<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/2248577.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>ClearTech Loop: In the Know, On the Move</title>

  <lastBuildDate>Sat, 07 Mar 2026 12:50:34 -0500</lastBuildDate>
  <link>https://www.buzzsprout.com/2248577</link>
  <language>en</language>
  <copyright>© 2026 ClearTech Loop: In the Know, On the Move</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>f81eaecd-b053-5486-a702-053ea5090b06</podcast:guid>
  <podcast:txt purpose="verify">suzie@clarify360.com</podcast:txt>
  <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>ClearTech Loop is a fast, focused podcast delivering sharp, soundbite-ready insights on what’s next in cybersecurity, cloud, and AI. Hosted by Jo Peterson, Chief Analyst at ClearTech Research, each 10-minute episode explores today’s most pressing tech and risk issues through a business-focused lens.&nbsp;</p><p><br></p><p>Whether it’s CISOs rethinking cyber strategy or AI reshaping risk governance, ClearTech Loop brings clarity to a shifting landscape—built for tech leaders who don’t have time for fluff.&nbsp;</p><p><br></p><p>We cut through hype. We rethink assumptions. We keep you in the loop.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>ClearTech Research / Jo Peterson</itunes:name>
    <itunes:email>suzie@clarify360.com</itunes:email>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/jhq48dqp2bmmf2w1v9j5rqoqq94v?.jpg</url>
     <title>ClearTech Loop: In the Know, On the Move</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/jhq48dqp2bmmf2w1v9j5rqoqq94v?.jpg" />
  <itunes:category text="Technology" />
  <itunes:category text="Business">
    <itunes:category text="Management" />
  </itunes:category>
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <item>
    <itunes:title>Cybersecurity Is a Social System with Fernando </itunes:title>
    <title>Cybersecurity Is a Social System with Fernando </title>
    <itunes:summary><![CDATA[In this episode of the ClearTech Loop podcast, Jo Peterson sits down with Fernando Montenegro to talk about what the CISO role actually looks like right now as generative AI spreads across the enterprise.   This is not a conversation about one more security tool. Fernando frames AI as a forcing function that exposes the social structure of an organization, including incentives, accountability, influence, and how decisions get made. The CISO role has become a bridge role, and the job is m...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of the ClearTech Loop podcast, Jo Peterson sits down with Fernando Montenegro to talk about what the CISO role actually looks like right now as generative AI spreads across the enterprise.  </p><p>This is not a conversation about one more security tool. Fernando frames AI as a forcing function that exposes the social structure of an organization, including incentives, accountability, influence, and how decisions get made. The CISO role has become a bridge role, and the job is more political, more collaborative, and more consultative than it used to be.  </p><p>Subscribe to ClearTech Loop on LinkedIn: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p>Zach Lewis Buzzsprout <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><ol><li>“They are the translator of security issues to non security decision makers.”  </li><li>“One of the ways to bring these silos down is to have empathy for the other side, if you will.”  </li><li>“You solve all of this at the design stage, at the initiation stage, not down the line when people want to release the production.”  </li></ol><p><b>Three Big Ideas from This Episode</b> </p><ol><li><b>AI forces cross functional alignment</b> <br/>AI makes silos expensive. When teams have to work together to make AI work, security cannot stay isolated and expect trust to show up later.  </li><li><b>Embed security by showing up early</b> <br/>There is no perfect universal checklist. The workable move is being there at the beginning, removing friction early, and helping the initiative flourish before deadlines turn everything into a showdown.  </li><li><b>The CISO is a translator role now</b> <br/>CISOs are playing multiple games at once across the board, the CIO, legal, customers, regulators, and internal teams. Translation is a core operating requirement, not a soft skill.  </li></ol><p><b>Episode Notes and Links</b> </p><p>Listen: In the Player <br/>Watch on YouTube: https://youtu.be/0H4x1-Hu-44<br/>Subscribe to the Newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Additional resources</b> </p><ul><li>The Futurum Group, Fernando Montenegro profile <br/><a href='https://futurumgroup.com/fernando-montenegro/?utm_source=chatgpt.com'>https://futurumgroup.com/fernando-montenegro/</a>  </li><li>AI and organizational risk management resources, NIST AI Risk Management Framework <br/><a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework</a>  </li><li>2017 Transformers paper<b>: </b>“Attention Is All You Need”<b> (2017) by </b>Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Łukasz Kaiser, Illia Polosukhin.<b> </b><a href='https://proceedings.neurips.cc/paper_files/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf'>https://proceedings.neurips.cc/paper_files/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf</a>  </li><li>ClearTech Research and ClearTech Loop <a href='https://cleartechresearch.com/'>https://cleartechresearch.com/</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of the ClearTech Loop podcast, Jo Peterson sits down with Fernando Montenegro to talk about what the CISO role actually looks like right now as generative AI spreads across the enterprise.  </p><p>This is not a conversation about one more security tool. Fernando frames AI as a forcing function that exposes the social structure of an organization, including incentives, accountability, influence, and how decisions get made. The CISO role has become a bridge role, and the job is more political, more collaborative, and more consultative than it used to be.  </p><p>Subscribe to ClearTech Loop on LinkedIn: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p>Zach Lewis Buzzsprout <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><ol><li>“They are the translator of security issues to non security decision makers.”  </li><li>“One of the ways to bring these silos down is to have empathy for the other side, if you will.”  </li><li>“You solve all of this at the design stage, at the initiation stage, not down the line when people want to release the production.”  </li></ol><p><b>Three Big Ideas from This Episode</b> </p><ol><li><b>AI forces cross functional alignment</b> <br/>AI makes silos expensive. When teams have to work together to make AI work, security cannot stay isolated and expect trust to show up later.  </li><li><b>Embed security by showing up early</b> <br/>There is no perfect universal checklist. The workable move is being there at the beginning, removing friction early, and helping the initiative flourish before deadlines turn everything into a showdown.  </li><li><b>The CISO is a translator role now</b> <br/>CISOs are playing multiple games at once across the board, the CIO, legal, customers, regulators, and internal teams. Translation is a core operating requirement, not a soft skill.  </li></ol><p><b>Episode Notes and Links</b> </p><p>Listen: In the Player <br/>Watch on YouTube: https://youtu.be/0H4x1-Hu-44<br/>Subscribe to the Newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Additional resources</b> </p><ul><li>The Futurum Group, Fernando Montenegro profile <br/><a href='https://futurumgroup.com/fernando-montenegro/?utm_source=chatgpt.com'>https://futurumgroup.com/fernando-montenegro/</a>  </li><li>AI and organizational risk management resources, NIST AI Risk Management Framework <br/><a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework</a>  </li><li>2017 Transformers paper<b>: </b>“Attention Is All You Need”<b> (2017) by </b>Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Łukasz Kaiser, Illia Polosukhin.<b> </b><a href='https://proceedings.neurips.cc/paper_files/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf'>https://proceedings.neurips.cc/paper_files/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf</a>  </li><li>ClearTech Research and ClearTech Loop <a href='https://cleartechresearch.com/'>https://cleartechresearch.com/</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18772881-cybersecurity-is-a-social-system-with-fernando.mp3" length="14569428" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/oyqdk8zsz6d1lofdkw0ixqoyhsdz?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18772881</guid>
    <pubDate>Mon, 02 Mar 2026 02:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18772881/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18772881/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18772881/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18772881/transcript.vtt" type="text/vtt" />
    <itunes:duration>1210</itunes:duration>
    <itunes:keywords>AI governance, generative AI, security leadership, CISO, organizational trust, security culture, cross functional alignment, threat modeling, risk management, security as a social system, Futurum Group, Fernando Montenegro, Jo Peterson, ClearTech Loop  </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Is an Environment with Miri Rodriguez </itunes:title>
    <title>Security Is an Environment with Miri Rodriguez </title>
    <itunes:summary><![CDATA[What CISOs miss when security only lives in features  AI security is still getting framed like a technology problem: new tools, new controls, new dashboards, and new rules. In this episode of ClearTech Loop, Jo Peterson talks with Miri Rodriguez, Cofounder and CEO of Empressa.ai, about why that framing keeps breaking in the real world.  Miri brings a people first lens to AI adoption and security. She argues that security is not just something you install. It is an environment people...]]></itunes:summary>
    <description><![CDATA[<p><b><em>What CISOs miss when security only lives in features </em></b></p><p>AI security is still getting framed like a technology problem: new tools, new controls, new dashboards, and new rules. In this episode of ClearTech Loop, Jo Peterson talks with Miri Rodriguez, Cofounder and CEO of Empressa.ai, about why that framing keeps breaking in the real world. </p><p>Miri brings a people first lens to AI adoption and security. She argues that security is not just something you install. It is an environment people are willing to enter. When the environment does not feel secure, adoption either slows or goes underground, and then security teams are left trying to govern what they cannot see. </p><p>This conversation connects three practical leadership threads: using GenAI upstream to understand real adoption patterns, embedding security and privacy without slowing innovation by designing for humans, and building governance that becomes habit instead of paperwork. </p><p>Subscribe to ClearTech Loop on LinkedIn <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes </b><br/>“The opportunity is massive when you think about security as an environment, not just a technology or a feature.” <br/>“The features don’t matter. If you can’t tell me why the features are important in my space.” </p><p><b>Three Big Ideas from This Episode </b></p><ol><li><b>GenAI beyond the tool stack </b><br/>Generative AI can help security leaders widen the lens on adoption. Before policies and controls, leaders need to understand where people hesitate, where they take shortcuts, and why the secure path gets avoided. </li><li><b>Inclusion is a security control </b><br/>Speed without inclusion creates blind spots, and blind spots become risk. Security and privacy do not have to slow innovation, but they do have to be designed in a way people can understand and follow. </li><li><b>Governance is behavior </b><br/>If governance does not translate into day to day habits, it is just documentation. Training format matters as much as content, and security sticks when people see it as personal responsibility, not corporate paperwork. </li></ol><p><b>Additional Resources </b></p><ul><li>AI Foundations for Women (Empressa AI) <br/><a href='https://empressa.ai/ai-foundations-for-women/?utm_source=chatgpt.com'>https://empressa.ai/ai-foundations-for-women/</a> </li><li>Most Tools Weren’t Built with Women in Mind, AI Is Just the Latest <br/><a href='https://empressa.ai/2025/04/03/most-tools-werent-built-with-women-in-mind-ai-is-just-the-latest/?utm_source=chatgpt.com'>https://empressa.ai/2025/04/03/most-tools-werent-built-with-women-in-mind-ai-is-just-the-latest/</a> </li><li>IABC Catalyst, Building Your Brand With Microsoft Senior Storyteller Miri Rodriguez <br/><a href='https://www.iabc.com/Catalyst/Article/building-your-brand-with-microsoft-senior-storyteller-miri-rodriguez?utm_source=chatgpt.com'>https://www.iabc.com/Catalyst/Article/building-your-brand-with-microsoft-senior-storyteller-miri-rodriguez</a> </li></ul><p><b>About the Guest </b><br/>Miri Rodriguez is Cofounder and CEO at Empressa.ai, an AI and storytelling strategist, bestselling author, and Microsoft alum. She focuses on ethical innovation, inclusion, and building trustworthy AI environments where women can connect, learn, and thrive. She is also the author of Brand Storytelling: Put Customers at the Heart of Your Brand Story. </p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p><b><em>What CISOs miss when security only lives in features </em></b></p><p>AI security is still getting framed like a technology problem: new tools, new controls, new dashboards, and new rules. In this episode of ClearTech Loop, Jo Peterson talks with Miri Rodriguez, Cofounder and CEO of Empressa.ai, about why that framing keeps breaking in the real world. </p><p>Miri brings a people first lens to AI adoption and security. She argues that security is not just something you install. It is an environment people are willing to enter. When the environment does not feel secure, adoption either slows or goes underground, and then security teams are left trying to govern what they cannot see. </p><p>This conversation connects three practical leadership threads: using GenAI upstream to understand real adoption patterns, embedding security and privacy without slowing innovation by designing for humans, and building governance that becomes habit instead of paperwork. </p><p>Subscribe to ClearTech Loop on LinkedIn <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes </b><br/>“The opportunity is massive when you think about security as an environment, not just a technology or a feature.” <br/>“The features don’t matter. If you can’t tell me why the features are important in my space.” </p><p><b>Three Big Ideas from This Episode </b></p><ol><li><b>GenAI beyond the tool stack </b><br/>Generative AI can help security leaders widen the lens on adoption. Before policies and controls, leaders need to understand where people hesitate, where they take shortcuts, and why the secure path gets avoided. </li><li><b>Inclusion is a security control </b><br/>Speed without inclusion creates blind spots, and blind spots become risk. Security and privacy do not have to slow innovation, but they do have to be designed in a way people can understand and follow. </li><li><b>Governance is behavior </b><br/>If governance does not translate into day to day habits, it is just documentation. Training format matters as much as content, and security sticks when people see it as personal responsibility, not corporate paperwork. </li></ol><p><b>Additional Resources </b></p><ul><li>AI Foundations for Women (Empressa AI) <br/><a href='https://empressa.ai/ai-foundations-for-women/?utm_source=chatgpt.com'>https://empressa.ai/ai-foundations-for-women/</a> </li><li>Most Tools Weren’t Built with Women in Mind, AI Is Just the Latest <br/><a href='https://empressa.ai/2025/04/03/most-tools-werent-built-with-women-in-mind-ai-is-just-the-latest/?utm_source=chatgpt.com'>https://empressa.ai/2025/04/03/most-tools-werent-built-with-women-in-mind-ai-is-just-the-latest/</a> </li><li>IABC Catalyst, Building Your Brand With Microsoft Senior Storyteller Miri Rodriguez <br/><a href='https://www.iabc.com/Catalyst/Article/building-your-brand-with-microsoft-senior-storyteller-miri-rodriguez?utm_source=chatgpt.com'>https://www.iabc.com/Catalyst/Article/building-your-brand-with-microsoft-senior-storyteller-miri-rodriguez</a> </li></ul><p><b>About the Guest </b><br/>Miri Rodriguez is Cofounder and CEO at Empressa.ai, an AI and storytelling strategist, bestselling author, and Microsoft alum. She focuses on ethical innovation, inclusion, and building trustworthy AI environments where women can connect, learn, and thrive. She is also the author of Brand Storytelling: Put Customers at the Heart of Your Brand Story. </p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18750914-security-is-an-environment-with-miri-rodriguez.mp3" length="11418969" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zk3792h3fwtrklhvbhpkoz54vjuy?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18750914</guid>
    <pubDate>Thu, 26 Feb 2026 02:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18750914/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18750914/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18750914/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18750914/transcript.vtt" type="text/vtt" />
    <itunes:duration>948</itunes:duration>
    <itunes:keywords>AI security, generative AI, AI governance, security culture, privacy by design, secure by design, CISO leadership, user behavior risk, security education, Empressa.ai, women in AI, trustworthy AI, ClearTech Loop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI, Cost, Control, and Relevance with Margaret Dawson, CMO, SUSE</itunes:title>
    <title>AI, Cost, Control, and Relevance with Margaret Dawson, CMO, SUSE</title>
    <itunes:summary><![CDATA[AI is getting embedded into everything, security workflows, engineering workflows, and customer facing products, often faster than organizations can govern it. The upside is real. The risk is in the assumptions leaders are making while they chase speed.  In this episode of ClearTech Loop, Jo Peterson sits down with Margaret Dawson, Chief Marketing Officer at SUSE, for a slightly different conversation than our usual guest mix. Same three questions, but through a CMO lens shaped by decade...]]></itunes:summary>
    <description><![CDATA[<p>AI is getting embedded into everything, security workflows, engineering workflows, and customer facing products, often faster than organizations can govern it. The upside is real. The risk is in the assumptions leaders are making while they chase speed. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Margaret Dawson, Chief Marketing Officer at SUSE, for a slightly different conversation than our usual guest mix. Same three questions, but through a CMO lens shaped by decades of enterprise buying cycles. </p><p>Margaret breaks down how security leaders can use generative AI to move beyond tools and tech, what it actually takes to embed security and privacy without slowing innovation, and how CMOs should talk about AI without getting trapped in AI washing. The throughline is practical: productivity gains are real, but cost, control, and credibility are not automatic. </p><p>Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p>Key Quotes <br/>“The mistake that we’re making as leaders is we are assuming that the integration of AI is an automatic reduction in cost.” — Margaret Dawson </p><p>“Until all of a sudden, the CFO got a million dollar cloud bill.” — Margaret Dawson <br/>“Consumers get smarter, very, very fast, especially BtoB Tech customers, and they start to know what’s real and what’s not.” — Margaret Dawson </p><p>“Being very specific on what it is doing for your product, for that customer, tying it back to the business outcome.” — Margaret Dawson <br/>“People trust their peers more than any vendor or anyone else.” — Margaret Dawson </p><p>Three Big Ideas from This Episode </p><ol><li>AI adoption fails when leaders treat it like automatic margin <br/>The board level narrative is tempting, but dangerous. AI can improve productivity, but assuming it instantly reduces cost is how organizations create governance debt and business continuity risk. </li><li>Speed is possible, but only with guardrails <br/>Embedding security and privacy is not what slows innovation. Confusion, rework, and incidents slow innovation. The answer is clear boundaries, clear accountability, and controls that keep pace with adoption. </li><li>In marketing, relevance and proof beat hype <br/>Buyers calibrate fast. AI messaging has to be specific, tied to outcomes, and backed by customer evidence. Credibility is built peer to peer, not through louder claims. </li></ol><p>Resources Mentioned </p><ul><li>The Secret to Digital Transformation is Human Connection by Margaret Dawson: <a href='https://devops.com/the-secret-to-digital-transformation-is-human-connection/'>https://devops.com/the-secret-to-digital-transformation-is-human-connection/</a> </li><li>INTERVIEW: SUSE CMO Margaret Dawson on AI, Kubernetes &amp; Open Source | KubeCon + CloudNativeCon NA 2025: <a href='https://www.youtube.com/watch?v=kUcEl3hfvG8'>https://www.youtube.com/watch?v=kUcEl3hfvG8</a>  </li><li>ClearTech Loop: AI Security Needs Better Execution with Zach Lewis: <a href='https://www.buzzsprout.com/2248577'>https://www.buzzsprout.com/2248577</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI is getting embedded into everything, security workflows, engineering workflows, and customer facing products, often faster than organizations can govern it. The upside is real. The risk is in the assumptions leaders are making while they chase speed. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Margaret Dawson, Chief Marketing Officer at SUSE, for a slightly different conversation than our usual guest mix. Same three questions, but through a CMO lens shaped by decades of enterprise buying cycles. </p><p>Margaret breaks down how security leaders can use generative AI to move beyond tools and tech, what it actually takes to embed security and privacy without slowing innovation, and how CMOs should talk about AI without getting trapped in AI washing. The throughline is practical: productivity gains are real, but cost, control, and credibility are not automatic. </p><p>Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p>Key Quotes <br/>“The mistake that we’re making as leaders is we are assuming that the integration of AI is an automatic reduction in cost.” — Margaret Dawson </p><p>“Until all of a sudden, the CFO got a million dollar cloud bill.” — Margaret Dawson <br/>“Consumers get smarter, very, very fast, especially BtoB Tech customers, and they start to know what’s real and what’s not.” — Margaret Dawson </p><p>“Being very specific on what it is doing for your product, for that customer, tying it back to the business outcome.” — Margaret Dawson <br/>“People trust their peers more than any vendor or anyone else.” — Margaret Dawson </p><p>Three Big Ideas from This Episode </p><ol><li>AI adoption fails when leaders treat it like automatic margin <br/>The board level narrative is tempting, but dangerous. AI can improve productivity, but assuming it instantly reduces cost is how organizations create governance debt and business continuity risk. </li><li>Speed is possible, but only with guardrails <br/>Embedding security and privacy is not what slows innovation. Confusion, rework, and incidents slow innovation. The answer is clear boundaries, clear accountability, and controls that keep pace with adoption. </li><li>In marketing, relevance and proof beat hype <br/>Buyers calibrate fast. AI messaging has to be specific, tied to outcomes, and backed by customer evidence. Credibility is built peer to peer, not through louder claims. </li></ol><p>Resources Mentioned </p><ul><li>The Secret to Digital Transformation is Human Connection by Margaret Dawson: <a href='https://devops.com/the-secret-to-digital-transformation-is-human-connection/'>https://devops.com/the-secret-to-digital-transformation-is-human-connection/</a> </li><li>INTERVIEW: SUSE CMO Margaret Dawson on AI, Kubernetes &amp; Open Source | KubeCon + CloudNativeCon NA 2025: <a href='https://www.youtube.com/watch?v=kUcEl3hfvG8'>https://www.youtube.com/watch?v=kUcEl3hfvG8</a>  </li><li>ClearTech Loop: AI Security Needs Better Execution with Zach Lewis: <a href='https://www.buzzsprout.com/2248577'>https://www.buzzsprout.com/2248577</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18734882-ai-cost-control-and-relevance-with-margaret-dawson-cmo-suse.mp3" length="12688900" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pdht6ky8k6qhl1iayhnemy1ljwef?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18734882</guid>
    <pubDate>Tue, 24 Feb 2026 01:00:00 -0500</pubDate>
    <itunes:duration>1054</itunes:duration>
    <itunes:keywords> AI leadership, AI security, generative AI, agentic AI, AI governance, security and privacy, business continuity, observability, cloud governance, AI cost, AI washing, B2B marketing, product relevance, customer proof, peer trust, open source, SUSE, Margar</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Security Needs Better Execution with Zach Lewis (CIO/CISO | Author, Locked Up)</itunes:title>
    <title>AI Security Needs Better Execution with Zach Lewis (CIO/CISO | Author, Locked Up)</title>
    <itunes:summary><![CDATA[AI security is getting marketed like it requires a brand-new playbook—new frameworks, new job titles, new spend.  In this episode of ClearTech Loop, Jo Peterson sits down with Zach Lewis (CIO/CISO and author of Locked Up) for a practical reset: AI doesn’t erase the fundamentals—it punishes you faster when you ignore them. Zach breaks down where GenAI is already helping security programs today (especially tabletop exercises and prioritization), what it actually takes to embed security and...]]></itunes:summary>
    <description><![CDATA[<p>AI security is getting marketed like it requires a brand-new playbook—new frameworks, new job titles, new spend. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Zach Lewis (CIO/CISO and author of <em>Locked Up</em>) for a practical reset: <b>AI doesn’t erase the fundamentals—it punishes you faster when you ignore them.</b> Zach breaks down where GenAI is already helping security programs today (especially tabletop exercises and prioritization), what it actually takes to embed security and privacy into AI models without slowing innovation (data classification, access controls, segmentation, documentation, least privilege), and why adoption fails when leaders treat AI like a tool rollout instead of a behavior change. </p><p>The takeaway is simple and actionable: get the foundations right, use AI to reduce friction where it matters, and build a culture where AI augments people rather than creating fear.  </p><p><b>Subscribe to ClearTech Loop on LinkedIn:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Key Quotes</b> </p><p>“<b>Strong AI security… starts with doing the basics well.</b>” — Zach Lewis  </p><p>“<b>One of the best use cases I found for it was tabletop exercises.</b>” — Zach Lewis  </p><p>“<b>You had a billion alerts… and you’re like, which one’s important?</b>” — Jo Peterson  </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1) AI security is data discipline + access discipline</b> </p><p>Before you talk tools, talk foundations: classify data before it touches a model, segment critical workloads, gate access by role and sensitivity, document prompts/sources/model versions, and enforce least privilege with ongoing testing and validation.  </p><p><b>2) GenAI can make readiness more real (tabletop exercises)</b> </p><p>Instead of running the same scripted scenario every year, GenAI can generate realistic incidents, inject curveballs, and help teams identify missed actions—turning tabletops into a real maturity-building loop.  </p><p><b>3) Adoption is a leadership problem, not a platform problem</b> </p><p>AI initiatives stall when people are afraid or unsupported. Training, shared use cases, and visible wins (time saved, friction removed) create a safe environment where AI augments work rather than threatening it.  </p><p>📘 <b>Zach’s book:</b> <em>Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World LockBit Ransomware Response</em>   <a href='https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044'>https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044</a> </p><p><b>Resources Mentioned </b> </p><ul><li>ClearTech Loop with Michael Machado AI Risk is Mostly Not New:<a href='https://www.buzzsprout.com/2248577/episodes/18535354-ai-risk-is-mostly-not-new-with-michael-machado'>https://www.buzzsprout.com/2248577/episodes/18535354-ai-risk-is-mostly-not-new-with-michael-machado</a>   </li><li>Locked Up by Zach Lewis is available: <a href='https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044'>https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044</a> </li><li>NIST AI Risk Management Framework: https://www.nist.gov/itl/ai-risk-management-framework </li><li>MITRE ATT&amp;CK Framework: <a href='https://attack.mitre.org/'>https://attack.mitre.org/</a><b> </b>   </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI security is getting marketed like it requires a brand-new playbook—new frameworks, new job titles, new spend. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Zach Lewis (CIO/CISO and author of <em>Locked Up</em>) for a practical reset: <b>AI doesn’t erase the fundamentals—it punishes you faster when you ignore them.</b> Zach breaks down where GenAI is already helping security programs today (especially tabletop exercises and prioritization), what it actually takes to embed security and privacy into AI models without slowing innovation (data classification, access controls, segmentation, documentation, least privilege), and why adoption fails when leaders treat AI like a tool rollout instead of a behavior change. </p><p>The takeaway is simple and actionable: get the foundations right, use AI to reduce friction where it matters, and build a culture where AI augments people rather than creating fear.  </p><p><b>Subscribe to ClearTech Loop on LinkedIn:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Key Quotes</b> </p><p>“<b>Strong AI security… starts with doing the basics well.</b>” — Zach Lewis  </p><p>“<b>One of the best use cases I found for it was tabletop exercises.</b>” — Zach Lewis  </p><p>“<b>You had a billion alerts… and you’re like, which one’s important?</b>” — Jo Peterson  </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1) AI security is data discipline + access discipline</b> </p><p>Before you talk tools, talk foundations: classify data before it touches a model, segment critical workloads, gate access by role and sensitivity, document prompts/sources/model versions, and enforce least privilege with ongoing testing and validation.  </p><p><b>2) GenAI can make readiness more real (tabletop exercises)</b> </p><p>Instead of running the same scripted scenario every year, GenAI can generate realistic incidents, inject curveballs, and help teams identify missed actions—turning tabletops into a real maturity-building loop.  </p><p><b>3) Adoption is a leadership problem, not a platform problem</b> </p><p>AI initiatives stall when people are afraid or unsupported. Training, shared use cases, and visible wins (time saved, friction removed) create a safe environment where AI augments work rather than threatening it.  </p><p>📘 <b>Zach’s book:</b> <em>Locked Up: Cybersecurity Threat Mitigation Lessons from a Real-World LockBit Ransomware Response</em>   <a href='https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044'>https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044</a> </p><p><b>Resources Mentioned </b> </p><ul><li>ClearTech Loop with Michael Machado AI Risk is Mostly Not New:<a href='https://www.buzzsprout.com/2248577/episodes/18535354-ai-risk-is-mostly-not-new-with-michael-machado'>https://www.buzzsprout.com/2248577/episodes/18535354-ai-risk-is-mostly-not-new-with-michael-machado</a>   </li><li>Locked Up by Zach Lewis is available: <a href='https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044'>https://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044</a> </li><li>NIST AI Risk Management Framework: https://www.nist.gov/itl/ai-risk-management-framework </li><li>MITRE ATT&amp;CK Framework: <a href='https://attack.mitre.org/'>https://attack.mitre.org/</a><b> </b>   </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18665307-ai-security-needs-better-execution-with-zach-lewis-cio-ciso-author-locked-up.mp3" length="7686754" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a45wykw64yoa7b7sftkskfm4b0bi?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18665307</guid>
