<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2615749.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Technology Risk Briefing </title>

  <lastBuildDate>Wed, 13 May 2026 06:03:31 -0400</lastBuildDate>
  <link>https://www.buzzsprout.com/2615749</link>
  <language>en-us</language>
  <copyright>© 2026 Technology Risk Briefing </copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>ef2dc3ea-2b7d-5cd0-af0a-b5deffccebd9</podcast:guid>
  <podcast:txt purpose="verify">dhorn@me.com</podcast:txt>
  <itunes:author>David Horn</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>A podcast that translates technology risk headlines into practical actions for technology, risk, security, resilience and audit professionals and for Boards to keep abreast of current Technology Risk topics.&nbsp;</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>David Horn</itunes:name>
    <itunes:email>dhorn@me.com</itunes:email>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/e72ly66xhl8nqc4efl2s8zdgpuqy?.jpg</url>
     <title>Technology Risk Briefing </title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/e72ly66xhl8nqc4efl2s8zdgpuqy?.jpg" />
  <itunes:category text="Business">
    <itunes:category text="Management" />
  </itunes:category>
  <item>
    <itunes:title>AI-Driven Cyber Risk, Identity Attacks, Cloud Concentration &amp; Operational Resilience</itunes:title>
    <title>AI-Driven Cyber Risk, Identity Attacks, Cloud Concentration &amp; Operational Resilience</title>
    <itunes:summary><![CDATA[In this week’s Technology Risk Weekly Briefing, David Horn explores the rapidly evolving technology risk landscape, including IMF warnings about AI-enabled cyber attacks, the continued surge in identity-based breaches, growing concentration risks in cloud and AI infrastructure, and lessons organisations must learn about operational resilience and third-party dependency management. The episode covers: AI-enabled cyber threats and systemic financial stability concernsThe rise in password and id...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s Technology Risk Weekly Briefing, David Horn explores the rapidly evolving technology risk landscape, including IMF warnings about AI-enabled cyber attacks, the continued surge in identity-based breaches, growing concentration risks in cloud and AI infrastructure, and lessons organisations must learn about operational resilience and third-party dependency management.</p><p>The episode covers:</p><ul><li>AI-enabled cyber threats and systemic financial stability concerns</li><li>The rise in password and identity attacks</li><li>Cloud and infrastructure concentration risk</li><li>Third-party ecosystem vulnerabilities</li><li>Practical resilience and control measures organisations should implement now</li></ul><p>Sponsored by CauTix — helping organisations strengthen secure and reliable digital operations.</p>]]></description>
    <content:encoded><![CDATA[<p>In this week’s Technology Risk Weekly Briefing, David Horn explores the rapidly evolving technology risk landscape, including IMF warnings about AI-enabled cyber attacks, the continued surge in identity-based breaches, growing concentration risks in cloud and AI infrastructure, and lessons organisations must learn about operational resilience and third-party dependency management.</p><p>The episode covers:</p><ul><li>AI-enabled cyber threats and systemic financial stability concerns</li><li>The rise in password and identity attacks</li><li>Cloud and infrastructure concentration risk</li><li>Third-party ecosystem vulnerabilities</li><li>Practical resilience and control measures organisations should implement now</li></ul><p>Sponsored by CauTix — helping organisations strengthen secure and reliable digital operations.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2615749/episodes/19169701-ai-driven-cyber-risk-identity-attacks-cloud-concentration-operational-resilience.mp3" length="7578145" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qkl6du89oquizhfdk9fm1nhbl7d5?.jpg" />
    <itunes:author>David Horn</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19169701</guid>
    <pubDate>Wed, 13 May 2026 10:00:00 +0100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2615749/19169701/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2615749/19169701/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2615749/19169701/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2615749/19169701/transcript.vtt" type="text/vtt" />
    <itunes:duration>625</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When AI Compresses Risk Timelines: Patch Waves, Cloud Fragility and Third-Party Exposure</itunes:title>
    <title>When AI Compresses Risk Timelines: Patch Waves, Cloud Fragility and Third-Party Exposure</title>
    <itunes:summary><![CDATA[This week, David Horn reviews the technology risk stories that matter: AI-driven vulnerability pressure, the emerging patch wave, physical disruption to cloud regions in the Middle East, developer supply-chain compromise, utility-sector third-party risk, and community concerns about whether cyber defence can keep pace. The episode translates the headlines into practical actions for technology, risk, security, resilience and audit teams. ]]></itunes:summary>
    <description><![CDATA[<p>This week, David Horn reviews the technology risk stories that matter: AI-driven vulnerability pressure, the emerging patch wave, physical disruption to cloud regions in the Middle East, developer supply-chain compromise, utility-sector third-party risk, and community concerns about whether cyber defence can keep pace. The episode translates the headlines into practical actions for technology, risk, security, resilience and audit teams.</p>]]></description>
    <content:encoded><![CDATA[<p>This week, David Horn reviews the technology risk stories that matter: AI-driven vulnerability pressure, the emerging patch wave, physical disruption to cloud regions in the Middle East, developer supply-chain compromise, utility-sector third-party risk, and community concerns about whether cyber defence can keep pace. The episode translates the headlines into practical actions for technology, risk, security, resilience and audit teams.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2615749/episodes/19128267-when-ai-compresses-risk-timelines-patch-waves-cloud-fragility-and-third-party-exposure.mp3" length="7226433" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/narx3ue1kw5ogv80i2v869mkq0q4?.jpg" />
    <itunes:author>David</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19128267</guid>
    <pubDate>Wed, 06 May 2026 09:00:00 +0100</pubDate>
    <itunes:duration>596</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
