<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2612409.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Unicorn CISO</title>

  <lastBuildDate>Tue, 05 May 2026 06:13:19 -0400</lastBuildDate>
  <link>https://www.buzzsprout.com/2612409</link>
  <language>en-us</language>
  <copyright>© 2026 Unicorn CISO</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>616d2adc-b9fd-5858-be0d-b6c837d9cd48</podcast:guid>
  <podcast:txt purpose="verify">pac@33n.vc</podcast:txt>
  <itunes:author>Pedro @ 33N</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>Unicorn CISO covers discussions with CISOs from tech unicorns, working on the frontier of cybersecurity while balancing business speed.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>Pedro @ 33N</itunes:name>
    <itunes:email>pac@33n.vc</itunes:email>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/hs693w6re91vvaa2lh7ruu937ozv?.jpg</url>
     <title>Unicorn CISO</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/hs693w6re91vvaa2lh7ruu937ozv?.jpg" />
  <itunes:category text="Technology" />
  <item>
    <itunes:title>Patrick Blanc (CISO Nexthink)</itunes:title>
    <title>Patrick Blanc (CISO Nexthink)</title>
    <itunes:summary><![CDATA[We talk with Patrick Blank about what it takes to secure a fast-growing B2B company whose product includes a privileged endpoint agent deployed at massive scale. We dig into why fundamentals beat hype, how productivity shortcuts quietly create the biggest risks, and how we frame security to customers and the board without losing speed.  • Patrick’s career path from banking and consulting to CISO roles and security leadership at Google DeepMind  • Why privileged endpoint agents raise...]]></itunes:summary>
    <description><![CDATA[<p>We talk with Patrick Blank about what it takes to secure a fast-growing B2B company whose product includes a privileged endpoint agent deployed at massive scale. We dig into why fundamentals beat hype, how productivity shortcuts quietly create the biggest risks, and how we frame security to customers and the board without losing speed. <br/>• Patrick’s career path from banking and consulting to CISO roles and security leadership at Google DeepMind <br/>• Why privileged endpoint agents raise reliability and trust stakes for enterprise customers <br/>• How identity and access management fits alongside endpoint security and defense in depth <br/>• Using compliance as a baseline trust signal while preparing for deeper customer audits <br/>• The hidden risk of productivity workarounds and the shift with agentic AI tools <br/>• Tool sprawl as a security problem and the value of secure-by-default standards <br/>• Emerging segments like IDE-integrated AI code security and the push to reduce alert noise <br/>• Practical ways to communicate cyber risk to a board focused on growth and resilience <br/>• Preparing for a faster external attack surface by tightening fundamentals like patching <br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>We talk with Patrick Blank about what it takes to secure a fast-growing B2B company whose product includes a privileged endpoint agent deployed at massive scale. We dig into why fundamentals beat hype, how productivity shortcuts quietly create the biggest risks, and how we frame security to customers and the board without losing speed. <br/>• Patrick’s career path from banking and consulting to CISO roles and security leadership at Google DeepMind <br/>• Why privileged endpoint agents raise reliability and trust stakes for enterprise customers <br/>• How identity and access management fits alongside endpoint security and defense in depth <br/>• Using compliance as a baseline trust signal while preparing for deeper customer audits <br/>• The hidden risk of productivity workarounds and the shift with agentic AI tools <br/>• Tool sprawl as a security problem and the value of secure-by-default standards <br/>• Emerging segments like IDE-integrated AI code security and the push to reduce alert noise <br/>• Practical ways to communicate cyber risk to a board focused on growth and resilience <br/>• Preparing for a faster external attack surface by tightening fundamentals like patching <br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2612409/episodes/19104214-patrick-blanc-ciso-nexthink.mp3" length="22451158" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hg1kc9yflskqor6oio1fs2k3hw4s?.jpg" />
    <itunes:author>Pedro Carreira</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19104214</guid>
    <pubDate>Mon, 04 May 2026 08:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2612409/19104214/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2612409/19104214/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2612409/19104214/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2612409/19104214/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2612409/19104214/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Patrick Blanc (CISO Nexthink)" />
  <psc:chapter start="0:02" title="Welcome And Show Setup" />
  <psc:chapter start="0:37" title="Patrick’s Path From Banking To Google" />
  <psc:chapter start="3:37" title="Securing SaaS Plus Privileged Agents" />
  <psc:chapter start="5:43" title="Identity Focus Without Ignoring Endpoints" />
  <psc:chapter start="8:06" title="Earning Enterprise Trust Through Compliance" />
  <psc:chapter start="12:22" title="Productivity Workarounds And Agentic AI Risk" />
  <psc:chapter start="15:59" title="Tool Sprawl And Secure Default Strategy" />