    <pubDate>Thu, 12 Feb 2026 02:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18665307/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18665307/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18665307/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18665307/transcript.vtt" type="text/vtt" />
    <itunes:duration>637</itunes:duration>
    <itunes:keywords>AI security, AI governance, data classification, access controls, least privilege, segmentation, tabletop exercises, incident response readiness, security prioritization, alert overload, security leadership, CIO CISO alignment, ransomware resilience, Zach</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Governance Is a Catalyst in AI Security with Stefano Righi (AMI) </itunes:title>
    <title>Governance Is a Catalyst in AI Security with Stefano Righi (AMI) </title>
    <itunes:summary><![CDATA[AI is speeding up both attackers and defenders. The goal is not speed alone. The goal is speed with trust.  In this episode of ClearTech Loop, Jo Peterson sits down with Stefano Righi, Chief Security Architect at American Megatrends, for a hot take conversation on what AI is changing inside security programs. Stefano breaks down how GenAI can move teams beyond reactive, tool centric security into anticipatory defense through predictive threat modeling, dynamic risk assessment, and orches...]]></itunes:summary>
    <description><![CDATA[<p>AI is speeding up both attackers and defenders. The goal is not speed alone. The goal is speed with trust. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Stefano Righi, Chief Security Architect at American Megatrends, for a hot take conversation on what AI is changing inside security programs. Stefano breaks down how GenAI can move teams beyond reactive, tool centric security into anticipatory defense through predictive threat modeling, dynamic risk assessment, and orchestration. He also explains what secure by design means for AI systems, including privacy, adversarial resiliency, prompt injection, and data poisoning, plus why human oversight still matters. The conversation closes on firmware security below the operating system and why governance aligned to standards becomes an accelerator, not paperwork. </p><p>Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><ul><li>“Governance may act as a catalyst, not as a brake to innovation, enabling innovation while ensuring trust.” — Stefano Righi </li><li>“From the very start, we need to pursue secure by design for AI model… build privacy and adversarial resiliency into AI life cycles… mitigate risk like prompt injection and data poisoning without slowing innovation.” — Stefano Righi </li><li>“Firmware runs under the operating system, and any attack that could happen at such layer could go undetected by any antivirus solution running in the operating system.” — Stefano Righi </li></ul><p><b>Three Big Ideas from This Episode</b> </p><ol><li>Governance accelerates trusted AI adoption <br/>Governance is not paperwork. Done right, it enables innovation while ensuring trust, and it must be cross functional rather than owned by security alone. </li><li>Secure by design has to include AI systems <br/>Privacy and adversarial resiliency belong in the AI lifecycle from the start, with attention to risks like prompt injection and data poisoning, plus human oversight to ensure compliance and prevent misuse. </li><li>Firmware is a visibility blind spot below the OS <br/>Platform layers from microcode to BIOS to BMC to Root of Trust create real complexity, and attacks below the OS can bypass controls that security leaders rely on for visibility. </li></ol><p><b>Episode Notes / Links</b> </p><p>🎧 Listen: In player above<br/>▶ Watch on YouTube: <a href='https://youtu.be/wXOf6erkQ6k'>https://youtu.be/wXOf6erkQ6k</a><br/>📰 Subscribe to the Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><ul><li>ClearTech Loop: The CSA AI Safety Initiative with George Finney <a href='https://cleartechresearch.com/the-csa-ai-safety-initiative-with-george-finney/'>https://cleartechresearch.com/the-csa-ai-safety-initiative-with-george-finney/</a>  </li><li>NIST AI Standards: <a href='https://www.nist.gov/artificial-intelligence/ai-standards'>https://www.nist.gov/artificial-intelligence/ai-standards</a>   </li><li>OWASP guidance for AI: <a href='https://owasp.org/www-project-ai-security-and-privacy-guide/'>https://owasp.org/www-project-ai-security-and-privacy-guide/</a>  </li><li>CSA: How Generative AI is Reshaping Zero Trust Security <a href='https://cloudsecurityalliance.org/blog/2026/01/09/how-generative-ai-is-reshaping-zero-trust-security'>https://cloudsecurityalliance.org/blog/2026/01/09/how-generative-ai-is-reshaping-zero-trust-security</a>  </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI is speeding up both attackers and defenders. The goal is not speed alone. The goal is speed with trust. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Stefano Righi, Chief Security Architect at American Megatrends, for a hot take conversation on what AI is changing inside security programs. Stefano breaks down how GenAI can move teams beyond reactive, tool centric security into anticipatory defense through predictive threat modeling, dynamic risk assessment, and orchestration. He also explains what secure by design means for AI systems, including privacy, adversarial resiliency, prompt injection, and data poisoning, plus why human oversight still matters. The conversation closes on firmware security below the operating system and why governance aligned to standards becomes an accelerator, not paperwork. </p><p>Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><ul><li>“Governance may act as a catalyst, not as a brake to innovation, enabling innovation while ensuring trust.” — Stefano Righi </li><li>“From the very start, we need to pursue secure by design for AI model… build privacy and adversarial resiliency into AI life cycles… mitigate risk like prompt injection and data poisoning without slowing innovation.” — Stefano Righi </li><li>“Firmware runs under the operating system, and any attack that could happen at such layer could go undetected by any antivirus solution running in the operating system.” — Stefano Righi </li></ul><p><b>Three Big Ideas from This Episode</b> </p><ol><li>Governance accelerates trusted AI adoption <br/>Governance is not paperwork. Done right, it enables innovation while ensuring trust, and it must be cross functional rather than owned by security alone. </li><li>Secure by design has to include AI systems <br/>Privacy and adversarial resiliency belong in the AI lifecycle from the start, with attention to risks like prompt injection and data poisoning, plus human oversight to ensure compliance and prevent misuse. </li><li>Firmware is a visibility blind spot below the OS <br/>Platform layers from microcode to BIOS to BMC to Root of Trust create real complexity, and attacks below the OS can bypass controls that security leaders rely on for visibility. </li></ol><p><b>Episode Notes / Links</b> </p><p>🎧 Listen: In player above<br/>▶ Watch on YouTube: <a href='https://youtu.be/wXOf6erkQ6k'>https://youtu.be/wXOf6erkQ6k</a><br/>📰 Subscribe to the Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><ul><li>ClearTech Loop: The CSA AI Safety Initiative with George Finney <a href='https://cleartechresearch.com/the-csa-ai-safety-initiative-with-george-finney/'>https://cleartechresearch.com/the-csa-ai-safety-initiative-with-george-finney/</a>  </li><li>NIST AI Standards: <a href='https://www.nist.gov/artificial-intelligence/ai-standards'>https://www.nist.gov/artificial-intelligence/ai-standards</a>   </li><li>OWASP guidance for AI: <a href='https://owasp.org/www-project-ai-security-and-privacy-guide/'>https://owasp.org/www-project-ai-security-and-privacy-guide/</a>  </li><li>CSA: How Generative AI is Reshaping Zero Trust Security <a href='https://cloudsecurityalliance.org/blog/2026/01/09/how-generative-ai-is-reshaping-zero-trust-security'>https://cloudsecurityalliance.org/blog/2026/01/09/how-generative-ai-is-reshaping-zero-trust-security</a>  </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18651944-governance-is-a-catalyst-in-ai-security-with-stefano-righi-ami.mp3" length="8923420" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/guzk7nllx5ylqr7r7mch4eweszfp?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18651944</guid>
    <pubDate>Tue, 10 Feb 2026 01:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18651944/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18651944/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18651944/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18651944/transcript.vtt" type="text/vtt" />
    <itunes:duration>740</itunes:duration>
    <itunes:keywords>AI security, AI governance, secure by design, prompt injection, data poisoning, adversarial AI, firmware security, BIOS, BMC, Root of Trust, predictive threat modeling, dynamic risk assessment, security orchestration, NIST, ISO, OWASP, EU AI Act, Cyber Re</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Tool-Driven Cyber to Adaptive AI Defense with Ryan Lutz  </itunes:title>
    <title>From Tool-Driven Cyber to Adaptive AI Defense with Ryan Lutz  </title>
    <itunes:summary><![CDATA[Cybersecurity has become a tool driven industry. Organizations buy platforms, stack controls, generate alerts, and ask humans to stitch it all together under pressure.   In this episode of ClearTech Loop, Jo Peterson sits down with Ryan Lutz to explore what changes when AI becomes part of the security workflow. Not as another console, but as an adaptive capability that helps teams interpret signals faster, prioritize more intelligently, and respond with more consistency when the volume i...]]></itunes:summary>
    <description><![CDATA[<p>Cybersecurity has become a tool driven industry. Organizations buy platforms, stack controls, generate alerts, and ask humans to stitch it all together under pressure.  </p><p>In this episode of <b>ClearTech Loop</b>, Jo Peterson sits down with <b>Ryan Lutz</b> to explore what changes when AI becomes part of the security workflow. Not as another console, but as an <b>adaptive capability</b> that helps teams interpret signals faster, prioritize more intelligently, and respond with more consistency when the volume is too high for humans to manage alone.  </p><p>The conversation focuses on three real-world themes: <br/>Why the SOC is the best initial use case for AI augmentation, how leaders should think about the inherent exposure that comes with more AI and more code, and why Ryan’s research on AI malware matters for building adaptive defensive responses.  </p><p>Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Key Quotes</b> </p><p>“Cyber is a very tool driven industry… with the implementation of AI being generative, I think that we’re going to see AI being used more in a way that’s adaptive.” — Ryan Lutz  </p><p>“In a setting like a SOC analyst… you have a ton of information coming in… millions of possible attack vectors… it’s very applicable to use AI… to generate a response very quickly and more efficiently.” — Ryan Lutz  </p><p>“How should the CISO be thinking about AI adoption… from an organizational governance perspective, because you don’t want to be the Department of no.” — Jo Peterson  </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1) Adaptive beats tool-driven</b> <br/>AI helps security teams move beyond tool sprawl by accelerating interpretation, prioritization, and decision-making in high-volume environments.  </p><p><b>2) The SOC is the natural first use case</b> <br/>SOC work is overwhelmed by inputs and possible attack paths. Ryan explains why AI can rank what matters, accelerate analysis, and suggest response paths quickly and efficiently.  </p><p><b>3) Governance must guide adoption without killing innovation</b> <br/>More AI and more code creates more exposure. The leadership job is balance: govern the use and guide adoption without becoming the “Department of No.”  </p><p><b>Episode Notes / Links</b> </p><p>🎧 Listen: In player<br/>▶ Watch on YouTube: https://youtu.be/-2mxfnCexjQ   <br/>📰 Subscribe to the Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Resources Mentioned</b> </p><ul><li>MITRE ATT&amp;CK Framework <a href='https://attack.mitre.org/'>https://attack.mitre.org/</a> </li><li>NIST Cybersecurity Framework (CSF) <a href='https://www.nist.gov/cyberframework'>https://www.nist.gov/cyberframework</a> </li><li>ClearTech Loop <em>AI Only Works If Your Foundations Do: A Conversation with Dr. Anton Chuvakin</em><b> </b><a href='https://www.buzzsprout.com/2248577/episodes/18211623-ai-only-works-if-your-foundations-do-a-conversation-with-dr-anton-chuvakin'>https://www.buzzsprout.com/2248577/episodes/18211623-ai-only-works-if-your-foundations-do-a-conversation-with-dr-anton-chuvakin</a> </li></ul><p><br/></p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>Cybersecurity has become a tool driven industry. Organizations buy platforms, stack controls, generate alerts, and ask humans to stitch it all together under pressure.  </p><p>In this episode of <b>ClearTech Loop</b>, Jo Peterson sits down with <b>Ryan Lutz</b> to explore what changes when AI becomes part of the security workflow. Not as another console, but as an <b>adaptive capability</b> that helps teams interpret signals faster, prioritize more intelligently, and respond with more consistency when the volume is too high for humans to manage alone.  </p><p>The conversation focuses on three real-world themes: <br/>Why the SOC is the best initial use case for AI augmentation, how leaders should think about the inherent exposure that comes with more AI and more code, and why Ryan’s research on AI malware matters for building adaptive defensive responses.  </p><p>Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Key Quotes</b> </p><p>“Cyber is a very tool driven industry… with the implementation of AI being generative, I think that we’re going to see AI being used more in a way that’s adaptive.” — Ryan Lutz  </p><p>“In a setting like a SOC analyst… you have a ton of information coming in… millions of possible attack vectors… it’s very applicable to use AI… to generate a response very quickly and more efficiently.” — Ryan Lutz  </p><p>“How should the CISO be thinking about AI adoption… from an organizational governance perspective, because you don’t want to be the Department of no.” — Jo Peterson  </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1) Adaptive beats tool-driven</b> <br/>AI helps security teams move beyond tool sprawl by accelerating interpretation, prioritization, and decision-making in high-volume environments.  </p><p><b>2) The SOC is the natural first use case</b> <br/>SOC work is overwhelmed by inputs and possible attack paths. Ryan explains why AI can rank what matters, accelerate analysis, and suggest response paths quickly and efficiently.  </p><p><b>3) Governance must guide adoption without killing innovation</b> <br/>More AI and more code creates more exposure. The leadership job is balance: govern the use and guide adoption without becoming the “Department of No.”  </p><p><b>Episode Notes / Links</b> </p><p>🎧 Listen: In player<br/>▶ Watch on YouTube: https://youtu.be/-2mxfnCexjQ   <br/>📰 Subscribe to the Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Resources Mentioned</b> </p><ul><li>MITRE ATT&amp;CK Framework <a href='https://attack.mitre.org/'>https://attack.mitre.org/</a> </li><li>NIST Cybersecurity Framework (CSF) <a href='https://www.nist.gov/cyberframework'>https://www.nist.gov/cyberframework</a> </li><li>ClearTech Loop <em>AI Only Works If Your Foundations Do: A Conversation with Dr. Anton Chuvakin</em><b> </b><a href='https://www.buzzsprout.com/2248577/episodes/18211623-ai-only-works-if-your-foundations-do-a-conversation-with-dr-anton-chuvakin'>https://www.buzzsprout.com/2248577/episodes/18211623-ai-only-works-if-your-foundations-do-a-conversation-with-dr-anton-chuvakin</a> </li></ul><p><br/></p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18627412-from-tool-driven-cyber-to-adaptive-ai-defense-with-ryan-lutz.mp3" length="6681426" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/m9v3lx3e4twh1e24w6jar8mb5ynw?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18627412</guid>
    <pubDate>Thu, 05 Feb 2026 00:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18627412/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18627412/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18627412/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18627412/transcript.vtt" type="text/vtt" />
    <itunes:duration>552</itunes:duration>
    <itunes:keywords>Adaptive AI defense, AI in SOC, SOC augmentation, cybersecurity governance, tool sprawl, AI malware research, IDS, IPS, MITRE ATT&amp;CK, NIST CSF, Ryan Lutz, Jo Peterson, ClearTech Loop  </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Reactive to Predictive in AI Security with Jen Waltz  </itunes:title>
    <title>From Reactive to Predictive in AI Security with Jen Waltz  </title>
    <itunes:summary><![CDATA[Cybersecurity has been trapped in a reactive cycle for years: a new threat emerges, a new tool gets purchased, and teams get overwhelmed by alerts.  In this episode of ClearTech Loop, Jo Peterson sits down with Jen Waltz (Chief Information Security Officer at IMAJENATIVE) to unpack how generative AI can fundamentally disrupt that cycle—shifting the focus from managing tools to achieving strategic outcomes.  The conversation goes beyond “faster alerts” and gets practical about what’s...]]></itunes:summary>
    <description><![CDATA[<p>Cybersecurity has been trapped in a reactive cycle for years: a new threat emerges, a new tool gets purchased, and teams get overwhelmed by alerts. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Jen Waltz (Chief Information Security Officer at IMAJENATIVE) to unpack how generative AI can fundamentally disrupt that cycle—<b>shifting the focus from managing tools to achieving strategic outcomes.</b> </p><p>The conversation goes beyond “faster alerts” and gets practical about what’s changing right now: </p><ul><li>Moving beyond alert triage into <b>predictive threat hunting</b>, including simulating adversary behavior and generating TTP playbooks—especially when paired with threat intel and MITRE ATT&amp;CK data. </li><li>Upskilling SOC teams by using GenAI to reduce menial work, provide clearer remediation paths, and support more anticipatory defense postures. </li><li>Embedding security, privacy, and governance early so “secure-by-design” becomes a business enabler, not a speed bump. </li></ul><p>Jen also gives a clear governance warning: as AI adoption accelerates, organizations must guide usage with approved tools and acceptable-use controls—especially to reduce the risk of sensitive data being dropped into consumer AI chat tools like ChatGPT. </p><p>If you’re responsible for security operations, AI strategy, or governance, this episode offers a grounded path for how to adopt GenAI without losing control. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“Cybersecurity has long been trapped in this reactive cycle… generative AI… can fundamentally disrupt the cycle by shifting the focus from managing tools to achieving strategic outcomes.” — Jen Waltz </p><p>“The CISO no longer is this superhero defender of the perimeter. You have to become a business strategist…” — Jen Waltz </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. GenAI can break the reactive cycle—if teams target outcomes, not tools</b> <br/>Jen frames GenAI as an opportunity to move beyond buying more technology and instead shift security programs toward strategic outcomes and anticipatory defense. </p><p><b>2. Predictive threat hunting becomes practical with TTP playbooks + MITRE ATT&amp;CK context</b> <br/>Rather than only prioritizing alerts, Jen describes prompting GenAI to simulate adversaries and generate playbooks—then connecting that to threat intel and MITRE ATT&amp;CK data to anticipate attacker evolution earlier. </p><p><b>3. AI governance is a leadership mandate—and the CISO role expands</b> <br/>Jen argues the CISO must operate as a business strategist balancing innovation enablement with risk governance. That includes guiding internal AI use with hardened, approved tools and clear controls—without shutting down creativity. </p><p>🎧 Listen: Buzzsprout player above<br/>▶ Watch on YouTube: <a href='https://youtu.be/EEf0eRdCfzg'>https://youtu.be/EEf0eRdCfzg</a></p><p>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><ul><li>MITRE ATT&amp;CK Framework: <a href='https://attack.mitre.org/resources/attack-data-and-tools/'>https://attack.mitre.org/resources/attack-data-and-tools/</a>  </li><li>NIST Cybersecurity Framework (CSF): <a href='https://www.nist.gov/cyberframework'>https://www.nist.gov/cyberframework</a>  </li><li>ISO/IEC 27001 (ISMS): <a href='https://www.iso.org/standard/27001'></a></li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>Cybersecurity has been trapped in a reactive cycle for years: a new threat emerges, a new tool gets purchased, and teams get overwhelmed by alerts. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Jen Waltz (Chief Information Security Officer at IMAJENATIVE) to unpack how generative AI can fundamentally disrupt that cycle—<b>shifting the focus from managing tools to achieving strategic outcomes.</b> </p><p>The conversation goes beyond “faster alerts” and gets practical about what’s changing right now: </p><ul><li>Moving beyond alert triage into <b>predictive threat hunting</b>, including simulating adversary behavior and generating TTP playbooks—especially when paired with threat intel and MITRE ATT&amp;CK data. </li><li>Upskilling SOC teams by using GenAI to reduce menial work, provide clearer remediation paths, and support more anticipatory defense postures. </li><li>Embedding security, privacy, and governance early so “secure-by-design” becomes a business enabler, not a speed bump. </li></ul><p>Jen also gives a clear governance warning: as AI adoption accelerates, organizations must guide usage with approved tools and acceptable-use controls—especially to reduce the risk of sensitive data being dropped into consumer AI chat tools like ChatGPT. </p><p>If you’re responsible for security operations, AI strategy, or governance, this episode offers a grounded path for how to adopt GenAI without losing control. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“Cybersecurity has long been trapped in this reactive cycle… generative AI… can fundamentally disrupt the cycle by shifting the focus from managing tools to achieving strategic outcomes.” — Jen Waltz </p><p>“The CISO no longer is this superhero defender of the perimeter. You have to become a business strategist…” — Jen Waltz </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. GenAI can break the reactive cycle—if teams target outcomes, not tools</b> <br/>Jen frames GenAI as an opportunity to move beyond buying more technology and instead shift security programs toward strategic outcomes and anticipatory defense. </p><p><b>2. Predictive threat hunting becomes practical with TTP playbooks + MITRE ATT&amp;CK context</b> <br/>Rather than only prioritizing alerts, Jen describes prompting GenAI to simulate adversaries and generate playbooks—then connecting that to threat intel and MITRE ATT&amp;CK data to anticipate attacker evolution earlier. </p><p><b>3. AI governance is a leadership mandate—and the CISO role expands</b> <br/>Jen argues the CISO must operate as a business strategist balancing innovation enablement with risk governance. That includes guiding internal AI use with hardened, approved tools and clear controls—without shutting down creativity. </p><p>🎧 Listen: Buzzsprout player above<br/>▶ Watch on YouTube: <a href='https://youtu.be/EEf0eRdCfzg'>https://youtu.be/EEf0eRdCfzg</a></p><p>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><ul><li>MITRE ATT&amp;CK Framework: <a href='https://attack.mitre.org/resources/attack-data-and-tools/'>https://attack.mitre.org/resources/attack-data-and-tools/</a>  </li><li>NIST Cybersecurity Framework (CSF): <a href='https://www.nist.gov/cyberframework'>https://www.nist.gov/cyberframework</a>  </li><li>ISO/IEC 27001 (ISMS): <a href='https://www.iso.org/standard/27001'></a></li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18612867-from-reactive-to-predictive-in-ai-security-with-jen-waltz.mp3" length="12014855" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ktc0e2ip14nwlsk456dct6yh9a2r?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18612867</guid>
    <pubDate>Tue, 03 Feb 2026 05:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18612867/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18612867/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18612867/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18612867/transcript.vtt" type="text/vtt" />
    <itunes:duration>997</itunes:duration>
    <itunes:keywords>AI security, generative AI cybersecurity, predictive threat hunting, SOC modernization, remediation guidance, secure by design, AI governance, CISO, MITRE ATT&amp;CK, NIST CSF, ISO 27001, ISO 42001, Jen Waltz, Jo Peterson, ClearTech Loop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Security Is Still Software Security with Nicolas Moy </itunes:title>
    <title>AI Security Is Still Software Security with Nicolas Moy </title>
    <itunes:summary><![CDATA[AI is being embedded into enterprise tools faster than most organizations can govern it.  Productivity platforms, security systems, and development workflows now include AI capabilities by default, often without a single approval moment or clear ownership model.  In this episode of ClearTech Loop, Jo Peterson sits down with Nicolas Moy, Founder and CIO of LifeMark Financial and vCISO for Security Engineering at Halyard Labs, to talk about what AI security looks like in practice when...]]></itunes:summary>
    <description><![CDATA[<p>AI is being embedded into enterprise tools faster than most organizations can govern it. </p><p>Productivity platforms, security systems, and development workflows now include AI capabilities by default, often without a single approval moment or clear ownership model. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with <b>Nicolas Moy</b>, Founder and CIO of LifeMark Financial and vCISO for Security Engineering at Halyard Labs, to talk about what AI security looks like in practice when it is treated as software, not as a separate discipline. </p><p>Nicolas shares how security teams are already using AI today to accelerate policy development, reduce operational noise, and support threat modeling earlier in the design and build process. The conversation also explores why governance is struggling to keep pace with employee behavior, especially as sensitive information enters AI systems without clear visibility into where data goes or how it is reused. </p><p>Rather than framing AI security as a future problem, this discussion focuses on what CISOs and CIOs are dealing with right now, and why accountability has to keep pace as AI compresses timelines across security and technology decisions. </p><p>If you are navigating AI adoption across security, development, and governance, this episode provides a grounded perspective on how to approach AI without losing control. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“For AI, it’s similar, it’s software, but there’s some new evolutions to it.” <br/>— Nicolas Moy, CISSP, CCSK </p><p>“If my employee puts this confidential information into an AI chat system, where is that being shipped out to?” <br/>— Nicolas Moy, CISSP, CCSK </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. AI security accelerates familiar risks rather than creating new ones</b> </p><p>Treating AI as software brings it into existing security and DevSecOps practices earlier, rather than isolating it as a separate problem. </p><p><b>2. Governance is lagging behind real employee behavior</b> </p><p>AI tools are being used inside normal workflows faster than policies and controls were designed to handle. </p><p><b>3. CISOs and CIOs must engage together earlier</b> </p><p>AI security sits between architecture, data governance, and risk ownership, requiring shared accountability across roles. </p><p><br/></p><p>🎧 Listen on player above.</p><p>▶ Watch on YouTube: https://youtu.be/MBVbyAE33e0<br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><ul><li>OWASP Top 10 for Large Language Model Applications <br/><a href='https://owasp.org/www-project-top-10-for-large-language-model-applications/'>https://owasp.org/www-project-top-10-for-large-language-model-applications/</a> </li><li>OWASP AI Project <br/><a href='https://owasp.org/www-project-ai/'>https://owasp.org/www-project-ai/</a> </li><li>ClearTech Loop Episode: AI as a Digital Co Worker with Timothy Youngblood <br/><a href='https://www.buzzsprout.com/2248577/episodes/18509846-ai-as-a-digital-co-worker-with-the-experience-of-an-intern-with-timothy-youngblood'>https://www.buzzsprout.com/2248577/episodes/18509846-ai-as-a-digital-co-worker-with-the-experience-of-an-intern-with-timothy-youngblood</a> L</li><li>Learn more about Nicolas <a href='https://nicolasmoy.com/'>NicolasMo</a></li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI is being embedded into enterprise tools faster than most organizations can govern it. </p><p>Productivity platforms, security systems, and development workflows now include AI capabilities by default, often without a single approval moment or clear ownership model. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with <b>Nicolas Moy</b>, Founder and CIO of LifeMark Financial and vCISO for Security Engineering at Halyard Labs, to talk about what AI security looks like in practice when it is treated as software, not as a separate discipline. </p><p>Nicolas shares how security teams are already using AI today to accelerate policy development, reduce operational noise, and support threat modeling earlier in the design and build process. The conversation also explores why governance is struggling to keep pace with employee behavior, especially as sensitive information enters AI systems without clear visibility into where data goes or how it is reused. </p><p>Rather than framing AI security as a future problem, this discussion focuses on what CISOs and CIOs are dealing with right now, and why accountability has to keep pace as AI compresses timelines across security and technology decisions. </p><p>If you are navigating AI adoption across security, development, and governance, this episode provides a grounded perspective on how to approach AI without losing control. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“For AI, it’s similar, it’s software, but there’s some new evolutions to it.” <br/>— Nicolas Moy, CISSP, CCSK </p><p>“If my employee puts this confidential information into an AI chat system, where is that being shipped out to?” <br/>— Nicolas Moy, CISSP, CCSK </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. AI security accelerates familiar risks rather than creating new ones</b> </p><p>Treating AI as software brings it into existing security and DevSecOps practices earlier, rather than isolating it as a separate problem. </p><p><b>2. Governance is lagging behind real employee behavior</b> </p><p>AI tools are being used inside normal workflows faster than policies and controls were designed to handle. </p><p><b>3. CISOs and CIOs must engage together earlier</b> </p><p>AI security sits between architecture, data governance, and risk ownership, requiring shared accountability across roles. </p><p><br/></p><p>🎧 Listen on player above.</p><p>▶ Watch on YouTube: https://youtu.be/MBVbyAE33e0<br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><ul><li>OWASP Top 10 for Large Language Model Applications <br/><a href='https://owasp.org/www-project-top-10-for-large-language-model-applications/'>https://owasp.org/www-project-top-10-for-large-language-model-applications/</a> </li><li>OWASP AI Project <br/><a href='https://owasp.org/www-project-ai/'>https://owasp.org/www-project-ai/</a> </li><li>ClearTech Loop Episode: AI as a Digital Co Worker with Timothy Youngblood <br/><a href='https://www.buzzsprout.com/2248577/episodes/18509846-ai-as-a-digital-co-worker-with-the-experience-of-an-intern-with-timothy-youngblood'>https://www.buzzsprout.com/2248577/episodes/18509846-ai-as-a-digital-co-worker-with-the-experience-of-an-intern-with-timothy-youngblood</a> L</li><li>Learn more about Nicolas <a href='https://nicolasmoy.com/'>NicolasMo</a></li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18586155-ai-security-is-still-software-security-with-nicolas-moy.mp3" length="8126458" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/t27dgpkfr9md36bj44813obf8e6c?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18586155</guid>
