<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/0XHaP_ro" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>chat:CYBR</title>
    <description>A podcast that explores cyber policy and its impact on our future.</description>
    <copyright>chat:CYBR 2024</copyright>
    <language>en</language>
    <pubDate>Tue, 5 Aug 2025 15:00:00 +0000</pubDate>
    <lastBuildDate>Tue, 5 Aug 2025 15:00:11 +0000</lastBuildDate>
    <image>
      <link>https://chat-cybr-eba1c7e7.simplecast.com</link>
      <title>chat:CYBR</title>
      <url>https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/abebdf12-127e-410b-a892-ac22bac68b82/3000x3000/show-logo-24-no-password-required-2024.jpg?aid=rss_feed</url>
    </image>
    <link>https://chat-cybr-eba1c7e7.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>A podcast that explores cyber policy and its impact on our future.</itunes:summary>
    <itunes:author>Jordan Deiuliis, James Jacobs</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/abebdf12-127e-410b-a892-ac22bac68b82/3000x3000/show-logo-24-no-password-required-2024.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/0XHaP_ro</itunes:new-feed-url>
    <itunes:keywords>artificial intelligence, cyber, cyber florida, policy, cyberattack, cybercrime, cyberpolicy, cybersecurity, decision makers, education, florida, government, infosec, leadership, legislation, policy makers, reasearch, security</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jordan Deiuliis</itunes:name>
      <itunes:email>jdeiuliis@cyberflorida.org</itunes:email>
    </itunes:owner>
    <itunes:category text="Government"/>
    <itunes:category text="Technology"/>
    <item>
      <guid isPermaLink="false">260db409-c178-465d-8894-fb49fedb599b</guid>
      <title>Kate Whitaker – chat:CYBR - Episode 14</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>CyberBay, Cyber Florida, Mr. Bellini, cybersecurity, Tampa Bay, AI, national defense, community building, technology, innovation</p><p><strong>Summary</strong></p><p>In this episode, James Jacobs and Jordan Deiuliis welcome Kate Whitaker, the Director of Outreach at Cyber Florida, to discuss the CyberBay Initiative. The conversation covers Mr. Bellini's background, his vision for cybersecurity in Tampa Bay, and the upcoming Cyber Bay event. The discussion emphasizes the importance of collaboration and community building in enhancing cybersecurity efforts in the region.</p><p><strong>Takeaways</strong></p><p>Mr. Bellini is a successful Tampa Bay entrepreneur.</p><p>He founded ConnectWise, Tampa Bay's first tech unicorn.</p><p>His initiatives include the Florida Wildlife Corridor and cybersecurity.</p><p>Cyber Florida's mission aligns with Mr. Bellini's vision.</p><p>The Cyber Bay Initiative aims to create a cybersecurity ecosystem.</p><p>USF is seen as a key player in this initiative.</p><p>The upcoming Cyber Bay event will showcase collaboration.</p><p>Leadership lessons from Silicon Valley inform Cyber Bay's approach.</p><p>Community engagement is crucial for cybersecurity improvement.</p><p>The event will bring together various stakeholders in cybersecurity.</p><p><strong>Titles</strong></p><p>Building Cybersecurity in Tampa Bay</p><p>The Vision Behind CyberBay</p><p>Sound bites</p><p>"He wants to leave behind a good legacy."</p><p>"He sees USF as the Stanford of the region."</p><p>"We want to create a community of groups."</p><p><strong>Chapters</strong></p><p>00:00 Introduction to CyberBay Initiative</p><p>02:41 Mr. Bellini's Background and Vision</p><p>05:42 The Synergy Between Cyber Florida and Mr. Bellini</p><p>08:36 The Concept of Cyber Bay</p><p>11:35 The Upcoming Cyber Bay Event</p><p>14:22 Building a Cybersecurity Community</p><p>17:40 Closing Thoughts and Future Directions</p><p> </p>
]]></description>
      <pubDate>Tue, 5 Aug 2025 15:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Kate Whitaker, Arnie Bellini, James Jacobs, Cyber Florida, USF, Cristina Solis, Jordan Deiuliis, Ernie Ferraresso)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/kate-whitaker-chat-cybr-episode-14-OK7YnwbH</link>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>CyberBay, Cyber Florida, Mr. Bellini, cybersecurity, Tampa Bay, AI, national defense, community building, technology, innovation</p><p><strong>Summary</strong></p><p>In this episode, James Jacobs and Jordan Deiuliis welcome Kate Whitaker, the Director of Outreach at Cyber Florida, to discuss the CyberBay Initiative. The conversation covers Mr. Bellini's background, his vision for cybersecurity in Tampa Bay, and the upcoming Cyber Bay event. The discussion emphasizes the importance of collaboration and community building in enhancing cybersecurity efforts in the region.</p><p><strong>Takeaways</strong></p><p>Mr. Bellini is a successful Tampa Bay entrepreneur.</p><p>He founded ConnectWise, Tampa Bay's first tech unicorn.</p><p>His initiatives include the Florida Wildlife Corridor and cybersecurity.</p><p>Cyber Florida's mission aligns with Mr. Bellini's vision.</p><p>The Cyber Bay Initiative aims to create a cybersecurity ecosystem.</p><p>USF is seen as a key player in this initiative.</p><p>The upcoming Cyber Bay event will showcase collaboration.</p><p>Leadership lessons from Silicon Valley inform Cyber Bay's approach.</p><p>Community engagement is crucial for cybersecurity improvement.</p><p>The event will bring together various stakeholders in cybersecurity.</p><p><strong>Titles</strong></p><p>Building Cybersecurity in Tampa Bay</p><p>The Vision Behind CyberBay</p><p>Sound bites</p><p>"He wants to leave behind a good legacy."</p><p>"He sees USF as the Stanford of the region."</p><p>"We want to create a community of groups."</p><p><strong>Chapters</strong></p><p>00:00 Introduction to CyberBay Initiative</p><p>02:41 Mr. Bellini's Background and Vision</p><p>05:42 The Synergy Between Cyber Florida and Mr. Bellini</p><p>08:36 The Concept of Cyber Bay</p><p>11:35 The Upcoming Cyber Bay Event</p><p>14:22 Building a Cybersecurity Community</p><p>17:40 Closing Thoughts and Future Directions</p><p> </p>
]]></content:encoded>
      <enclosure length="17487868" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/83d681ab-bc4f-48fa-afe3-7981611b1147/audio/e2c083cf-8ba5-432a-9b0e-2218084993c6/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Kate Whitaker – chat:CYBR - Episode 14</itunes:title>
