle first understood the importance of cybersecurity in 2007 when he joined <a href='https://www.checkpoint.com/'>Check Point Software</a>. Back then, it was a transformative phase; IT departments were just beginning to comprehend the concept of data centers to deal with the data influx post the dot-com era. <br/><br/>Interestingly, Doyle noticed that while these data centers were physically half-empty, they consumed immense power and cooling resources. Doyle navigated the rapidly evolving cybersecurity landscape, witnessing the rise of threat actors who managed to bypass physical security measures by infiltrating systems virtually—a phenomenon triggered by data outsourcing. This necessitated the introduction of network security, a critical aspect in the digital world today. <br/><br/>As technology advances at an unprecedented pace today, so does the acceleration of cyber threats and associated risks. Doyle is a firm believer in the effectiveness of defensive strategies over offensive ones. He points to the legal and reputational hazards of aggressive cybersecurity measures and emphasizes the need to maintain a defensive stand. Despite the challenges of the Digital Age, Doyle is very optimistic about cybersecurity’s future, especially considering the emerging industry trends. He believes that security measures, if comprehensible and straightforward, are more likely to be implemented. <br/><br/>Doyle uses various anecdotes from his career to illustrate his points and provide more context. Innovation can be inherently insecure, despite cybersecurity’s primary goal to protect and secure. He shares a valuable insight from a military representative who advocated for the concept of “failing forward.” This idea implies that once a cybersecurity threat has been identified and contained, it’s essential to continue looking forward and adapt, a perspective different from the typical commercial response that halts after containment. <br/><br/>Doyle highlights the complexity of legal issues arising from offensive cybersecurity measures, such as retaliation against a cyberattack. He also provides insight into the Dark Web’s reality, discussing the proactive measures taken by his team to stay a step ahead of potential threats. Discussing the role of private industries and citizens in cybersecurity, Doyle notes that while industries aim to defend against cyberattacks through their products and services, they generally avoid an offensive stance due to legal implications. <br/><br/>Doyle paints a grim picture for cybersecurity professionals. Expanding upon the methodology of cybercrime syndicates who exploit system vulnerabilities, he highlights the diabolical precision of their operations, frequently helmed by psychopathic individuals launching phishing emails and targeting victims. <br/><br/>Doyle reiterates the expansive global reach of such cybercrime syndicates, pushing for the creation and implementation of strategic cybersecurity tools to fend off such sophisticated attacks. He additionally emphasizes the potential of blockchain and <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>artificial intelligence</a> in fortifying cybersecurity measures. Acknowledging the current crisis of misinformation and declining trust in media and leadership, Doyle identifies blockchain technology—with its transparent, decentralized system for verifying authenticity and securing personal information—as a groundbreaking solution and the benefits of safeguarding <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>personal data</a>.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/edwin-eddie-doyle/'></a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Eddie Doyle, a renowned Security Strategist and Speaker at Check Point Software, has a fascinating career journey in the fast-paced field of cybersecurity. Doyle first understood the importance of cybersecurity in 2007 when he joined <a href='https://www.checkpoint.com/'>Check Point Software</a>. Back then, it was a transformative phase; IT departments were just beginning to comprehend the concept of data centers to deal with the data influx post the dot-com era. <br/><br/>Interestingly, Doyle noticed that while these data centers were physically half-empty, they consumed immense power and cooling resources. Doyle navigated the rapidly evolving cybersecurity landscape, witnessing the rise of threat actors who managed to bypass physical security measures by infiltrating systems virtually—a phenomenon triggered by data outsourcing. This necessitated the introduction of network security, a critical aspect in the digital world today. <br/><br/>As technology advances at an unprecedented pace today, so does the acceleration of cyber threats and associated risks. Doyle is a firm believer in the effectiveness of defensive strategies over offensive ones. He points to the legal and reputational hazards of aggressive cybersecurity measures and emphasizes the need to maintain a defensive stand. Despite the challenges of the Digital Age, Doyle is very optimistic about cybersecurity’s future, especially considering the emerging industry trends. He believes that security measures, if comprehensible and straightforward, are more likely to be implemented. <br/><br/>Doyle uses various anecdotes from his career to illustrate his points and provide more context. Innovation can be inherently insecure, despite cybersecurity’s primary goal to protect and secure. He shares a valuable insight from a military representative who advocated for the concept of “failing forward.” This idea implies that once a cybersecurity threat has been identified and contained, it’s essential to continue looking forward and adapt, a perspective different from the typical commercial response that halts after containment. <br/><br/>Doyle highlights the complexity of legal issues arising from offensive cybersecurity measures, such as retaliation against a cyberattack. He also provides insight into the Dark Web’s reality, discussing the proactive measures taken by his team to stay a step ahead of potential threats. Discussing the role of private industries and citizens in cybersecurity, Doyle notes that while industries aim to defend against cyberattacks through their products and services, they generally avoid an offensive stance due to legal implications. <br/><br/>Doyle paints a grim picture for cybersecurity professionals. Expanding upon the methodology of cybercrime syndicates who exploit system vulnerabilities, he highlights the diabolical precision of their operations, frequently helmed by psychopathic individuals launching phishing emails and targeting victims. <br/><br/>Doyle reiterates the expansive global reach of such cybercrime syndicates, pushing for the creation and implementation of strategic cybersecurity tools to fend off such sophisticated attacks. He additionally emphasizes the potential of blockchain and <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>artificial intelligence</a> in fortifying cybersecurity measures. Acknowledging the current crisis of misinformation and declining trust in media and leadership, Doyle identifies blockchain technology—with its transparent, decentralized system for verifying authenticity and securing personal information—as a groundbreaking solution and the benefits of safeguarding <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>personal data</a>.<br/><br/>LinkedIn: <a href='https://www.linkedin.com/in/edwin-eddie-doyle/'></a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/13248100-eddie-doyle-cybersecurity-evolutions-from-the-network-to-blockchains.mp3" length="33950683" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13248100</guid>
    <pubDate>Tue, 18 Jul 2023 16:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/13248100/transcript" type="text/html" />
    <itunes:duration>2827</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/edwin-eddie-doyle/" img="https://storage.buzzsprout.com/14b4nvvf6xnwoyis6cfykzczhpa2">Eddie Doyle</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Dr. Rebecca Wynn: Cybersecurity Mentoring Promotes Risk Management</itunes:title>
    <title>Dr. Rebecca Wynn: Cybersecurity Mentoring Promotes Risk Management</title>
    <itunes:summary><![CDATA[Dr. Rebecca Wynn is the Global Chief Security Strategist and CISO at Click Solutions Group and Podcast Host for Soulful CXO and Threat Watch. In this Kitecast episode, Dr. Wynn discusses professional motivation, the importance of mentorship, and her unique approach to cybersecurity based on her diverse experience, including time in the U.S. military.   Dr. Wynn underscores the crucial role of mentors in professional development. She emphasizes that finding the right mentor depends on individu...]]></itunes:summary>