    <pubDate>Thu, 29 Jan 2026 05:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18586155/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18586155/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18586155/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18586155/transcript.vtt" type="text/vtt" />
    <itunes:duration>673</itunes:duration>
    <itunes:keywords>AI security, DevSecOps AI, AI governance, AI threat modeling, AI security operations, CISO AI strategy, CIO AI governance, Nicolas Moy, Jo Peterson, ClearTech Loop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The CISO’s Job in AI Is Not to Stop the Wave, But to Shape It with Travis Farral, CISO at Archaea Energy </itunes:title>
    <title>The CISO’s Job in AI Is Not to Stop the Wave, But to Shape It with Travis Farral, CISO at Archaea Energy </title>
    <itunes:summary><![CDATA[AI did not arrive through a single decision. It crept into enterprises through productivity tools, cloud platforms, security products, and SaaS applications that teams were already using.  Most organizations did not choose to adopt AI. They woke up and realized it was already there.  In this episode of ClearTech Loop, Jo Peterson sits down with Travis Farral, Vice President and Chief Information Security Officer at Archaea Energy, to talk about what that reality means for security l...]]></itunes:summary>
    <description><![CDATA[<p>AI did not arrive through a single decision. It crept into enterprises through productivity tools, cloud platforms, security products, and SaaS applications that teams were already using. </p><p>Most organizations did not choose to adopt AI. They woke up and realized it was already there. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Travis Farral, Vice President and Chief Information Security Officer at Archaea Energy, to talk about what that reality means for security leaders who are being asked to govern AI systems that are still evolving in real time. </p><p>Travis explains why AI cannot be stopped, only shaped, and why the real risk is not the technology itself but the lack of clarity around what is actually being deployed. </p><p>“This is not something that we’re going to be able to stop,” he said. “Even if we wanted to. It’s like standing in front of a tidal wave.”  </p><p>The conversation covers: </p><ul><li>Why “AI” has become a dangerously vague label </li><li>How the AI threat model is shifting toward training data, prompts, and model behavior </li><li>Why frameworks from NIST, OWASP, and MITRE already exist </li><li>Why fluency, not guidance, is the real gap </li><li>How CISOs can define guardrails without becoming the Department of No </li></ul><p>If you are responsible for cybersecurity, data governance, or enterprise risk, this episode offers a grounded way to think about AI adoption without losing control of your environment. </p><p>🎧 Listen to the episode <br/>▶ Watch on YouTube <a href='https://youtu.be/JyQ2mgg_hYw'>https://youtu.be/JyQ2mgg_hYw</a></p><p>📬 Subscribe to the ClearTech Loop Newsletter <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quote</b> </p><p>“This is not something that we’re going to be able to stop. Even if we wanted to. It’s like standing in front of a tidal wave.” <br/>Travis Farral, CISO, Archaea Energy  </p><p><b>Additional Resources</b> </p><ul><li><b>NIST AI Risk Management Framework </b>Travis specifically called out NIST as one of the primary sources for understanding the risks and controls around generative and agentic AI: <a href='https://www.nist.gov/itl/ai-risk-management-framework'><b>https://www.nist.gov/itl/ai-risk-management-framework</b></a> </li><li><b>OWASP Top 10 for Large Language Model Applications </b>When Travis talked about protecting prompts, inputs, and model interfaces, he was pointing directly at the kinds of risks OWASP is mapping for LLMs.<b> </b><a href='https://owasp.org/www-project-top-10-for-large-language-model-applications/'><b>https://owasp.org/www-project-top-10-for-large-language-model-applications/</b></a> </li><li><b>MITRE ATLAS MITRE’s </b>Adversarial Threat Landscape for AI is one of the frameworks Travis referenced when he talked about how attacks against models are different from traditional exploits<b>. </b><a href='https://atlas.mitre.org/'><b>https://atlas.mitre.org/</b></a> </li><li><b>ClearTech Loop with Dutch Schwartz </b>Travis’s comments about guardrails, controls, and not being the Department of No connect directly to Dutch’s episode on pragmatic AI safety.<b> </b><a href='https://cleartechresearch.com/bumpers-not-brakes/'><b>https://cleartechresearch.com/bumpers-not-brakes/</b></a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI did not arrive through a single decision. It crept into enterprises through productivity tools, cloud platforms, security products, and SaaS applications that teams were already using. </p><p>Most organizations did not choose to adopt AI. They woke up and realized it was already there. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Travis Farral, Vice President and Chief Information Security Officer at Archaea Energy, to talk about what that reality means for security leaders who are being asked to govern AI systems that are still evolving in real time. </p><p>Travis explains why AI cannot be stopped, only shaped, and why the real risk is not the technology itself but the lack of clarity around what is actually being deployed. </p><p>“This is not something that we’re going to be able to stop,” he said. “Even if we wanted to. It’s like standing in front of a tidal wave.”  </p><p>The conversation covers: </p><ul><li>Why “AI” has become a dangerously vague label </li><li>How the AI threat model is shifting toward training data, prompts, and model behavior </li><li>Why frameworks from NIST, OWASP, and MITRE already exist </li><li>Why fluency, not guidance, is the real gap </li><li>How CISOs can define guardrails without becoming the Department of No </li></ul><p>If you are responsible for cybersecurity, data governance, or enterprise risk, this episode offers a grounded way to think about AI adoption without losing control of your environment. </p><p>🎧 Listen to the episode <br/>▶ Watch on YouTube <a href='https://youtu.be/JyQ2mgg_hYw'>https://youtu.be/JyQ2mgg_hYw</a></p><p>📬 Subscribe to the ClearTech Loop Newsletter <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quote</b> </p><p>“This is not something that we’re going to be able to stop. Even if we wanted to. It’s like standing in front of a tidal wave.” <br/>Travis Farral, CISO, Archaea Energy  </p><p><b>Additional Resources</b> </p><ul><li><b>NIST AI Risk Management Framework </b>Travis specifically called out NIST as one of the primary sources for understanding the risks and controls around generative and agentic AI: <a href='https://www.nist.gov/itl/ai-risk-management-framework'><b>https://www.nist.gov/itl/ai-risk-management-framework</b></a> </li><li><b>OWASP Top 10 for Large Language Model Applications </b>When Travis talked about protecting prompts, inputs, and model interfaces, he was pointing directly at the kinds of risks OWASP is mapping for LLMs.<b> </b><a href='https://owasp.org/www-project-top-10-for-large-language-model-applications/'><b>https://owasp.org/www-project-top-10-for-large-language-model-applications/</b></a> </li><li><b>MITRE ATLAS MITRE’s </b>Adversarial Threat Landscape for AI is one of the frameworks Travis referenced when he talked about how attacks against models are different from traditional exploits<b>. </b><a href='https://atlas.mitre.org/'><b>https://atlas.mitre.org/</b></a> </li><li><b>ClearTech Loop with Dutch Schwartz </b>Travis’s comments about guardrails, controls, and not being the Department of No connect directly to Dutch’s episode on pragmatic AI safety.<b> </b><a href='https://cleartechresearch.com/bumpers-not-brakes/'><b>https://cleartechresearch.com/bumpers-not-brakes/</b></a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18574500-the-ciso-s-job-in-ai-is-not-to-stop-the-wave-but-to-shape-it-with-travis-farral-ciso-at-archaea-energy.mp3" length="8388134" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/d94btoary0pdysdj0hb5llvz6u3s?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18574500</guid>
    <pubDate>Tue, 27 Jan 2026 05:00:00 -0500</pubDate>
    <itunes:duration>695</itunes:duration>
    <itunes:keywords>AI governance  CISO leadership  LLM security  AI risk management  Prompt injection  Model poisoning  NIST AI RMF  OWASP LLM  MITRE ATLAS  ClearTech Loop  Travis Farral  Archaea Energy </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Risk Is Mostly Not New with Michael Machado </itunes:title>
    <title>AI Risk Is Mostly Not New with Michael Machado </title>
    <itunes:summary><![CDATA[AI has technically been around for years. What changed is not the math, it is the front door. Suddenly anyone in the organization can touch it, feed it data, and make decisions with it and that shift in accessibility is rewriting business risk.   In this episode of ClearTech Loop, Jo Peterson sits down with Michael Machado, CISO and Chief Data Officer at Hyland, to break down a calm, practical truth CISOs need right now. Most of the AI risk conversation is not new. The disciplines are fa...]]></itunes:summary>
    <description><![CDATA[<p>AI has technically been around for years. What changed is not the math, it is the front door. Suddenly anyone in the organization can touch it, feed it data, and make decisions with it and that shift in accessibility is rewriting business risk.  </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Michael Machado, CISO and Chief Data Officer at Hyland, to break down a calm, practical truth CISOs need right now. Most of the AI risk conversation is not new. The disciplines are familiar. Visibility. Data movement. Accountability. Audit trails. Resilience. What is different is the speed and the number of people who can now participate in risk without realizing it. </p><p>The conversation focuses on leadership realities, not hype: </p><ul><li>Why there is risk in doing things and risk in not doing things </li><li>How AI accessibility changes governance pressure inside enterprises </li><li>Why governance should start with business goals, not tools </li><li>What it means to build an AI governance model that is multi department by design </li><li>Why CISOs should measure adoption and value signals, not only exposure </li></ul><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> <br/>“Waves of technology come. Cloud, SaaS, mobile, AI. The muscles we flex are things we have seen before.” <br/>Michael Machado </p><p>“There’s a risk of doing things and a risk of not doing things, and it’s important to strike a balance when we’re having that conversation.” <br/>Michael Machado </p><p><b>Three Big Ideas from This Episode</b> </p><ol><li>AI risk is not new, accessibility is <br/>The models are not the headline. The fact that anyone can use them is. That changes how quickly data moves and how quickly decisions get made. </li><li>Governance starts with the business problem <br/>Tool first governance creates policies that look responsible and work poorly. Start with the objective, map the data movement, then apply controls that support the mission.  </li><li>Measure value analytics alongside risk analytics <br/>It is not enough to track what could go wrong. CISOs also need visibility into whether tools are being used and whether adoption is producing meaningful value. </li></ol><p><b>Episode Notes / Links</b> <br/>🎧 Listen in player <br/>▶ Watch on YouTube: https://youtu.be/D-1-Ny4hlF0 <br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><ul><li><b>Resources Mentioned</b> <br/>An Evolution of Defensive Security Operations: From Simple Detection to Modern SOC Automation <a href='https://www.linkedin.com/pulse/evolution-defensive-security-operations-from-simple-modern-machado-unctc/'>https://www.linkedin.com/pulse/evolution-defensive-security-operations-from-simple-modern-machado-unctc/</a>  </li><li>NIST AI Risk Management Framework <a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework</a>  </li><li>ClearTech Research Insights <a href='https://cleartechresearch.com/'>https://cleartechresearch.com</a>  </li></ul><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI has technically been around for years. What changed is not the math, it is the front door. Suddenly anyone in the organization can touch it, feed it data, and make decisions with it and that shift in accessibility is rewriting business risk.  </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Michael Machado, CISO and Chief Data Officer at Hyland, to break down a calm, practical truth CISOs need right now. Most of the AI risk conversation is not new. The disciplines are familiar. Visibility. Data movement. Accountability. Audit trails. Resilience. What is different is the speed and the number of people who can now participate in risk without realizing it. </p><p>The conversation focuses on leadership realities, not hype: </p><ul><li>Why there is risk in doing things and risk in not doing things </li><li>How AI accessibility changes governance pressure inside enterprises </li><li>Why governance should start with business goals, not tools </li><li>What it means to build an AI governance model that is multi department by design </li><li>Why CISOs should measure adoption and value signals, not only exposure </li></ul><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> <br/>“Waves of technology come. Cloud, SaaS, mobile, AI. The muscles we flex are things we have seen before.” <br/>Michael Machado </p><p>“There’s a risk of doing things and a risk of not doing things, and it’s important to strike a balance when we’re having that conversation.” <br/>Michael Machado </p><p><b>Three Big Ideas from This Episode</b> </p><ol><li>AI risk is not new, accessibility is <br/>The models are not the headline. The fact that anyone can use them is. That changes how quickly data moves and how quickly decisions get made. </li><li>Governance starts with the business problem <br/>Tool first governance creates policies that look responsible and work poorly. Start with the objective, map the data movement, then apply controls that support the mission.  </li><li>Measure value analytics alongside risk analytics <br/>It is not enough to track what could go wrong. CISOs also need visibility into whether tools are being used and whether adoption is producing meaningful value. </li></ol><p><b>Episode Notes / Links</b> <br/>🎧 Listen in player <br/>▶ Watch on YouTube: https://youtu.be/D-1-Ny4hlF0 <br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><ul><li><b>Resources Mentioned</b> <br/>An Evolution of Defensive Security Operations: From Simple Detection to Modern SOC Automation <a href='https://www.linkedin.com/pulse/evolution-defensive-security-operations-from-simple-modern-machado-unctc/'>https://www.linkedin.com/pulse/evolution-defensive-security-operations-from-simple-modern-machado-unctc/</a>  </li><li>NIST AI Risk Management Framework <a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework</a>  </li><li>ClearTech Research Insights <a href='https://cleartechresearch.com/'>https://cleartechresearch.com</a>  </li></ul><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18535354-ai-risk-is-mostly-not-new-with-michael-machado.mp3" length="13159494" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wtv05b5s2ltdsfxwrw1ut8rua55s?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18535354</guid>
    <pubDate>Tue, 20 Jan 2026 05:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18535354/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18535354/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18535354/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18535354/transcript.vtt" type="text/vtt" />
    <itunes:duration>1093</itunes:duration>
    <itunes:keywords> AI risk, AI governance, CISO leadership, business risk, data movement, audit trails, security analytics, value analytics, Michael Machado, Jo Peterson, ClearTech Loop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI as a Digital Co-Worker With the Experience of an Intern with Timothy Youngblood </itunes:title>
    <title>AI as a Digital Co-Worker With the Experience of an Intern with Timothy Youngblood </title>
    <itunes:summary><![CDATA[As AI becomes embedded across security operations and business workflows, organizations are confronting a new reality. AI is no longer just a tool. It is behaving like a digital co-worker acting on data, surfacing decisions, and influencing outcomes.  In this episode of ClearTech Loop, Jo Peterson sits down with Timothy Youngblood, a four-time Fortune 500 CSO and CISO, board member, angel investor, and adjunct professor, to explore what it really means to manage AI responsibly at scale.&...]]></itunes:summary>
    <description><![CDATA[<p>As AI becomes embedded across security operations and business workflows, organizations are confronting a new reality. AI is no longer just a tool. It is behaving like a digital co-worker acting on data, surfacing decisions, and influencing outcomes. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with <b>Timothy Youngblood</b>, a four-time Fortune 500 CSO and CISO, board member, angel investor, and adjunct professor, to explore what it really means to manage AI responsibly at scale. </p><p>Tim introduces a powerful and practical analogy: AI as a digital co-worker with the experience of an intern. Capable, fast, and eager, but not ready to operate without oversight, guardrails, and accountability. </p><p>The conversation looks beyond hype and focuses on leadership realities: </p><p>• Why AI capability is advancing faster than accountability models <br/>• How AI agents quietly expand risk through data aggregation <br/>• Why governance must be operational, not policy driven <br/>• How oversight enables innovation instead of slowing it down <br/>• What CISOs and executives must own as AI becomes embedded across the enterprise </p><p>If you are responsible for cybersecurity, risk, or enterprise technology strategy, this episode offers a grounded way to think about AI adoption without losing control. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“That digital worker right now has the experience of a slightly experienced intern. And you wouldn’t let a slightly experienced intern go off on their own and start doing things without some oversight.” <br/>— Timothy Youngblood </p><p>“I’ve been in this industry 30 years, and I try to make sure people can learn from all the mistakes I’ve made. And I’ve made many.” <br/>— Timothy Youngblood </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. AI should be treated like a junior employee, not an autonomous system</b> </p><p>AI can move fast, analyze data, and surface insights, but it lacks judgment and accountability. Treating AI as a digital co-worker reframes governance around supervision and responsibility. </p><p><b>2. Guardrails must exist before AI is deployed, not after</b> </p><p>AI agents aggregate data and create new risk simply by combining systems. Governance applied after deployment documents exposure instead of preventing it. </p><p><b>3. Oversight is the control that enables sustainable innovation</b> </p><p>Human review, scoped access, and accountability are not blockers. They are what allow organizations to experiment with AI without creating consequences they cannot unwind. </p><p><b>Episode Notes / Links</b> </p><p>🎧 Listen: In player above<br/>▶ Watch on YouTube: https://youtu.be/796uzmuBQE4 <br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><p>AI’s Newest Employee: Who Bears the Burden of Your Digital Co-Workers <br/><a href='https://tdan.com/ais-newest-employee-who-bears-the-burden-of-your-digital-co-workers/'>https://tdan.com/ais-newest-employee-who-bears-the-burden-of-your-digital-co-workers/</a> </p><p>To Fix AI Governance, Stop Building It Backwards <br/><a href='https://www.reworked.co/digital-workplace/to-fix-ai-governance-stop-building-it-backwards/?utm_source=chatgpt.com'>https://www.reworked.co/digital-workplace/to-fix-ai-governance-stop-building-it-backwar</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>As AI becomes embedded across security operations and business workflows, organizations are confronting a new reality. AI is no longer just a tool. It is behaving like a digital co-worker acting on data, surfacing decisions, and influencing outcomes. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with <b>Timothy Youngblood</b>, a four-time Fortune 500 CSO and CISO, board member, angel investor, and adjunct professor, to explore what it really means to manage AI responsibly at scale. </p><p>Tim introduces a powerful and practical analogy: AI as a digital co-worker with the experience of an intern. Capable, fast, and eager, but not ready to operate without oversight, guardrails, and accountability. </p><p>The conversation looks beyond hype and focuses on leadership realities: </p><p>• Why AI capability is advancing faster than accountability models <br/>• How AI agents quietly expand risk through data aggregation <br/>• Why governance must be operational, not policy driven <br/>• How oversight enables innovation instead of slowing it down <br/>• What CISOs and executives must own as AI becomes embedded across the enterprise </p><p>If you are responsible for cybersecurity, risk, or enterprise technology strategy, this episode offers a grounded way to think about AI adoption without losing control. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“That digital worker right now has the experience of a slightly experienced intern. And you wouldn’t let a slightly experienced intern go off on their own and start doing things without some oversight.” <br/>— Timothy Youngblood </p><p>“I’ve been in this industry 30 years, and I try to make sure people can learn from all the mistakes I’ve made. And I’ve made many.” <br/>— Timothy Youngblood </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. AI should be treated like a junior employee, not an autonomous system</b> </p><p>AI can move fast, analyze data, and surface insights, but it lacks judgment and accountability. Treating AI as a digital co-worker reframes governance around supervision and responsibility. </p><p><b>2. Guardrails must exist before AI is deployed, not after</b> </p><p>AI agents aggregate data and create new risk simply by combining systems. Governance applied after deployment documents exposure instead of preventing it. </p><p><b>3. Oversight is the control that enables sustainable innovation</b> </p><p>Human review, scoped access, and accountability are not blockers. They are what allow organizations to experiment with AI without creating consequences they cannot unwind. </p><p><b>Episode Notes / Links</b> </p><p>🎧 Listen: In player above<br/>▶ Watch on YouTube: https://youtu.be/796uzmuBQE4 <br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><p>AI’s Newest Employee: Who Bears the Burden of Your Digital Co-Workers <br/><a href='https://tdan.com/ais-newest-employee-who-bears-the-burden-of-your-digital-co-workers/'>https://tdan.com/ais-newest-employee-who-bears-the-burden-of-your-digital-co-workers/</a> </p><p>To Fix AI Governance, Stop Building It Backwards <br/><a href='https://www.reworked.co/digital-workplace/to-fix-ai-governance-stop-building-it-backwards/?utm_source=chatgpt.com'>https://www.reworked.co/digital-workplace/to-fix-ai-governance-stop-building-it-backwar</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18509846-ai-as-a-digital-co-worker-with-the-experience-of-an-intern-with-timothy-youngblood.mp3" length="13612672" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3zrun060ufrqwu810sfsi48vk6bn?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18509846</guid>
    <pubDate>Thu, 15 Jan 2026 05:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18509846/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18509846/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18509846/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18509846/transcript.vtt" type="text/vtt" />
    <itunes:duration>1131</itunes:duration>
    <itunes:keywords>AI governance, digital co-worker, AI oversight, enterprise risk management, CISO leadership, AI agents, cybersecurity leadership, Timothy Youngblood, Jo Peterson, ClearTech Loop </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>   The CISO’s Role in AI Is to Lead the Risk Conversation  with Mustapha Kebbeh, Chief Security Officer at UKG </itunes:title>
    <title>   The CISO’s Role in AI Is to Lead the Risk Conversation  with Mustapha Kebbeh, Chief Security Officer at UKG </title>
    <itunes:summary><![CDATA[AI adoption is accelerating across the enterprise, often faster than governance and risk models were designed to support. Boards want innovation. Business leaders want speed. Security teams are expected to manage risk in environments where the technology itself is still evolving.  In this episode of ClearTech Loop, Jo Peterson speaks with Mustapha Kebbeh, Chief Security Officer at UKG, about why the CISO’s role in AI is not to block innovation or own governance outright, but to lead the ...]]></itunes:summary>