      <itunes:author>Kate Whitaker, Arnie Bellini, James Jacobs, Cyber Florida, USF, Cristina Solis, Jordan Deiuliis, Ernie Ferraresso</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/08788cfb-0fad-4766-82ef-48878cecaa6f/3000x3000/chat-episode-art-20ep14.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:11</itunes:duration>
      <itunes:summary>In this episode, James and Jordan welcome Kate Whitaker, the Director of Outreach at Cyber Florida, to discuss the CyberBay Initiative. The conversation covers Mr. Bellini&apos;s background, his vision for cybersecurity in Tampa Bay, and the upcoming Cyber Bay event. The discussion emphasizes the importance of collaboration and community building in enhancing cybersecurity efforts in the region.</itunes:summary>
      <itunes:subtitle>In this episode, James and Jordan welcome Kate Whitaker, the Director of Outreach at Cyber Florida, to discuss the CyberBay Initiative. The conversation covers Mr. Bellini&apos;s background, his vision for cybersecurity in Tampa Bay, and the upcoming Cyber Bay event. The discussion emphasizes the importance of collaboration and community building in enhancing cybersecurity efforts in the region.</itunes:subtitle>
      <itunes:keywords>cyberbay, cyber florida, technology, florida, silicon valley, cybersecurity, ai, innovation, tampa bay, community building, national defense</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9bb594c9-b4d7-4f08-9b98-23376a922e1e</guid>
      <title>General Frank McKenzie — chat:CYBR - Episode 13</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>Iran, history, asymmetric warfare, proxy groups, cyber capabilities, U.S. defense, critical infrastructure, General McKenzie, military strategy, regional power</p><p><strong>Summary</strong></p><p>In this episode, General Frank McKenzie discusses the historical context of Iran, its strategies in asymmetric warfare and proxy groups, and the implications of its cyber capabilities. He emphasizes the importance of understanding Iran's long-standing cultural identity and its current regime's focus on survival. The conversation also covers U.S. strategies to mitigate cyber threats and protect critical infrastructure, particularly in Florida.</p><p><strong>Takeaways</strong></p><p>Iran's relationship with the U.S. dates back to the 1950s.</p><p>Iran sees itself as a regional hegemon despite internal challenges.</p><p>The Iranian regime prioritizes survival and exporting its ideology.</p><p>Asymmetric warfare is a key component of Iran's military strategy.</p><p>Iran's ballistic missile capabilities have significantly improved.</p><p>Cyber capabilities are a growing concern for U.S. infrastructure.</p><p>The U.S. is vulnerable to cyber attacks due to its open systems.</p><p>Florida has taken proactive steps to assess cyber vulnerabilities.</p><p>Training and resources are available for critical infrastructure protection.</p><p>Collaboration between state and local entities is essential for cybersecurity.</p><p><strong>Titles</strong></p><p>Decoding Iran: History and Modern Implications</p><p>Asymmetric Warfare: Iran's Strategy Explained</p><p><strong>Sound bites</strong></p><p>"Iran is a factor we should respect."</p><p>"We offer a cyber range for training."</p><p>"I always enjoy talking to y'all."</p><p><strong>Chapters</strong></p><p>00:00 Understanding Iran's Historical Context</p><p>03:01 Iran's Asymmetric Warfare and Proxy Strategies</p><p>06:04 Iran's Cyber Capabilities and Threats</p><p>09:04 Mitigating Cyber Threats and Infrastructure Protection</p><p> </p>
]]></description>
      <pubDate>Tue, 1 Jul 2025 15:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Ernie Ferraresso, General (Ret.) Frank McKenzie, USF, James Jacobs, Cyber Florida, Jordan Deiuliis)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/general-mckenzie-chat-cybr-episode-13-RJkr7_Bb</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/53eb3371-60d2-47cc-8ee2-80f8b2bd5b9c/youtube-ep13.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>Iran, history, asymmetric warfare, proxy groups, cyber capabilities, U.S. defense, critical infrastructure, General McKenzie, military strategy, regional power</p><p><strong>Summary</strong></p><p>In this episode, General Frank McKenzie discusses the historical context of Iran, its strategies in asymmetric warfare and proxy groups, and the implications of its cyber capabilities. He emphasizes the importance of understanding Iran's long-standing cultural identity and its current regime's focus on survival. The conversation also covers U.S. strategies to mitigate cyber threats and protect critical infrastructure, particularly in Florida.</p><p><strong>Takeaways</strong></p><p>Iran's relationship with the U.S. dates back to the 1950s.</p><p>Iran sees itself as a regional hegemon despite internal challenges.</p><p>The Iranian regime prioritizes survival and exporting its ideology.</p><p>Asymmetric warfare is a key component of Iran's military strategy.</p><p>Iran's ballistic missile capabilities have significantly improved.</p><p>Cyber capabilities are a growing concern for U.S. infrastructure.</p><p>The U.S. is vulnerable to cyber attacks due to its open systems.</p><p>Florida has taken proactive steps to assess cyber vulnerabilities.</p><p>Training and resources are available for critical infrastructure protection.</p><p>Collaboration between state and local entities is essential for cybersecurity.</p><p><strong>Titles</strong></p><p>Decoding Iran: History and Modern Implications</p><p>Asymmetric Warfare: Iran's Strategy Explained</p><p><strong>Sound bites</strong></p><p>"Iran is a factor we should respect."</p><p>"We offer a cyber range for training."</p><p>"I always enjoy talking to y'all."</p><p><strong>Chapters</strong></p><p>00:00 Understanding Iran's Historical Context</p><p>03:01 Iran's Asymmetric Warfare and Proxy Strategies</p><p>06:04 Iran's Cyber Capabilities and Threats</p><p>09:04 Mitigating Cyber Threats and Infrastructure Protection</p><p> </p>
]]></content:encoded>
      <enclosure length="17652469" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/c0546219-3ca0-472f-949b-b7ca7330a56c/audio/395a506b-0326-41f7-a0fb-cee291673bca/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>General Frank McKenzie — chat:CYBR - Episode 13</itunes:title>