    <description><![CDATA[<p>Dr. Rebecca Wynn is the Global Chief Security Strategist and CISO at Click Solutions Group and Podcast Host for Soulful CXO and Threat Watch. In this Kitecast episode, Dr. Wynn discusses professional motivation, the importance of mentorship, and her unique approach to cybersecurity based on her diverse experience, including time in the U.S. military. <br/><br/>Dr. Wynn underscores the crucial role of mentors in professional development. She emphasizes that finding the right mentor depends on individual needs and suggests having multiple mentors for different aspects of one’s career. She differentiates mentors from sponsors within an organization where one works. A sponsor actively opens new opportunities for you and typically initially starts as a mentor. A sponsor is someone within your organization, whereas a mentor may or may not be a member of your same organization. When it comes to selecting mentors, Dr. Wynn states they should be individuals whose values resonate with those of the mentees.<br/><br/>For women in the cybersecurity field, Dr. Wynn encourages them to apply for positions, even if they have doubts about meeting all qualifications. She emphasizes that she personally ensures that all female applicants are reviewed, despite what HR algorithms might suggest. Dr. Wynn believes in conducting one-on-one discussions to identify the best position for the applicant, highlighting a recent success story where she helped an underselling candidate secure a managerial role in <a href='https://www.kiteworks.com/secure-file-transfer/security-governance/'>GRC</a> (governance, risk, and compliance). <br/><br/>Throughout the podcast, Dr. Wynn shares her personal experiences, including her time caring for her elderly parents, which made her reflect on her core values and approach to work. She stresses the importance of maintaining authenticity and staying true to oneself. She also speaks about how her military background influenced her approach to cybersecurity, particularly her emphasis on GRC frameworks. According to Dr. Wynn, these frameworks allow for the fast mitigation, detection, and resolution of attacks.<br/><br/>When it comes to <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a>, Dr. Wynn champions the concept of <a href='https://www.kiteworks.com/risk-compliance-glossary/privacy-by-design/'>Privacy by Design</a>, which advocates for privacy measures to be built into products and systems from their inception, rather than added on afterwards. She emphasizes the idea of data having an expiration date, arguing that companies should not be allowed to keep personal data indefinitely without explicit consent. She suggests that tagging data upon creation with an expiration date could serve as a practical solution. This aligns closely with Kiteworks’ approach using <a href='https://www.kiteworks.com/risk-compliance-glossary/digital-rights-management/'>digital rights management</a> in concert with advanced security and compliance. <br/><br/><b>LinkedIn Profile: </b><a href='https://www.linkedin.com/in/rebeccawynncissp/'>https://www.linkedin.com/in/rebeccawynncissp/</a> <br/><br/><b>The Soulful CXO Podcast: </b><a href='https://soulfulcxo.com/'>https://soulfulcxo.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Dr. Rebecca Wynn is the Global Chief Security Strategist and CISO at Click Solutions Group and Podcast Host for Soulful CXO and Threat Watch. In this Kitecast episode, Dr. Wynn discusses professional motivation, the importance of mentorship, and her unique approach to cybersecurity based on her diverse experience, including time in the U.S. military. <br/><br/>Dr. Wynn underscores the crucial role of mentors in professional development. She emphasizes that finding the right mentor depends on individual needs and suggests having multiple mentors for different aspects of one’s career. She differentiates mentors from sponsors within an organization where one works. A sponsor actively opens new opportunities for you and typically initially starts as a mentor. A sponsor is someone within your organization, whereas a mentor may or may not be a member of your same organization. When it comes to selecting mentors, Dr. Wynn states they should be individuals whose values resonate with those of the mentees.<br/><br/>For women in the cybersecurity field, Dr. Wynn encourages them to apply for positions, even if they have doubts about meeting all qualifications. She emphasizes that she personally ensures that all female applicants are reviewed, despite what HR algorithms might suggest. Dr. Wynn believes in conducting one-on-one discussions to identify the best position for the applicant, highlighting a recent success story where she helped an underselling candidate secure a managerial role in <a href='https://www.kiteworks.com/secure-file-transfer/security-governance/'>GRC</a> (governance, risk, and compliance). <br/><br/>Throughout the podcast, Dr. Wynn shares her personal experiences, including her time caring for her elderly parents, which made her reflect on her core values and approach to work. She stresses the importance of maintaining authenticity and staying true to oneself. She also speaks about how her military background influenced her approach to cybersecurity, particularly her emphasis on GRC frameworks. According to Dr. Wynn, these frameworks allow for the fast mitigation, detection, and resolution of attacks.<br/><br/>When it comes to <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a>, Dr. Wynn champions the concept of <a href='https://www.kiteworks.com/risk-compliance-glossary/privacy-by-design/'>Privacy by Design</a>, which advocates for privacy measures to be built into products and systems from their inception, rather than added on afterwards. She emphasizes the idea of data having an expiration date, arguing that companies should not be allowed to keep personal data indefinitely without explicit consent. She suggests that tagging data upon creation with an expiration date could serve as a practical solution. This aligns closely with Kiteworks’ approach using <a href='https://www.kiteworks.com/risk-compliance-glossary/digital-rights-management/'>digital rights management</a> in concert with advanced security and compliance. <br/><br/><b>LinkedIn Profile: </b><a href='https://www.linkedin.com/in/rebeccawynncissp/'>https://www.linkedin.com/in/rebeccawynncissp/</a> <br/><br/><b>The Soulful CXO Podcast: </b><a href='https://soulfulcxo.com/'>https://soulfulcxo.com/</a> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/13238563-dr-rebecca-wynn-cybersecurity-mentoring-promotes-risk-management.mp3" length="32056343" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13238563</guid>
    <pubDate>Mon, 17 Jul 2023 10:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/13238563/transcript" type="text/html" />
    <itunes:duration>2669</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/rebeccawynncissp/" img="https://storage.buzzsprout.com/5qcdgx5pvmaq67lmzmzub2hysvkb">Dr. Rebecca Wynn</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Albert E. Whale: Against-the-Grain Cybersecurity for Managing Cyber Risk </itunes:title>
    <title>Albert E. Whale: Against-the-Grain Cybersecurity for Managing Cyber Risk </title>
    <itunes:summary><![CDATA[Albert E. Whale is a serial entrepreneur with over 30 years of experience in cybersecurity and risk management. He is the Founder and CEO of IT Security Solutions, which helps businesses secure their environments using ITS Safe™, an appliance that delivers real-time continuous protection of networks, printers, servers, clouds, modems and routers, and other equipment. Albert is a Global Ambassador at the Napoleon Hill Institute where he supports other professionals in their personal developmen...]]></itunes:summary>
    <description><![CDATA[<p>Albert E. Whale is a serial entrepreneur with over 30 years of experience in cybersecurity and risk management. He is the Founder and CEO of IT Security Solutions, which helps businesses secure their environments using ITS Safe™, an appliance that delivers real-time continuous protection of networks, printers, servers, clouds, modems and routers, and other equipment. Albert is a Global Ambassador at the Napoleon Hill Institute where he supports other professionals in their personal development. He also is a Startup Mentor at the Founder Institute, guiding entrepreneurs as they build their businesses. He is the author and coauthor of two award-winning books: #HACKED and #HACKED2.</p><p>In this Kitecast episode, Albert asserts that organizations must be more vigilant about <a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>third-party risk</a>. He also argues that <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance regulations</a> aren’t the panacea many believe them to be when it comes to thwarting cyber threats and minimizing cyber risk. Going against the grain, he argues that overemphasis on compliance regulations may leave organizations more vulnerable to cyber threats. Point-in-time security measures, which are reflective of compliance regulations, need to be replaced with continuous monitoring and scanning. Finally, Albert recommends that CISOs and CSOs abandon their efforts to adopt business speak when articulating cyber risk to executives and boards of directors. Instead, Albert contends they need to retain their specialist language to ensure conveyance of cyber risk. </p><p><b>LinkedIn Profile: </b><a href='http://www.linkedin.com/in/albertwhale'>www.linkedin.com/in/albertwhale</a><b> </b></p><p><b>IT Security Solutions:</b> <a href='http://www.it-security-solutions.com/'>http://www.it-security-solutions.com/</a> </p><p><b>Published Books:</b> </p><p><a href='https://www.amazon.com/HACKED-Practical-Cybersecurity-Personal-Information-ebook/dp/B09TJGD545/ref=sr_1_1'>#HACKED: 10 Practice Cybersecurity Tips to Help Protect Personal or Business Information</a></p><p><a href='https://www.amazon.com/HACKED2-Practical-Guidance-Dealing-Business-ebook/dp/B0BH27ZBNW/ref=sr_1_2'>#HACKED2: Practice Guidance for Dealing with Threats to Your Business and Privacy</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Albert E. Whale is a serial entrepreneur with over 30 years of experience in cybersecurity and risk management. He is the Founder and CEO of IT Security Solutions, which helps businesses secure their environments using ITS Safe™, an appliance that delivers real-time continuous protection of networks, printers, servers, clouds, modems and routers, and other equipment. Albert is a Global Ambassador at the Napoleon Hill Institute where he supports other professionals in their personal development. He also is a Startup Mentor at the Founder Institute, guiding entrepreneurs as they build their businesses. He is the author and coauthor of two award-winning books: #HACKED and #HACKED2.</p><p>In this Kitecast episode, Albert asserts that organizations must be more vigilant about <a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>third-party risk</a>. He also argues that <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance regulations</a> aren’t the panacea many believe them to be when it comes to thwarting cyber threats and minimizing cyber risk. Going against the grain, he argues that overemphasis on compliance regulations may leave organizations more vulnerable to cyber threats. Point-in-time security measures, which are reflective of compliance regulations, need to be replaced with continuous monitoring and scanning. Finally, Albert recommends that CISOs and CSOs abandon their efforts to adopt business speak when articulating cyber risk to executives and boards of directors. Instead, Albert contends they need to retain their specialist language to ensure conveyance of cyber risk. </p><p><b>LinkedIn Profile: </b><a href='http://www.linkedin.com/in/albertwhale'>www.linkedin.com/in/albertwhale</a><b> </b></p><p><b>IT Security Solutions:</b> <a href='http://www.it-security-solutions.com/'>http://www.it-security-solutions.com/</a> </p><p><b>Published Books:</b> </p><p><a href='https://www.amazon.com/HACKED-Practical-Cybersecurity-Personal-Information-ebook/dp/B09TJGD545/ref=sr_1_1'>#HACKED: 10 Practice Cybersecurity Tips to Help Protect Personal or Business Information</a></p><p><a href='https://www.amazon.com/HACKED2-Practical-Guidance-Dealing-Business-ebook/dp/B0BH27ZBNW/ref=sr_1_2'>#HACKED2: Practice Guidance for Dealing with Threats to Your Business and Privacy</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/13000713-albert-e-whale-against-the-grain-cybersecurity-for-managing-cyber-risk.mp3" length="31849637" type="audio/mpeg" />