    <description><![CDATA[<p>AI adoption is accelerating across the enterprise, often faster than governance and risk models were designed to support. Boards want innovation. Business leaders want speed. Security teams are expected to manage risk in environments where the technology itself is still evolving. </p><p>In this episode of ClearTech Loop, Jo Peterson speaks with Mustapha Kebbeh, Chief Security Officer at UKG, about why the CISO’s role in AI is not to block innovation or own governance outright, but to lead the enterprise risk conversation that enables informed decision making. </p><p>Mustapha shares how CISOs can help organizations understand what is being protected, why it matters, and what level of risk the organization is intentionally accepting as AI adoption accelerates. He also explains why effective AI governance depends on early involvement, clear guardrails, and shared ownership across the enterprise. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>In This Episode, We Cover</b> </p><ul><li>Why AI does not create new risk, but accelerates existing risk </li><li>How the CISO role is evolving from control owner to risk leader </li><li>Why AI governance fails when security is brought in too late </li><li>The importance of early involvement and shared ownership </li><li>How governance enables informed decisions rather than documenting failure </li></ul><p><b>Key Quotes</b> </p><p>“Every cyber program is going to have risk.” </p><p>“But the most important piece in my mind is what is it that you are protecting.” </p><p>“The reason that’s really important is everything that touches data creates a risk management program.” </p><p>“Am I investing in the right risk.” </p><p><b>About the Guest</b> </p><p><b>Mustapha Kebbeh</b> is Chief Security Officer at <b>UKG</b>, where he leads global cybersecurity strategy, enterprise risk management, and architecture supporting more than 75,000 employees worldwide. </p><p>He has held senior security leadership roles at Brink’s, IBM, Vodafone, and CompuCom, and is known for building large-scale security programs that balance governance, resilience, and business growth. He also serves as a CISO Executive Governing Body Member and Co Chair with Evanta, a Gartner company. </p><p> </p><p><b>🎧 Listen above</b> <br/><b>▶ Watch on YouTube: </b><a href='https://youtu.be/XxA0Uw3xll0'><b>https://youtu.be/XxA0Uw3xll0</b></a> <br/><b>📰 Subscribe to the ClearTech Loop Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'><b>https://www.linkedin.com/newsletters/7346174860760416256/</b></a> </p><p><b>Resources Mentioned</b> </p><p>Gartner: CISO FAQs on AI Governance and Cybersecurity Strategy <br/><a href='https://www.gartner.com/en/cybersecurity/cybersecurity-faqs?utm_source=chatgpt.com'>https://www.gartner.com/en/cybersecurity/cybersecurity-faqs</a> </p><p>Webinar Replay: Building Trust Through Enhanced Security Measures (UKG) <br/><a href='https://www.ukg.com/learn/resources/webinar-replay/building-trust-through-enhanced-security-measures?utm_source=chatgpt.com'>https://www.ukg.com/learn/resources/webinar-replay/building-trust-through-enhanced-security-measures</a> </p><p>ClearTech Loop: Simplifying Complexity in Modern Infrastructure with Dan DeBacker <br/><a href='https://www.buzzsprout.com/2248577/episodes/18455780'>https://www.buzzsprout.com/2248577/episodes/18455780</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI adoption is accelerating across the enterprise, often faster than governance and risk models were designed to support. Boards want innovation. Business leaders want speed. Security teams are expected to manage risk in environments where the technology itself is still evolving. </p><p>In this episode of ClearTech Loop, Jo Peterson speaks with Mustapha Kebbeh, Chief Security Officer at UKG, about why the CISO’s role in AI is not to block innovation or own governance outright, but to lead the enterprise risk conversation that enables informed decision making. </p><p>Mustapha shares how CISOs can help organizations understand what is being protected, why it matters, and what level of risk the organization is intentionally accepting as AI adoption accelerates. He also explains why effective AI governance depends on early involvement, clear guardrails, and shared ownership across the enterprise. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>In This Episode, We Cover</b> </p><ul><li>Why AI does not create new risk, but accelerates existing risk </li><li>How the CISO role is evolving from control owner to risk leader </li><li>Why AI governance fails when security is brought in too late </li><li>The importance of early involvement and shared ownership </li><li>How governance enables informed decisions rather than documenting failure </li></ul><p><b>Key Quotes</b> </p><p>“Every cyber program is going to have risk.” </p><p>“But the most important piece in my mind is what is it that you are protecting.” </p><p>“The reason that’s really important is everything that touches data creates a risk management program.” </p><p>“Am I investing in the right risk.” </p><p><b>About the Guest</b> </p><p><b>Mustapha Kebbeh</b> is Chief Security Officer at <b>UKG</b>, where he leads global cybersecurity strategy, enterprise risk management, and architecture supporting more than 75,000 employees worldwide. </p><p>He has held senior security leadership roles at Brink’s, IBM, Vodafone, and CompuCom, and is known for building large-scale security programs that balance governance, resilience, and business growth. He also serves as a CISO Executive Governing Body Member and Co Chair with Evanta, a Gartner company. </p><p> </p><p><b>🎧 Listen above</b> <br/><b>▶ Watch on YouTube: </b><a href='https://youtu.be/XxA0Uw3xll0'><b>https://youtu.be/XxA0Uw3xll0</b></a> <br/><b>📰 Subscribe to the ClearTech Loop Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'><b>https://www.linkedin.com/newsletters/7346174860760416256/</b></a> </p><p><b>Resources Mentioned</b> </p><p>Gartner: CISO FAQs on AI Governance and Cybersecurity Strategy <br/><a href='https://www.gartner.com/en/cybersecurity/cybersecurity-faqs?utm_source=chatgpt.com'>https://www.gartner.com/en/cybersecurity/cybersecurity-faqs</a> </p><p>Webinar Replay: Building Trust Through Enhanced Security Measures (UKG) <br/><a href='https://www.ukg.com/learn/resources/webinar-replay/building-trust-through-enhanced-security-measures?utm_source=chatgpt.com'>https://www.ukg.com/learn/resources/webinar-replay/building-trust-through-enhanced-security-measures</a> </p><p>ClearTech Loop: Simplifying Complexity in Modern Infrastructure with Dan DeBacker <br/><a href='https://www.buzzsprout.com/2248577/episodes/18455780'>https://www.buzzsprout.com/2248577/episodes/18455780</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18497498-the-ciso-s-role-in-ai-is-to-lead-the-risk-conversation-with-mustapha-kebbeh-chief-security-officer-at-ukg.mp3" length="9988894" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2qvovi49ccbpfnjcxflnaqxuudku?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18497498</guid>
    <pubDate>Mon, 12 Jan 2026 05:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18497498/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18497498/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18497498/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18497498/transcript.vtt" type="text/vtt" />
    <itunes:duration>829</itunes:duration>
    <itunes:keywords>AI Enhanced Cloud Operations, market convergence, unified policy engine, network security convergence, hybrid cloud operations, cloud and on premises continuum, Extreme Networks, Dan DeBacker, Jo Peterson, ClearTech Loop</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When the Market Converges with Dan DeBacker</itunes:title>
    <title>When the Market Converges with Dan DeBacker</title>
    <itunes:summary><![CDATA[The market is converging.  Networking, security, and cloud operations are no longer separate conversations. They are colliding at the operational layer, driven by hybrid environments, AI driven operations, and growing pressure to reduce complexity without losing control.  In this episode of ClearTech Loop Market Perspective, Jo Peterson sits down with Dan DeBacker, Chief Product Officer at Extreme Networks, to explore what this convergence looks like in practice and why simplicity, ...]]></itunes:summary>
    <description><![CDATA[<p>The market is converging. </p><p>Networking, security, and cloud operations are no longer separate conversations. They are colliding at the operational layer, driven by hybrid environments, AI driven operations, and growing pressure to reduce complexity without losing control. </p><p>In this episode of <b>ClearTech Loop Market Perspective</b>, Jo Peterson sits down with <b>Dan DeBacker</b>, Chief Product Officer at Extreme Networks, to explore what this convergence looks like in practice and why simplicity, unified policy, and cloud design are increasingly inseparable decisions. </p><p>Dan shares how enterprises are grappling with operational friction created by multiple control planes and fragmented policy engines, and why the market is responding by collapsing domains into platforms. The conversation examines convergence not as a trend, but as a response to real operational pressure. </p><p>Through the lens of <b>AI Enhanced Cloud Operations</b>, the discussion focuses on how AI is tightening feedback loops, exposing hidden complexity, and forcing organizations to rethink how visibility, policy, and control operate across cloud and on premises environments. </p><p>If you’re navigating hybrid operations, policy sprawl, or the growing pressure to simplify without sacrificing sovereignty, this episode brings clarity to where the market is headed. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“If you have to integrate and manage multiple UI experiences, multiple policies, multiple ways of doing things… that’s complexity. Our goal is to reduce friction by bringing those together.” <br/>— Dan DeBacker </p><p>“When you talk about NAC policy, VPN policy, Zero Trust policy ideally they should not live in silos. The next evolution is a unified policy engine.” <br/>— Dan DeBacker </p><p>“AI doesn’t tolerate fragmentation. The more intelligence we embed into operations, the more exposed complexity becomes.” <br/>— Jo Peterson </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. Convergence is an operational reality, not a future state</b> </p><p>The collision of networking, security, and cloud operations is happening because fragmented environments cannot keep up with AI driven decision cycles. </p><p><b>2. Policy is becoming shared operational infrastructure</b> </p><p>Unified policy models are emerging as the connective tissue across access, security, and network operations, replacing siloed controls that slow response and increase risk. </p><p><b>3. Cloud and on premises now function as a continuum</b> </p><p>Organizations are designing for flexibility and sovereignty by treating cloud as an experience rather than a location, applying consistent control across environments. </p><p><b>Episode Notes</b></p><p>🎧 Listen in player<br/>▶ Watch on YouTube: https://youtu.be/75DciQR03DY<br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><p>Extreme Platform ONE Security: Accelerating Zero Trust and Simplifying Operations for Network Leaders <br/><a href='https://www.extremenetworks.com/resources/blogs/extreme-platform-one-security-accelerating-zero-trust-and-simplifying-operations-for-network-leaders?utm_source=chatgpt.com'>https://www.extremenetworks.com/resources/blogs/extreme-platform-one-security-accelerating-zero-trust-and-simplifying-operations-for-</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>The market is converging. </p><p>Networking, security, and cloud operations are no longer separate conversations. They are colliding at the operational layer, driven by hybrid environments, AI driven operations, and growing pressure to reduce complexity without losing control. </p><p>In this episode of <b>ClearTech Loop Market Perspective</b>, Jo Peterson sits down with <b>Dan DeBacker</b>, Chief Product Officer at Extreme Networks, to explore what this convergence looks like in practice and why simplicity, unified policy, and cloud design are increasingly inseparable decisions. </p><p>Dan shares how enterprises are grappling with operational friction created by multiple control planes and fragmented policy engines, and why the market is responding by collapsing domains into platforms. The conversation examines convergence not as a trend, but as a response to real operational pressure. </p><p>Through the lens of <b>AI Enhanced Cloud Operations</b>, the discussion focuses on how AI is tightening feedback loops, exposing hidden complexity, and forcing organizations to rethink how visibility, policy, and control operate across cloud and on premises environments. </p><p>If you’re navigating hybrid operations, policy sprawl, or the growing pressure to simplify without sacrificing sovereignty, this episode brings clarity to where the market is headed. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“If you have to integrate and manage multiple UI experiences, multiple policies, multiple ways of doing things… that’s complexity. Our goal is to reduce friction by bringing those together.” <br/>— Dan DeBacker </p><p>“When you talk about NAC policy, VPN policy, Zero Trust policy ideally they should not live in silos. The next evolution is a unified policy engine.” <br/>— Dan DeBacker </p><p>“AI doesn’t tolerate fragmentation. The more intelligence we embed into operations, the more exposed complexity becomes.” <br/>— Jo Peterson </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. Convergence is an operational reality, not a future state</b> </p><p>The collision of networking, security, and cloud operations is happening because fragmented environments cannot keep up with AI driven decision cycles. </p><p><b>2. Policy is becoming shared operational infrastructure</b> </p><p>Unified policy models are emerging as the connective tissue across access, security, and network operations, replacing siloed controls that slow response and increase risk. </p><p><b>3. Cloud and on premises now function as a continuum</b> </p><p>Organizations are designing for flexibility and sovereignty by treating cloud as an experience rather than a location, applying consistent control across environments. </p><p><b>Episode Notes</b></p><p>🎧 Listen in player<br/>▶ Watch on YouTube: https://youtu.be/75DciQR03DY<br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><p>Extreme Platform ONE Security: Accelerating Zero Trust and Simplifying Operations for Network Leaders <br/><a href='https://www.extremenetworks.com/resources/blogs/extreme-platform-one-security-accelerating-zero-trust-and-simplifying-operations-for-network-leaders?utm_source=chatgpt.com'>https://www.extremenetworks.com/resources/blogs/extreme-platform-one-security-accelerating-zero-trust-and-simplifying-operations-for-</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18455780-when-the-market-converges-with-dan-debacker.mp3" length="8092894" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ali9umr5gita2s9mvdb40dcp8j2z?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18455780</guid>
    <pubDate>Tue, 06 Jan 2026 05:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18455780/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18455780/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18455780/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2248577/18455780/transcript.vtt" type="text/vtt" />
    <itunes:duration>670</itunes:duration>
    <itunes:keywords>AI Enhanced Cloud Operations, market convergence, unified policy engine, network security convergence, hybrid cloud operations, cloud and on premises continuum, Extreme Networks, Dan DeBacker, Jo Peterson, ClearTech Loop Market Perspective</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Reaction to Prediction in AI Security with Evan Kirstel</itunes:title>
    <title>From Reaction to Prediction in AI Security with Evan Kirstel</title>
    <itunes:summary><![CDATA[Security teams have spent years operating in reaction mode. Alerts fire, analysts scramble, and incident response often moves at human speed while adversaries move faster.  In this episode of ClearTech Loop, Jo Peterson sits down with Evan Kirstel to talk about how generative AI is changing that reality. Evan shares practical examples of how AI powered triage is shrinking incident response timelines from hours to minutes and why speed, when paired with better analysis and guidance, can f...]]></itunes:summary>
    <description><![CDATA[<p>Security teams have spent years operating in reaction mode. Alerts fire, analysts scramble, and incident response often moves at human speed while adversaries move faster. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Evan Kirstel to talk about how generative AI is changing that reality. Evan shares practical examples of how AI powered triage is shrinking incident response timelines from hours to minutes and why speed, when paired with better analysis and guidance, can fundamentally change outcomes. </p><p>The conversation goes beyond faster detection and digs into what this shift really means for security teams and CISOs: </p><p>AI is enabling analysts to move from reacting after the fact to predicting threats as they emerge. </p><p>Entry level SOC teams are being up leveled with remediation paths and decision support, not just alerts. </p><p>Security and privacy controls can be embedded into AI development early without slowing innovation, and in many cases, actually accelerating it. </p><p>And CISOs are being pushed into a broader governance role as AI becomes both a critical capability and a growing threat surface. </p><p>If you’re trying to understand how AI is reshaping security operations today and what leaders need to be thinking about next, this episode brings clarity to the conversation. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“They can cut incident response times from hours to minutes. Just like an emergency room, minutes matter.” — Evan Kirstel </p><p>“I think this gives us a chance to really up level our more entry level SOC folks, and it gives them remediation paths. It doesn’t just find things, it gives solutions to the problem.” — Jo Peterson </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. AI powered triage changes the math of incident response</b> </p><p>AI is compressing detection, analysis, and decision cycles. When response moves from hours to minutes, outcomes change and teams gain back control during critical moments. </p><p><b>2. Proactive security starts with better guidance, not just faster alerts</b> </p><p>AI is helping teams predict and prepare, not just react. By offering remediation paths and context, it allows SOC analysts to make smarter decisions under pressure. </p><p><b>3. Governance becomes a core CISO responsibility in an AI driven world</b> </p><p>As AI adoption accelerates, CISOs must balance speed with guardrails. Embedded security, privacy by design, and clear governance frameworks are now essential to maintaining trust and reducing risk. </p><p><b>Episode Notes / Links for Suzie to Fill Out</b> </p><p>🎧 Listen: in the player above<br/>▶ Watch on YouTube: https://youtu.be/BFkpNCOQfnw<br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><ul><li>NIST AI Risk Management Framework <a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework</a> </li><li>The Evan Kirstel Show <a href='https://www.youtube.com/@EvanKirstel'>https://www.youtube.com/@EvanKirstel</a> </li><li>ClearTech Research Insights <a href='https://cleartechresearch.com/'>https://cleartechresearch.com</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>Security teams have spent years operating in reaction mode. Alerts fire, analysts scramble, and incident response often moves at human speed while adversaries move faster. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Evan Kirstel to talk about how generative AI is changing that reality. Evan shares practical examples of how AI powered triage is shrinking incident response timelines from hours to minutes and why speed, when paired with better analysis and guidance, can fundamentally change outcomes. </p><p>The conversation goes beyond faster detection and digs into what this shift really means for security teams and CISOs: </p><p>AI is enabling analysts to move from reacting after the fact to predicting threats as they emerge. </p><p>Entry level SOC teams are being up leveled with remediation paths and decision support, not just alerts. </p><p>Security and privacy controls can be embedded into AI development early without slowing innovation, and in many cases, actually accelerating it. </p><p>And CISOs are being pushed into a broader governance role as AI becomes both a critical capability and a growing threat surface. </p><p>If you’re trying to understand how AI is reshaping security operations today and what leaders need to be thinking about next, this episode brings clarity to the conversation. </p><p>👉 Subscribe to ClearTech Loop on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes</b> </p><p>“They can cut incident response times from hours to minutes. Just like an emergency room, minutes matter.” — Evan Kirstel </p><p>“I think this gives us a chance to really up level our more entry level SOC folks, and it gives them remediation paths. It doesn’t just find things, it gives solutions to the problem.” — Jo Peterson </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. AI powered triage changes the math of incident response</b> </p><p>AI is compressing detection, analysis, and decision cycles. When response moves from hours to minutes, outcomes change and teams gain back control during critical moments. </p><p><b>2. Proactive security starts with better guidance, not just faster alerts</b> </p><p>AI is helping teams predict and prepare, not just react. By offering remediation paths and context, it allows SOC analysts to make smarter decisions under pressure. </p><p><b>3. Governance becomes a core CISO responsibility in an AI driven world</b> </p><p>As AI adoption accelerates, CISOs must balance speed with guardrails. Embedded security, privacy by design, and clear governance frameworks are now essential to maintaining trust and reducing risk. </p><p><b>Episode Notes / Links for Suzie to Fill Out</b> </p><p>🎧 Listen: in the player above<br/>▶ Watch on YouTube: https://youtu.be/BFkpNCOQfnw<br/>📰 Subscribe to the ClearTech Loop Newsletter: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned</b> </p><ul><li>NIST AI Risk Management Framework <a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework</a> </li><li>The Evan Kirstel Show <a href='https://www.youtube.com/@EvanKirstel'>https://www.youtube.com/@EvanKirstel</a> </li><li>ClearTech Research Insights <a href='https://cleartechresearch.com/'>https://cleartechresearch.com</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18365591-from-reaction-to-prediction-in-ai-security-with-evan-kirstel.mp3" length="10001253" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6cgwko8p3lj4trhkqm80t29ixr2r?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18365591</guid>
    <pubDate>Wed, 17 Dec 2025 05:00:00 -0500</pubDate>
    <itunes:duration>830</itunes:duration>
    <itunes:keywords>AI security, generative AI cybersecurity, incident response, AI powered triage, SOC modernization, proactive security, AI governance, CISO, Jo Peterson, Evan Kirstel, ClearTech Loop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Air Traffic Control for AI Security with Deputy CISO Aby Rao </itunes:title>
    <title>Air Traffic Control for AI Security with Deputy CISO Aby Rao </title>
    <itunes:summary><![CDATA[AI has erased the perimeter. Security teams are no longer guarding walls — they’re managing airspace.  In this episode of ClearTech Loop, Jo Peterson sits down with Deputy CISO Aby Rao to unpack what AI security really looks like when threats move through models, APIs, agents, and identity flows instead of firewalls and fences.  Aby explains why security teams are at an inflection point:  No code and low code tools now let cyber teams build automation and identity workflows wit...]]></itunes:summary>
    <description><![CDATA[<p>AI has erased the perimeter. Security teams are no longer guarding walls — they’re managing airspace. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Deputy CISO <b>Aby Rao</b> to unpack what AI security really looks like when threats move through models, APIs, agents, and identity flows instead of firewalls and fences. </p><p>Aby explains why security teams are at an inflection point: </p><ul><li>No code and low code tools now let cyber teams build automation and identity workflows without relying on vendors. </li><li>AI development is outpacing AI literacy, creating a widening gap between capability and understanding. </li><li>And CISOs can no longer operate as castle guards — they must become bridges between high-velocity development and the governance functions responsible for responsible AI. </li></ul><p>If you want to understand how CISOs should adapt to a boundaryless threat landscape — and what “air traffic control” for AI security actually means — this episode gives you the clarity you’re looking for. </p><p>👉 <b>Subscribe to ClearTech Loop on LinkedIn:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes </b> </p><p>“<b>We have to break out of this castle guard mindset and think of us as air traffic controllers.</b>” — Aby Rao </p><p>“<b>The pace at which AI development is taking place, it has outgrown AI literacy and AI education.</b>” — Aby Rao </p><p>“<b>If you’re not actively involving your CISO, you really need to. You’re short-changing yourself.</b>” — Jo Peterson </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. AI gives cyber teams new power — and new ownership.</b> <br/>With no code and low code tools, teams can now build custom workflows and agentic processes on their own data. That freedom comes with long-term responsibility. </p><p><b>2. Security by design only works if AI literacy exists first.</b> <br/>You can’t embed privacy, fairness, transparency, or explainability if the team doesn’t understand AI fundamentals. </p><p><b>3. CISOs must become the bridge.</b> <br/>They now sit between fast-moving developers and governance leaders in legal, audit, privacy, fairness, and ethics — translating risk and keeping the entire airspace safe. </p><p><b>Episode Notes / Links for Suzie to Fill Out</b> </p><p>🎧 <b>Listen:</b> on player above<br/>▶ <b>Watch on YouTube:</b> https://youtu.be/7OSuAiLZCgo<br/>📰 <b>Subscribe to the ClearTech Loop Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned:</b> </p><ul><li>NIST AI Risk Management Framework: <a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework</a>  </li><li>CSA Trusted AI Course Materials: https://cloudsecurityalliance.org/education </li><li>“Pack a Room Full of Governors” <a href='https://www.linkedin.com/posts/abyrao_pack-a-room-full-of-governors-standing-activity-7401658932416528384-PFxH/'>https://www.linkedin.com/posts/abyrao_pack-a-room-full-of-governors-standing-activity-7401658932416528384-PFxH/</a> </li><li>Previous Episode: AI Safety with Dutch Schwartz: <a href='https://cleartechresearch.com/bumpers-not-brakes/'>https://cleartechresearch.com/bumpers-not-brakes/</a>  </li></ul><p><br/></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI has erased the perimeter. Security teams are no longer guarding walls — they’re managing airspace. </p><p>In this episode of ClearTech Loop, Jo Peterson sits down with Deputy CISO <b>Aby Rao</b> to unpack what AI security really looks like when threats move through models, APIs, agents, and identity flows instead of firewalls and fences. </p><p>Aby explains why security teams are at an inflection point: </p><ul><li>No code and low code tools now let cyber teams build automation and identity workflows without relying on vendors. </li><li>AI development is outpacing AI literacy, creating a widening gap between capability and understanding. </li><li>And CISOs can no longer operate as castle guards — they must become bridges between high-velocity development and the governance functions responsible for responsible AI. </li></ul><p>If you want to understand how CISOs should adapt to a boundaryless threat landscape — and what “air traffic control” for AI security actually means — this episode gives you the clarity you’re looking for. </p><p>👉 <b>Subscribe to ClearTech Loop on LinkedIn:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes </b> </p><p>“<b>We have to break out of this castle guard mindset and think of us as air traffic controllers.</b>” — Aby Rao </p><p>“<b>The pace at which AI development is taking place, it has outgrown AI literacy and AI education.</b>” — Aby Rao </p><p>“<b>If you’re not actively involving your CISO, you really need to. You’re short-changing yourself.</b>” — Jo Peterson </p><p><b>Three Big Ideas from This Episode</b> </p><p><b>1. AI gives cyber teams new power — and new ownership.</b> <br/>With no code and low code tools, teams can now build custom workflows and agentic processes on their own data. That freedom comes with long-term responsibility. </p><p><b>2. Security by design only works if AI literacy exists first.</b> <br/>You can’t embed privacy, fairness, transparency, or explainability if the team doesn’t understand AI fundamentals. </p><p><b>3. CISOs must become the bridge.</b> <br/>They now sit between fast-moving developers and governance leaders in legal, audit, privacy, fairness, and ethics — translating risk and keeping the entire airspace safe. </p><p><b>Episode Notes / Links for Suzie to Fill Out</b> </p><p>🎧 <b>Listen:</b> on player above<br/>▶ <b>Watch on YouTube:</b> https://youtu.be/7OSuAiLZCgo<br/>📰 <b>Subscribe to the ClearTech Loop Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Resources Mentioned:</b> </p><ul><li>NIST AI Risk Management Framework: <a href='https://www.nist.gov/itl/ai-risk-management-framework'>https://www.nist.gov/itl/ai-risk-management-framework</a>  </li><li>CSA Trusted AI Course Materials: https://cloudsecurityalliance.org/education </li><li>“Pack a Room Full of Governors” <a href='https://www.linkedin.com/posts/abyrao_pack-a-room-full-of-governors-standing-activity-7401658932416528384-PFxH/'>https://www.linkedin.com/posts/abyrao_pack-a-room-full-of-governors-standing-activity-7401658932416528384-PFxH/</a> </li><li>Previous Episode: AI Safety with Dutch Schwartz: <a href='https://cleartechresearch.com/bumpers-not-brakes/'>https://cleartechresearch.com/bumpers-not-brakes/</a>  </li></ul><p><br/></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18334342-air-traffic-control-for-ai-security-with-deputy-ciso-aby-rao.mp3" length="9088922" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/igjmzreoex3o0mx3hlg669h0466d?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18334342</guid>
    <pubDate>Thu, 11 Dec 2025 05:00:00 -0500</pubDate>
    <itunes:duration>753</itunes:duration>
    <itunes:keywords>AI security, CISO, responsible AI, security by design, AI literacy, cloud security, identity security, Jo Peterson, ClearTech Loop, Aby Rao, model governance, air traffic controller analogy </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Only Works If Your Foundations Do: A Conversation with Dr. Anton Chuvakin </itunes:title>
    <title>AI Only Works If Your Foundations Do: A Conversation with Dr. Anton Chuvakin </title>
    <itunes:summary><![CDATA[AI is not a fix for a broken SOC. It exposes weaknesses you already have. In this ClearTech Loop episode, Jo Peterson talks with Dr. Anton Chuvakin — Senior Security Staff in Google Cloud’s Office of the CISO and one of the most respected voices in SOC modernization — about what “AI readiness” really means and why most teams are nowhere near it.  You’ll hear about:  • Why AI accelerates process debt instead of compensating for it  • The two forms of shadow AI already inside eve...]]></itunes:summary>