      <itunes:author>Ernie Ferraresso, General (Ret.) Frank McKenzie, USF, James Jacobs, Cyber Florida, Jordan Deiuliis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/2bd6e00d-11b9-4dff-aee6-707123a03bb0/3000x3000/chat-episode-art-ep13.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:21</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, General Frank McKenzie discusses the historical context of Iran, its strategies in asymmetric warfare, and the implications of its cyber capabilities. He emphasizes the importance of understanding Iran&apos;s long-standing cultural identity and its pursuit of regional power. The conversation also touches on the vulnerabilities of the U.S. to cyber attacks and the measures being taken to protect critical infrastructure, particularly in Florida.</itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, General Frank McKenzie discusses the historical context of Iran, its strategies in asymmetric warfare, and the implications of its cyber capabilities. He emphasizes the importance of understanding Iran&apos;s long-standing cultural identity and its pursuit of regional power. The conversation also touches on the vulnerabilities of the U.S. to cyber attacks and the measures being taken to protect critical infrastructure, particularly in Florida.</itunes:subtitle>
      <itunes:keywords>cyberattack, critical infrastructure, regional power, asymmetric warfare, history, cybersecurity, cyber capabilities, u.s. defense, military strategy, proxy groups, iran</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d0a68dbc-a534-4e6c-a301-4897ba13a72d</guid>
      <title>James Welsh - chat:CYBR – Episode 12</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>Dr. Welsh, FCIT, Cyber Florida, Operation K-12, Cybersecurity Education, CyberLaunch, Teacher Support, Workforce Development, K-12 Education, USF</p><p> </p><p><strong>Summary</strong></p><p>In this conversation, Dr. Welch discusses the Florida Center for Instructional Technology (FCIT) and its evolution, emphasizing its outward-focused approach to education and collaboration with Cyber Florida. The discussion highlights the importance of cybersecurity education, the challenges faced in K-12 settings, and the initiatives like Operation K-12 and CyberLaunch that aim to enhance cybersecurity awareness and workforce development. Dr. Welch also underscores the need for good policy to support educational outcomes and the exciting future of cybersecurity education at the University of South Florida.</p><p><strong>Takeaways</strong></p><ul><li>The Florida Center for Instructional Technology was established in the early 1980s.</li><li>FCIT's success is attributed to its outward-focused approach and problem-solving mindset.</li><li>Collaboration with Cyber Florida has led to the creation of Operation K-12.</li><li>CyberLaunch is the largest high school cybersecurity competition in the nation.</li><li>Support for teachers is crucial in implementing cybersecurity education.</li><li>Cybersecurity education is primarily focused on high school courses.</li><li>Removing barriers for school districts to participate in events is essential.</li><li>Cybersecurity awareness needs to be integrated across all subject areas.</li><li>The advent of AI presents new challenges for cybersecurity education.</li><li>Good policy is foundational for achieving positive educational outcomes.</li></ul><p><strong>Titles</strong></p><ul><li>Empowering Cybersecurity Education with Dr. Welch</li><li>The Evolution of FCIT and Its Impact</li></ul><p><strong>Sound Bites</strong></p><ul><li>"We are the K-12 piece of Cyber Florida."</li><li>"We need a workforce ready to adapt."</li><li>"We pay for all the food and transportation."</li><li>"Cybersecurity is getting more important."</li></ul><p>Chapters</p><p>00:00 Introduction to Dr. Welch and FCIT</p><p>02:51 The Evolution of FCIT and Its Mission</p><p>06:01 Collaboration with Cyber Florida and Operation K-12</p><p>09:13 Supporting Teachers in Cybersecurity Education</p><p>12:00 CyberLaunch: A Major Cybersecurity Competition</p><p>15:07 Barriers to Participation and Engagement</p><p>18:13 The Need for Broader Cybersecurity Awareness</p><p>21:14 The Future of Cybersecurity Education at USF</p>
]]></description>
      <pubDate>Tue, 3 Jun 2025 15:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (James Welsh, Florida Center for Instructional Technology, James Jacobs, University of South Florida, Ernie Ferraresso, Cyber Florida, Jordan Deiuliis)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/james-welsh-chat-cybr-episode-12-9EwMpfJE</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/a83b27f9-cf84-42bc-8104-8746ff0a6557/youtube-template-ep12.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>Dr. Welsh, FCIT, Cyber Florida, Operation K-12, Cybersecurity Education, CyberLaunch, Teacher Support, Workforce Development, K-12 Education, USF</p><p> </p><p><strong>Summary</strong></p><p>In this conversation, Dr. Welch discusses the Florida Center for Instructional Technology (FCIT) and its evolution, emphasizing its outward-focused approach to education and collaboration with Cyber Florida. The discussion highlights the importance of cybersecurity education, the challenges faced in K-12 settings, and the initiatives like Operation K-12 and CyberLaunch that aim to enhance cybersecurity awareness and workforce development. Dr. Welch also underscores the need for good policy to support educational outcomes and the exciting future of cybersecurity education at the University of South Florida.</p><p><strong>Takeaways</strong></p><ul><li>The Florida Center for Instructional Technology was established in the early 1980s.</li><li>FCIT's success is attributed to its outward-focused approach and problem-solving mindset.</li><li>Collaboration with Cyber Florida has led to the creation of Operation K-12.</li><li>CyberLaunch is the largest high school cybersecurity competition in the nation.</li><li>Support for teachers is crucial in implementing cybersecurity education.</li><li>Cybersecurity education is primarily focused on high school courses.</li><li>Removing barriers for school districts to participate in events is essential.</li><li>Cybersecurity awareness needs to be integrated across all subject areas.</li><li>The advent of AI presents new challenges for cybersecurity education.