    <itunes:author>Albert E. Whale</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13000713</guid>
    <pubDate>Wed, 07 Jun 2023 21:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/13000713/transcript" type="text/html" />
    <itunes:duration>2652</itunes:duration>
    <itunes:keywords>Cyberattacks, Cyberthreats, cybersecurity, compliance, standards, securitymonitoring</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/albertwhale" img="https://storage.buzzsprout.com/fv0izne6sbfp68wm6ad1d0henqtf">Albert Whale</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Mark Lynd: Connecting GRC With DRM</itunes:title>
    <title>Mark Lynd: Connecting GRC With DRM</title>
    <itunes:summary><![CDATA[Mark Lynd is a former CEO, CIO, CTO, and CISO and currently serves as the Head of Digital Business at Netsync that employs a consultative and collaborative approach to help organizations architect innovative technology solutions that meet business needs. He is an author, frequent speaker on topics related to AI, IoT, and cybersecurity, is ranked in the Top 1 Globally for Security by Thinkers360, was named an Ernst &amp; Young Entrepreneur of the Year for the Southwest Region, and is frequentl...]]></itunes:summary>
    <description><![CDATA[<p>Mark Lynd is a former CEO, CIO, CTO, and CISO and currently serves as the Head of Digital Business at Netsync that employs a consultative and collaborative approach to help organizations architect innovative technology solutions that meet business needs. He is an author, frequent speaker on topics related to AI, IoT, and cybersecurity, is ranked in the Top 1 Globally for Security by Thinkers360, was named an Ernst &amp; Young Entrepreneur of the Year for the Southwest Region, and is frequently interviewed by and quoted in publications such as The Wall Street Journal, InformationWeek, and others. Before his time in the private sector, Mark served in the U.S. Army’s 3rd Ranger Battalion and 82nd Airborne Division.</p><p>In this Kitecast episode, Mark discusses the significance of <a href='https://www.kiteworks.com/risk-compliance-glossary/governance-risk-compliance/'>GRC</a> (Governance, Risk Management, and Compliance) in today’s technology landscape, which is being propelled by accelerated evolution in cyber threats, third-party risks, and data security issues in the cloud. One outcome is that organizations must prioritize GRC strategies rather than making them an afterthought. In addition, Mark argues that Digital Rights Management (<a href='https://www.kiteworks.com/risk-compliance-glossary/digital-rights-management/'>DRM</a>) is critical when implementing a GRC strategy that addresses a <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/'>zero-trust model</a> focused on protecting sensitive content.  <br/><br/>Beyond connecting GRC with DRM, Mark also speaks about artificial intelligence (<a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>AI</a>), why it is important to teach cybersecurity life skills to teenagers, what he will be covering in his next book, how lack of DRM governance in the higher education sector is exposing national secrets, and more. This is an insightful discussion for anyone interested in learning from a proven leader who is dedicated to digital transformation and cybersecurity.<br/><br/></p><p><b>LinkedIn Profile: </b><a href='http://www.linkedin.com/in/marklynd'>www.linkedin.com/in/marklynd</a> </p><p><b>Netsync:</b> <a href='http://www.netsync.com'>www.netsync.com</a> </p><p><b>Published Book: </b><a href='https://www.amazon.com/Cybersecurity-Life-Skills-Teens-cybersecurity-ebook/dp/B0C36LJJF7'>Cyber Security Life Skills for Teens: Life Skills for the Digital Age</a> </p><p> </p><p> </p><p> </p><p> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Mark Lynd is a former CEO, CIO, CTO, and CISO and currently serves as the Head of Digital Business at Netsync that employs a consultative and collaborative approach to help organizations architect innovative technology solutions that meet business needs. He is an author, frequent speaker on topics related to AI, IoT, and cybersecurity, is ranked in the Top 1 Globally for Security by Thinkers360, was named an Ernst &amp; Young Entrepreneur of the Year for the Southwest Region, and is frequently interviewed by and quoted in publications such as The Wall Street Journal, InformationWeek, and others. Before his time in the private sector, Mark served in the U.S. Army’s 3rd Ranger Battalion and 82nd Airborne Division.</p><p>In this Kitecast episode, Mark discusses the significance of <a href='https://www.kiteworks.com/risk-compliance-glossary/governance-risk-compliance/'>GRC</a> (Governance, Risk Management, and Compliance) in today’s technology landscape, which is being propelled by accelerated evolution in cyber threats, third-party risks, and data security issues in the cloud. One outcome is that organizations must prioritize GRC strategies rather than making them an afterthought. In addition, Mark argues that Digital Rights Management (<a href='https://www.kiteworks.com/risk-compliance-glossary/digital-rights-management/'>DRM</a>) is critical when implementing a GRC strategy that addresses a <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/'>zero-trust model</a> focused on protecting sensitive content.  <br/><br/>Beyond connecting GRC with DRM, Mark also speaks about artificial intelligence (<a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>AI</a>), why it is important to teach cybersecurity life skills to teenagers, what he will be covering in his next book, how lack of DRM governance in the higher education sector is exposing national secrets, and more. This is an insightful discussion for anyone interested in learning from a proven leader who is dedicated to digital transformation and cybersecurity.<br/><br/></p><p><b>LinkedIn Profile: </b><a href='http://www.linkedin.com/in/marklynd'>www.linkedin.com/in/marklynd</a> </p><p><b>Netsync:</b> <a href='http://www.netsync.com'>www.netsync.com</a> </p><p><b>Published Book: </b><a href='https://www.amazon.com/Cybersecurity-Life-Skills-Teens-cybersecurity-ebook/dp/B0C36LJJF7'>Cyber Security Life Skills for Teens: Life Skills for the Digital Age</a> </p><p> </p><p> </p><p> </p><p> </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/12928251-mark-lynd-connecting-grc-with-drm.mp3" length="31712609" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12928251</guid>
    <pubDate>Fri, 26 May 2023 15:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/12928251/transcript" type="text/html" />
    <itunes:duration>2640</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/marklynd" img="https://storage.buzzsprout.com/l5znlrkm3c1t0tii1v1v5h2z18it">Mark Lynd</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Richard Stiennon: The Good, Bad, and Ugly About AI Cybersecurity</itunes:title>
    <title>Richard Stiennon: The Good, Bad, and Ugly About AI Cybersecurity</title>
    <itunes:summary><![CDATA[Richard Stiennon, a cybersecurity pioneer, author, and industry executive, spoke about the hottest trending topic of our day in this Kitecast episode: artificial intelligence (AI). He currently serves as the Chief Research Analyst at IT-Harvest, a research organization he founded in 2017, which provides access to data on more than 3,318 cybersecurity vendors. To streamline and automate the compilation of data, Stiennon explains how IT-Harvest is using ChatGPT 4.0. On that note, Stiennon discu...]]></itunes:summary>
    <description><![CDATA[<p>Richard Stiennon, a cybersecurity pioneer, author, and industry executive, spoke about the hottest trending topic of our day in this Kitecast episode: artificial intelligence (AI). He currently serves as the Chief Research Analyst at IT-Harvest, a research organization he founded in 2017, which provides access to data on more than 3,318 cybersecurity vendors. To streamline and automate the compilation of data, Stiennon explains how IT-Harvest is using ChatGPT 4.0. On that note, Stiennon discusses how AI is transforming cybersecurity—both for the good and the bad. </p><p>Cybercriminals are finding ways around guardrails instituted in commercially available <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>AI</a> solutions like ChatGPT and Bard or simply developing their own to accelerate the development of <a href='https://www.kiteworks.com/risk-compliance-glossary/malware-based-attacks/'>malware</a>, automate <a href='https://www.kiteworks.com/risk-compliance-glossary/comprehensive-guide-to-advanced-threat-protection-atp/'>advanced persistent threats</a>, and generate human-like <a href='https://www.kiteworks.com/risk-compliance-glossary/phishing-attacks/'>phishing</a> and spear-phishing attacks. At the same time, cybersecurity vendors are rapidly adding new AI capabilities to their product portfolios that improve the efficacy and efficiency of threat prevention, incident response, threat correlation and analysis, and more. Beyond the topic of AI, Stiennon addressed his thoughts on the role of cybersecurity leaders and subject-matter experts when it comes to serving as a board member or advisor. As a board member and advisor for a number of