    <description><![CDATA[<p>AI is not a fix for a broken SOC. It exposes weaknesses you already have. In this ClearTech Loop episode, Jo Peterson talks with Dr. Anton Chuvakin — Senior Security Staff in Google Cloud’s Office of the CISO and one of the most respected voices in SOC modernization — about what “AI readiness” really means and why most teams are nowhere near it. </p><p>You’ll hear about: </p><p>• Why AI accelerates process debt instead of compensating for it <br/>• The two forms of shadow AI already inside every enterprise <br/>• The five foundations of an AI ready SOC: data quality, ownership, interoperability, probabilistic thinking, and metrics <br/>• Why governance has to move at the speed of experimentation, not quarterly reviews <br/>• How to evaluate AI tools through use cases instead of marketing promises </p><p>Anton has spent decades shaping security operations — from coining the term EDR to defining detection and response strategies as a Gartner Distinguished Analyst. Today, he helps global enterprises build the structural maturity required before AI can add any value at all. </p><p>Subscribe to the ClearTech Loop Newsletter on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'><b>https://www.linkedin.com/newsletters/7346174860760416256/</b></a> </p><p><b>Episode Description (Short):</b> </p><p>Jo Peterson and Dr. Anton Chuvakin break down what AI readiness really requires and why most SOCs are not prepared for what AI will expose. </p><p><b>Timestamps</b> </p><p>00:00 Intro and Anton’s background <br/>01:15 Why AI exposes foundational weaknesses <br/>03:45 Process debt and SOC workflow failures <br/>05:20 Two forms of shadow AI inside enterprises <br/>07:10 Data quality, ownership, and workflows <br/>09:22 Five foundations of an AI-ready SOC <br/>11:18 Why interoperability matters <br/>12:40 Leaders and probabilistic thinking <br/>14:05 Governance at the speed of AI <br/>17:10 How to evaluate AI tools <br/>19:25 Closing thoughts </p><p><b>About the Guest</b> </p><p><b>Dr. Anton Chuvakin</b> is Senior Security Staff in the Office of the CISO at Google Cloud. Previously a Research Vice President and Distinguished Analyst at Gartner, he has authored multiple books on security monitoring and log management and co hosts the Cloud Security Podcast. </p><p><b>Resources</b> </p><p>Anton’s YouTube playlist <br/><a href='https://www.youtube.com/watch?v=iX5SvgMpS0s&amp;list=PLkdSRxA6DyHtxH623M1WYuAYGpEXdvEqp'>https://www.youtube.com/watch?v=iX5SvgMpS0s&amp;list=PLkdSRxA6DyHtxH623M1WYuAYGpEXdvEqp</a> </p><p>Google Cloud security best practices <br/><a href='https://cloud.google.com/security/best-practices'>https://cloud.google.com/security/best-practices</a> </p><p>CSA AI Safety Initiative <br/><a href='https://cloudsecurityalliance.org/ai-safety-initiative'>https://cloudsecurityalliance.org/ai-safety-initiative</a> </p><p>ClearTech Loop: George Finney on the CSA AI Initiative <br/><a href='https://cleartechresearch.com/the-csa-ai-safety-initiative-with-george-finney/'>https://cleartechresearch.com/the-csa-ai-safety-initiative-with-george-finney/</a> </p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI is not a fix for a broken SOC. It exposes weaknesses you already have. In this ClearTech Loop episode, Jo Peterson talks with Dr. Anton Chuvakin — Senior Security Staff in Google Cloud’s Office of the CISO and one of the most respected voices in SOC modernization — about what “AI readiness” really means and why most teams are nowhere near it. </p><p>You’ll hear about: </p><p>• Why AI accelerates process debt instead of compensating for it <br/>• The two forms of shadow AI already inside every enterprise <br/>• The five foundations of an AI ready SOC: data quality, ownership, interoperability, probabilistic thinking, and metrics <br/>• Why governance has to move at the speed of experimentation, not quarterly reviews <br/>• How to evaluate AI tools through use cases instead of marketing promises </p><p>Anton has spent decades shaping security operations — from coining the term EDR to defining detection and response strategies as a Gartner Distinguished Analyst. Today, he helps global enterprises build the structural maturity required before AI can add any value at all. </p><p>Subscribe to the ClearTech Loop Newsletter on LinkedIn: <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'><b>https://www.linkedin.com/newsletters/7346174860760416256/</b></a> </p><p><b>Episode Description (Short):</b> </p><p>Jo Peterson and Dr. Anton Chuvakin break down what AI readiness really requires and why most SOCs are not prepared for what AI will expose. </p><p><b>Timestamps</b> </p><p>00:00 Intro and Anton’s background <br/>01:15 Why AI exposes foundational weaknesses <br/>03:45 Process debt and SOC workflow failures <br/>05:20 Two forms of shadow AI inside enterprises <br/>07:10 Data quality, ownership, and workflows <br/>09:22 Five foundations of an AI-ready SOC <br/>11:18 Why interoperability matters <br/>12:40 Leaders and probabilistic thinking <br/>14:05 Governance at the speed of AI <br/>17:10 How to evaluate AI tools <br/>19:25 Closing thoughts </p><p><b>About the Guest</b> </p><p><b>Dr. Anton Chuvakin</b> is Senior Security Staff in the Office of the CISO at Google Cloud. Previously a Research Vice President and Distinguished Analyst at Gartner, he has authored multiple books on security monitoring and log management and co hosts the Cloud Security Podcast. </p><p><b>Resources</b> </p><p>Anton’s YouTube playlist <br/><a href='https://www.youtube.com/watch?v=iX5SvgMpS0s&amp;list=PLkdSRxA6DyHtxH623M1WYuAYGpEXdvEqp'>https://www.youtube.com/watch?v=iX5SvgMpS0s&amp;list=PLkdSRxA6DyHtxH623M1WYuAYGpEXdvEqp</a> </p><p>Google Cloud security best practices <br/><a href='https://cloud.google.com/security/best-practices'>https://cloud.google.com/security/best-practices</a> </p><p>CSA AI Safety Initiative <br/><a href='https://cloudsecurityalliance.org/ai-safety-initiative'>https://cloudsecurityalliance.org/ai-safety-initiative</a> </p><p>ClearTech Loop: George Finney on the CSA AI Initiative <br/><a href='https://cleartechresearch.com/the-csa-ai-safety-initiative-with-george-finney/'>https://cleartechresearch.com/the-csa-ai-safety-initiative-with-george-finney/</a> </p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18211623-ai-only-works-if-your-foundations-do-a-conversation-with-dr-anton-chuvakin.mp3" length="11812200" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5w3isaedaoa567qhg7euqsq7nvj0?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18211623</guid>
    <pubDate>Wed, 19 Nov 2025 05:00:00 -0500</pubDate>
    <itunes:duration>980</itunes:duration>
    <itunes:keywords>AI readiness, SOC modernization, shadow AI, AI governance, cybersecurity, Google Cloud, Anton Chuvakin, ClearTech Loop </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title> AI with Financial Intelligence: Turning Hype Into Measurable Value (with Ajay Patel, GM Apptio/IBM) </itunes:title>
    <title> AI with Financial Intelligence: Turning Hype Into Measurable Value (with Ajay Patel, GM Apptio/IBM) </title>
    <itunes:summary><![CDATA[A practical framework for AI ROI: visibility, accountability, and value  Episode description / show notes  Last week, you probably caught my chat with Ajay Patel, GM of Apptio and IBM IT Automation. If you missed it, this episode breaks down how a layer of financial intelligence turns AI from experiments into measurable business value.  We walk through a simple framework that leaders can actually run with. First, visibility across every AI initiative and its real costs, includi...]]></itunes:summary>
    <description><![CDATA[<p>A practical framework for AI ROI: visibility, accountability, and value </p><p><b>Episode description / show notes</b> </p><p>Last week, you probably caught my chat with Ajay Patel, GM of Apptio and IBM IT Automation. If you missed it, this episode breaks down how a layer of financial intelligence turns AI from experiments into measurable business value. </p><p>We walk through a simple framework that leaders can actually run with. First, visibility across every AI initiative and its real costs, including people, data preparation, governance, and change management. Second, accountability that ties projects to business objectives, not activity. Third, value that tracks both hard returns and soft returns so the story holds up with finance and the board. </p><p>Adoption and trust matter just as much. AI programs don’t stall for lack of models. They stall when people can’t trust the data or see the wins. Start with accurate, contextual data and repeatable outcomes. Build confidence with useful insights that remove busywork. Then let automation follow. </p><p>Listen in for what CIOs and CFOs need to align on the same page and move faster with less risk. </p><p>What you’ll learn </p><ol><li>How to inventory AI initiatives and total cost drivers </li><li>How to link projects to measurable outcomes that matter </li><li>How to measure hard and soft ROI without hand-waving </li><li>How to build trust so automation becomes a natural next step </li></ol><p>Key quotes <br/>“AI starts with the productivity tool. It starts providing me rich insight and making smarter decisions. It starts taking away some of that mundane work, and you kind of walk into building that trust… till you get to a point where the user says, ‘I trust it — can you automate that action for me?’” </p><p>“What if you could have a series of financial experts available at your fingertips? That’s what enterprise financial intelligence is all about — building those experts from your own data so every decision gets smarter.” </p><p>Links <br/>LinkedIn clip of the conversation: [add link] <br/>ClearTech Research episode page: [add link] <br/>Apptio and IBM IT Automation: <a href='https://www.ibm.com/apptio'>https://www.ibm.com/apptio</a> <br/>Apptio FinOps Framework: <a href='https://www.apptio.com/solutions/finops/'>https://www.apptio.com/solutions/finops/</a> <br/>Subscribe to ClearTech Loop: <a href='https://form.typeform.com/to/EESYYt4a'>https://form.typeform.com/to/EESYYt4a</a> </p><p>About the guest <br/>Ajay Patel is the General Manager of Apptio and IBM IT Automation, leading Apptio, Turbonomic, Instana, and AIOps across hybrid environments. His leadership spans VMware, Oracle, BEA Systems, and Apigee. He focuses on using financial and operational intelligence to optimize technology investments and outcomes. </p><p><b>Chapter markers</b> </p><p>00:00 Intro and why financial intelligence matters <br/>00:23 Guest welcome <br/>01:47 From AI hype to ROI <br/>02:53 Financial intelligence vision inside the enterprise <br/>04:58 The framework: visibility, accountability, value <br/>06:39 Adoption, governance, and responsible AI <br/>07:29 Data quality, trust, and building confidence <br/>10:35 Fourteen years of customer data and lessons learned <br/>11:04 Benchmarking, unit economics, and practical guidance <br/>12:43 Closing and conference note </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>A practical framework for AI ROI: visibility, accountability, and value </p><p><b>Episode description / show notes</b> </p><p>Last week, you probably caught my chat with Ajay Patel, GM of Apptio and IBM IT Automation. If you missed it, this episode breaks down how a layer of financial intelligence turns AI from experiments into measurable business value. </p><p>We walk through a simple framework that leaders can actually run with. First, visibility across every AI initiative and its real costs, including people, data preparation, governance, and change management. Second, accountability that ties projects to business objectives, not activity. Third, value that tracks both hard returns and soft returns so the story holds up with finance and the board. </p><p>Adoption and trust matter just as much. AI programs don’t stall for lack of models. They stall when people can’t trust the data or see the wins. Start with accurate, contextual data and repeatable outcomes. Build confidence with useful insights that remove busywork. Then let automation follow. </p><p>Listen in for what CIOs and CFOs need to align on the same page and move faster with less risk. </p><p>What you’ll learn </p><ol><li>How to inventory AI initiatives and total cost drivers </li><li>How to link projects to measurable outcomes that matter </li><li>How to measure hard and soft ROI without hand-waving </li><li>How to build trust so automation becomes a natural next step </li></ol><p>Key quotes <br/>“AI starts with the productivity tool. It starts providing me rich insight and making smarter decisions. It starts taking away some of that mundane work, and you kind of walk into building that trust… till you get to a point where the user says, ‘I trust it — can you automate that action for me?’” </p><p>“What if you could have a series of financial experts available at your fingertips? That’s what enterprise financial intelligence is all about — building those experts from your own data so every decision gets smarter.” </p><p>Links <br/>LinkedIn clip of the conversation: [add link] <br/>ClearTech Research episode page: [add link] <br/>Apptio and IBM IT Automation: <a href='https://www.ibm.com/apptio'>https://www.ibm.com/apptio</a> <br/>Apptio FinOps Framework: <a href='https://www.apptio.com/solutions/finops/'>https://www.apptio.com/solutions/finops/</a> <br/>Subscribe to ClearTech Loop: <a href='https://form.typeform.com/to/EESYYt4a'>https://form.typeform.com/to/EESYYt4a</a> </p><p>About the guest <br/>Ajay Patel is the General Manager of Apptio and IBM IT Automation, leading Apptio, Turbonomic, Instana, and AIOps across hybrid environments. His leadership spans VMware, Oracle, BEA Systems, and Apigee. He focuses on using financial and operational intelligence to optimize technology investments and outcomes. </p><p><b>Chapter markers</b> </p><p>00:00 Intro and why financial intelligence matters <br/>00:23 Guest welcome <br/>01:47 From AI hype to ROI <br/>02:53 Financial intelligence vision inside the enterprise <br/>04:58 The framework: visibility, accountability, value <br/>06:39 Adoption, governance, and responsible AI <br/>07:29 Data quality, trust, and building confidence <br/>10:35 Fourteen years of customer data and lessons learned <br/>11:04 Benchmarking, unit economics, and practical guidance <br/>12:43 Closing and conference note </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18155554-ai-with-financial-intelligence-turning-hype-into-measurable-value-with-ajay-patel-gm-apptio-ibm.mp3" length="9727132" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c67fhvaigzwpfmbfkzvosxi6eemb?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18155554</guid>
    <pubDate>Sat, 08 Nov 2025 17:00:00 -0500</pubDate>
    <itunes:duration>807</itunes:duration>
    <itunes:keywords>AI ROI, Financial Intelligence, FinOps, TBM, Apptio, IBM IT Automation, Ajay Patel, Jo Peterson, ClearTech Loop, Enterprise AI, Cost Optimization </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hybrid Integration in the Era of AI: Real Enterprise Use Cases </itunes:title>
    <title>Hybrid Integration in the Era of AI: Real Enterprise Use Cases </title>
    <itunes:summary><![CDATA[Enterprises are not trying to modernize in a vacuum. They are running mission-critical workloads on mainframes and ERPs, while also deploying cloud apps, SaaS platforms, and mobile services at scale. Now leaders are expected to layer in AI without disrupting operations.  Hybrid integration is how they do it.  In this ClearTech Loop special edition sponsored by IBM webMethods, Jo Peterson breaks down real-world integration patterns and what IT leaders need to enable AI-ready operatio...]]></itunes:summary>
    <description><![CDATA[<p>Enterprises are not trying to modernize in a vacuum. They are running mission-critical workloads on mainframes and ERPs, while also deploying cloud apps, SaaS platforms, and mobile services at scale. Now leaders are expected to layer in AI without disrupting operations. </p><p>Hybrid integration is how they do it. </p><p>In this ClearTech Loop special edition sponsored by IBM webMethods, Jo Peterson breaks down real-world integration patterns and what IT leaders need to enable AI-ready operations across legacy, cloud, and SaaS environments. </p><p>Topics include: </p><ul><li>Modernizing legacy systems without disruption </li><li>Wrapping core systems with APIs for real-time access </li><li>Connecting cloud platforms and on-prem applications </li><li>Managing event-driven automation and data unification </li><li>Treating APIs as digital products with governance and scale </li><li>Why a hybrid control plane matters for AI outcomes </li></ul><p>Hybrid integration is not a temporary bridge. It is the operating model for the AI era. </p><p><b>Links &amp; Resources</b> </p><p>Learn more about webMethods Hybrid Integration: <a href='https://ibm.biz/Bde6n2'>https://ibm.biz/Bde6n2</a> <br/>Start a free 30-day trial: <a href='https://ibm.biz/Bde6nf'>https://ibm.biz/Bde6nf</a> </p><p>Subscribe to the ClearTech Loop newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> <br/>Watch this episode on YouTube: https://youtu.be/3_2ZTq-jdmM</p><p><b>Guest</b> </p><p><b>Jo Peterson</b> <br/>Chief Analyst, ClearTech Research <br/>VP of Cloud and Security Services, Clarify360 </p><p><b>Sponsored by</b> </p><p><b>IBM webMethods Hybrid Integration</b> </p><p><b>Short Preview Copy</b> <br/>Hybrid integration is how enterprises modernize without disruption. Jo Peterson explains real-world use cases and why webMethods is becoming core to AI-ready architecture. </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>Enterprises are not trying to modernize in a vacuum. They are running mission-critical workloads on mainframes and ERPs, while also deploying cloud apps, SaaS platforms, and mobile services at scale. Now leaders are expected to layer in AI without disrupting operations. </p><p>Hybrid integration is how they do it. </p><p>In this ClearTech Loop special edition sponsored by IBM webMethods, Jo Peterson breaks down real-world integration patterns and what IT leaders need to enable AI-ready operations across legacy, cloud, and SaaS environments. </p><p>Topics include: </p><ul><li>Modernizing legacy systems without disruption </li><li>Wrapping core systems with APIs for real-time access </li><li>Connecting cloud platforms and on-prem applications </li><li>Managing event-driven automation and data unification </li><li>Treating APIs as digital products with governance and scale </li><li>Why a hybrid control plane matters for AI outcomes </li></ul><p>Hybrid integration is not a temporary bridge. It is the operating model for the AI era. </p><p><b>Links &amp; Resources</b> </p><p>Learn more about webMethods Hybrid Integration: <a href='https://ibm.biz/Bde6n2'>https://ibm.biz/Bde6n2</a> <br/>Start a free 30-day trial: <a href='https://ibm.biz/Bde6nf'>https://ibm.biz/Bde6nf</a> </p><p>Subscribe to the ClearTech Loop newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> <br/>Watch this episode on YouTube: https://youtu.be/3_2ZTq-jdmM</p><p><b>Guest</b> </p><p><b>Jo Peterson</b> <br/>Chief Analyst, ClearTech Research <br/>VP of Cloud and Security Services, Clarify360 </p><p><b>Sponsored by</b> </p><p><b>IBM webMethods Hybrid Integration</b> </p><p><b>Short Preview Copy</b> <br/>Hybrid integration is how enterprises modernize without disruption. Jo Peterson explains real-world use cases and why webMethods is becoming core to AI-ready architecture. </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18139733-hybrid-integration-in-the-era-of-ai-real-enterprise-use-cases.mp3" length="3555591" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bzhgjscv7mv1yhsxteexg4dmm0oc?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18139733</guid>
    <pubDate>Thu, 06 Nov 2025 05:00:00 -0500</pubDate>
    <itunes:duration>292</itunes:duration>
    <itunes:keywords>Hybrid integration, IBM webMethods, enterprise architecture, legacy modernization, cloud integration, API strategy, data integration, AI readiness   </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guardrails for Growth: AI in Regulated Industries </itunes:title>
    <title>Guardrails for Growth: AI in Regulated Industries </title>
    <itunes:summary><![CDATA[How do you enable AI inside one of the most highly regulated industries on the planet — without slowing the business or attracting regulatory heat?  In this episode, veteran financial-services CISO Parrish Gunnels joins Jo Peterson to break down the real playbook for operationalizing AI in banking environments.  This isn’t theory. It’s where risk appetite, regulation, and revenue meet reality.  We cover:  Why “turn off AI” was a knee-jerk — and why it can’t last Movin...]]></itunes:summary>
    <description><![CDATA[<p>How do you enable AI inside one of the most highly regulated industries on the planet — without slowing the business or attracting regulatory heat? </p><p>In this episode, <b>veteran financial-services CISO Parrish Gunnels</b> joins <b>Jo Peterson</b> to break down the <em>real</em> playbook for operationalizing AI in banking environments. </p><p>This isn’t theory. It’s where <b>risk appetite, regulation, and revenue meet reality</b>. </p><p>We cover: </p><ul><li>Why “turn off AI” was a knee-jerk — and why it can’t last </li><li>Moving from prohibition to <b>auditable enablement</b> </li><li>How financial-services CISOs model AI-risk in dollars </li><li>Why <b>human-in-the-loop</b> is still non-negotiable </li><li>Designing paved roads that stop Shadow AI </li><li>The 90-day maturity model for regulated AI adoption </li><li>Culture, training, and trust as the real control surface </li></ul><p><b>“There isn’t a great model for ROI in security… I think of it as downtime, reputational risk, lost revenue, and the cost of fines per record.” — Parrish Gunnels</b> </p><p>If you’re in a regulated space — banking, healthcare, insurance, public sector — and trying to balance innovation with compliance, this one’s your blueprint. </p><p>🎧 Subscribe to stay in The Loop <br/>🔗 Connect with Parrish on LinkedIn <br/>🔗 Follow Jo for more executive AI + cyber insights </p><p>See you in the Loop.  </p><p><br/></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>How do you enable AI inside one of the most highly regulated industries on the planet — without slowing the business or attracting regulatory heat? </p><p>In this episode, <b>veteran financial-services CISO Parrish Gunnels</b> joins <b>Jo Peterson</b> to break down the <em>real</em> playbook for operationalizing AI in banking environments. </p><p>This isn’t theory. It’s where <b>risk appetite, regulation, and revenue meet reality</b>. </p><p>We cover: </p><ul><li>Why “turn off AI” was a knee-jerk — and why it can’t last </li><li>Moving from prohibition to <b>auditable enablement</b> </li><li>How financial-services CISOs model AI-risk in dollars </li><li>Why <b>human-in-the-loop</b> is still non-negotiable </li><li>Designing paved roads that stop Shadow AI </li><li>The 90-day maturity model for regulated AI adoption </li><li>Culture, training, and trust as the real control surface </li></ul><p><b>“There isn’t a great model for ROI in security… I think of it as downtime, reputational risk, lost revenue, and the cost of fines per record.” — Parrish Gunnels</b> </p><p>If you’re in a regulated space — banking, healthcare, insurance, public sector — and trying to balance innovation with compliance, this one’s your blueprint. </p><p>🎧 Subscribe to stay in The Loop <br/>🔗 Connect with Parrish on LinkedIn <br/>🔗 Follow Jo for more executive AI + cyber insights </p><p>See you in the Loop.  </p><p><br/></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18125896-guardrails-for-growth-ai-in-regulated-industries.mp3" length="8548918" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/71uufjbysexkexkl9c0xa3v027x9?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18125896</guid>
    <pubDate>Tue, 04 Nov 2025 05:00:00 -0500</pubDate>
    <itunes:duration>709</itunes:duration>
    <itunes:keywords>CISO, cybersecurity, AI governance, banking security, regulated industries, risk management, compliance, financial services, enterprise AI, human-in-the-loop, security leadership, cloud security, ClearTech Loop, Jo Peterson, Parrish Gunnels </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talk Dollars, Not FUD: The CISO’s New Mandate </itunes:title>
    <title>Talk Dollars, Not FUD: The CISO’s New Mandate </title>
    <itunes:summary><![CDATA[Episode Description:  In this episode of ClearTech Loop, Jo Peterson sits down with John Carse, Field CISO at SquareX and former CISO at Dyson and Rakuten, to talk about why modern CISOs must move beyond fear, uncertainty, and doubt — and start quantifying risk in business terms.  Carse explains how two levers — risk appetite and budget alignment — determine every security decision, and why the browser has become the new edge of enterprise risk. From AI prompt attacks to malicious extens...]]></itunes:summary>
    <description><![CDATA[<p><b>Episode Description:</b> <br/>In this episode of <em>ClearTech Loop</em>, Jo Peterson sits down with <b>John Carse</b>, Field CISO at <b>SquareX</b> and former CISO at <b>Dyson</b> and <b>Rakuten</b>, to talk about why modern CISOs must move beyond fear, uncertainty, and doubt — and start quantifying risk in business terms. </p><p>Carse explains how two levers — <b>risk appetite and budget alignment</b> — determine every security decision, and why the <b>browser</b> has become the new edge of enterprise risk. From AI prompt attacks to malicious extensions, Carse offers a practical blueprint for translating security posture into measurable business impact. </p><p>🎧 <b>Listen to the full episode:</b> ADD LINK <br/>📬 <b>Stay in the Loop:</b> Subscribe for new episodes and resources — ADD LINK </p><p><b>Key Topics Covered:</b> </p><ul><li>Why “talking dollars, not FUD” earns board trust </li><li>The connection between risk appetite and budget allocation </li><li>The browser as the modern enterprise perimeter </li><li>How the Field CISO role bridges business and technology </li><li>Practical ways CISOs can quantify risk and value </li></ul><p><b>About the Guest:</b> <br/>John Carse is a three-time CISO and currently serves as Field CISO at<a href='https://www.sqrx.com/'> <b>SquareX</b></a>, helping enterprises defend against browser-based threats and translate security strategy into business impact. His previous roles include CISO positions at Dyson and Rakuten and security leadership at Expedia and JPMorgan Chase. </p><p><b>Additional Resources</b> </p><ul><li><a href='https://www.securitymagazine.com/articles/101416-john-carse-hired-as-field-ciso-at-squarex'>Security Magazine: John Carse hired as Field CISO at SquareX</a> </li><li><a href='https://www.youtube.com/playlist?list=PL9E-Z6c21SVgMCyG_ycOAm993x0W6N_ZA'>The CISO Perspective with John Carse Podcast</a> </li><li><a href='https://brilliancesecuritymagazine.com/cybersecurity/the-browser-blind-spot-rethinking-enterprise-security/'>The Browser Blind Spot: Rethinking Enterprise Security</a>  </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p><b>Episode Description:</b> <br/>In this episode of <em>ClearTech Loop</em>, Jo Peterson sits down with <b>John Carse</b>, Field CISO at <b>SquareX</b> and former CISO at <b>Dyson</b> and <b>Rakuten</b>, to talk about why modern CISOs must move beyond fear, uncertainty, and doubt — and start quantifying risk in business terms. </p><p>Carse explains how two levers — <b>risk appetite and budget alignment</b> — determine every security decision, and why the <b>browser</b> has become the new edge of enterprise risk. From AI prompt attacks to malicious extensions, Carse offers a practical blueprint for translating security posture into measurable business impact. </p><p>🎧 <b>Listen to the full episode:</b> ADD LINK <br/>📬 <b>Stay in the Loop:</b> Subscribe for new episodes and resources — ADD LINK </p><p><b>Key Topics Covered:</b> </p><ul><li>Why “talking dollars, not FUD” earns board trust </li><li>The connection between risk appetite and budget allocation </li><li>The browser as the modern enterprise perimeter </li><li>How the Field CISO role bridges business and technology </li><li>Practical ways CISOs can quantify risk and value </li></ul><p><b>About the Guest:</b> <br/>John Carse is a three-time CISO and currently serves as Field CISO at<a href='https://www.sqrx.com/'> <b>SquareX</b></a>, helping enterprises defend against browser-based threats and translate security strategy into business impact. His previous roles include CISO positions at Dyson and Rakuten and security leadership at Expedia and JPMorgan Chase. </p><p><b>Additional Resources</b> </p><ul><li><a href='https://www.securitymagazine.com/articles/101416-john-carse-hired-as-field-ciso-at-squarex'>Security Magazine: John Carse hired as Field CISO at SquareX</a> </li><li><a href='https://www.youtube.com/playlist?list=PL9E-Z6c21SVgMCyG_ycOAm993x0W6N_ZA'>The CISO Perspective with John Carse Podcast</a> </li><li><a href='https://brilliancesecuritymagazine.com/cybersecurity/the-browser-blind-spot-rethinking-enterprise-security/'>The Browser Blind Spot: Rethinking Enterprise Security</a>  </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18084081-talk-dollars-not-fud-the-ciso-s-new-mandate.mp3" length="16751089" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rqggwf2mepi303o33319g7d4zibf?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18084081</guid>
    <pubDate>Tue, 28 Oct 2025 05:00:00 -0400</pubDate>
    <itunes:duration>1392</itunes:duration>
    <itunes:keywords>#CyberSecurity #CISO #RiskManagement #BrowserSecurity #CloudSecurity #AI #ClearTechLoop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Integration Imperative: Why AI Starts (and Succeeds) With webMethods Hybrid Integration | ClearTech Loop x IBM</itunes:title>
    <title>The Integration Imperative: Why AI Starts (and Succeeds) With webMethods Hybrid Integration | ClearTech Loop x IBM</title>
    <itunes:summary><![CDATA[AI doesn’t fail because of bad models — it fails because of broken connections. Jo Peterson and David Linthicum unpack how IBM’s webMethods Hybrid Integration unites data, applications, and automation for AI that actually delivers.  Episode Description:  When it comes to AI success, it’s not just about the model — it’s about the movement of data.  In this episode of ClearTech Loop, Jo Peterson sits down with David Linthicum, Chief Analyst at Linthicum Research, to discuss why A...]]></itunes:summary>
    <description><![CDATA[<p>AI doesn’t fail because of bad models — it fails because of broken connections. Jo Peterson and David Linthicum unpack how IBM’s webMethods Hybrid Integration unites data, applications, and automation for AI that actually delivers. </p><p><b>Episode Description:</b> </p><p>When it comes to AI success, it’s not just about the model — it’s about the movement of data. </p><p>In this episode of <em>ClearTech Loop</em>, <b>Jo Peterson</b> sits down with <b>David Linthicum</b>, Chief Analyst at Linthicum Research, to discuss why AI can’t scale without a strong integration backbone — and how <b>IBM’s webMethods Hybrid Integration</b> is changing that conversation. </p><p><b>They explore:</b> </p><ul><li>The five major challenges facing enterprise architects today </li><li>Why AI fails without connected systems </li><li>How webMethods Hybrid Integration bridges on-prem and cloud environments </li><li>The shift from integration as “plumbing” to integration as “infrastructure” </li><li>Real-world examples of companies modernizing safely and quickly </li></ul><p>David breaks down the patterns and pitfalls of enterprise integration — and why solving them is the foundation for secure, sustainable AI growth. </p><p><b>Guest:</b> </p><p><b>David Linthicum</b> <br/>Chief Analyst, Linthicum Research </p><p><b>Host:</b> </p><p><b>Jo Peterson</b> <br/>Chief Analyst, ClearTech Research </p><p>Subscribe to ClearTech Loop Newsletter: https://form.typeform.com/to/EESYYt4a</p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI doesn’t fail because of bad models — it fails because of broken connections. Jo Peterson and David Linthicum unpack how IBM’s webMethods Hybrid Integration unites data, applications, and automation for AI that actually delivers. </p><p><b>Episode Description:</b> </p><p>When it comes to AI success, it’s not just about the model — it’s about the movement of data. </p><p>In this episode of <em>ClearTech Loop</em>, <b>Jo Peterson</b> sits down with <b>David Linthicum</b>, Chief Analyst at Linthicum Research, to discuss why AI can’t scale without a strong integration backbone — and how <b>IBM’s webMethods Hybrid Integration</b> is changing that conversation. </p><p><b>They explore:</b> </p><ul><li>The five major challenges facing enterprise architects today </li><li>Why AI fails without connected systems </li><li>How webMethods Hybrid Integration bridges on-prem and cloud environments </li><li>The shift from integration as “plumbing” to integration as “infrastructure” </li><li>Real-world examples of companies modernizing safely and quickly </li></ul><p>David breaks down the patterns and pitfalls of enterprise integration — and why solving them is the foundation for secure, sustainable AI growth. </p><p><b>Guest:</b> </p><p><b>David Linthicum</b> <br/>Chief Analyst, Linthicum Research </p><p><b>Host:</b> </p><p><b>Jo Peterson</b> <br/>Chief Analyst, ClearTech Research </p><p>Subscribe to ClearTech Loop Newsletter: https://form.typeform.com/to/EESYYt4a</p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18050483-the-integration-imperative-why-ai-starts-and-succeeds-with-webmethods-hybrid-integration-cleartech-loop-x-ibm.mp3" length="4908150" type="audio/mpeg" />