</li><li>Good policy is foundational for achieving positive educational outcomes.</li></ul><p><strong>Titles</strong></p><ul><li>Empowering Cybersecurity Education with Dr. Welch</li><li>The Evolution of FCIT and Its Impact</li></ul><p><strong>Sound Bites</strong></p><ul><li>"We are the K-12 piece of Cyber Florida."</li><li>"We need a workforce ready to adapt."</li><li>"We pay for all the food and transportation."</li><li>"Cybersecurity is getting more important."</li></ul><p>Chapters</p><p>00:00 Introduction to Dr. Welch and FCIT</p><p>02:51 The Evolution of FCIT and Its Mission</p><p>06:01 Collaboration with Cyber Florida and Operation K-12</p><p>09:13 Supporting Teachers in Cybersecurity Education</p><p>12:00 CyberLaunch: A Major Cybersecurity Competition</p><p>15:07 Barriers to Participation and Engagement</p><p>18:13 The Need for Broader Cybersecurity Awareness</p><p>21:14 The Future of Cybersecurity Education at USF</p>
]]></content:encoded>
      <enclosure length="24926856" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/2aa1b2ac-8e59-47aa-b1d4-8a8525cd7ac7/audio/ff31224b-4d03-4f5d-bad2-95094740e38a/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>James Welsh - chat:CYBR – Episode 12</itunes:title>
      <itunes:author>James Welsh, Florida Center for Instructional Technology, James Jacobs, University of South Florida, Ernie Ferraresso, Cyber Florida, Jordan Deiuliis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/3368ca6b-77fa-40d1-b1bc-4dfc086e7bfe/3000x3000/chat-episode-art-20ep-2012.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:56</itunes:duration>
      <itunes:summary>In this conversation, Dr. Welsh discusses the Florida Center for Instructional Technology (FCIT) and its evolution, emphasizing its outward-focused approach to education and collaboration with Cyber Florida. The discussion highlights the importance of cybersecurity education, the challenges faced in K-12 settings, and initiatives, like Operation K-12 and CyberLaunch, that aim to enhance cybersecurity awareness and workforce development. </itunes:summary>
      <itunes:subtitle>In this conversation, Dr. Welsh discusses the Florida Center for Instructional Technology (FCIT) and its evolution, emphasizing its outward-focused approach to education and collaboration with Cyber Florida. The discussion highlights the importance of cybersecurity education, the challenges faced in K-12 settings, and initiatives, like Operation K-12 and CyberLaunch, that aim to enhance cybersecurity awareness and workforce development. </itunes:subtitle>
      <itunes:keywords>cybersecurity education, cyber florida, cybersecurity, operation k-12, cyberlaunch, teacher support, fcit, education, awareness, workforce development, k-12 education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f79b4b2c-be75-4b4f-bfc0-94dcd12ac90f</guid>
      <title>Tad Schnaufer - chat:CYBR – Episode 11</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>Ukrainian conflict, cyber operations, military strategy, cyber attacks, critical infrastructure, Russia, Ukraine, NATO, cybersecurity, hybrid warfare</p><p><strong>Summary</strong></p><p>In this conversation, James Jacobs and Tad discuss the ongoing conflict in Ukraine, focusing on the historical context, the role of cyber operations, and the integration of cyber capabilities with military strategies. They explore the evolution of Russian cyber attacks, the defensive measures taken by Ukraine, and the implications for critical infrastructure in places like Florida. The discussion emphasizes the importance of education and preparedness in the face of cyber threats.</p><p><strong>Takeaways</strong></p><ul><li>The Ukrainian conflict has roots dating back to 2014 with the annexation of Crimea.</li><li>Cyber operations have been a key component of Russia's strategy in Ukraine.</li><li>Russia has conducted numerous cyber attacks targeting critical infrastructure in Ukraine.</li><li>The integration of cyber capabilities into military operations is crucial in modern warfare.</li><li>Ukraine has developed significant cyber defense capabilities since 2014.</li><li>Education and awareness are vital for defending against cyber attacks.</li><li>Private partnerships can enhance a nation's cyber defense.</li><li>Chaos and misinformation are tactics used in cyber warfare.</li><li>Redundant systems are essential for maintaining operations during cyber attacks.</li><li>Lessons from Ukraine can inform cybersecurity strategies in other regions.</li></ul><p><strong>Titles</strong></p><p>Understanding the Ukrainian Conflict</p><p><strong>Sound Bites</strong></p><ul><li>"Russian aggression in Ukraine."</li><li>"Ukrainians were able to respond."</li><li>"Thank you so much for joining us."</li></ul><p><strong>Chapters</strong></p><p>00:00 Overview of the Ukrainian Conflict</p><p>03:48 Cyber Operations and Attacks</p><p>10:13 Integration of Cyber and Military Operations</p><p>16:00 Preparing for Cyber Attacks in Florida</p>
]]></description>
      <pubDate>Tue, 29 Apr 2025 15:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (GNSI, Tad Schnaufer, Ernie Ferraresso, James Jacobs, Cyber Florida, University of South Florida, Jordan Deiuliis, Cristina Solis)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/tad-schnaufer-chat-cybr-episode-11-YtvdeFr5</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/30fe3f60-31f2-42ad-a6fd-0cd7dfa680ef/thumbnail-20-20ep-2011.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>Ukrainian conflict, cyber operations, military strategy, cyber attacks, critical infrastructure, Russia, Ukraine, NATO, cybersecurity, hybrid warfare</p><p><strong>Summary</strong></p><p>In this conversation, James Jacobs and Tad discuss the ongoing conflict in Ukraine, focusing on the historical context, the role of cyber operations, and the integration of cyber capabilities with military strategies. They explore the evolution of Russian cyber attacks, the defensive measures taken by Ukraine, and the implications for critical infrastructure in places like Florida. The discussion emphasizes the importance of education and preparedness in the face of cyber threats.</p><p><strong>Takeaways</strong></p><ul><li>The Ukrainian conflict has roots dating back to 2014 with the annexation of Crimea.</li><li>Cyber operations have been a key component of Russia's strategy in Ukraine.