cybersecurity and compliance companies, he argues that organizations need to rethink how cybersecurity is discussed at the business level. Rather than teaching CISOs to speak the language of the business, they need to speak the language of cybersecurity and teach boards to understand cybersecurity risk through the lens of cybersecurity. <br/><br/></p><p><b>LinkedIn Profile: </b><a href='http://www.linkedin.com/in/stiennon/'>www.linkedin.com/in/stiennon/</a> </p><p><br/><b>IT-Harvest: </b><a href='http://www.it-harvest.com'>www.it-harvest.com</a> </p><p><br/><b>Published Books:</b></p><p><em>Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security</em></p><p><a href='https://www.amazon.com/Net-Zeros-Ones-Promotes-Sustainability-ebook/dp/B0BN72M57X/ref=sr_1_3'>https://www.amazon.com/Net-Zeros-Ones-Promotes-Sustainability-ebook/dp/B0BN72M57X/ref=sr_1_3</a></p><p><em>Secure Cloud Transformation: The CIO&apos;s Journey</em></p><p><a href='https://www.amazon.com/Secure-Cloud-Transformation-CIOS-Journey/dp/1945254203'>https://www.amazon.com/Secure-Cloud-Transformation-CIOS-Journey/dp/1945254203</a></p><p><em>UP and to the RIGHT: Strategy and Tactics of Analyst Influence</em></p><p><a href='https://www.amazon.com/UP-RIGHT-Strategy-Influence-influence/dp/0985460709'>https://www.amazon.com/UP-RIGHT-Strategy-Influence-influence/dp/0985460709</a></p><p><em>There Will Be Cyberware: How the Move to Network-centric War Fighting Has Set the Stage for Cyberwar</em></p><p><a href='https://www.amazon.com/There-Will-Be-Cyberwar-Network-Centric/dp/0985460784/'>https://www.amazon.com/There-Will-Be-Cyberwar-Network-Centric/dp/0985460784/</a></p><p><em>Surviving Cyber War</em></p><p><a href='https://www.amazon.com/Surviving-Cyberwar-Richard-Stiennon/dp/1605906883/'>https://www.amazon.com/Surviving-Cyberwar-Richard-Stiennon/dp/1605906883/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Richard Stiennon, a cybersecurity pioneer, author, and industry executive, spoke about the hottest trending topic of our day in this Kitecast episode: artificial intelligence (AI). He currently serves as the Chief Research Analyst at IT-Harvest, a research organization he founded in 2017, which provides access to data on more than 3,318 cybersecurity vendors. To streamline and automate the compilation of data, Stiennon explains how IT-Harvest is using ChatGPT 4.0. On that note, Stiennon discusses how AI is transforming cybersecurity—both for the good and the bad. </p><p>Cybercriminals are finding ways around guardrails instituted in commercially available <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>AI</a> solutions like ChatGPT and Bard or simply developing their own to accelerate the development of <a href='https://www.kiteworks.com/risk-compliance-glossary/malware-based-attacks/'>malware</a>, automate <a href='https://www.kiteworks.com/risk-compliance-glossary/comprehensive-guide-to-advanced-threat-protection-atp/'>advanced persistent threats</a>, and generate human-like <a href='https://www.kiteworks.com/risk-compliance-glossary/phishing-attacks/'>phishing</a> and spear-phishing attacks. At the same time, cybersecurity vendors are rapidly adding new AI capabilities to their product portfolios that improve the efficacy and efficiency of threat prevention, incident response, threat correlation and analysis, and more. Beyond the topic of AI, Stiennon addressed his thoughts on the role of cybersecurity leaders and subject-matter experts when it comes to serving as a board member or advisor. As a board member and advisor for a number of cybersecurity and compliance companies, he argues that organizations need to rethink how cybersecurity is discussed at the business level. Rather than teaching CISOs to speak the language of the business, they need to speak the language of cybersecurity and teach boards to understand cybersecurity risk through the lens of cybersecurity. <br/><br/></p><p><b>LinkedIn Profile: </b><a href='http://www.linkedin.com/in/stiennon/'>www.linkedin.com/in/stiennon/</a> </p><p><br/><b>IT-Harvest: </b><a href='http://www.it-harvest.com'>www.it-harvest.com</a> </p><p><br/><b>Published Books:</b></p><p><em>Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security</em></p><p><a href='https://www.amazon.com/Net-Zeros-Ones-Promotes-Sustainability-ebook/dp/B0BN72M57X/ref=sr_1_3'>https://www.amazon.com/Net-Zeros-Ones-Promotes-Sustainability-ebook/dp/B0BN72M57X/ref=sr_1_3</a></p><p><em>Secure Cloud Transformation: The CIO&apos;s Journey</em></p><p><a href='https://www.amazon.com/Secure-Cloud-Transformation-CIOS-Journey/dp/1945254203'>https://www.amazon.com/Secure-Cloud-Transformation-CIOS-Journey/dp/1945254203</a></p><p><em>UP and to the RIGHT: Strategy and Tactics of Analyst Influence</em></p><p><a href='https://www.amazon.com/UP-RIGHT-Strategy-Influence-influence/dp/0985460709'>https://www.amazon.com/UP-RIGHT-Strategy-Influence-influence/dp/0985460709</a></p><p><em>There Will Be Cyberware: How the Move to Network-centric War Fighting Has Set the Stage for Cyberwar</em></p><p><a href='https://www.amazon.com/There-Will-Be-Cyberwar-Network-Centric/dp/0985460784/'>https://www.amazon.com/There-Will-Be-Cyberwar-Network-Centric/dp/0985460784/</a></p><p><em>Surviving Cyber War</em></p><p><a href='https://www.amazon.com/Surviving-Cyberwar-Richard-Stiennon/dp/1605906883/'>https://www.amazon.com/Surviving-Cyberwar-Richard-Stiennon/dp/1605906883/</a></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/12773999-richard-stiennon-the-good-bad-and-ugly-about-ai-cybersecurity.mp3" length="32273610" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12773999</guid>
    <pubDate>Tue, 02 May 2023 21:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/12773999/transcript" type="text/html" />
    <itunes:duration>2687</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="http://www.linkedin.com/in/stiennon/" img="https://storage.buzzsprout.com/guagjz9nu0ot957j5go0uwfomiep">Richard Stiennon</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Michael Redman: Mapping Out Your CMMC Roadmap: Insights &amp; Tips</itunes:title>
    <title>Michael Redman: Mapping Out Your CMMC Roadmap: Insights &amp; Tips</title>
    <itunes:summary><![CDATA[In this Kitecast episode, Michael Redman, who is a Knowledge &amp; Learning Management Instructor at Schellman and is a subject-matter expert in various cybersecurity and compliance standards, spoke at length about Cybersecurity Maturity Model Certification (CMMC), the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF), and other topics that are pressing concerns for the Defense Industrial base (DIB). Redman asserts that businesses must approach cybersecurity as...]]></itunes:summary>
    <description><![CDATA[<p>In this Kitecast episode, Michael Redman, who is a Knowledge &amp; Learning Management Instructor at Schellman and is a subject-matter expert in various cybersecurity and compliance standards, spoke at length about <a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc/'>Cybersecurity Maturity Model Certification (CMMC)</a>, the <a href='https://www.kiteworks.com/risk-compliance-glossary/what-is-the-nist-cybersecurity-framework/'>National Institute of Standards and Technology Cybersecurity Framework</a> (NIST CSF), and other topics that are pressing concerns for the Defense Industrial base (DIB). Redman asserts that businesses must approach cybersecurity as a risk management issue, just like any other business risk. Organizations must take proactive measures to mitigate cybersecurity risks and ensure they have a robust cybersecurity program in place.</p><p>Part of the podcast discussion with Redman involved the role of <a href='https://www.kiteworks.com/cmmc-compliance/uncovering-the-benefits-of-working-with-a-c3pao-organization-for-cmmc-2-0-compliance/'>Certified Third Party Assessor Organizations</a> (C3PAOs) and CMMC compliance. He explains that C3PAOs are an interesting entity and are being asked to shoulder a whole lot of responsibility with not a lot of reward. C3PAOs are swimming in murky water and need to be patient. As we proceed closer to <a href='https://www.kiteworks.com/cmmc-compliance/a-roadmap-for-cmmc-2-0-compliance-for-dod-contractors/'>CMMC implementation</a>, the good, better, and best 3CPAOs will rise to the top, and the ones that aren’t fully invested will focus their energies elsewhere.<br/><br/>Midway through the podcast, Redman spoke about the CMMC Standards Council, of which he is a part. He explains that the Standards Council is working to create an objective matrix that can be used to rate C3PAOs objectively. He believes this will help organizations choose the right C3PAO based on their needs and budget. The alpha version of the objective matrix was just completed and is circulating among subject-matter experts for feedback.<br/><br/>Redman also talks about the importance of having a risk-based approach to cybersecurity. He suggests that organizations need to identify their high-value assets and focus on protecting them. He believes a risk-based approach is more effective than a compliance-based approach, as it helps organizations focus on what really matters. He emphasizes the importance of having a cybersecurity program aligned with the business objectives of the organization and one that accounts for <a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>third-party risk management</a> (TPRM).\<br/><br/>Digital transformation is driving dramatic changes in cybersecurity. The confluence of cybersecurity and compliance demands a risk management model, and one focused on keeping <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>private data private</a>. Organizations can no longer view cybersecurity and compliance in separate silos but rather as intertwined and predictors of risk. Kiteworks’ content-defined zero-trust approach, which relies on the <a href='https://www.kiteworks.com/platform/private-content-network/'>Kiteworks Private Content Network</a>, is used by thousands of organizations around the world to unify security and compliance approaches to sensitive content communications while wrapping them in a <a href='https://www.kiteworks.com/product-brief-kiteworks-hardened-virtual-appliance-provides-multiple-security-layers-to-dramatically-reduce-vulnerability-exploit-and-impact-severity/'>hardened virtual appliance</a>. <br/><br/>For more on Schellman, visit <a href='https://gate.sc/?url=https%3A%2F%2Fwww.schellman.com%2F&amp;token=2be6c1-1-1679693271121'>www.schellman.com/</a>.