    <link>https://cleartechresearch.com/the-integration-imperative-why-ai-starts-and-succeeds-with-webmethods-hybrid-integration/</link>
    <itunes:image href="https://storage.buzzsprout.com/l0z6pvq5t8kl0eskqt4shrvu26xv?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18050483</guid>
    <pubDate>Thu, 23 Oct 2025 00:00:00 -0400</pubDate>
    <itunes:duration>404</itunes:duration>
    <itunes:keywords>IBM, webMethods Hybrid Integration, David Linthicum, Jo Peterson, ClearTech Loop, hybrid cloud, enterprise architecture, AI integration, automation, governance, cloud modernization, digital transformation, AI strategy </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Bumpers, Not Brakes: Pragmatic AI Safety with Dutch Schwartz </itunes:title>
    <title>Bumpers, Not Brakes: Pragmatic AI Safety with Dutch Schwartz </title>
    <itunes:summary><![CDATA[AI safety isn’t about slowing innovation — it’s about steering smarter. In this episode of ClearTech Loop, Jo Peterson sits down with Dutch Schwartz, Vice President of Cloud Services and fractional CISO at SideChannel, to talk about how CISOs can keep delivery velocity while adding the guardrails that actually reduce risk.  Dutch shares real-world lessons from the Cloud Security Alliance’s AI Safety Initiative — where both he and Jo serve as members — and explains how pre-approved AI pat...]]></itunes:summary>
    <description><![CDATA[<p>AI safety isn’t about slowing innovation — it’s about steering smarter. In this episode of <em>ClearTech Loop</em>, <b>Jo Peterson</b> sits down with <b>Dutch Schwartz</b>, Vice President of Cloud Services and fractional CISO at <b>SideChannel</b>, to talk about how CISOs can keep delivery velocity while adding the guardrails that actually reduce risk. </p><p>Dutch shares real-world lessons from the Cloud Security Alliance’s <b>AI Safety Initiative</b> — where both he and Jo serve as members — and explains how pre-approved AI patterns and identity governance are key to responsible innovation. </p><p>“It’s not about slamming on the brakes; it’s about putting up bumpers so you can move fast without ending up in the gutter.” <br/>— <b>Dutch Schwartz</b> </p><p>If you’re leading AI adoption inside your organization, this episode breaks down how to build controls that accelerate outcomes, not bureaucracy. </p><p><b>Timestamps</b> </p><p>00:00 – Intro: What ClearTech Loop is and who Dutch Schwartz is <br/>01:27 – Dutch’s background and role at SideChannel <br/>03:13 – The “chaos manager” mindset in cybersecurity <br/>04:13 – What makes the CSA AI Safety Initiative different <br/>05:57 – How early AI adoption mirrors cultural waves <br/>06:37 – The “bumpers, not brakes” analogy explained <br/>08:15 – Why non-human identities will define the next phase of AI governance <br/>10:02 – Translating CSA frameworks into practical, recoverable steps <br/>12:15 – The quick hits CISOs need today <br/>13:18 – Jo’s closing reflections and invitation to continue the conversation </p><p><b>Resources &amp; Links</b> </p><ul><li>CSA AI Safety Initiative: <a href='https://cloudsecurityalliance.org/ai-safety-initiative'>https://cloudsecurityalliance.org/ai-safety-initiative</a> </li><li>CSA White Paper: <a href='https://cloudsecurityalliance.org/artifacts/ai-controls-matrix'>AI Matrix Controls</a> </li><li>Previous Episode: <a href='https://www.buzzsprout.com/2248577/episodes/18003524'>The CSA AI Safety Initiative with George Finney</a> </li><li>Related Read by Dutch: <a href='https://aws.amazon.com/blogs/security/securing-generative-ai-applying-relevant-security-controls/'>Securing generative AI: Applying relevant security controls</a> </li></ul><p><b>Guest: Dutch Schwartz</b> — VP of Cloud Services and fractional CISO at SideChannel </p><p><b>Host: Jo Peterson</b> — Chief Analyst, ClearTech Research </p><p><b>CTA Footer: </b><em>ClearTech Loop</em> is where <b>AI, cloud, and security intersect</b> — hosted by Jo Peterson. </p><p>New episodes drop weekly. <br/><b>See you in the Loop.</b> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI safety isn’t about slowing innovation — it’s about steering smarter. In this episode of <em>ClearTech Loop</em>, <b>Jo Peterson</b> sits down with <b>Dutch Schwartz</b>, Vice President of Cloud Services and fractional CISO at <b>SideChannel</b>, to talk about how CISOs can keep delivery velocity while adding the guardrails that actually reduce risk. </p><p>Dutch shares real-world lessons from the Cloud Security Alliance’s <b>AI Safety Initiative</b> — where both he and Jo serve as members — and explains how pre-approved AI patterns and identity governance are key to responsible innovation. </p><p>“It’s not about slamming on the brakes; it’s about putting up bumpers so you can move fast without ending up in the gutter.” <br/>— <b>Dutch Schwartz</b> </p><p>If you’re leading AI adoption inside your organization, this episode breaks down how to build controls that accelerate outcomes, not bureaucracy. </p><p><b>Timestamps</b> </p><p>00:00 – Intro: What ClearTech Loop is and who Dutch Schwartz is <br/>01:27 – Dutch’s background and role at SideChannel <br/>03:13 – The “chaos manager” mindset in cybersecurity <br/>04:13 – What makes the CSA AI Safety Initiative different <br/>05:57 – How early AI adoption mirrors cultural waves <br/>06:37 – The “bumpers, not brakes” analogy explained <br/>08:15 – Why non-human identities will define the next phase of AI governance <br/>10:02 – Translating CSA frameworks into practical, recoverable steps <br/>12:15 – The quick hits CISOs need today <br/>13:18 – Jo’s closing reflections and invitation to continue the conversation </p><p><b>Resources &amp; Links</b> </p><ul><li>CSA AI Safety Initiative: <a href='https://cloudsecurityalliance.org/ai-safety-initiative'>https://cloudsecurityalliance.org/ai-safety-initiative</a> </li><li>CSA White Paper: <a href='https://cloudsecurityalliance.org/artifacts/ai-controls-matrix'>AI Matrix Controls</a> </li><li>Previous Episode: <a href='https://www.buzzsprout.com/2248577/episodes/18003524'>The CSA AI Safety Initiative with George Finney</a> </li><li>Related Read by Dutch: <a href='https://aws.amazon.com/blogs/security/securing-generative-ai-applying-relevant-security-controls/'>Securing generative AI: Applying relevant security controls</a> </li></ul><p><b>Guest: Dutch Schwartz</b> — VP of Cloud Services and fractional CISO at SideChannel </p><p><b>Host: Jo Peterson</b> — Chief Analyst, ClearTech Research </p><p><b>CTA Footer: </b><em>ClearTech Loop</em> is where <b>AI, cloud, and security intersect</b> — hosted by Jo Peterson. </p><p>New episodes drop weekly. <br/><b>See you in the Loop.</b> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18043247-bumpers-not-brakes-pragmatic-ai-safety-with-dutch-schwartz.mp3" length="10106406" type="audio/mpeg" />
    <link>https://cleartechresearch.com/bumpers-not-brakes/</link>
    <itunes:image href="https://storage.buzzsprout.com/hl3f7b0caw5lgap88j11l3aa71v4?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18043247</guid>
    <pubDate>Tue, 21 Oct 2025 05:00:00 -0400</pubDate>
    <itunes:duration>838</itunes:duration>
    <itunes:keywords>AI safety, CSA AI Safety Initiative, CISO, cybersecurity, AI governance, Jo Peterson, Dutch Schwartz, ClearTech Loop, SideChannel, agentic AI, responsible AI, AI risk </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The CSA AI Safety Initiative with George Finney </itunes:title>
    <title>The CSA AI Safety Initiative with George Finney </title>
    <itunes:summary><![CDATA[AI is moving fast — and the frameworks to secure it are racing to keep up.  In this episode of ClearTech Loop, Jo Peterson sits down with George Finney, Chief Security Officer for the University of Texas System and Co-Chair of the Cloud Security Alliance (CSA) AI Safety Council), to unpack the CSA AI Safety Initiative — a global effort to build practical guardrails for AI adoption.  They cover:  Why the CSA is leading the charge on AI safety How the AI Controls Matrix and ...]]></itunes:summary>
    <description><![CDATA[<p>AI is moving fast — and the frameworks to secure it are racing to keep up. </p><p>In this episode of <em>ClearTech Loop</em>, <b>Jo Peterson</b> sits down with <b>George Finney</b>, <b>Chief Security Officer for the University of Texas System</b> and <b>Co-Chair of the Cloud Security Alliance (CSA) AI Safety Council)</b>, to unpack the <b>CSA AI Safety Initiative</b> — a global effort to build practical guardrails for AI adoption. </p><p>They cover: </p><ul><li>Why the CSA is leading the charge on AI safety </li><li>How the AI Controls Matrix and “AI firewalls” help organizations evaluate tools responsibly </li><li>What third-party AI risk looks like in the enterprise stack </li><li>Why CISOs must have a voice in shaping AI governance </li></ul><p>If you’re a CISO, IT leader, or practitioner navigating the AI wave, this conversation connects the dots between security frameworks and real-world implementation. </p><p><b>Listen now</b> — and find out how the same group that defined cloud security standards is laying the foundation for AI. </p><p><b>Resources Mentioned</b> </p><ul><li><a href='https://www.amazon.com/Project-Zero-Trust-Strategy-Aligning/dp/1119884845'><em>Project Zero Trust</em> — George Finney</a> </li><li><a href='https://www.amazon.com/Rise-Machines-Project-Trust-Story/dp/B0F6ZPVBM7'><em>Rise of the Machines: A Project Zero Trust Story</em></a> — George Finney <br/><em>Also available as an audiobook on Amazon and Audible, narrated by Daniel Thomas May — best known for his role in</em> <em>The Walking Dead.</em> </li><li><a href='https://cloudsecurityalliance.org/ai-safety-initiative'>Cloud Security Alliance – AI Safety Initiative</a> </li><li><a href='https://cloudsecurityalliance.org/artifacts/ai-controls-matrix'>CSA AI Controls Matrix</a> </li></ul><p><b>About ClearTech Loop</b> </p><p><em>ClearTech Loop</em> brings together the voices shaping what’s next in cloud, AI, and cybersecurity. Hosted by <b>Jo Peterson</b>, Chief Analyst at ClearTech Research, each episode delivers real conversations with practitioners who are redefining the technology landscape. </p><p>Follow <em>The ClearTech Loop</em> on LinkedIn for new episodes, industry analysis, and insights from ClearTech Research: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Stay in the Loop</b> </p><p>Want more than a thirty-minute listen? Join the ClearTech Loop subscriber community. </p><p><b>Sign up:</b> <a href='https://form.typeform.com/to/EESYYt4a'>https://form.typeform.com/to/EESYYt4a</a> </p><p>Choose what you’d like to receive: </p><ul><li>Deeper analysis and early research drops </li><li>New episode alerts </li><li>Occasional invites to analyst discussions and industry roundtables </li></ul><p>Your data stays private. We analyze AI — not you. </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI is moving fast — and the frameworks to secure it are racing to keep up. </p><p>In this episode of <em>ClearTech Loop</em>, <b>Jo Peterson</b> sits down with <b>George Finney</b>, <b>Chief Security Officer for the University of Texas System</b> and <b>Co-Chair of the Cloud Security Alliance (CSA) AI Safety Council)</b>, to unpack the <b>CSA AI Safety Initiative</b> — a global effort to build practical guardrails for AI adoption. </p><p>They cover: </p><ul><li>Why the CSA is leading the charge on AI safety </li><li>How the AI Controls Matrix and “AI firewalls” help organizations evaluate tools responsibly </li><li>What third-party AI risk looks like in the enterprise stack </li><li>Why CISOs must have a voice in shaping AI governance </li></ul><p>If you’re a CISO, IT leader, or practitioner navigating the AI wave, this conversation connects the dots between security frameworks and real-world implementation. </p><p><b>Listen now</b> — and find out how the same group that defined cloud security standards is laying the foundation for AI. </p><p><b>Resources Mentioned</b> </p><ul><li><a href='https://www.amazon.com/Project-Zero-Trust-Strategy-Aligning/dp/1119884845'><em>Project Zero Trust</em> — George Finney</a> </li><li><a href='https://www.amazon.com/Rise-Machines-Project-Trust-Story/dp/B0F6ZPVBM7'><em>Rise of the Machines: A Project Zero Trust Story</em></a> — George Finney <br/><em>Also available as an audiobook on Amazon and Audible, narrated by Daniel Thomas May — best known for his role in</em> <em>The Walking Dead.</em> </li><li><a href='https://cloudsecurityalliance.org/ai-safety-initiative'>Cloud Security Alliance – AI Safety Initiative</a> </li><li><a href='https://cloudsecurityalliance.org/artifacts/ai-controls-matrix'>CSA AI Controls Matrix</a> </li></ul><p><b>About ClearTech Loop</b> </p><p><em>ClearTech Loop</em> brings together the voices shaping what’s next in cloud, AI, and cybersecurity. Hosted by <b>Jo Peterson</b>, Chief Analyst at ClearTech Research, each episode delivers real conversations with practitioners who are redefining the technology landscape. </p><p>Follow <em>The ClearTech Loop</em> on LinkedIn for new episodes, industry analysis, and insights from ClearTech Research: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a>  </p><p><b>Stay in the Loop</b> </p><p>Want more than a thirty-minute listen? Join the ClearTech Loop subscriber community. </p><p><b>Sign up:</b> <a href='https://form.typeform.com/to/EESYYt4a'>https://form.typeform.com/to/EESYYt4a</a> </p><p>Choose what you’d like to receive: </p><ul><li>Deeper analysis and early research drops </li><li>New episode alerts </li><li>Occasional invites to analyst discussions and industry roundtables </li></ul><p>Your data stays private. We analyze AI — not you. </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/18003524-the-csa-ai-safety-initiative-with-george-finney.mp3" length="8364318" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/foox8x6qw0giv6pthc6ryqr0rh5a?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18003524</guid>
    <pubDate>Tue, 14 Oct 2025 05:00:00 -0400</pubDate>
    <itunes:duration>693</itunes:duration>
    <itunes:keywords>AI security, Cloud Security Alliance, CSA AI Safety Initiative, Jo Peterson, George Finney, Zero Trust, Cybersecurity Leadership, CISO, Cloud Security, ClearTech Loop, AI Governance, AI Risk Management </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hybrid Integration: The Foundation of Full-Stack Automation | Jo Peterson | ClearTechLoop</itunes:title>
    <title>Hybrid Integration: The Foundation of Full-Stack Automation | Jo Peterson | ClearTechLoop</title>
    <itunes:summary><![CDATA[Jo Peterson explores why hybrid integration is now the foundation of full-stack automation — and how a unified platform helps IT leaders manage complexity, connect data across environments, and scale AI initiatives securely. Featuring insights on IBM webMethods Hybrid Integration. Episode Description Today’s enterprise runs everywhere — cloud, on-prem, SaaS, and edge. The real challenge isn’t connecting systems; it’s keeping control, visibility, and governance while doing it. In this special ...]]></itunes:summary>
    <description><![CDATA[<p>Jo Peterson explores why hybrid integration is now the foundation of full-stack automation — and how a unified platform helps IT leaders manage complexity, connect data across environments, and scale AI initiatives securely. Featuring insights on IBM webMethods Hybrid Integration.</p><p><b>Episode Description</b></p><p>Today’s enterprise runs everywhere — cloud, on-prem, SaaS, and edge. The real challenge isn’t connecting systems; it’s <b>keeping control, visibility, and governance</b> while doing it.</p><p>In this special edition of <em>ClearTech Loop</em>, Jo Peterson unpacks:</p><ul><li>What hybrid integration really means in practice</li><li>Why a unified integration platform is essential for automation at scale</li><li>How AI depends on hybrid integration for real-time, trusted data</li><li>Where IBM webMethods Hybrid Integration fits into the modern enterprise tech stack</li></ul><p>Want to learn more about how hybrid integration supports resilient, AI-driven automation?</p><p>Learn more → <a href='https://ibm.biz/Bde6n2'>https://ibm.biz/Bde6n2</a><br/>Start your <b>free 30-day trial</b> → <a href='https://ibm.biz/Bde6nf'>https://ibm.biz/Bde6nf</a></p><p>🎥 Watch on YouTube → https://youtu.be/EhB6jn2-_sM<br/>📩 Subscribe to <em>ClearTech Loop</em> on LinkedIn → <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a></p><p><b>Episode Notes (extended)</b></p><p>Hybrid integration isn’t just a technical upgrade — it’s a <b>strategic necessity</b> for full-stack automation.</p><ul><li>It unifies APIs, data pipelines, and event streams into a single governance framework.</li><li>It ensures consistent policy enforcement and observability across hybrid and multi-cloud deployments.</li><li>It’s the backbone that lets AI systems access data securely, reliably, and at scale.</li></ul><p>IBM’s webMethods Hybrid Integration offers a <b>hybrid control plane</b> purpose-built for this challenge — connecting innovation with infrastructure and giving organizations the flexibility to modernize without losing control.</p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>Jo Peterson explores why hybrid integration is now the foundation of full-stack automation — and how a unified platform helps IT leaders manage complexity, connect data across environments, and scale AI initiatives securely. Featuring insights on IBM webMethods Hybrid Integration.</p><p><b>Episode Description</b></p><p>Today’s enterprise runs everywhere — cloud, on-prem, SaaS, and edge. The real challenge isn’t connecting systems; it’s <b>keeping control, visibility, and governance</b> while doing it.</p><p>In this special edition of <em>ClearTech Loop</em>, Jo Peterson unpacks:</p><ul><li>What hybrid integration really means in practice</li><li>Why a unified integration platform is essential for automation at scale</li><li>How AI depends on hybrid integration for real-time, trusted data</li><li>Where IBM webMethods Hybrid Integration fits into the modern enterprise tech stack</li></ul><p>Want to learn more about how hybrid integration supports resilient, AI-driven automation?</p><p>Learn more → <a href='https://ibm.biz/Bde6n2'>https://ibm.biz/Bde6n2</a><br/>Start your <b>free 30-day trial</b> → <a href='https://ibm.biz/Bde6nf'>https://ibm.biz/Bde6nf</a></p><p>🎥 Watch on YouTube → https://youtu.be/EhB6jn2-_sM<br/>📩 Subscribe to <em>ClearTech Loop</em> on LinkedIn → <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a></p><p><b>Episode Notes (extended)</b></p><p>Hybrid integration isn’t just a technical upgrade — it’s a <b>strategic necessity</b> for full-stack automation.</p><ul><li>It unifies APIs, data pipelines, and event streams into a single governance framework.</li><li>It ensures consistent policy enforcement and observability across hybrid and multi-cloud deployments.</li><li>It’s the backbone that lets AI systems access data securely, reliably, and at scale.</li></ul><p>IBM’s webMethods Hybrid Integration offers a <b>hybrid control plane</b> purpose-built for this challenge — connecting innovation with infrastructure and giving organizations the flexibility to modernize without losing control.</p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17972810-hybrid-integration-the-foundation-of-full-stack-automation-jo-peterson-cleartechloop.mp3" length="3468941" type="audio/mpeg" />
    <link>https://cleartechresearch.com/hybrid-integration-full-stack-automation/</link>
    <itunes:image href="https://storage.buzzsprout.com/je3okbuye9zuyjqyekllsnhs0qkl?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17972810</guid>
    <pubDate>Wed, 08 Oct 2025 08:00:00 -0400</pubDate>
    <itunes:duration>285</itunes:duration>
    <itunes:keywords>Jo Peterson, ClearTech Loop, IBM webMethods, hybrid integration, full-stack automation, unified integration platform, AI and automation, hybrid control plane, enterprise IT, governance, AI integration, digital transformation, automation strategy</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The CISO’s Financial Reality Check: Building Security That Pays for Itself </itunes:title>
    <title>The CISO’s Financial Reality Check: Building Security That Pays for Itself </title>
    <itunes:summary><![CDATA[In this episode of ClearTech Loop, Jo Peterson sits down with Bil Harmer, Founder &amp; CEO of Killswitch Advisory, to explore a topic every security leader wrestles with — how to make cybersecurity pay for itself.  Harmer brings more than two decades of experience leading programs for startups, governments, and global financial institutions. He’s blunt, practical, and focused on one truth: cybersecurity isn’t a cost center — it’s a financial model.  Jo and Bil break down what that ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of <em>ClearTech Loop,</em> Jo Peterson sits down with <b>Bil Harmer</b>, Founder &amp; CEO of <b>Killswitch Advisory</b>, to explore a topic every security leader wrestles with — how to make cybersecurity <em>pay for itself.</em> </p><p>Harmer brings more than two decades of experience leading programs for startups, governments, and global financial institutions. He’s blunt, practical, and focused on one truth: <b>cybersecurity isn’t a cost center — it’s a financial model.</b> </p><p>Jo and Bil break down what that means for CISOs under pressure to do more with less: </p><ul><li>Why <em>security is a cost of survival, not safety</em> </li><li>How to redefine cyber risk as <em>financial risk</em> </li><li>Why governance now starts with <em>procurement</em> </li><li>What “acceptable loss” really looks like in practice </li><li>How to spot hidden AI clauses in your SaaS contracts before your data trains someone else’s model </li></ul><p>This episode cuts past the theory and gets into the business side of cybersecurity — where financial fluency is now just as important as technical skill. </p><p>🎧 Listen to the full episode here.<br/>💌 Subscribe to the ClearTech Loop newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of <em>ClearTech Loop,</em> Jo Peterson sits down with <b>Bil Harmer</b>, Founder &amp; CEO of <b>Killswitch Advisory</b>, to explore a topic every security leader wrestles with — how to make cybersecurity <em>pay for itself.</em> </p><p>Harmer brings more than two decades of experience leading programs for startups, governments, and global financial institutions. He’s blunt, practical, and focused on one truth: <b>cybersecurity isn’t a cost center — it’s a financial model.</b> </p><p>Jo and Bil break down what that means for CISOs under pressure to do more with less: </p><ul><li>Why <em>security is a cost of survival, not safety</em> </li><li>How to redefine cyber risk as <em>financial risk</em> </li><li>Why governance now starts with <em>procurement</em> </li><li>What “acceptable loss” really looks like in practice </li><li>How to spot hidden AI clauses in your SaaS contracts before your data trains someone else’s model </li></ul><p>This episode cuts past the theory and gets into the business side of cybersecurity — where financial fluency is now just as important as technical skill. </p><p>🎧 Listen to the full episode here.<br/>💌 Subscribe to the ClearTech Loop newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17965019-the-ciso-s-financial-reality-check-building-security-that-pays-for-itself.mp3" length="9274545" type="audio/mpeg" />
    <link>https://cleartechresearch.com/the-cisos-financial-reality-check-cleartech-loop-bil-harmer/</link>
    <itunes:image href="https://storage.buzzsprout.com/y1bgxrsr17uaoj39cdgpciujw5lf?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17965019</guid>
    <pubDate>Tue, 07 Oct 2025 05:00:00 -0400</pubDate>
    <itunes:duration>769</itunes:duration>
    <itunes:keywords>CISO, Cybersecurity, Financial Risk, Acceptable Loss, Risk Management, AI Governance, SaaS Security, Killswitch Advisory, Bil Harmer, Jo Peterson, ClearTech Loop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The CISO’s AI Dilemma: Shadow AI, Survival Moves, and Governance with Josh Copeland </itunes:title>
    <title>The CISO’s AI Dilemma: Shadow AI, Survival Moves, and Governance with Josh Copeland </title>
    <itunes:summary><![CDATA[ CISOs are being asked to do two things at once: deploy AI faster and guarantee it won’t backfire. In this ClearTech Loop episode, Jo Peterson talks with Josh Copeland — cybersecurity executive, professor, and author of Unpopular Opinion — about how to balance speed and safety in AI adoption.  You’ll hear about:  Four AI “survival moves” CISOs can use now: hypothesis testing, knowledge synthesis, contextualized decision-making, and creativity catalysts. Why Josh rates shad...]]></itunes:summary>
    <description><![CDATA[<p> CISOs are being asked to do two things at once: deploy AI faster and guarantee it won’t backfire. In this ClearTech Loop episode, Jo Peterson talks with <b>Josh Copeland</b> — cybersecurity executive, professor, and author of <em>Unpopular Opinion</em> — about how to balance speed and safety in AI adoption. </p><p>You’ll hear about: </p><ul><li>Four AI “survival moves” CISOs can use now: hypothesis testing, knowledge synthesis, contextualized decision-making, and creativity catalysts. </li><li>Why Josh rates shadow AI an “eight out of ten” risk — and what CISOs can do to govern it instead of chasing it underground. </li><li>How to embed explainability, human oversight, and resilience into AI systems from the start. </li><li>Why every enterprise needs an <b>AI Incident Response playbook</b> before scaling. </li></ul><p>Josh brings 25+ years of experience spanning federal, state, and commercial sectors. He’s also the author of <a href='https://www.amazon.com/dp/B0FPZS6QX1'><em>Unpopular Opinion: Burning Down the Bullsh*t to Rebuild Cybersecurity</em></a>. </p><p>Subscribe to the ClearTech Loop Newsletter on LinkedIn: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Episode Description (Short):</b> <br/>Jo Peterson and Josh Copeland break down the CISO’s AI dilemma: how to move fast on AI adoption without breaking trust. </p><p><br/></p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p> CISOs are being asked to do two things at once: deploy AI faster and guarantee it won’t backfire. In this ClearTech Loop episode, Jo Peterson talks with <b>Josh Copeland</b> — cybersecurity executive, professor, and author of <em>Unpopular Opinion</em> — about how to balance speed and safety in AI adoption. </p><p>You’ll hear about: </p><ul><li>Four AI “survival moves” CISOs can use now: hypothesis testing, knowledge synthesis, contextualized decision-making, and creativity catalysts. </li><li>Why Josh rates shadow AI an “eight out of ten” risk — and what CISOs can do to govern it instead of chasing it underground. </li><li>How to embed explainability, human oversight, and resilience into AI systems from the start. </li><li>Why every enterprise needs an <b>AI Incident Response playbook</b> before scaling. </li></ul><p>Josh brings 25+ years of experience spanning federal, state, and commercial sectors. He’s also the author of <a href='https://www.amazon.com/dp/B0FPZS6QX1'><em>Unpopular Opinion: Burning Down the Bullsh*t to Rebuild Cybersecurity</em></a>. </p><p>Subscribe to the ClearTech Loop Newsletter on LinkedIn: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Episode Description (Short):</b> <br/>Jo Peterson and Josh Copeland break down the CISO’s AI dilemma: how to move fast on AI adoption without breaking trust. </p><p><br/></p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17922131-the-ciso-s-ai-dilemma-shadow-ai-survival-moves-and-governance-with-josh-copeland.mp3" length="11270674" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xevv19uo86sbcn2m0gnwef3o25rv?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17922131</guid>
    <pubDate>Tue, 30 Sep 2025 05:00:00 -0400</pubDate>
    <itunes:duration>935</itunes:duration>
    <itunes:keywords>CISO, Cybersecurity, AI, Shadow AI, Governance, Risk, Compliance, Josh Copeland, Jo Peterson, ClearTech Loop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Evolution of Full Stack Automation in the AI Era | Jo Peterson | ClearTech Loop </itunes:title>
    <title>The Evolution of Full Stack Automation in the AI Era | Jo Peterson | ClearTech Loop </title>
    <itunes:summary><![CDATA[Summary Jo Peterson explores how a full stack approach to automation — powered by a hybrid control plane and AI — helps IT leaders cut through fragmentation and build an AI-ready foundation. Featuring insights on IBM webMethods Hybrid Integration.  Episode Description Enterprise IT is more fragmented than ever — siloed apps, processes, and clouds that don’t talk to each other. The result? manual workarounds and architectures that can’t keep pace with business demand.  In this ClearT...]]></itunes:summary>
    <description><![CDATA[<p><b>Summary</b></p><p>Jo Peterson explores how a full stack approach to automation — powered by a hybrid control plane and AI — helps IT leaders cut through fragmentation and build an AI-ready foundation. Featuring insights on IBM webMethods Hybrid Integration. </p><p><b>Episode Description</b></p><p>Enterprise IT is more fragmented than ever — siloed apps, processes, and clouds that don’t talk to each other. The result? manual workarounds and architectures that can’t keep pace with business demand. </p><p>In this ClearTech Loop special edition, Jo Peterson explores: </p><ul><li>What a <b>full stack approach to automation</b> looks like in practice </li><li>Why a <b>hybrid control plane</b> is critical for IT leaders </li><li>How <b>agentic AI</b> is changing the automation playbook </li><li>Where <b>IBM webMethods Hybrid Integration</b> fits into this strategy </li></ul><p><b>Want to learn more about this evolution and what challenges webMethods Hybrid Integration can solve for you and your team today?</b> </p><p>Learn more here: <a href='https://ibm.biz/Bde6n2'>https://ibm.biz/Bde6n2</a> and sign up for your FREE 30- day trial today: <a href='https://ibm.biz/Bde6nf'>https://ibm.biz/Bde6nf</a>  </p><p> </p><p>🎥 Watch on YouTube → <a href='https://youtu.be/mfSCSPukOds '>https://youtu.be/mfSCSPukOds </a><br/>📩 Subscribe to ClearTech Loop on LinkedIn → <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Episode Notes</b></p><ul><li>Automation isn’t just about speeding up processes — it’s about creating a cohesive, AI-ready foundation that can scale. </li><li>Hybrid and multicloud deployments are creating complexity that requires centralized governance. </li><li>Agentic AI is pushing enterprises beyond reactive prompts to autonomous systems that take on complex workloads. </li><li>IBM’s <b>webMethods Hybrid Integration</b> offers a hybrid control plane designed to unify governance across environments and support this next wave of automation. </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p><b>Summary</b></p><p>Jo Peterson explores how a full stack approach to automation — powered by a hybrid control plane and AI — helps IT leaders cut through fragmentation and build an AI-ready foundation. Featuring insights on IBM webMethods Hybrid Integration. </p><p><b>Episode Description</b></p><p>Enterprise IT is more fragmented than ever — siloed apps, processes, and clouds that don’t talk to each other. The result? manual workarounds and architectures that can’t keep pace with business demand. </p><p>In this ClearTech Loop special edition, Jo Peterson explores: </p><ul><li>What a <b>full stack approach to automation</b> looks like in practice </li><li>Why a <b>hybrid control plane</b> is critical for IT leaders </li><li>How <b>agentic AI</b> is changing the automation playbook </li><li>Where <b>IBM webMethods Hybrid Integration</b> fits into this strategy </li></ul><p><b>Want to learn more about this evolution and what challenges webMethods Hybrid Integration can solve for you and your team today?</b> </p><p>Learn more here: <a href='https://ibm.biz/Bde6n2'>https://ibm.biz/Bde6n2</a> and sign up for your FREE 30- day trial today: <a href='https://ibm.biz/Bde6nf'>https://ibm.biz/Bde6nf</a>  </p><p> </p><p>🎥 Watch on YouTube → <a href='https://youtu.be/mfSCSPukOds '>https://youtu.be/mfSCSPukOds </a><br/>📩 Subscribe to ClearTech Loop on LinkedIn → <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Episode Notes</b></p><ul><li>Automation isn’t just about speeding up processes — it’s about creating a cohesive, AI-ready foundation that can scale. </li><li>Hybrid and multicloud deployments are creating complexity that requires centralized governance. </li><li>Agentic AI is pushing enterprises beyond reactive prompts to autonomous systems that take on complex workloads. </li><li>IBM’s <b>webMethods Hybrid Integration</b> offers a hybrid control plane designed to unify governance across environments and support this next wave of automation. </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17895095-the-evolution-of-full-stack-automation-in-the-ai-era-jo-peterson-cleartech-loop.mp3" length="4508181" type="audio/mpeg" />