</li><li>Russia has conducted numerous cyber attacks targeting critical infrastructure in Ukraine.</li><li>The integration of cyber capabilities into military operations is crucial in modern warfare.</li><li>Ukraine has developed significant cyber defense capabilities since 2014.</li><li>Education and awareness are vital for defending against cyber attacks.</li><li>Private partnerships can enhance a nation's cyber defense.</li><li>Chaos and misinformation are tactics used in cyber warfare.</li><li>Redundant systems are essential for maintaining operations during cyber attacks.</li><li>Lessons from Ukraine can inform cybersecurity strategies in other regions.</li></ul><p><strong>Titles</strong></p><p>Understanding the Ukrainian Conflict</p><p><strong>Sound Bites</strong></p><ul><li>"Russian aggression in Ukraine."</li><li>"Ukrainians were able to respond."</li><li>"Thank you so much for joining us."</li></ul><p><strong>Chapters</strong></p><p>00:00 Overview of the Ukrainian Conflict</p><p>03:48 Cyber Operations and Attacks</p><p>10:13 Integration of Cyber and Military Operations</p><p>16:00 Preparing for Cyber Attacks in Florida</p>
]]></content:encoded>
      <enclosure length="21358681" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/db9640ba-adf8-431c-82ad-c003480c4f79/audio/fed64384-f840-417e-8982-9717ea063a68/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Tad Schnaufer - chat:CYBR – Episode 11</itunes:title>
      <itunes:author>GNSI, Tad Schnaufer, Ernie Ferraresso, James Jacobs, Cyber Florida, University of South Florida, Jordan Deiuliis, Cristina Solis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/6baf7219-e78d-470e-b380-f7d5756e6044/3000x3000/chat-episode-art-20-20ep-11.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:13</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, Dr. Tad Schnaufer discusses the ongoing conflict in Ukraine, focusing on the historical context, the role of cyber operations, and the integration of cyber capabilities within military strategies. They explore the evolution of Russian cyber attacks, the defensive measures taken by Ukraine, and the implications for critical infrastructure in Florida. The discussion emphasizes the importance of education and preparedness in the face of cyber threats.</itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, Dr. Tad Schnaufer discusses the ongoing conflict in Ukraine, focusing on the historical context, the role of cyber operations, and the integration of cyber capabilities within military strategies. They explore the evolution of Russian cyber attacks, the defensive measures taken by Ukraine, and the implications for critical infrastructure in Florida. The discussion emphasizes the importance of education and preparedness in the face of cyber threats.</itunes:subtitle>
      <itunes:keywords>critical infrastructure, nato, cybersecurity, ai, military strategy, cyber attacks, security, ukraine, hybrid warfare, politics, russia</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">56cccb5b-c015-4934-bd38-efd8a750195c</guid>
      <title>Mike Duffey - chat:CYBR – Episode 10</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>cybersecurity, law enforcement, cyber incidents, cybercrime, technology, AI, public policy, digital forensics, incident response, victim support</p><p><strong>Summary</strong></p><p>This conversation explores the multifaceted world of cybersecurity, focusing on the role of law enforcement, the challenges faced in incident response, and the importance of supporting victims of cybercrime. The discussion also highlights emerging technologies, particularly AI, and their implications for both law enforcement and cybercriminals.</p><p><strong>Takeaways</strong></p><ul><li>Cybersecurity is a pressing public policy issue.</li><li>Law enforcement agencies are adapting to the evolving cyber landscape.</li><li>A hybrid approach is essential in tackling cybercrime.</li><li>Incident response requires collaboration across various teams.</li><li>Having a cyber incident response plan is crucial for organizations.</li><li>AI can enhance data analysis but also poses risks.</li><li>Victims of cybercrime include vulnerable populations, not just businesses.</li><li>Education and awareness are key in preventing cybercrime.</li><li>Partnerships between agencies can improve response efforts.</li><li>Emerging technologies must be handled with caution to protect sensitive data.</li></ul><p><strong>Titles</strong></p><ul><li>Navigating the Cybersecurity Landscape</li><li>Law Enforcement's Evolving Role in Cybersecurity</li></ul><p><strong>Sound Bites</strong></p><ul><li>"If I can understand it, they can understand it."</li><li>"It's not just a computer, it's a phone, it's a car."</li><li>"We have a hybrid approach now."</li><li>"AI is the ultimate question for us."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Overview of Cyber Florida</p><p>09:52 The Role of Law Enforcement in Cybersecurity</p><p>19:51 Challenges in Cyber Incident Response</p><p>24:37 Supporting Victims of Cybercrime</p>
]]></description>
      <pubDate>Tue, 25 Mar 2025 15:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Mike Duffey, Florida Department of Law Enforcement, Cristina Solis, Ernie Ferraresso, Jordan Deiuliis, USF, James Jacobs, Cyber Florida)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/mike-duffey-chat-cybr-episode-10-R5JVyzJc</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/342d6af7-22b8-4e4d-8ebc-693acb8a4f47/youtube-template-ep-2010.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>cybersecurity, law enforcement, cyber incidents, cybercrime, technology, AI, public policy, digital forensics, incident response, victim support</p><p><strong>Summary</strong></p><p>This conversation explores the multifaceted world of cybersecurity, focusing on the role of law enforcement, the challenges faced in incident response, and the importance of supporting victims of cybercrime. The discussion also highlights emerging technologies, particularly AI, and their implications for both law enforcement and cybercriminals.</p><p><strong>Takeaways</strong></p><ul><li>Cybersecurity is a pressing public policy issue.</li><li>Law enforcement agencies are adapting to the evolving cyber landscape.</li><li>A hybrid approach is essential in tackling cybercrime.