</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>In this Kitecast episode, Michael Redman, who is a Knowledge &amp; Learning Management Instructor at Schellman and is a subject-matter expert in various cybersecurity and compliance standards, spoke at length about <a href='https://www.kiteworks.com/risk-compliance-glossary/cmmc/'>Cybersecurity Maturity Model Certification (CMMC)</a>, the <a href='https://www.kiteworks.com/risk-compliance-glossary/what-is-the-nist-cybersecurity-framework/'>National Institute of Standards and Technology Cybersecurity Framework</a> (NIST CSF), and other topics that are pressing concerns for the Defense Industrial base (DIB). Redman asserts that businesses must approach cybersecurity as a risk management issue, just like any other business risk. Organizations must take proactive measures to mitigate cybersecurity risks and ensure they have a robust cybersecurity program in place.</p><p>Part of the podcast discussion with Redman involved the role of <a href='https://www.kiteworks.com/cmmc-compliance/uncovering-the-benefits-of-working-with-a-c3pao-organization-for-cmmc-2-0-compliance/'>Certified Third Party Assessor Organizations</a> (C3PAOs) and CMMC compliance. He explains that C3PAOs are an interesting entity and are being asked to shoulder a whole lot of responsibility with not a lot of reward. C3PAOs are swimming in murky water and need to be patient. As we proceed closer to <a href='https://www.kiteworks.com/cmmc-compliance/a-roadmap-for-cmmc-2-0-compliance-for-dod-contractors/'>CMMC implementation</a>, the good, better, and best 3CPAOs will rise to the top, and the ones that aren’t fully invested will focus their energies elsewhere.<br/><br/>Midway through the podcast, Redman spoke about the CMMC Standards Council, of which he is a part. He explains that the Standards Council is working to create an objective matrix that can be used to rate C3PAOs objectively. He believes this will help organizations choose the right C3PAO based on their needs and budget. The alpha version of the objective matrix was just completed and is circulating among subject-matter experts for feedback.<br/><br/>Redman also talks about the importance of having a risk-based approach to cybersecurity. He suggests that organizations need to identify their high-value assets and focus on protecting them. He believes a risk-based approach is more effective than a compliance-based approach, as it helps organizations focus on what really matters. He emphasizes the importance of having a cybersecurity program aligned with the business objectives of the organization and one that accounts for <a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>third-party risk management</a> (TPRM).\<br/><br/>Digital transformation is driving dramatic changes in cybersecurity. The confluence of cybersecurity and compliance demands a risk management model, and one focused on keeping <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>private data private</a>. Organizations can no longer view cybersecurity and compliance in separate silos but rather as intertwined and predictors of risk. Kiteworks’ content-defined zero-trust approach, which relies on the <a href='https://www.kiteworks.com/platform/private-content-network/'>Kiteworks Private Content Network</a>, is used by thousands of organizations around the world to unify security and compliance approaches to sensitive content communications while wrapping them in a <a href='https://www.kiteworks.com/product-brief-kiteworks-hardened-virtual-appliance-provides-multiple-security-layers-to-dramatically-reduce-vulnerability-exploit-and-impact-severity/'>hardened virtual appliance</a>. <br/><br/>For more on Schellman, visit <a href='https://gate.sc/?url=https%3A%2F%2Fwww.schellman.com%2F&amp;token=2be6c1-1-1679693271121'>www.schellman.com/</a>.</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/12510819-michael-redman-mapping-out-your-cmmc-roadmap-insights-tips.mp3" length="32292982" type="audio/mpeg" />
    <itunes:author>Michael Redman</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12510819</guid>
    <pubDate>Fri, 24 Mar 2023 14:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/12510819/transcript" type="text/html" />
    <itunes:duration>2689</itunes:duration>
    <itunes:keywords>Cybersecurity, CMMC, CMMC Compliance, CMMC 2.0, CyberThreats, Cyberattacks, Compliance, ITGovernance</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/mcharlesredman/" img="https://storage.buzzsprout.com/7h8bx6tbo994how0or8hn07kkvp7">Michael Redman</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Chet Hayes: Data Privacy and Governance in the Public Sector</itunes:title>
    <title>Chet Hayes: Data Privacy and Governance in the Public Sector</title>
    <itunes:summary><![CDATA[Vertosoft's CTO Chet Hayes is a technologist at heart and has kept his finger on the pulse of the public sector for much of his career. Early on in his career, he cut his teeth in technical software architecture roles in organizations such as Sun Microsystems, Hughes Information Technology, and BEA Systems. Based in Virginia, much of his customer-facing work was with the federal government. For the past 15 years, Hayes has worked in various senior leadership positions serving the public secto...]]></itunes:summary>
    <description><![CDATA[<p>Vertosoft&apos;s CTO Chet Hayes is a technologist at heart and has kept his finger on the pulse of the public sector for much of his career. Early on in his career, he cut his teeth in technical software architecture roles in organizations such as Sun Microsystems, Hughes Information Technology, and BEA Systems. Based in Virginia, much of his customer-facing work was with the federal government. For the past 15 years, Hayes has worked in various senior leadership positions serving the public sector.</p><p>While government organizations face many of the same technology challenges as private sector organizations, they also have unique requirements. Federal government agencies and their supply chains, in particular, tend to be ahead of the private sector when it comes to the use of cybersecurity frameworks. In this Kitecast episode, Hayes discusses how the <a href='https://www.kiteworks.com/risk-compliance-glossary/what-is-the-nist-cybersecurity-framework/'>NIST CSF</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/understanding-cmmc-2-0-levels-a-comprehensive-guide-for-dod-contractors/'>CMMC 2.0</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/fedramp/'>FedRAMP Authorization</a>, and other federal cybersecurity standards are driving the adoption of <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/'>zero trust</a> and other security best practices. Discover what he thinks are some of the biggest security opportunities and challenges facing the government sector today and how <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a> exposure risks play into both components by listening to this podcast.<br/><br/>For more on Vertosoft, visit www.vertosoft.com.<br/><br/>For more on Chet Hayes, visit www.linkedin.com/in/chetdhayes.<br/><br/></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Vertosoft&apos;s CTO Chet Hayes is a technologist at heart and has kept his finger on the pulse of the public sector for much of his career. Early on in his career, he cut his teeth in technical software architecture roles in organizations such as Sun Microsystems, Hughes Information Technology, and BEA Systems. Based in Virginia, much of his customer-facing work was with the federal government. For the past 15 years, Hayes has worked in various senior leadership positions serving the public sector.</p><p>While government organizations face many of the same technology challenges as private sector organizations, they also have unique requirements. Federal government agencies and their supply chains, in particular, tend to be ahead of the private sector when it comes to the use of cybersecurity frameworks. In this Kitecast episode, Hayes discusses how the <a href='https://www.kiteworks.com/risk-compliance-glossary/what-is-the-nist-cybersecurity-framework/'>NIST CSF</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/understanding-cmmc-2-0-levels-a-comprehensive-guide-for-dod-contractors/'>CMMC 2.0</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/fedramp/'>FedRAMP Authorization</a>, and other federal cybersecurity standards are driving the adoption of <a href='https://www.kiteworks.com/risk-compliance-glossary/zero-trust-security/'>zero trust</a> and other security best practices. Discover what he thinks are some of the biggest security opportunities and challenges facing the government sector today and how <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a> exposure risks play into both components by listening to this podcast.<br/><br/>For more on Vertosoft, visit www.vertosoft.com.<br/><br/>For more on Chet Hayes, visit www.linkedin.com/in/chetdhayes.<br/><br/></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/12246902-chet-hayes-data-privacy-and-governance-in-the-public-sector.mp3" length="29538416" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12246902</guid>
    <pubDate>Mon, 13 Feb 2023 18:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/12246902/transcript" type="text/html" />
    <itunes:duration>2459</itunes:duration>
    <itunes:keywords>Cybersecurity, AISecurity, CyberThreats, Cyberattacks, Compliance, ITGovernance</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/chetdhayes/" img="https://storage.buzzsprout.com/gkw2et0qwjktra5pqkkdlpknvvic">Chet Hayes</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Taiye Lambo: Managing Risk Using Cybersecurity Frameworks</itunes:title>
    <title>Taiye Lambo: Managing Risk Using Cybersecurity Frameworks</title>