    <link>https://cleartechresearch.com/the-evolution-full-stack-automation-ai-era/</link>
    <itunes:image href="https://storage.buzzsprout.com/85dwpj421wxjlcz1lg4bfbzgzfja?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17895095</guid>
    <pubDate>Wed, 24 Sep 2025 05:00:00 -0400</pubDate>
    <itunes:duration>372</itunes:duration>
    <itunes:keywords>Jo Peterson, ClearTech Loop, full stack automation, IBM webMethods, hybrid integration, hybrid control plane, agentic AI, enterprise IT, automation strategy, AI-ready foundation </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The CISO Role in the Age of Generative AI with Rob May </itunes:title>
    <title>The CISO Role in the Age of Generative AI with Rob May </title>
    <itunes:summary><![CDATA[AI isn’t just another shiny tool — it’s a catalyst to rethink how we secure and govern our organizations.  In this ClearTech Loop episode, Jo Peterson sits down with Rob May — Executive Chairman of ramsac, UK Cybersecurity Ambassador, and author of Harnessing AI and The Human Firewall.  Rob shares a practical playbook for CISOs navigating AI adoption:  Reframe the Role of AI: Treat it as assistive intelligence — a thought partner that changes the questions you ask, not just a p...]]></itunes:summary>
    <description><![CDATA[<p>AI isn’t just another shiny tool — it’s a catalyst to rethink how we secure and govern our organizations. </p><p>In this ClearTech Loop episode, Jo Peterson sits down with <b>Rob May</b> — Executive Chairman of ramsac, UK Cybersecurity Ambassador, and author of <em>Harnessing AI</em> and <em>The Human Firewall</em>. </p><p>Rob shares a practical playbook for CISOs navigating AI adoption: </p><p><b>Reframe the Role of AI:</b> Treat it as <em>assistive intelligence</em> — a thought partner that changes the questions you ask, not just a productivity add-on. </p><p><b>Red Team Smarter:</b> Use generative AI to simulate likely attack paths in your environment so you can adjust defenses before alerts ever fire. </p><p><b>Build Security In:</b> Stop bolting security on at the end. Embed privacy checklists, automated testing, and audit trails directly into the AI development lifecycle. </p><p><b>Govern with Confidence:</b> CISOs must own the narrative around visibility, accountability, data use, and explainability. AI is both a defense multiplier and a governance responsibility. </p><p>If you’ve been wondering how to balance AI innovation with trust, or how to expand your CISO mandate without slowing your teams down, this episode is for you. </p><p>Watch the full conversation + subscribe to our LinkedIn newsletter here: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes </b> </p><p>“Don’t think of it as artificial intelligence. Think of it as assistive intelligence.” — Rob May </p><p>“When security and AI teams work side by side, you don’t slow down innovation — you accelerate trust in the outcomes.” — Rob May </p><p>“AI can be both a force multiplier and a new category of risk. The CISO’s role is to maximize the former and govern the latter.” — Rob May </p><p><b>Episode Notes</b></p><p>Listen: https://www.buzzsprout.com/2248577/episodes/17885925<br/>Watch on YouTube: https://youtu.be/Tzf6dwfUh50<br/>Subscribe to ClearTech Loop Newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> <br/>Rob May’s books: <a href='https://www.amazon.com/stores/Rob-May/author/B078GYKHZJ'>https://www.amazon.com/stores/Rob-May/author/B078GYKHZJ</a> </p><p>Resources mentioned: </p><ul><li><em>Harnessing AI</em>: <a href='https://www.amazon.com/dp/1915074252'>https://www.amazon.com/dp/1915074252</a> </li><li><em>The Human Firewall</em>: <a href='https://www.amazon.com/dp/1915074236'>https://www.amazon.com/dp/1915074236</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI isn’t just another shiny tool — it’s a catalyst to rethink how we secure and govern our organizations. </p><p>In this ClearTech Loop episode, Jo Peterson sits down with <b>Rob May</b> — Executive Chairman of ramsac, UK Cybersecurity Ambassador, and author of <em>Harnessing AI</em> and <em>The Human Firewall</em>. </p><p>Rob shares a practical playbook for CISOs navigating AI adoption: </p><p><b>Reframe the Role of AI:</b> Treat it as <em>assistive intelligence</em> — a thought partner that changes the questions you ask, not just a productivity add-on. </p><p><b>Red Team Smarter:</b> Use generative AI to simulate likely attack paths in your environment so you can adjust defenses before alerts ever fire. </p><p><b>Build Security In:</b> Stop bolting security on at the end. Embed privacy checklists, automated testing, and audit trails directly into the AI development lifecycle. </p><p><b>Govern with Confidence:</b> CISOs must own the narrative around visibility, accountability, data use, and explainability. AI is both a defense multiplier and a governance responsibility. </p><p>If you’ve been wondering how to balance AI innovation with trust, or how to expand your CISO mandate without slowing your teams down, this episode is for you. </p><p>Watch the full conversation + subscribe to our LinkedIn newsletter here: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Key Quotes </b> </p><p>“Don’t think of it as artificial intelligence. Think of it as assistive intelligence.” — Rob May </p><p>“When security and AI teams work side by side, you don’t slow down innovation — you accelerate trust in the outcomes.” — Rob May </p><p>“AI can be both a force multiplier and a new category of risk. The CISO’s role is to maximize the former and govern the latter.” — Rob May </p><p><b>Episode Notes</b></p><p>Listen: https://www.buzzsprout.com/2248577/episodes/17885925<br/>Watch on YouTube: https://youtu.be/Tzf6dwfUh50<br/>Subscribe to ClearTech Loop Newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> <br/>Rob May’s books: <a href='https://www.amazon.com/stores/Rob-May/author/B078GYKHZJ'>https://www.amazon.com/stores/Rob-May/author/B078GYKHZJ</a> </p><p>Resources mentioned: </p><ul><li><em>Harnessing AI</em>: <a href='https://www.amazon.com/dp/1915074252'>https://www.amazon.com/dp/1915074252</a> </li><li><em>The Human Firewall</em>: <a href='https://www.amazon.com/dp/1915074236'>https://www.amazon.com/dp/1915074236</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17885925-the-ciso-role-in-the-age-of-generative-ai-with-rob-may.mp3" length="8977887" type="audio/mpeg" />
    <link>https://cleartechresearch.com/proactive-ai-security-for-cisos-2/</link>
    <itunes:image href="https://storage.buzzsprout.com/kfgtaxq4y3g6org0hilu83emoc82?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17885925</guid>
    <pubDate>Tue, 23 Sep 2025 05:00:00 -0400</pubDate>
    <itunes:duration>744</itunes:duration>
    <itunes:keywords>CISO, AI governance, assistive intelligence, AI red teaming, AI security by design, cybersecurity leadership, Rob May, Jo Peterson, ClearTech Loop, trust, ramsac   </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>  Proactive AI Security for CISOs with David Linthicum </itunes:title>
    <title>  Proactive AI Security for CISOs with David Linthicum </title>
    <itunes:summary><![CDATA[AI isn’t just a productivity tool — it’s a brand-new attack surface.  In this ClearTech Loop episode, Jo Peterson sits down with David Linthicum — cloud pioneer, five-time best-selling author, and leading voice on cloud and AI strategy.  David shares a practical roadmap for CISOs facing the reality of AI adoption:  Weaponize AI for Good: Use generative AI to simulate attacks on your own systems. Find the gaps before adversaries do.  Shift Security Left: Bake privacy and se...]]></itunes:summary>
    <description><![CDATA[<p>AI isn’t just a productivity tool — it’s a brand-new attack surface. </p><p>In this ClearTech Loop episode, Jo Peterson sits down with <b>David Linthicum</b> — cloud pioneer, five-time best-selling author, and leading voice on cloud and AI strategy. </p><p>David shares a practical roadmap for CISOs facing the reality of AI adoption: </p><p><b>Weaponize AI for Good</b>: Use generative AI to simulate attacks on your own systems. Find the gaps before adversaries do. </p><p><b>Shift Security Left</b>: Bake privacy and security into the <b>first 20%</b> of your AI/ML pipeline, not the last. </p><p><b>Rethink Incident Response</b>: Static PDFs don’t cut it. Build AI-driven playbooks that adapt to your live environment. </p><p><b>Close the Governance Gap</b>: Break down silos between DevOps and security. Shared responsibility doesn’t mean shared blame. </p><p>If you’ve been wondering how to hack yourself before the hackers do, govern AI adoption without slowing innovation, or stop incident response chaos before it starts, this is your episode. </p><p>👉 Watch the full conversation + subscribe to our LinkedIn newsletter here: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>AI isn’t just a productivity tool — it’s a brand-new attack surface. </p><p>In this ClearTech Loop episode, Jo Peterson sits down with <b>David Linthicum</b> — cloud pioneer, five-time best-selling author, and leading voice on cloud and AI strategy. </p><p>David shares a practical roadmap for CISOs facing the reality of AI adoption: </p><p><b>Weaponize AI for Good</b>: Use generative AI to simulate attacks on your own systems. Find the gaps before adversaries do. </p><p><b>Shift Security Left</b>: Bake privacy and security into the <b>first 20%</b> of your AI/ML pipeline, not the last. </p><p><b>Rethink Incident Response</b>: Static PDFs don’t cut it. Build AI-driven playbooks that adapt to your live environment. </p><p><b>Close the Governance Gap</b>: Break down silos between DevOps and security. Shared responsibility doesn’t mean shared blame. </p><p>If you’ve been wondering how to hack yourself before the hackers do, govern AI adoption without slowing innovation, or stop incident response chaos before it starts, this is your episode. </p><p>👉 Watch the full conversation + subscribe to our LinkedIn newsletter here: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17846871-proactive-ai-security-for-cisos-with-david-linthicum.mp3" length="16003163" type="audio/mpeg" />
    <link>https://cleartechresearch.com/proactive-ai-security-for-cisos/</link>
    <itunes:image href="https://storage.buzzsprout.com/eyz2exn9iagxbh7gt41k51dl7rzm?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17846871</guid>
    <pubDate>Tue, 16 Sep 2025 05:00:00 -0400</pubDate>
    <itunes:duration>1329</itunes:duration>
    <itunes:keywords>CISO, AI security, incident response, cloud misconfigurations, shared responsibility model, proactive intelligence, AI-native protections, David Linthicum, Jo Peterson, ClearTech Loop, governance, AI adoption</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The CISO Field Guide: Becoming Operator, Strategist, Storyteller with Mark Lynd </itunes:title>
    <title>The CISO Field Guide: Becoming Operator, Strategist, Storyteller with Mark Lynd </title>
    <itunes:summary><![CDATA[CISOs wear three hats in 2025: Operator, Strategist, Storyteller.  In this ClearTech Loop episode, Jo Peterson sits down with Mark Lynd — Head of Executive Advisory &amp; Strategy at Netsync, globally ranked AI &amp; Security Thought Leader, and author of Cyber War One Scenario.  Mark shares a practical field guide for CISOs navigating the complexity of AI adoption:  Operator: Shift SOCs from alert-chasing to question-asking. Measure time-to-decision, not tool count. Strat...]]></itunes:summary>
    <description><![CDATA[<p>CISOs wear three hats in 2025: <b>Operator, Strategist, Storyteller</b>. </p><p>In this ClearTech Loop episode, Jo Peterson sits down with <b>Mark Lynd</b> — Head of Executive Advisory &amp; Strategy at Netsync, globally ranked AI &amp; Security Thought Leader, and author of <em>Cyber War One Scenario</em>. </p><p>Mark shares a practical field guide for CISOs navigating the complexity of AI adoption: </p><ul><li><b>Operator:</b> Shift SOCs from alert-chasing to question-asking. Measure <em>time-to-decision</em>, not tool count. </li><li><b>Strategist:</b> Stop reinventing governance. Use paved roads with guardrails (NIST, ISO, vendor frameworks). </li><li><b>Storyteller:</b> Boards don’t want tool inventories — they want proof you can protect the business. Translate cyber chaos into ROI and resilience. </li></ul><p>If you’ve been wondering how to brief the board, govern shadow AI, or actually augment your SOC with AI (without burning out your team), this is your episode. </p><p>👉 Watch the full conversation + subscribe to our LinkedIn newsletter here: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Episode Notes</b></p><p>🎧 Listen: [Buzzsprout embed auto-fills] </p><p>📺 Watch on YouTube: [insert link] </p><p>📰 Subscribe to ClearTech Loop Newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p>📘 Mark Lynd’s book <em>Cyber War One Scenario</em>: <a href='https://www.amazon.com/Cyber-War-Scenario-Mark-Lynd/dp/B0FH41GRHS'>https://www.amazon.com/Cyber-War-Scenario-Mark-Lynd/dp/B0FH41GRHS</a>  </p><p>🔗 Resources mentioned: </p><ul><li><a href='https://www.nist.gov/itl/ai-risk-management-framework'>NIST AI RMF</a> </li><li><a href='https://www.gartner.com/en/documents/5618991'>Gartner SOC Efficiency</a> </li><li><a href='https://www.pwc.com/gx/en/news-room/press-releases/2024/pwc-2025-global-digital-trust-insights.html'>PwC Digital Trust Insights 2025</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>CISOs wear three hats in 2025: <b>Operator, Strategist, Storyteller</b>. </p><p>In this ClearTech Loop episode, Jo Peterson sits down with <b>Mark Lynd</b> — Head of Executive Advisory &amp; Strategy at Netsync, globally ranked AI &amp; Security Thought Leader, and author of <em>Cyber War One Scenario</em>. </p><p>Mark shares a practical field guide for CISOs navigating the complexity of AI adoption: </p><ul><li><b>Operator:</b> Shift SOCs from alert-chasing to question-asking. Measure <em>time-to-decision</em>, not tool count. </li><li><b>Strategist:</b> Stop reinventing governance. Use paved roads with guardrails (NIST, ISO, vendor frameworks). </li><li><b>Storyteller:</b> Boards don’t want tool inventories — they want proof you can protect the business. Translate cyber chaos into ROI and resilience. </li></ul><p>If you’ve been wondering how to brief the board, govern shadow AI, or actually augment your SOC with AI (without burning out your team), this is your episode. </p><p>👉 Watch the full conversation + subscribe to our LinkedIn newsletter here: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Episode Notes</b></p><p>🎧 Listen: [Buzzsprout embed auto-fills] </p><p>📺 Watch on YouTube: [insert link] </p><p>📰 Subscribe to ClearTech Loop Newsletter: <a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p>📘 Mark Lynd’s book <em>Cyber War One Scenario</em>: <a href='https://www.amazon.com/Cyber-War-Scenario-Mark-Lynd/dp/B0FH41GRHS'>https://www.amazon.com/Cyber-War-Scenario-Mark-Lynd/dp/B0FH41GRHS</a>  </p><p>🔗 Resources mentioned: </p><ul><li><a href='https://www.nist.gov/itl/ai-risk-management-framework'>NIST AI RMF</a> </li><li><a href='https://www.gartner.com/en/documents/5618991'>Gartner SOC Efficiency</a> </li><li><a href='https://www.pwc.com/gx/en/news-room/press-releases/2024/pwc-2025-global-digital-trust-insights.html'>PwC Digital Trust Insights 2025</a> </li></ul><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17816212-the-ciso-field-guide-becoming-operator-strategist-storyteller-with-mark-lynd.mp3" length="13086507" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zf4cb72famnt9f2k7uovxru5lqze?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17816212</guid>
    <pubDate>Tue, 09 Sep 2025 15:00:00 -0400</pubDate>
    <itunes:duration>1086</itunes:duration>
    <itunes:keywords>CISO, AI strategy, SOC augmentation, cybersecurity governance, board communication, Netsync, Mark Lynd, Jo Peterson</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Security Isn’t a Regex Problem — Lori MacVittie on Governing the New Threat Surface </itunes:title>
    <title>AI Security Isn’t a Regex Problem — Lori MacVittie on Governing the New Threat Surface </title>
    <itunes:summary><![CDATA[Rules don’t scale. Architecture does. F5’s Lori MacVittie makes the case for putting security policy in the infrastructure—not the app—and for treating AI as its own threat surface. If your program is still chasing strings with rules, you’re already behind.   If your “AI security” strategy is a pile of brittle rules, you’re governing yesterday’s system. In this no-fluff conversation, Lori MacVittie argues for a structural fix: move policy and enforcement into the architecture where they ...]]></itunes:summary>
    <description><![CDATA[<p>Rules don’t scale. Architecture does. F5’s <b>Lori MacVittie</b> makes the case for putting security policy in the <b>infrastructure</b>—not the app—and for treating AI as its own <b>threat surface</b>. If your program is still chasing strings with rules, you’re already behind.  </p><p>If your “AI security” strategy is a pile of brittle rules, you’re governing yesterday’s system. In this no-fluff conversation, <b>Lori MacVittie</b> argues for a structural fix: move <b>policy and enforcement</b> into the architecture where they can evolve without redeploys—then govern AI as a <b>distinct</b> threat surface (prompts, context, responses, completions, agents), not just another API.  </p><p>She also shows how to use LLMs for what humans are bad at: <b>fast pattern discovery</b>. Her real-world example? A packet capture fed to an LLM surfaced a noisy IoT device in minutes—compressing mean-time-to-repair by skipping the rule-writing slog.  </p><p>Reality check: <b>AI adoption is outrunning AI security</b>. If you’re still reactive, you’re late.  </p><p><em>Quick explainer for non-practitioners:</em> <b>Regex</b> (regular expressions) = rule-based string pattern matching; useful for forms, brittle against attackers who mutate text. Lori’s point: shift to <b>semantic</b> signals (meaning/behavior), not just string matches.  </p><p><b>In This Episode</b> </p><ul><li><b>From rules to semantics:</b> why regex won’t save you—and how AI helps detect <b>semantic patterns</b> of abuse.  </li><li><b>Put controls in the architecture:</b> keep secure coding by default, but move policy/enforcement/governance out of the app to avoid security debt and dev drag.  </li><li><b>Govern the AI loop:</b> prompts, context windows, responses, completions, agents—the surface is broader than APIs or the network stack.  </li><li><b>Adoption vs. security:</b> the Road Runner problem—AI is sprinting ahead of the controls.  </li><li><b>Practical win:</b> use LLMs to accelerate discovery in telemetry (e.g., packet captures) and cut MTTR.  </li></ul><p><b>Guest Bio</b></p><p><b>Lori MacVittie</b> is a <b>Distinguished Engineer &amp; Chief Evangelist in F5’s Office of the CTO</b>. She writes and speaks extensively on modern app delivery, AI-driven operations, and security governance. </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>Rules don’t scale. Architecture does. F5’s <b>Lori MacVittie</b> makes the case for putting security policy in the <b>infrastructure</b>—not the app—and for treating AI as its own <b>threat surface</b>. If your program is still chasing strings with rules, you’re already behind.  </p><p>If your “AI security” strategy is a pile of brittle rules, you’re governing yesterday’s system. In this no-fluff conversation, <b>Lori MacVittie</b> argues for a structural fix: move <b>policy and enforcement</b> into the architecture where they can evolve without redeploys—then govern AI as a <b>distinct</b> threat surface (prompts, context, responses, completions, agents), not just another API.  </p><p>She also shows how to use LLMs for what humans are bad at: <b>fast pattern discovery</b>. Her real-world example? A packet capture fed to an LLM surfaced a noisy IoT device in minutes—compressing mean-time-to-repair by skipping the rule-writing slog.  </p><p>Reality check: <b>AI adoption is outrunning AI security</b>. If you’re still reactive, you’re late.  </p><p><em>Quick explainer for non-practitioners:</em> <b>Regex</b> (regular expressions) = rule-based string pattern matching; useful for forms, brittle against attackers who mutate text. Lori’s point: shift to <b>semantic</b> signals (meaning/behavior), not just string matches.  </p><p><b>In This Episode</b> </p><ul><li><b>From rules to semantics:</b> why regex won’t save you—and how AI helps detect <b>semantic patterns</b> of abuse.  </li><li><b>Put controls in the architecture:</b> keep secure coding by default, but move policy/enforcement/governance out of the app to avoid security debt and dev drag.  </li><li><b>Govern the AI loop:</b> prompts, context windows, responses, completions, agents—the surface is broader than APIs or the network stack.  </li><li><b>Adoption vs. security:</b> the Road Runner problem—AI is sprinting ahead of the controls.  </li><li><b>Practical win:</b> use LLMs to accelerate discovery in telemetry (e.g., packet captures) and cut MTTR.  </li></ul><p><b>Guest Bio</b></p><p><b>Lori MacVittie</b> is a <b>Distinguished Engineer &amp; Chief Evangelist in F5’s Office of the CTO</b>. She writes and speaks extensively on modern app delivery, AI-driven operations, and security governance. </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17773548-ai-security-isn-t-a-regex-problem-lori-macvittie-on-governing-the-new-threat-surface.mp3" length="11844996" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7aw8j2a7sexrma3z4bdgojptqqkv?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17773548</guid>
    <pubDate>Tue, 02 Sep 2025 11:00:00 -0400</pubDate>
    <itunes:duration>983</itunes:duration>
    <itunes:keywords>AI Security; Threat Surface; Governance; CISO; Application Delivery; DevSecOps; Semantic Detection; LLM; Agentic AI; MCP Servers; Infrastructure Policy; F5; ClearTech Loop </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity is a Business Risk, So Why are We Still Talking Tech?</itunes:title>
    <title>Cybersecurity is a Business Risk, So Why are We Still Talking Tech?</title>
    <itunes:summary><![CDATA[Think your security strategy is airtight? Think again.  In this episode, Brad Moldenhauer — VP and CISO-in-Residence at Zscaler — lays out the brutal truth: most companies are underestimating the financial and existential risks lurking in their systems.  He’s not pulling punches.  From AI that predicts attacks before they happen to material risks that could bankrupt you overnight, Brad explains how the old-school view of cyber is blinding businesses to what really matters — and...]]></itunes:summary>
    <description><![CDATA[<p>Think your security strategy is airtight? Think again. </p><p>In this episode, Brad Moldenhauer — VP and CISO-in-Residence at Zscaler — lays out the brutal truth: most companies are underestimating the financial and existential risks lurking in their systems. </p><p>He’s not pulling punches. </p><p>From AI that predicts attacks before they happen to material risks that could bankrupt you overnight, Brad explains how the old-school view of cyber is blinding businesses to what really matters — and how to fix it before it&apos;s too late. </p><p><b>In This Episode:</b> </p><ul><li>Why your “cyber strategy” could trigger an extinction-level event </li><li>The business risk mistake even seasoned CISOs still make </li><li>How to stop spending $100 to fix a $5 problem </li><li>Why ignoring AI governance might be your last mistake </li><li>The one shift that turns CISOs into true executives </li></ul><p><b>Why You Should Listen:</b> <br/>If you’re a CISO still talking controls instead of customers — you’re already behind. <br/>This isn’t just another tech talk. It’s a wake-up call from one of the most strategic minds in cybersecurity. <br/><br/></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>Think your security strategy is airtight? Think again. </p><p>In this episode, Brad Moldenhauer — VP and CISO-in-Residence at Zscaler — lays out the brutal truth: most companies are underestimating the financial and existential risks lurking in their systems. </p><p>He’s not pulling punches. </p><p>From AI that predicts attacks before they happen to material risks that could bankrupt you overnight, Brad explains how the old-school view of cyber is blinding businesses to what really matters — and how to fix it before it&apos;s too late. </p><p><b>In This Episode:</b> </p><ul><li>Why your “cyber strategy” could trigger an extinction-level event </li><li>The business risk mistake even seasoned CISOs still make </li><li>How to stop spending $100 to fix a $5 problem </li><li>Why ignoring AI governance might be your last mistake </li><li>The one shift that turns CISOs into true executives </li></ul><p><b>Why You Should Listen:</b> <br/>If you’re a CISO still talking controls instead of customers — you’re already behind. <br/>This isn’t just another tech talk. It’s a wake-up call from one of the most strategic minds in cybersecurity. <br/><br/></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17731244-cybersecurity-is-a-business-risk-so-why-are-we-still-talking-tech.mp3" length="9703148" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/myiyzilpzy3kzvl5levsj8b58bsl?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17731244</guid>
    <pubDate>Tue, 26 Aug 2025 15:00:00 -0400</pubDate>
    <itunes:duration>804</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Fake AI Won’t Innovate — It’ll Infect You </itunes:title>
    <title>Fake AI Won’t Innovate — It’ll Infect You </title>
    <itunes:summary><![CDATA[ClearTech Loop Ep. 8 with Rob Bair, CISO-in-Residence at Zscaler  Episode Summary  Cybercriminals are running fake AI startups — and users are downloading ransomware straight from what looks like “innovation.” In this episode, Rob Bair (Zscaler) breaks down how ransomware has gone corporate: polished websites, SEO poisoning, even English-speaking help desks guiding victims through payments.  This isn’t a hoodie-in-the-basement threat anymore. It’s a professionalized extortion b...]]></itunes:summary>
    <description><![CDATA[<p><em>ClearTech Loop Ep. 8 with Rob Bair, CISO-in-Residence at Zscaler</em> </p><p><b>Episode Summary</b> <br/>Cybercriminals are running fake AI startups — and users are downloading ransomware straight from what looks like “innovation.” In this episode, Rob Bair (Zscaler) breaks down how ransomware has gone corporate: polished websites, SEO poisoning, even English-speaking help desks guiding victims through payments. </p><p>This isn’t a hoodie-in-the-basement threat anymore. It’s a professionalized extortion business — and it’s moving at machine speed. Rob explains why defenders can’t win at human speed, why AI <em>must</em> be in the loop, and what CISOs should expect in the next 12–18 months. </p><p><b>What You’ll Learn in This Episode:</b> </p><ul><li>How ransomware crews are turning <b>fake AI startups into bait</b> </li><li>Why ransomware is now a <b>professionalized industry</b> with customer support </li><li>Why <b>manual patching is dead</b> — and what CISOs must do about it </li><li>The <b>12–18 month horizon</b> for AI-driven cyber threats </li></ul><p><b>About the Guest</b> <br/>Rob Bair is CISO-in-Residence at Zscaler, advising on emerging threats and resilience strategies. He also serves as an investor and advisor at Autonomous Cyber, a board member at Rebel Space Technologies, and advisory board member at ISARA Corporation and BOSS Controls.  </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p><em>ClearTech Loop Ep. 8 with Rob Bair, CISO-in-Residence at Zscaler</em> </p><p><b>Episode Summary</b> <br/>Cybercriminals are running fake AI startups — and users are downloading ransomware straight from what looks like “innovation.” In this episode, Rob Bair (Zscaler) breaks down how ransomware has gone corporate: polished websites, SEO poisoning, even English-speaking help desks guiding victims through payments. </p><p>This isn’t a hoodie-in-the-basement threat anymore. It’s a professionalized extortion business — and it’s moving at machine speed. Rob explains why defenders can’t win at human speed, why AI <em>must</em> be in the loop, and what CISOs should expect in the next 12–18 months. </p><p><b>What You’ll Learn in This Episode:</b> </p><ul><li>How ransomware crews are turning <b>fake AI startups into bait</b> </li><li>Why ransomware is now a <b>professionalized industry</b> with customer support </li><li>Why <b>manual patching is dead</b> — and what CISOs must do about it </li><li>The <b>12–18 month horizon</b> for AI-driven cyber threats </li></ul><p><b>About the Guest</b> <br/>Rob Bair is CISO-in-Residence at Zscaler, advising on emerging threats and resilience strategies. He also serves as an investor and advisor at Autonomous Cyber, a board member at Rebel Space Technologies, and advisory board member at ISARA Corporation and BOSS Controls.  </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17697657-fake-ai-won-t-innovate-it-ll-infect-you.mp3" length="5559298" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/w3d0cv1lfgsiqxa4q7by7g17ooyp?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17697657</guid>
    <pubDate>Tue, 19 Aug 2025 14:00:00 -0400</pubDate>
    <podcast:soundbite startTime="205.333" duration="15.0" />
    <itunes:duration>458</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Stop! AI Could Be Your Next Breach — Here’s Why </itunes:title>
    <title>Stop! AI Could Be Your Next Breach — Here’s Why </title>