</li><li>Incident response requires collaboration across various teams.</li><li>Having a cyber incident response plan is crucial for organizations.</li><li>AI can enhance data analysis but also poses risks.</li><li>Victims of cybercrime include vulnerable populations, not just businesses.</li><li>Education and awareness are key in preventing cybercrime.</li><li>Partnerships between agencies can improve response efforts.</li><li>Emerging technologies must be handled with caution to protect sensitive data.</li></ul><p><strong>Titles</strong></p><ul><li>Navigating the Cybersecurity Landscape</li><li>Law Enforcement's Evolving Role in Cybersecurity</li></ul><p><strong>Sound Bites</strong></p><ul><li>"If I can understand it, they can understand it."</li><li>"It's not just a computer, it's a phone, it's a car."</li><li>"We have a hybrid approach now."</li><li>"AI is the ultimate question for us."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Overview of Cyber Florida</p><p>09:52 The Role of Law Enforcement in Cybersecurity</p><p>19:51 Challenges in Cyber Incident Response</p><p>24:37 Supporting Victims of Cybercrime</p>
]]></content:encoded>
      <enclosure length="19607656" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/f8766e19-ea63-47ad-b275-928af8f5873d/audio/b06e80d1-5b5a-471b-86a2-d4592652bdd0/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Mike Duffey - chat:CYBR – Episode 10</itunes:title>
      <itunes:author>Mike Duffey, Florida Department of Law Enforcement, Cristina Solis, Ernie Ferraresso, Jordan Deiuliis, USF, James Jacobs, Cyber Florida</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/3f35d6f6-f780-4f2d-9a93-aa727897ffaa/3000x3000/chat-episode-art-20ep-2010.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:23</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, James and Jordan meet with FDLE Special Agent in Charge Mike Duffey at Sunshine Cyber Con to explore the multifaceted world of cybersecurity, focusing on the role of law enforcement, the challenges faced in incident response, and the importance of supporting victims of cybercrime. This discussion also highlights emerging technologies, particularly AI, and their implications for both law enforcement and cybercriminals.</itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, James and Jordan meet with FDLE Special Agent in Charge Mike Duffey at Sunshine Cyber Con to explore the multifaceted world of cybersecurity, focusing on the role of law enforcement, the challenges faced in incident response, and the importance of supporting victims of cybercrime. This discussion also highlights emerging technologies, particularly AI, and their implications for both law enforcement and cybercriminals.</itunes:subtitle>
      <itunes:keywords>incident response, victim support, digital forensics, public policy, technology, cybercrime, cybersecurity, ai, ransomware, cyber incidents, law enforcement, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a14cc31f-fcfa-4b24-a8f8-7d10cdf0fbfe</guid>
      <title>June Teufel Dreyer - chat:CYBR - Episode 9</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>China, cybersecurity, military strategy, Baltic Sea, fiber optic cables, geopolitical tensions, US-China relations, cyber warfare, international security, technology</p><p><strong>Summary</strong></p><p>In this conversation, Dr. June Teufel Dreyer discusses the evolving military strategy of China under Xi Jinping, focusing on their expanding military capabilities, particularly in naval power and cyber warfare. She highlights the implications of China's actions in the Baltic Sea regarding fiber optic cables and the potential threats to global communications. The discussion also covers the cybersecurity landscape, emphasizing the need for the U.S. to adopt robust policies to counter China's cyber threats. Dr. Dreyer concludes with thoughts on the importance of STEM education and the balance between secrecy and transparency in national security.</p><p><strong>Takeaways</strong></p><ul><li>China is rapidly expanding its military capabilities, including naval power.</li><li>The 'Guam Killer' missile indicates aggressive military intentions.</li><li>Cybersecurity is a critical area where China aims to dominate.</li><li>Fiber optic cables in the Baltic Sea are vital for global communications.</li><li>The U.S. must enhance its cybersecurity measures against China.</li><li>International agreements may not be effective with adversarial nations.</li><li>Attacks on critical infrastructure should be off-limits in cyber warfare.</li><li>The intelligence community's assessment of incidents can be misleading.</li><li>STEM education is crucial for future national security.</li><li>A balance between secrecy and transparency is necessary for effective defense.</li></ul><p><strong>Titles</strong></p><ul><li>Understanding China's Military Strategy</li><li>The Cybersecurity Race: China vs. the U.S.</li><li>Threats in the Baltic Sea: A New Front</li></ul><p><strong>Sound Bites</strong></p><ul><li>"We have to triangulate Xi Jinping's mindset."</li><li>"The Guam Killer missile is a concerning development."</li><li>"They want to be the leading cyber power."</li><li>"We need to be super vigilant here."</li><li>"These cables carry over 90% of communications."</li><li>"Cyber operations should be off-limits."</li><li>"We need a sword behind the shield."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to Dr. Dreier and Chinese Military Strategy</p><p>07:11 China's Cybersecurity Ambitions and Strategies</p><p>12:21 Concerns Over Baltic Sea Fiber Optic Cables</p><p>20:54 Addressing the Cybersecurity Threat from China</p><p>30:45 Closing Thoughts and Future Implications</p>
]]></description>