    <itunes:summary><![CDATA[Serial Entrepreneur and Cybersecurity and Risk Management Pioneer Taiye Lambo has worn a lot of different hats over the course of his career. He has led cybersecurity at the Federal Reserve Bank of Atlanta, the City of Atlanta, and Harland Clarke, among others. He founded or co-founded organizations such as eFortresses (a Gartner Cool Vendor), CloudeAssurance, and the Holistic Information Security Practitioner Institute (HISPI).   In this Kitecast episode, Lambo discusses a range of topics re...]]></itunes:summary>
    <description><![CDATA[<p>Serial Entrepreneur and Cybersecurity and Risk Management Pioneer Taiye Lambo has worn a lot of different hats over the course of his career. He has led cybersecurity at the Federal Reserve Bank of Atlanta, the City of Atlanta, and Harland Clarke, among others. He founded or co-founded organizations such as eFortresses (a Gartner Cool Vendor), CloudeAssurance, and the Holistic Information Security Practitioner Institute (HISPI). <br/><br/>In this Kitecast episode, Lambo discusses a range of topics related to <a href='https://staging.kiteworks.com/risk-compliance-glossary/cybersecurity-risk-management-2/'>cybersecurity and risk management</a>. He argues that cybersecurity frameworks like <a href='https://www.kiteworks.com/risk-compliance-glossary/what-is-the-nist-cybersecurity-framework/'>NIST CSF</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/iso-27000-standards/'>ISO 27001</a>, and <a href='https://staging.kiteworks.com/risk-compliance-glossary/soc-2/'>SOC 2</a> empower organizations to measure their risk and institute technologies and processes to manage that risk. He also overviews the HISPI Certification Program and how cybersecurity and risk management professionals can get certified. </p><p><a href='https://www.hispi.org'>https://www.hispi.org</a> </p><p><a href='https://www.cloudeassurance.com'>https://www.cloudeassurance.com</a> </p><p><a href='https://efortresses.com'>https://efortresses.com</a>  </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Serial Entrepreneur and Cybersecurity and Risk Management Pioneer Taiye Lambo has worn a lot of different hats over the course of his career. He has led cybersecurity at the Federal Reserve Bank of Atlanta, the City of Atlanta, and Harland Clarke, among others. He founded or co-founded organizations such as eFortresses (a Gartner Cool Vendor), CloudeAssurance, and the Holistic Information Security Practitioner Institute (HISPI). <br/><br/>In this Kitecast episode, Lambo discusses a range of topics related to <a href='https://staging.kiteworks.com/risk-compliance-glossary/cybersecurity-risk-management-2/'>cybersecurity and risk management</a>. He argues that cybersecurity frameworks like <a href='https://www.kiteworks.com/risk-compliance-glossary/what-is-the-nist-cybersecurity-framework/'>NIST CSF</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/iso-27000-standards/'>ISO 27001</a>, and <a href='https://staging.kiteworks.com/risk-compliance-glossary/soc-2/'>SOC 2</a> empower organizations to measure their risk and institute technologies and processes to manage that risk. He also overviews the HISPI Certification Program and how cybersecurity and risk management professionals can get certified. </p><p><a href='https://www.hispi.org'>https://www.hispi.org</a> </p><p><a href='https://www.cloudeassurance.com'>https://www.cloudeassurance.com</a> </p><p><a href='https://efortresses.com'>https://efortresses.com</a>  </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/12133416-taiye-lambo-managing-risk-using-cybersecurity-frameworks.mp3" length="41190381" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12133416</guid>
    <pubDate>Fri, 27 Jan 2023 15:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/12133416/transcript" type="text/html" />
    <itunes:duration>3430</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/taiyelambo/" img="https://storage.buzzsprout.com/45mtoldy9xg6jduxcxdrwboph7d4">Taiye Lambo</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Evgeniy Kharam: Pushing the Boundaries of Private Content Governance</itunes:title>
    <title>Evgeniy Kharam: Pushing the Boundaries of Private Content Governance</title>
    <itunes:summary><![CDATA[Over 20 years ago, Evgeniy Kharam launched his career on the “high seas” as a cybersecurity engineer for the Israeli Navy and in his subsequent professional career spent over 40,000 hours in pre- and post-sales support as a cybersecurity architect and consultant working with private and public sector organizations across the spectrum—from those with 500 employees to those with more than 100,000 employees.   Kharam sees Zero Trust as a critical ingredient for any cybersecurity approach and arg...]]></itunes:summary>
    <description><![CDATA[<p>Over 20 years ago, Evgeniy Kharam launched his career on the “high seas” as a cybersecurity engineer for the Israeli Navy and in his subsequent professional career spent over 40,000 hours in pre- and post-sales support as a cybersecurity architect and consultant working with private and public sector organizations across the spectrum—from those with 500 employees to those with more than 100,000 employees. <br/><br/>Kharam sees <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>Zero Trust</a> as a critical ingredient for any cybersecurity approach and argues in this podcast interview that protecting sensitive content requires appropriate <a href='https://www.kiteworks.com/platform/advanced-governance/'>governance tracking and controls</a>. As part of this process, least-privilege access and employing zero trust when it comes to governance policies are crucial in managing <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>security and compliance risks</a>. <br/><br/>Check out Evgeniy&apos;s podcasts at https://linktr.ee/ekcyber. </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Over 20 years ago, Evgeniy Kharam launched his career on the “high seas” as a cybersecurity engineer for the Israeli Navy and in his subsequent professional career spent over 40,000 hours in pre- and post-sales support as a cybersecurity architect and consultant working with private and public sector organizations across the spectrum—from those with 500 employees to those with more than 100,000 employees. <br/><br/>Kharam sees <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>Zero Trust</a> as a critical ingredient for any cybersecurity approach and argues in this podcast interview that protecting sensitive content requires appropriate <a href='https://www.kiteworks.com/platform/advanced-governance/'>governance tracking and controls</a>. As part of this process, least-privilege access and employing zero trust when it comes to governance policies are crucial in managing <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>security and compliance risks</a>. <br/><br/>Check out Evgeniy&apos;s podcasts at https://linktr.ee/ekcyber. </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/12092043-evgeniy-kharam-pushing-the-boundaries-of-private-content-governance.mp3" length="30259725" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12092043</guid>
    <pubDate>Sat, 21 Jan 2023 21:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/12092043/transcript" type="text/html" />
    <itunes:duration>2519</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/ekharam/" img="https://storage.buzzsprout.com/nlo6v6rgjz7c3k68e3yyd5upaa1w">Evgeniy Kharam</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Bryan Hadzik: The Intertwining of Cybersecurity and Compliance</itunes:title>
    <title>Bryan Hadzik: The Intertwining of Cybersecurity and Compliance</title>
    <itunes:summary><![CDATA[NCSi CTO Bryan Hadzik has spent over two decades with the Utah-based security and operations service provider. As cybercriminals and rogue nation-states focus their attention on hacking critical information, government and industry groups have responded by passing different compliance regulations, such as GDPR, FERPA, GBLA, PIPEDA, and others, and cybersecurity frameworks that include NIST CSF, ISO 27001, and SOC 2. Hadzik discusses how this has led to an intertwining of cybersecurity and com...]]></itunes:summary>
    <description><![CDATA[<p>NCSi CTO Bryan Hadzik has spent over two decades with the Utah-based security and operations service provider. As cybercriminals and rogue nation-states focus their attention on hacking critical information, government and industry groups have responded by passing different compliance regulations, such as <a href='https://www.kiteworks.com/risk-compliance-glossary/gdpr/'>GDPR</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/ferpa-compliance/'>FERPA</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/glba/'>GBLA</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/pipeda/'>PIPEDA</a>, and others, and cybersecurity frameworks that include <a href='https://www.kiteworks.com/risk-compliance-glossary/what-is-the-nist-cybersecurity-framework/'>NIST CSF</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/iso-27000-standards/'>ISO 27001</a>, and <a href='https://www.kiteworks.com/risk-compliance-glossary/soc-2/'>SOC 2</a>. Hadzik discusses how this has led to an intertwining of cybersecurity and <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> that organizations must address in order to manage private content and compliance risks effectively. He points out that insurance companies rate insurance policies based on an organization&apos;s adherence to these cybersecurity frameworks and ability to ensure compliance with <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a> regulations. </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>NCSi CTO Bryan Hadzik has spent over two decades with the Utah-based security and operations service provider. As cybercriminals and rogue nation-states focus their attention on hacking critical information, government and industry groups have responded by passing different compliance regulations, such as <a href='https://www.kiteworks.com/risk-compliance-glossary/gdpr/'>GDPR</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/ferpa-compliance/'>FERPA</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/glba/'>GBLA</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/pipeda/'>PIPEDA</a>, and others, and cybersecurity frameworks that include <a href='https://www.kiteworks.com/risk-compliance-glossary/what-is-the-nist-cybersecurity-framework/'>NIST CSF</a>, <a href='https://www.kiteworks.com/risk-compliance-glossary/iso-27000-standards/'>ISO 27001</a>, and <a href='https://www.kiteworks.com/risk-compliance-glossary/soc-2/'>SOC 2</a>. Hadzik discusses how this has led to an intertwining of cybersecurity and <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> that organizations must address in order to manage private content and compliance risks effectively. He points out that insurance companies rate insurance policies based on an organization&apos;s adherence to these cybersecurity frameworks and ability to ensure compliance with <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>data privacy</a> regulations. </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/11913218-bryan-hadzik-the-intertwining-of-cybersecurity-and-compliance.mp3" length="33838593" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11913218</guid>