    <itunes:summary><![CDATA[You think AI is protecting you.  It might actually be helping hackers.  V-CISO Danny Pastrana has seen it first-hand — AI tools deployed without guardrails can turn into a compliance nightmare, a data leak machine, and your fastest path to a breach.  In this episode, Danny rips the lid off AI hype and shows you where the real danger lives — and how to keep it from wrecking your business.  In This Episode:  The cyber insurance trap that could cost you millions  Ho...]]></itunes:summary>
    <description><![CDATA[<p>You think AI is protecting you. <br/>It might actually be helping hackers. </p><p>V-CISO <a href='https://www.linkedin.com/in/daniel-pastranamendez/'>Danny Pastrana</a> has seen it first-hand — AI tools deployed without guardrails can turn into a compliance nightmare, a data leak machine, and your fastest path to a breach. </p><p>In this episode, Danny rips the lid off AI hype and shows you where the real danger lives — and how to keep it from wrecking your business. </p><p><b>In This Episode:</b> </p><ul><li>The <b>cyber insurance trap</b> that could cost you millions  </li><li>How hackers use <b>AI to scale phishing and deepfakes</b>  </li><li>Why “human-in-the-loop” isn’t optional  </li><li>The <b>one mistake</b> that turns AI from asset to liability </li></ul><p><b>Why You Should Listen:</b> </p><p>If your board is pushing for more AI without asking the right questions, this could be the most important 10 minutes you hear all year. </p><p>Because AI won’t just make you faster — it’ll make your mistakes faster too. </p><p><br/></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>You think AI is protecting you. <br/>It might actually be helping hackers. </p><p>V-CISO <a href='https://www.linkedin.com/in/daniel-pastranamendez/'>Danny Pastrana</a> has seen it first-hand — AI tools deployed without guardrails can turn into a compliance nightmare, a data leak machine, and your fastest path to a breach. </p><p>In this episode, Danny rips the lid off AI hype and shows you where the real danger lives — and how to keep it from wrecking your business. </p><p><b>In This Episode:</b> </p><ul><li>The <b>cyber insurance trap</b> that could cost you millions  </li><li>How hackers use <b>AI to scale phishing and deepfakes</b>  </li><li>Why “human-in-the-loop” isn’t optional  </li><li>The <b>one mistake</b> that turns AI from asset to liability </li></ul><p><b>Why You Should Listen:</b> </p><p>If your board is pushing for more AI without asking the right questions, this could be the most important 10 minutes you hear all year. </p><p>Because AI won’t just make you faster — it’ll make your mistakes faster too. </p><p><br/></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17662421-stop-ai-could-be-your-next-breach-here-s-why.mp3" length="9079636" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/f96qit5mxepk0bx1ro7nl1ub8rqu?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17662421</guid>
    <pubDate>Wed, 13 Aug 2025 09:00:00 -0400</pubDate>
    <itunes:duration>751</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Translating Cyber Risk into Business Strategy | Robert Uno | ClearTech Loop Ep. 6</itunes:title>
    <title>Translating Cyber Risk into Business Strategy | Robert Uno | ClearTech Loop Ep. 6</title>
    <itunes:summary><![CDATA[In this sixth episode of ClearTech Loop, Jo Peterson is joined by Robert Uno, Global CISO and Founder of Triden Group, to unpack what modern cybersecurity leadership really looks like—from AI governance to financial risk quantification.  This 10-minute episode continues The CISO Slant—a 10-part series that explores how today’s security leaders are navigating AI disruption, boardroom expectations, and digital transformation.  What we cover in this episode:  Why CISOs must evolve...]]></itunes:summary>
    <description><![CDATA[<p>In this sixth episode of <em>ClearTech Loop</em>, Jo Peterson is joined by Robert Uno, Global CISO and Founder of Triden Group, to unpack what modern cybersecurity leadership really looks like—from AI governance to financial risk quantification. </p><p>This 10-minute episode continues <em>The CISO Slant</em>—a 10-part series that explores how today’s security leaders are navigating AI disruption, boardroom expectations, and digital transformation. </p><p><b>What we cover in this episode:</b> </p><ul><li>Why CISOs must evolve into business risk managers </li><li>The real business value of quantifying cyber risk </li><li>How governance, not just tooling, drives safe AI adoption </li></ul><p><b>Guest:</b> Robert Uno, Global Chief Information Security Officer, Triden Group <br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <a href='https://cleartechresearch.com/project/episode-6-the-ciso-slant-robert-uno-global-ciso-at-triden-group/'>https://cleartechresearch.com/project/episode-6-the-ciso-slant-robert-uno-global-ciso-at-triden-group/</a></p><p><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Topics:</b> <br/>cybersecurity, risk quantification, AI governance, business strategy, CISO, ClearTech Loop, Jo Peterson, Robert Uno </p><p><b>Tags/Keywords:</b> <br/>CISO, cybersecurity, AI risk, business leadership, cyber strategy, Robert Uno, ClearTech Loop, Jo Peterson, Triden Group </p><p><b>Episode Type:</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number:</b> <br/>Season 1, Episode 6 </p><p><b>Custom Episode Webpage:</b> <br/>https://cleartechresearch.com/Cleartech-loop-podcast/episode-6-robert-uno </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this sixth episode of <em>ClearTech Loop</em>, Jo Peterson is joined by Robert Uno, Global CISO and Founder of Triden Group, to unpack what modern cybersecurity leadership really looks like—from AI governance to financial risk quantification. </p><p>This 10-minute episode continues <em>The CISO Slant</em>—a 10-part series that explores how today’s security leaders are navigating AI disruption, boardroom expectations, and digital transformation. </p><p><b>What we cover in this episode:</b> </p><ul><li>Why CISOs must evolve into business risk managers </li><li>The real business value of quantifying cyber risk </li><li>How governance, not just tooling, drives safe AI adoption </li></ul><p><b>Guest:</b> Robert Uno, Global Chief Information Security Officer, Triden Group <br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <a href='https://cleartechresearch.com/project/episode-6-the-ciso-slant-robert-uno-global-ciso-at-triden-group/'>https://cleartechresearch.com/project/episode-6-the-ciso-slant-robert-uno-global-ciso-at-triden-group/</a></p><p><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Topics:</b> <br/>cybersecurity, risk quantification, AI governance, business strategy, CISO, ClearTech Loop, Jo Peterson, Robert Uno </p><p><b>Tags/Keywords:</b> <br/>CISO, cybersecurity, AI risk, business leadership, cyber strategy, Robert Uno, ClearTech Loop, Jo Peterson, Triden Group </p><p><b>Episode Type:</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number:</b> <br/>Season 1, Episode 6 </p><p><b>Custom Episode Webpage:</b> <br/>https://cleartechresearch.com/Cleartech-loop-podcast/episode-6-robert-uno </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17614704-translating-cyber-risk-into-business-strategy-robert-uno-cleartech-loop-ep-6.mp3" length="8361462" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bkb29ozug9hg5izelbdwywkfkdfc?.jpg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-17614704</guid>
    <pubDate>Tue, 05 Aug 2025 05:00:00 -0400</pubDate>
    <itunes:duration>693</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Architecting Resilient Cybersecurity at Scale | Stan Lowe | ClearTech Loop Ep. 5 </itunes:title>
    <title>Architecting Resilient Cybersecurity at Scale | Stan Lowe | ClearTech Loop Ep. 5 </title>
    <itunes:summary><![CDATA[In this fifth episode of ClearTech Loop, Jo Peterson sits down with Stan Lowe, CISO at the U.S. Department of the Interior, to explore how federal-scale cybersecurity transformation offers a blueprint for all modern enterprises.  This 10-minute conversation continues The CISO Slant—a 10-episode series on how security leaders are navigating AI risk, operational complexity, and leadership in the digital era.  What we cover in this episode:  Deploying Zero Trust architecture at sc...]]></itunes:summary>
    <description><![CDATA[<p>In this fifth episode of <em>ClearTech Loop</em>, Jo Peterson sits down with Stan Lowe, CISO at the U.S. Department of the Interior, to explore how federal-scale cybersecurity transformation offers a blueprint for all modern enterprises. </p><p>This 10-minute conversation continues <em>The CISO Slant</em>—a 10-episode series on how security leaders are navigating AI risk, operational complexity, and leadership in the digital era. </p><p><b>What we cover in this episode:</b> </p><ul><li>Deploying Zero Trust architecture at scale </li><li>Why centralized security operations matter more than ever </li><li>How to rethink security in the age of AI and cloud complexity </li></ul><p><b>Guest:</b> Stanley Lowe, Chief Information Security Officer, U.S. Department of the Interior <br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <br/><a href='https://cleartechresearch.com/project/cleartech-loop-episode-5-stan-lowe/'>https://cleartechresearch.com/project/cleartech-loop-episode-5-stan-lowe/</a><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Topics:</b> <br/>cybersecurity, zero trust, AI security, federal cybersecurity, digital transformation, ClearTech Loop, Jo Peterson, Stan Lowe </p><p><b>Tags/Keywords</b> <br/>CISO, cybersecurity, zero trust, AI, federal IT, risk strategy, Jo Peterson, ClearTech Loop, Stan Lowe, U.S. Department of the Interior </p><p><b>Episode Type</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number</b> <br/>Season 1, Episode 5 </p><p><b>Custom Episode Webpage</b> <br/>https://cleartechresearch.com/project/cleartech-loop-episode-5-stan-lowe/</p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this fifth episode of <em>ClearTech Loop</em>, Jo Peterson sits down with Stan Lowe, CISO at the U.S. Department of the Interior, to explore how federal-scale cybersecurity transformation offers a blueprint for all modern enterprises. </p><p>This 10-minute conversation continues <em>The CISO Slant</em>—a 10-episode series on how security leaders are navigating AI risk, operational complexity, and leadership in the digital era. </p><p><b>What we cover in this episode:</b> </p><ul><li>Deploying Zero Trust architecture at scale </li><li>Why centralized security operations matter more than ever </li><li>How to rethink security in the age of AI and cloud complexity </li></ul><p><b>Guest:</b> Stanley Lowe, Chief Information Security Officer, U.S. Department of the Interior <br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <br/><a href='https://cleartechresearch.com/project/cleartech-loop-episode-5-stan-lowe/'>https://cleartechresearch.com/project/cleartech-loop-episode-5-stan-lowe/</a><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Topics:</b> <br/>cybersecurity, zero trust, AI security, federal cybersecurity, digital transformation, ClearTech Loop, Jo Peterson, Stan Lowe </p><p><b>Tags/Keywords</b> <br/>CISO, cybersecurity, zero trust, AI, federal IT, risk strategy, Jo Peterson, ClearTech Loop, Stan Lowe, U.S. Department of the Interior </p><p><b>Episode Type</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number</b> <br/>Season 1, Episode 5 </p><p><b>Custom Episode Webpage</b> <br/>https://cleartechresearch.com/project/cleartech-loop-episode-5-stan-lowe/</p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17582159-architecting-resilient-cybersecurity-at-scale-stan-lowe-cleartech-loop-ep-5.mp3" length="10390423" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bv3cdmim3r2g8z3ajvbn9pch8d8w?.jpg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-17582159</guid>
    <pubDate>Tue, 29 Jul 2025 17:00:00 -0400</pubDate>
    <itunes:duration>862</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Securing AI at Scale: Privacy, Trust &amp; Growth | Mike Britton | ClearTech Loop Ep. 4 </itunes:title>
    <title>Securing AI at Scale: Privacy, Trust &amp; Growth | Mike Britton | ClearTech Loop Ep. 4 </title>
    <itunes:summary><![CDATA[Episode Description / Show Notes  In this fourth episode of ClearTech Loop, Jo Peterson sits down with Mike Britton, CIO at Abnormal Security, to unpack the real-world challenges of governing AI, protecting cloud-native platforms, and building trust in fast-growth environments.  This 10-minute conversation continues The CISO Slant—a 10-episode series exploring how today’s security leaders balance innovation and risk.  What we cover in this episode:  How to implement secure...]]></itunes:summary>
    <description><![CDATA[<p><b>Episode Description / Show Notes</b> <br/>In this fourth episode of ClearTech Loop, Jo Peterson sits down with Mike Britton, CIO at Abnormal Security, to unpack the real-world challenges of governing AI, protecting cloud-native platforms, and building trust in fast-growth environments. </p><p>This 10-minute conversation continues <em>The CISO Slant</em>—a 10-episode series exploring how today’s security leaders balance innovation and risk. </p><p><b>What we cover in this episode:</b> </p><ul><li>How to implement secure, compliant AI programs </li><li>What CIOs must prioritize in high-growth cybersecurity teams </li><li>Why trust and privacy are central to platform security </li></ul><p><b>Guest:</b> Mike Britton, Chief Information Officer, Abnormal Security <br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <br/><a href='https://cleartechresearch.com/project/cleartech-loop-podcast-episode-4-mike-britton/'>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-4-mike-britton/</a> </p><p><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Topics:</b> <br/>cybersecurity, AI strategy, privacy, enterprise security, scale, ClearTech Loop, Jo Peterson, Mike Britton </p><p><b>Tags/Keywords</b> <br/>CISO, CIO, AI security, cloud security, privacy, risk, digital growth, Jo Peterson, ClearTech Loop, Mike Britton, Abnormal Security </p><p><b>Episode Type</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number</b> <br/>Season 1, Episode 4 </p><p><b>Custom Episode Webpage</b> <br/>https://cleartechresearch.com/Cleartech-loop-podcast/episode-4-mike-britton </p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p><b>Episode Description / Show Notes</b> <br/>In this fourth episode of ClearTech Loop, Jo Peterson sits down with Mike Britton, CIO at Abnormal Security, to unpack the real-world challenges of governing AI, protecting cloud-native platforms, and building trust in fast-growth environments. </p><p>This 10-minute conversation continues <em>The CISO Slant</em>—a 10-episode series exploring how today’s security leaders balance innovation and risk. </p><p><b>What we cover in this episode:</b> </p><ul><li>How to implement secure, compliant AI programs </li><li>What CIOs must prioritize in high-growth cybersecurity teams </li><li>Why trust and privacy are central to platform security </li></ul><p><b>Guest:</b> Mike Britton, Chief Information Officer, Abnormal Security <br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <br/><a href='https://cleartechresearch.com/project/cleartech-loop-podcast-episode-4-mike-britton/'>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-4-mike-britton/</a> </p><p><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Topics:</b> <br/>cybersecurity, AI strategy, privacy, enterprise security, scale, ClearTech Loop, Jo Peterson, Mike Britton </p><p><b>Tags/Keywords</b> <br/>CISO, CIO, AI security, cloud security, privacy, risk, digital growth, Jo Peterson, ClearTech Loop, Mike Britton, Abnormal Security </p><p><b>Episode Type</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number</b> <br/>Season 1, Episode 4 </p><p><b>Custom Episode Webpage</b> <br/>https://cleartechresearch.com/Cleartech-loop-podcast/episode-4-mike-britton </p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17546172-securing-ai-at-scale-privacy-trust-growth-mike-britton-cleartech-loop-ep-4.mp3" length="4938772" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/14lvj2kyc11fs5jy1vgpu2vzz55p?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17546172</guid>
    <pubDate>Tue, 22 Jul 2025 15:00:00 -0400</pubDate>
    <itunes:duration>408</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Risk Culture in Manufacturing: Aligning Security with Process | Thomas LaBonte | ClearTech Loop Ep. 3</itunes:title>
    <title>Risk Culture in Manufacturing: Aligning Security with Process | Thomas LaBonte | ClearTech Loop Ep. 3</title>
    <itunes:summary><![CDATA[In this third episode of ClearTech Loop, Jo Peterson speaks with Thomas LaBonte, CISO at Saint-Gobain North America, about the practical side of aligning cybersecurity with industrial operations.  This 10-minute conversation continues The CISO Slant—a 10-episode series on how security leaders are navigating AI risk, cultural change, and operational complexity.  What we cover in this episode:  How to embed security into industrial and operational technology (OT) environments&nbs...]]></itunes:summary>
    <description><![CDATA[<p>In this third episode of ClearTech Loop, Jo Peterson speaks with Thomas LaBonte, CISO at Saint-Gobain North America, about the practical side of aligning cybersecurity with industrial operations. </p><p>This 10-minute conversation continues <em>The CISO Slant</em>—a 10-episode series on how security leaders are navigating AI risk, cultural change, and operational complexity. </p><p><b>What we cover in this episode:</b> </p><ul><li>How to embed security into industrial and operational technology (OT) environments </li><li>The cultural mindset shift needed to drive security ownership </li><li>Where risk, process, and communication intersect in complex organizations </li></ul><p><b>Guest:</b> Thomas LaBonte, Chief Information Security Officer, Saint-Gobain North America <br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <a href=' https://cleartechresearch.com/Cleartech-loop-podcast/episode-3-thomas-labonte '><br/>https://cleartechresearch.com/Cleartech-loop-podcast/episode-3-thomas-labonte </a></p><p><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Topics:</b> <br/>cybersecurity, OT security, manufacturing, risk culture, process security, ClearTech Loop, Jo Peterson, Thomas LaBonte </p><p><b>Tags/Keywords</b> <br/>CISO, cybersecurity, manufacturing security, risk management, OT, business alignment, Jo Peterson, ClearTech Loop, Thomas LaBonte, Saint-Gobain North America </p><p><b>Episode Type</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number</b> <br/>Season 1, Episode 3 </p><p><b>Custom Episode Webpage</b> <a href=' https://cleartechresearch.com/Cleartech-loop-podcast/episode-3-thomas-labonte '><span style='background-color: highlight;'><br/>https://cleartechresearch.com/Cleartech-loop-podcast/episode-3-thomas-labonte </span></a></p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this third episode of ClearTech Loop, Jo Peterson speaks with Thomas LaBonte, CISO at Saint-Gobain North America, about the practical side of aligning cybersecurity with industrial operations. </p><p>This 10-minute conversation continues <em>The CISO Slant</em>—a 10-episode series on how security leaders are navigating AI risk, cultural change, and operational complexity. </p><p><b>What we cover in this episode:</b> </p><ul><li>How to embed security into industrial and operational technology (OT) environments </li><li>The cultural mindset shift needed to drive security ownership </li><li>Where risk, process, and communication intersect in complex organizations </li></ul><p><b>Guest:</b> Thomas LaBonte, Chief Information Security Officer, Saint-Gobain North America <br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <a href=' https://cleartechresearch.com/Cleartech-loop-podcast/episode-3-thomas-labonte '><br/>https://cleartechresearch.com/Cleartech-loop-podcast/episode-3-thomas-labonte </a></p><p><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p><p><b>Topics:</b> <br/>cybersecurity, OT security, manufacturing, risk culture, process security, ClearTech Loop, Jo Peterson, Thomas LaBonte </p><p><b>Tags/Keywords</b> <br/>CISO, cybersecurity, manufacturing security, risk management, OT, business alignment, Jo Peterson, ClearTech Loop, Thomas LaBonte, Saint-Gobain North America </p><p><b>Episode Type</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number</b> <br/>Season 1, Episode 3 </p><p><b>Custom Episode Webpage</b> <a href=' https://cleartechresearch.com/Cleartech-loop-podcast/episode-3-thomas-labonte '><span style='background-color: highlight;'><br/>https://cleartechresearch.com/Cleartech-loop-podcast/episode-3-thomas-labonte </span></a></p><p> </p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17510050-risk-culture-in-manufacturing-aligning-security-with-process-thomas-labonte-cleartech-loop-ep-3.mp3" length="10201376" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7jhq4441jryuxk99xe9t3bakp7j1?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17510050</guid>
    <pubDate>Tue, 15 Jul 2025 16:00:00 -0400</pubDate>
    <itunes:duration>846</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security as an Enabler: Board Communication &amp; Cloud Risk | Scott Howitt | ClearTech Loop Ep. 2</itunes:title>
    <title>Security as an Enabler: Board Communication &amp; Cloud Risk | Scott Howitt | ClearTech Loop Ep. 2</title>
    <itunes:summary><![CDATA[In this second episode of ClearTech Loop, Jo Peterson sits down with Scott Howitt, Founder, SVH Cyber, to discuss how CISOs can help drive secure innovation rather than slow it down.  This 10-minute conversation continues The CISO Slant—a 10-episode series on how security leaders are navigating risk, cloud strategy, and board engagement in today’s enterprise environment.  What we cover in this episode:  How to position security as an innovation partner, not a roadblock How...]]></itunes:summary>
    <description><![CDATA[<p>In this second episode of ClearTech Loop, Jo Peterson sits down with Scott Howitt, Founder, SVH Cyber, to discuss how CISOs can help drive secure innovation rather than slow it down. </p><p>This 10-minute conversation continues The CISO Slant—a 10-episode series on how security leaders are navigating risk, cloud strategy, and board engagement in today’s enterprise environment. </p><p><b>What we cover in this episode:</b> </p><ul><li>How to position security as an innovation partner, not a roadblock </li><li>How to communicate cybersecurity priorities to the board using business language </li><li>How cloud transformation demands new governance and operating models </li></ul><p><b>Guest:</b> Scott Howitt, Founder, SVH Cyber<br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <br/><a href='https://cleartechresearch.com/Cleartech-loop-podcast/episode-2-scott-howitt '>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-2-scott-howitt/</a></p><p><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/ '>https://www.linkedin.com/newsletters/7346174860760416256/ </a></p><p><b>Topics:</b> <br/>cybersecurity, cloud strategy, board communication, digital risk, governance, ClearTech Loop, Jo Peterson, Scott Howitt </p><p><b>Tags/Keywords</b> <br/>CISO, cybersecurity, digital transformation, board engagement, cloud governance, business risk, Jo Peterson, ClearTech Loop, Scott Howitt, UL Solutions, enterprise security </p><p><b>Episode Type</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number</b> <br/>Season 1, Episode 2 </p><p><b>Custom Episode Webpage</b> </p><p><a href='https://cleartechresearch.com/project/cleartech-loop-podcast-episode-2-scott-howitt/'>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-2-scott-howitt/</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this second episode of ClearTech Loop, Jo Peterson sits down with Scott Howitt, Founder, SVH Cyber, to discuss how CISOs can help drive secure innovation rather than slow it down. </p><p>This 10-minute conversation continues The CISO Slant—a 10-episode series on how security leaders are navigating risk, cloud strategy, and board engagement in today’s enterprise environment. </p><p><b>What we cover in this episode:</b> </p><ul><li>How to position security as an innovation partner, not a roadblock </li><li>How to communicate cybersecurity priorities to the board using business language </li><li>How cloud transformation demands new governance and operating models </li></ul><p><b>Guest:</b> Scott Howitt, Founder, SVH Cyber<br/><b>Host:</b> Jo Peterson, Chief Analyst, ClearTech Research </p><p><b>Full episode page with transcript and takeaways:</b> <br/><a href='https://cleartechresearch.com/Cleartech-loop-podcast/episode-2-scott-howitt '>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-2-scott-howitt/</a></p><p><b>Subscribe to the newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/ '>https://www.linkedin.com/newsletters/7346174860760416256/ </a></p><p><b>Topics:</b> <br/>cybersecurity, cloud strategy, board communication, digital risk, governance, ClearTech Loop, Jo Peterson, Scott Howitt </p><p><b>Tags/Keywords</b> <br/>CISO, cybersecurity, digital transformation, board engagement, cloud governance, business risk, Jo Peterson, ClearTech Loop, Scott Howitt, UL Solutions, enterprise security </p><p><b>Episode Type</b> <br/>Full Episode </p><p><b>Season &amp; Episode Number</b> <br/>Season 1, Episode 2 </p><p><b>Custom Episode Webpage</b> </p><p><a href='https://cleartechresearch.com/project/cleartech-loop-podcast-episode-2-scott-howitt/'>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-2-scott-howitt/</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17467412-security-as-an-enabler-board-communication-cloud-risk-scott-howitt-cleartech-loop-ep-2.mp3" length="8595847" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zubkn69oka6vi69yx77ocomdasc7?.jpg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-17467412</guid>
    <pubDate>Tue, 08 Jul 2025 06:00:00 -0400</pubDate>
    <itunes:duration>712</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CISO Playbook: Quantifying Cyber Risk &amp; Governing AI | Stephenie Southard | ClearTech Loop Ep. 1</itunes:title>
    <title>CISO Playbook: Quantifying Cyber Risk &amp; Governing AI | Stephenie Southard | ClearTech Loop Ep. 1</title>
    <itunes:summary><![CDATA[In this premiere episode of ClearTech Loop, Jo Peterson speaks with Stephenie Southard, Chief Security Officer at Baxter Credit Union, to explore what it really takes to lead cybersecurity in 2025.  This 10-minute conversation kicks off The CISO Slant—a 10-episode series exploring how modern CISOs are rethinking risk, AI, and leadership in a rapidly shifting landscape.  What we cover in this episode:  How to frame cyber risk in financial terms that resonate with executive leade...]]></itunes:summary>
    <description><![CDATA[<p>In this premiere episode of ClearTech Loop, Jo Peterson speaks with Stephenie Southard, Chief Security Officer at Baxter Credit Union, to explore what it really takes to lead cybersecurity in 2025. </p><p>This 10-minute conversation kicks off The CISO Slant—a 10-episode series exploring how modern CISOs are rethinking risk, AI, and leadership in a rapidly shifting landscape. </p><p><b>What we cover in this episode: </b></p><ul><li>How to frame cyber risk in financial terms that resonate with executive leadership </li><li>How cybersecurity should be integrated into the broader enterprise risk model </li><li>How CISOs can govern AI—both internally and across third-party vendors </li></ul><p><b>Guest</b>: Stephenie Southard, SVP &amp; Chief Security Officer, Baxter Credit Union <b>Host</b>: Jo Peterson, Chief Analyst, ClearTech Research</p><p><b>Full episode page with transcript and takeaways</b>: <a href='https://cleartechresearch.com/cleartech-loop-podcast-episode-1-stephanie-southard/'>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-1-stephenie-southard/</a></p><p><b>Subscribe to the newsletter: </b></p><p>Topics: cybersecurity, AI governance, cyber risk, executive strategy, CISO leadership, ClearTech Loop, Jo Peterson, Stephenie Southard </p><p><b>Tags/Keywords </b></p><p>CISO, cybersecurity, cyber risk, AI governance, business strategy, enterprise risk, Jo Peterson, ClearTech Loop, Stephenie Southard, Baxter Credit Union, technology leadership </p><p><b>Episode Type </b></p><p>Full Episode </p><p><b>Season &amp; Episode Number </b></p><p>Season 1, Episode 1 </p><p><b>Custom Episode Webpage </b></p><p><a href='https://cleartechresearch.com/cleartech-loop-podcast-episode-1-stephanie-southard/'>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-1-stephenie-southard/</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this premiere episode of ClearTech Loop, Jo Peterson speaks with Stephenie Southard, Chief Security Officer at Baxter Credit Union, to explore what it really takes to lead cybersecurity in 2025. </p><p>This 10-minute conversation kicks off The CISO Slant—a 10-episode series exploring how modern CISOs are rethinking risk, AI, and leadership in a rapidly shifting landscape. </p><p><b>What we cover in this episode: </b></p><ul><li>How to frame cyber risk in financial terms that resonate with executive leadership </li><li>How cybersecurity should be integrated into the broader enterprise risk model </li><li>How CISOs can govern AI—both internally and across third-party vendors </li></ul><p><b>Guest</b>: Stephenie Southard, SVP &amp; Chief Security Officer, Baxter Credit Union <b>Host</b>: Jo Peterson, Chief Analyst, ClearTech Research</p><p><b>Full episode page with transcript and takeaways</b>: <a href='https://cleartechresearch.com/cleartech-loop-podcast-episode-1-stephanie-southard/'>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-1-stephenie-southard/</a></p><p><b>Subscribe to the newsletter: </b></p><p>Topics: cybersecurity, AI governance, cyber risk, executive strategy, CISO leadership, ClearTech Loop, Jo Peterson, Stephenie Southard </p><p><b>Tags/Keywords </b></p><p>CISO, cybersecurity, cyber risk, AI governance, business strategy, enterprise risk, Jo Peterson, ClearTech Loop, Stephenie Southard, Baxter Credit Union, technology leadership </p><p><b>Episode Type </b></p><p>Full Episode </p><p><b>Season &amp; Episode Number </b></p><p>Season 1, Episode 1 </p><p><b>Custom Episode Webpage </b></p><p><a href='https://cleartechresearch.com/cleartech-loop-podcast-episode-1-stephanie-southard/'>https://cleartechresearch.com/project/cleartech-loop-podcast-episode-1-stephenie-southard/</a></p><p>🎧 <b>Listen:</b> In Buzzsprout Player<br/>▶ <b>Watch on YouTube:</b> <a href='https://youtu.be/byUzDwQV-DY'>https://www.youtube.com/@ClearTechResearch/playlist</a><br/>📰 <b>Subscribe to the Newsletter:</b> <br/><a href='https://www.linkedin.com/newsletters/7346174860760416256/'>https://www.linkedin.com/newsletters/7346174860760416256/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2248577/episodes/17430001-ciso-playbook-quantifying-cyber-risk-governing-ai-stephenie-southard-cleartech-loop-ep-1.mp3" length="4769016" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/m7n0ibdvbgaailu9o7mebuncg55l?.jpg" />
    <itunes:author>ClearTech Research / Jo Peterson</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17430001</guid>
    <pubDate>Tue, 01 Jul 2025 11:00:00 -0400</pubDate>
    <itunes:duration>393</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