      <pubDate>Tue, 18 Feb 2025 16:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (June Teufel Dreyer, Cyber Florida, USF, Cristina Solis, James Jacobs, Ernie Ferraresso, Jordan Deiuliis)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/june-teufel-dreyer-chat-cybr-episode-9-nn4eIxEZ</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/c7ff89e5-fbe6-49d9-8555-1089fe7fa4ae/youtube-template-ep9.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>China, cybersecurity, military strategy, Baltic Sea, fiber optic cables, geopolitical tensions, US-China relations, cyber warfare, international security, technology</p><p><strong>Summary</strong></p><p>In this conversation, Dr. June Teufel Dreyer discusses the evolving military strategy of China under Xi Jinping, focusing on their expanding military capabilities, particularly in naval power and cyber warfare. She highlights the implications of China's actions in the Baltic Sea regarding fiber optic cables and the potential threats to global communications. The discussion also covers the cybersecurity landscape, emphasizing the need for the U.S. to adopt robust policies to counter China's cyber threats. Dr. Dreyer concludes with thoughts on the importance of STEM education and the balance between secrecy and transparency in national security.</p><p><strong>Takeaways</strong></p><ul><li>China is rapidly expanding its military capabilities, including naval power.</li><li>The 'Guam Killer' missile indicates aggressive military intentions.</li><li>Cybersecurity is a critical area where China aims to dominate.</li><li>Fiber optic cables in the Baltic Sea are vital for global communications.</li><li>The U.S. must enhance its cybersecurity measures against China.</li><li>International agreements may not be effective with adversarial nations.</li><li>Attacks on critical infrastructure should be off-limits in cyber warfare.</li><li>The intelligence community's assessment of incidents can be misleading.</li><li>STEM education is crucial for future national security.</li><li>A balance between secrecy and transparency is necessary for effective defense.</li></ul><p><strong>Titles</strong></p><ul><li>Understanding China's Military Strategy</li><li>The Cybersecurity Race: China vs. the U.S.</li><li>Threats in the Baltic Sea: A New Front</li></ul><p><strong>Sound Bites</strong></p><ul><li>"We have to triangulate Xi Jinping's mindset."</li><li>"The Guam Killer missile is a concerning development."</li><li>"They want to be the leading cyber power."</li><li>"We need to be super vigilant here."</li><li>"These cables carry over 90% of communications."</li><li>"Cyber operations should be off-limits."</li><li>"We need a sword behind the shield."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to Dr. Dreier and Chinese Military Strategy</p><p>07:11 China's Cybersecurity Ambitions and Strategies</p><p>12:21 Concerns Over Baltic Sea Fiber Optic Cables</p><p>20:54 Addressing the Cybersecurity Threat from China</p><p>30:45 Closing Thoughts and Future Implications</p>
]]></content:encoded>
      <enclosure length="35680707" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/133e55b3-0ab3-4b50-b223-ab6a27061852/audio/c95f757a-e7b3-438e-b0e9-af4d350038c5/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>June Teufel Dreyer - chat:CYBR - Episode 9</itunes:title>
      <itunes:author>June Teufel Dreyer, Cyber Florida, USF, Cristina Solis, James Jacobs, Ernie Ferraresso, Jordan Deiuliis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/4f642451-a11b-42d9-813d-f946ebdab8c1/3000x3000/chat-episode-art-20ep9-june-20t.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:07</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, Dr. June Teufel Dreyer discusses the evolving military strategy of China under Xi Jinping, focusing on their expanding military capabilities, particularly in cyber warfare. She highlights the implications of China&apos;s actions in the Baltic Sea regarding fiber optic cables and the potential threats to global communications. The discussion also covers the cybersecurity landscape, emphasizing the need for the U.S. to adopt robust policies to counter China&apos;s cyber threats. Dr. Dreyer concludes with thoughts on the importance of STEM education and the balance between secrecy and transparency in national security.</itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, Dr. June Teufel Dreyer discusses the evolving military strategy of China under Xi Jinping, focusing on their expanding military capabilities, particularly in cyber warfare. She highlights the implications of China&apos;s actions in the Baltic Sea regarding fiber optic cables and the potential threats to global communications. The discussion also covers the cybersecurity landscape, emphasizing the need for the U.S. to adopt robust policies to counter China&apos;s cyber threats. Dr. Dreyer concludes with thoughts on the importance of STEM education and the balance between secrecy and transparency in national security.</itunes:subtitle>
      <itunes:keywords>china, international security, information warfare, us-china relations, fiber optic cables, technology, cybersecurity, ai, military strategy, geopolitical tensions, cyber warfare, baltic sea, information security, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d4b745e9-1b5c-44e8-93c6-d05705559495</guid>
      <title>Bryan Langley - chat:CYBR - Episode 8</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>Cyber Florida, Critical Infrastructure, Cybersecurity, Risk Assessment, Workforce Development, Training, Data Insights, Policy, Technology, R&D</p><p><strong>Summary</strong></p><p>In this episode of chat:CYBR, hosts James Jacobs and Jordan Deiuliis are joined by Brian Langley from Cyber Florida to discuss the Critical Infrastructure Protection Program. They explore the importance of critical infrastructure, the findings from a comprehensive risk assessment, and the challenges faced by sectors in cybersecurity. The conversation highlights the need for workforce development, training resources, and the innovative approaches taken by the Florida legislature to enhance cybersecurity measures across the state. Brian shares insights on future directions for research and development, as well as personal anecdotes from his career.</p><p><strong>Takeaways</strong></p><ul><li>Cyber Florida received significant funding from the Florida legislature for a comprehensive risk assessment.</li><li>The assessment covers all 16 critical infrastructure sectors, highlighting their interdependencies.</li><li>49% of participants in the risk assessment lack a learning management system.</li><li>Many sectors do not have a Chief Information Security Officer (CISO), indicating a workforce gap.</li><li>Cyber Florida provides free training resources to support critical infrastructure sectors.</li><li>Workforce development is essential to address the cybersecurity talent shortage.