    <pubDate>Wed, 21 Dec 2022 12:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/11913218/transcript" type="text/html" />
    <itunes:duration>2817</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/bryan-hadzik-2328999/" img="https://storage.buzzsprout.com/eeshrqpqto4p370trcp5ojt18cul">Bryan Hadzik</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Sylvain Hirsch: Cyber Forensics and Incident Response Through the Lens of Rugby</itunes:title>
    <title>Sylvain Hirsch: Cyber Forensics and Incident Response Through the Lens of Rugby</title>
    <itunes:summary><![CDATA[While Sylvain Hirsch played on the Swiss National Rugby Team over a period of eight years, he learned much about the importance of collective collaboration and response. This prepared him for a career in cyber forensics and incident response that has taken him on an interesting journey from Europe to the Asia-Pacific region. He's worked for international organizations such as Credit Suisse in threat detection and response and has spent the past two years as an incident responder at Mandiant. ...]]></itunes:summary>
    <description><![CDATA[<p>While Sylvain Hirsch played on the Swiss National Rugby Team over a period of eight years, he learned much about the importance of collective collaboration and response. This prepared him for a career in cyber forensics and incident response that has taken him on an interesting journey from Europe to the Asia-Pacific region. He&apos;s worked for international organizations such as Credit Suisse in threat detection and response and has spent the past two years as an incident responder at Mandiant. His academic endeavors include serving as a guest speaker at different conferences and guest lecturer and researcher at Interpol, University College Dublin, University of Lausanne, and Berner Fachhochschule. This Kitecast episode explores various aspects of cyber forensics and incident response and what Sylvain sees as best practices and anticipates will be key advances in the field.</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>While Sylvain Hirsch played on the Swiss National Rugby Team over a period of eight years, he learned much about the importance of collective collaboration and response. This prepared him for a career in cyber forensics and incident response that has taken him on an interesting journey from Europe to the Asia-Pacific region. He&apos;s worked for international organizations such as Credit Suisse in threat detection and response and has spent the past two years as an incident responder at Mandiant. His academic endeavors include serving as a guest speaker at different conferences and guest lecturer and researcher at Interpol, University College Dublin, University of Lausanne, and Berner Fachhochschule. This Kitecast episode explores various aspects of cyber forensics and incident response and what Sylvain sees as best practices and anticipates will be key advances in the field.</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/11725285-sylvain-hirsch-cyber-forensics-and-incident-response-through-the-lens-of-rugby.mp3" length="36316603" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11725285</guid>
    <pubDate>Fri, 18 Nov 2022 21:00:00 -0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/11725285/transcript" type="text/html" />
    <itunes:duration>3024</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/sylvain-hirsch/" img="https://storage.buzzsprout.com/3pd8r8dv5afw6h7vchjkcgiuddok">Sylvain Hirsch</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Josh Horwitz: A Deep Dive Into the Dark Web</itunes:title>
    <title>Josh Horwitz: A Deep Dive Into the Dark Web</title>
    <itunes:summary><![CDATA[Software Entrepreneur and Executive Josh Horwitz built a highly successful customer engagement software company and sold it. What was his next move? He dived into the Dark Web and—working with a couple other entrepreneurs—launched a fast-growth cybersecurity startup called Enzoic. Their focus is on stopping bad actors from exploiting compromised passwords. This frequently is a point of entry when cybercriminals and rogue nation-states gain access to networks, applications, and sensitive conte...]]></itunes:summary>
    <description><![CDATA[<p>Software Entrepreneur and Executive Josh Horwitz built a highly successful customer engagement software company and sold it. What was his next move? He dived into the Dark Web and—working with a couple other entrepreneurs—launched a fast-growth cybersecurity startup called Enzoic. Their focus is on stopping bad actors from exploiting compromised passwords. This frequently is a point of entry when cybercriminals and rogue nation-states gain access to networks, applications, and sensitive content. Watch or listen to this Kitecast episode to learn how Josh and the team at Enzoic are transforming password security by mining the Dark Web, empowering organizations and users to use passwords that have not been compromised and, when they are compromised, letting them know they have been. </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Software Entrepreneur and Executive Josh Horwitz built a highly successful customer engagement software company and sold it. What was his next move? He dived into the Dark Web and—working with a couple other entrepreneurs—launched a fast-growth cybersecurity startup called Enzoic. Their focus is on stopping bad actors from exploiting compromised passwords. This frequently is a point of entry when cybercriminals and rogue nation-states gain access to networks, applications, and sensitive content. Watch or listen to this Kitecast episode to learn how Josh and the team at Enzoic are transforming password security by mining the Dark Web, empowering organizations and users to use passwords that have not been compromised and, when they are compromised, letting them know they have been. </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/11627477-josh-horwitz-a-deep-dive-into-the-dark-web.mp3" length="29166697" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11627477</guid>
    <pubDate>Thu, 03 Nov 2022 17:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/11627477/transcript" type="text/html" />
    <itunes:duration>2428</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/joshuahorwitz/" img="https://storage.buzzsprout.com/m2nvw9a09km11g64fqr7g6qjvi0h">Josh Horwitz</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>André Tehrani: How CISOs Can Raise Their Game Against Cybersecurity Threats</itunes:title>
    <title>André Tehrani: How CISOs Can Raise Their Game Against Cybersecurity Threats</title>
    <itunes:summary><![CDATA[What organizations seek in terms of experience, certifications, and skillsets when it comes to their next senior cybersecurity leaders reflects their current and future priorities. Today's CISOs must understand the business and be able to articulate cyber risks in terms of financial and compliance impact. Simply being an expert in network perimeter and workload security is no longer sufficient. In this Kitecast episode, Cybersecurity Recruiter André Tehrani talks about what matters most for h...]]></itunes:summary>
    <description><![CDATA[<p>What organizations seek in terms of experience, certifications, and skillsets when it comes to their next senior cybersecurity leaders reflects their current and future priorities. Today&apos;s CISOs must understand the business and be able to articulate cyber risks in terms of financial and <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> impact. Simply being an expert in network perimeter and workload security is no longer sufficient. In this Kitecast episode, Cybersecurity Recruiter André Tehrani talks about what matters most for his clients when they vet senior cybersecurity candidates. When it comes to CISOs, they must be able to articulate <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>cyber risk</a> through the lens of business impact: operational disruption, damaged brand, negative sales, and compliance fines and penalties.</p><p><br/><br/></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>What organizations seek in terms of experience, certifications, and skillsets when it comes to their next senior cybersecurity leaders reflects their current and future priorities. Today&apos;s CISOs must understand the business and be able to articulate cyber risks in terms of financial and <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> impact. Simply being an expert in network perimeter and workload security is no longer sufficient. In this Kitecast episode, Cybersecurity Recruiter André Tehrani talks about what matters most for his clients when they vet senior cybersecurity candidates. When it comes to CISOs, they must be able to articulate <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>cyber risk</a> through the lens of business impact: operational disruption, damaged brand, negative sales, and compliance fines and penalties.</p><p><br/><br/></p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/11605984-andre-tehrani-how-cisos-can-raise-their-game-against-cybersecurity-threats.mp3" length="37760838" type="audio/mpeg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11605984</guid>