  <psc:chapter start="19:20" title="AI Coding Tools And Security That Scales" />
  <psc:chapter start="23:20" title="How To Talk Security With The Board" />
  <psc:chapter start="27:43" title="AI-Driven Attack Surface And Fundamentals" />
  <psc:chapter start="30:53" title="Closing Thoughts" />
</psc:chapters>
    <itunes:duration>1868</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Nuno Teodoro (ex-VP Cybersecurity at Solaris)</itunes:title>
    <title>Nuno Teodoro (ex-VP Cybersecurity at Solaris)</title>
    <itunes:summary><![CDATA[We talk with Nuno Teodoro about how a hands-on security leader builds real defenses inside a cloud-native bank while regulators, auditors, and the business all demand speed. We dig into what changes when a fintech becomes a bank, how to use compliance to fund security maturity, and why AI-driven fraud is raising the stakes. • career path from computer engineering to application security and penetration testing • shifting from consultancy to leading security inside companies across telecom, in...]]></itunes:summary>
    <description><![CDATA[<p>We talk with Nuno Teodoro about how a hands-on security leader builds real defenses inside a cloud-native bank while regulators, auditors, and the business all demand speed. We dig into what changes when a fintech becomes a bank, how to use compliance to fund security maturity, and why AI-driven fraud is raising the stakes.<br/>• career path from computer engineering to application security and penetration testing<br/>• shifting from consultancy to leading security inside companies across telecom, insurance, and fintech<br/>• difference between VP of Cybersecurity and CISO roles across the three lines of defense<br/>• selecting vendors through hands-on POVs and POCs instead of only RFPs<br/>• protecting customer funds as the core cybersecurity goal in regulated banking<br/>• balancing compliance work with risk-based security priorities<br/>• navigating major frameworks and regulations like PCI DSS, SWIFT, ISO 27001, ISO 22301, PSD2, and DORA<br/>• using regulatory requirements to justify investments and close real security gaps<br/>• scaling security culture in a cloud-based AWS bank while managing control expectations<br/>• friction points in secure software development life cycle and blocking risky pull requests<br/>• communicating cyber risk to the board through business impact and clear narratives<br/>• focusing on DORA implementation plus the rise of AI-enabled fraud and account takeover threats<br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>We talk with Nuno Teodoro about how a hands-on security leader builds real defenses inside a cloud-native bank while regulators, auditors, and the business all demand speed. We dig into what changes when a fintech becomes a bank, how to use compliance to fund security maturity, and why AI-driven fraud is raising the stakes.<br/>• career path from computer engineering to application security and penetration testing<br/>• shifting from consultancy to leading security inside companies across telecom, insurance, and fintech<br/>• difference between VP of Cybersecurity and CISO roles across the three lines of defense<br/>• selecting vendors through hands-on POVs and POCs instead of only RFPs<br/>• protecting customer funds as the core cybersecurity goal in regulated banking<br/>• balancing compliance work with risk-based security priorities<br/>• navigating major frameworks and regulations like PCI DSS, SWIFT, ISO 27001, ISO 22301, PSD2, and DORA<br/>• using regulatory requirements to justify investments and close real security gaps<br/>• scaling security culture in a cloud-based AWS bank while managing control expectations<br/>• friction points in secure software development life cycle and blocking risky pull requests<br/>• communicating cyber risk to the board through business impact and clear narratives<br/>• focusing on DORA implementation plus the rise of AI-enabled fraud and account takeover threats<br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2612409/episodes/19052643-nuno-teodoro-ex-vp-cybersecurity-at-solaris.mp3" length="24134540" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6m9fiylfifzfhokhzkxs58in8g3p?.jpg" />
    <itunes:author>Pedro Carreira</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19052643</guid>
    <pubDate>Mon, 04 May 2026 08:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2612409/19052643/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2612409/19052643/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2612409/19052643/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2612409/19052643/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2612409/19052643/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Nuno Teodoro (ex-VP Cybersecurity at Solaris)" />
  <psc:chapter start="0:02" title="Welcome And Guest Introduction" />
  <psc:chapter start="0:50" title="From Computer Engineering To Cyber" />
  <psc:chapter start="5:49" title="VP Of Cybersecurity Versus CISO" />
  <psc:chapter start="9:23" title="Choosing Vendors And Staying Hands-On" />
  <psc:chapter start="16:33" title="Protecting Customer Funds Under Scrutiny" />
  <psc:chapter start="20:37" title="Turning Compliance Into Security Investment" />
  <psc:chapter start="24:43" title="Culture Shift From Fintech To Bank" />
  <psc:chapter start="30:53" title="Secure Development Lifecycle And Delivery Friction" />
</psc:chapters>
    <itunes:duration>2009</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