    <pubDate>Mon, 31 Oct 2022 19:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/11605984/transcript" type="text/html" />
    <itunes:duration>3145</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" img="https://storage.buzzsprout.com/wr3p1m8ip1r7yi7a1lsr8xp2eqau">André Tehrani</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Joan Ross: The Intersection of Cybersecurity and AI</itunes:title>
    <title>Joan Ross: The Intersection of Cybersecurity and AI</title>
    <itunes:summary><![CDATA[AI seems to be a "dime a dozen" if you trust the cybersecurity vendors. What does meaningful cybersecurity AI look like? What is on the horizon when it comes to the potential of cybersecurity and AI? And what does this mean when it comes to risk management? Chief Intelligence and Security Officer and Cybersecurity Professor Joan Ross discusses these and other cyber-related topics in this episode of Kitecast. She explains how AI can be used to detect and stop cyberattacks as well as rapidly re...]]></itunes:summary>
    <description><![CDATA[<p>AI seems to be a &quot;dime a dozen&quot; if you trust the cybersecurity vendors. What does meaningful <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>cybersecurity AI</a> look like? What is on the horizon when it comes to the potential of cybersecurity and AI? And what does this mean when it comes to <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a>? Chief Intelligence and Security Officer and Cybersecurity Professor Joan Ross discusses these and other cyber-related topics in this episode of Kitecast. She explains how AI can be used to detect and stop cyberattacks as well as rapidly respond to breaches when they happen. The conversation also touched on how cybercriminals and rogue nation-states are leveraging AI to create attacks that are more complex and harder to detect and stop.</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>AI seems to be a &quot;dime a dozen&quot; if you trust the cybersecurity vendors. What does meaningful <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-generative-ai/'>cybersecurity AI</a> look like? What is on the horizon when it comes to the potential of cybersecurity and AI? And what does this mean when it comes to <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a>? Chief Intelligence and Security Officer and Cybersecurity Professor Joan Ross discusses these and other cyber-related topics in this episode of Kitecast. She explains how AI can be used to detect and stop cyberattacks as well as rapidly respond to breaches when they happen. The conversation also touched on how cybercriminals and rogue nation-states are leveraging AI to create attacks that are more complex and harder to detect and stop.</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/11480439-joan-ross-the-intersection-of-cybersecurity-and-ai.mp3" length="34178998" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tdw6h3eqfbyfgd08dqopu0dcoguq?.jpg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-11480439</guid>
    <pubDate>Tue, 11 Oct 2022 12:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/11480439/transcript" type="text/html" />
    <itunes:duration>2844</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/joanross/" img="https://storage.buzzsprout.com/qr11zfx03s49u70izgxbx2eicu4z">Joan Ross</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Michael Daniel: Combatting Cyber Attacks and Incidents </itunes:title>
    <title>Michael Daniel: Combatting Cyber Attacks and Incidents </title>
    <itunes:summary><![CDATA[Cyber Threat Alliance President and CEO Michael Daniel, who served four-plus years as Cybersecurity Coordinator for the U.S. Government, discusses what cyber-threat trends you know about and which ones pose the greatest risk. Michael explains  how the Cyber Threat Alliance enables organizations to prioritize risk management based on aggregated threat intelligence from numerous vendors. The interview with Michael also covers cyber incidents and risk during the Russian-Ukraine War, lessons...]]></itunes:summary>
    <description><![CDATA[<p>Cyber Threat Alliance President and CEO Michael Daniel, who served four-plus years as Cybersecurity Coordinator for the U.S. Government, discusses what cyber-threat trends you know about and which ones pose the greatest risk. Michael explains  how the Cyber Threat Alliance enables organizations to prioritize <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a> based on aggregated threat intelligence from numerous vendors. The interview with Michael also covers cyber incidents and risk during the Russian-Ukraine War, lessons learned when he served as the U.S. Cybersecurity Coordinator, how the federal government is evolving to address rogue nation-state bad actors, and adoption of <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>zero-trust security</a>.<br/><br/>For more information on the Cyber Threat Alliance, visit https://www.cyberthreatalliance.org. </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Cyber Threat Alliance President and CEO Michael Daniel, who served four-plus years as Cybersecurity Coordinator for the U.S. Government, discusses what cyber-threat trends you know about and which ones pose the greatest risk. Michael explains  how the Cyber Threat Alliance enables organizations to prioritize <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a> based on aggregated threat intelligence from numerous vendors. The interview with Michael also covers cyber incidents and risk during the Russian-Ukraine War, lessons learned when he served as the U.S. Cybersecurity Coordinator, how the federal government is evolving to address rogue nation-state bad actors, and adoption of <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>zero-trust security</a>.<br/><br/>For more information on the Cyber Threat Alliance, visit https://www.cyberthreatalliance.org. </p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/11454474-michael-daniel-combatting-cyber-attacks-and-incidents.mp3" length="34575397" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9o92vu01nlnku01ou8je7r2c88k5?.jpg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11454474</guid>
    <pubDate>Fri, 07 Oct 2022 14:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/11454474/transcript" type="text/html" />
    <itunes:duration>2877</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/j-michael-daniel-cta/" img="https://storage.buzzsprout.com/wczroonbv9cqhqajmfu56c0rgun1">Michael Daniel</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
  <item>
    <itunes:title>Andreas Wuchner: Cybersecurity Through the Lens of Risk Management</itunes:title>
    <title>Andreas Wuchner: Cybersecurity Through the Lens of Risk Management</title>
    <itunes:summary><![CDATA[Cybersecurity and Risk Management Investor and Advisor  Andreas Wuchner discusses how cybersecurity is all about risk management and how security and compliance are now intertwined. Learn how the complexity of managing all the dimensions, such as migration to the cloud and digital exchange of private data with thousands of third parties, makes it increasingly difficult for organizations to manage risk and what you can do about it. Check out video versions of Kitecast episodes at https://...]]></itunes:summary>
    <description><![CDATA[<p>Cybersecurity and Risk Management Investor and Advisor  Andreas Wuchner discusses how cybersecurity is all about <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a> and how security and <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> are now intertwined. Learn how the complexity of managing all the dimensions, such as migration to the cloud and digital exchange of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>private data</a> with thousands of <a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>third parties</a>, makes it increasingly difficult for organizations to manage risk and what you can do about it.</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></description>
    <content:encoded><![CDATA[<p>Cybersecurity and Risk Management Investor and Advisor  Andreas Wuchner discusses how cybersecurity is all about <a href='https://www.kiteworks.com/cybersecurity-risk-management/zero-trust-architecture-never-trust-always-verify/'>risk management</a> and how security and <a href='https://www.kiteworks.com/platform/compliance/regulatory-compliance/'>compliance</a> are now intertwined. Learn how the complexity of managing all the dimensions, such as migration to the cloud and digital exchange of <a href='https://www.kiteworks.com/risk-compliance-glossary/data-privacy/'>private data</a> with thousands of <a href='https://www.kiteworks.com/risk-compliance-glossary/third-party-risk-management/'>third parties</a>, makes it increasingly difficult for organizations to manage risk and what you can do about it.</p><p>Check out video versions of Kitecast episodes at https://www.kiteworks.com/kitecast or on YouTube at https://www.youtube.com/c/KiteworksCGCP. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2062267/episodes/11454436-andreas-wuchner-cybersecurity-through-the-lens-of-risk-management.mp3" length="32372219" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jhc3f8idrf8zid2djcui1l3ni0o5?.jpg" />
    <itunes:author>Tim Freestone and Patrick Spencer</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11454436</guid>
    <pubDate>Fri, 07 Oct 2022 14:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2062267/11454436/transcript" type="text/html" />
    <itunes:duration>2693</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
    <podcast:person role="guest" href="https://www.linkedin.com/in/andreaswuchner/" img="https://storage.buzzsprout.com/irsptf0cvjmlkm3bc6cgl3krf4ag">Andreas Wuchner</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/patrickespencer" img="https://storage.buzzsprout.com/gkudp4qdfq0v7fgbl3wjaa8tea9n">Patrick Spencer</podcast:person>
    <podcast:person role="co-host" href="https://www.linkedin.com/in/freestone/" img="https://storage.buzzsprout.com/sjpoul9itlipgjrnotwpo7ydesqj">Tim Freestone</podcast:person>
  </item>
</channel>
</rss>