</li><li>The data collected from the assessment is used to inform policy and resource allocation.</li><li>Cyber Florida aims to create a mapping system to connect resources with sector needs.</li><li>Training programs are crucial as 90% of cyber attacks result from human error.</li><li>The future of cybersecurity in Florida involves leveraging data for predictive analysis and R&D opportunities.</li></ul><p><strong>Titles</strong></p><ul><li>Insights from Florida's Cyber Risk Assessment</li><li>Future Directions for Cybersecurity in Florida</li></ul><p><strong>Sound Bites</strong></p><ul><li>"I want to be Brian when I grow up."</li><li>"Critical infrastructure is everything you do on a normal daily basis."</li><li>"49% don't have a learning management system."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to Cyber Florida's Critical Infrastructure Protection Program</p><p>03:01 Understanding Critical Infrastructure and Its Importance</p><p>06:13 Data Insights from the Risk Assessment</p><p>09:08 Addressing Resource Gaps in Cybersecurity</p><p>12:01 Workforce Development and Cybersecurity Training</p><p>15:09 Future Directions: R&D and Technology Integration</p><p>18:05 Conclusion and Personal Insights from Brian Langley</p>
]]></description>
      <pubDate>Tue, 21 Jan 2025 16:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Bryan Langley, Ernie Ferraresso, Cyber Florida, Cristina Solis, James Jacobs, USF, Jordan Deiuliis)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/bryan-langley-chat-cybr-ep-8-i_GMhpJJ</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/99e4c0b5-29ed-4f7f-bdd2-5ff1608f45a2/youtube-template-chat-20bryan-20langley.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>Cyber Florida, Critical Infrastructure, Cybersecurity, Risk Assessment, Workforce Development, Training, Data Insights, Policy, Technology, R&D</p><p><strong>Summary</strong></p><p>In this episode of chat:CYBR, hosts James Jacobs and Jordan Deiuliis are joined by Brian Langley from Cyber Florida to discuss the Critical Infrastructure Protection Program. They explore the importance of critical infrastructure, the findings from a comprehensive risk assessment, and the challenges faced by sectors in cybersecurity. The conversation highlights the need for workforce development, training resources, and the innovative approaches taken by the Florida legislature to enhance cybersecurity measures across the state. Brian shares insights on future directions for research and development, as well as personal anecdotes from his career.</p><p><strong>Takeaways</strong></p><ul><li>Cyber Florida received significant funding from the Florida legislature for a comprehensive risk assessment.</li><li>The assessment covers all 16 critical infrastructure sectors, highlighting their interdependencies.</li><li>49% of participants in the risk assessment lack a learning management system.</li><li>Many sectors do not have a Chief Information Security Officer (CISO), indicating a workforce gap.</li><li>Cyber Florida provides free training resources to support critical infrastructure sectors.</li><li>Workforce development is essential to address the cybersecurity talent shortage.</li><li>The data collected from the assessment is used to inform policy and resource allocation.</li><li>Cyber Florida aims to create a mapping system to connect resources with sector needs.</li><li>Training programs are crucial as 90% of cyber attacks result from human error.</li><li>The future of cybersecurity in Florida involves leveraging data for predictive analysis and R&D opportunities.</li></ul><p><strong>Titles</strong></p><ul><li>Insights from Florida's Cyber Risk Assessment</li><li>Future Directions for Cybersecurity in Florida</li></ul><p><strong>Sound Bites</strong></p><ul><li>"I want to be Brian when I grow up."</li><li>"Critical infrastructure is everything you do on a normal daily basis."</li><li>"49% don't have a learning management system."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to Cyber Florida's Critical Infrastructure Protection Program</p><p>03:01 Understanding Critical Infrastructure and Its Importance</p><p>06:13 Data Insights from the Risk Assessment</p><p>09:08 Addressing Resource Gaps in Cybersecurity</p><p>12:01 Workforce Development and Cybersecurity Training</p><p>15:09 Future Directions: R&D and Technology Integration</p><p>18:05 Conclusion and Personal Insights from Brian Langley</p>
]]></content:encoded>
      <enclosure length="25914328" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/4f871019-2ef0-4037-a8f7-16b3d8b5cfe7/audio/c02168a8-6803-42b4-ba7d-a5d77bf9d6a9/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Bryan Langley - chat:CYBR - Episode 8</itunes:title>
      <itunes:author>Bryan Langley, Ernie Ferraresso, Cyber Florida, Cristina Solis, James Jacobs, USF, Jordan Deiuliis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/dd737764-dd6d-4f58-b323-276b0467c957/3000x3000/chat-episode-art-20bryan-20langley.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:56</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, hosts James Jacobs and Jordan Deiuliis are joined by Brian Langley from Cyber Florida to discuss the Critical Infrastructure Protection Program. They explore the importance of critical infrastructure, the findings from a comprehensive risk assessment, and the challenges faced by sectors in cybersecurity. </itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, hosts James Jacobs and Jordan Deiuliis are joined by Brian Langley from Cyber Florida to discuss the Critical Infrastructure Protection Program. They explore the importance of critical infrastructure, the findings from a comprehensive risk assessment, and the challenges faced by sectors in cybersecurity. </itunes:subtitle>
      <itunes:keywords>resource allocation, critical infrastructure, cyber, government, cyber florida, technology, risk assessment, cybersecurity, ai, policy, data insights, integration, workforce development, state legislature, training</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c79e64d6-a515-4358-bb6d-0078b75cf5db</guid>
      <title>Frank Cilluffo - chat:CYBR – Episode 7</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>cybersecurity, Cyber Space Solarium Commission, economic competitiveness, regulatory framework, defend forward, cyber diplomacy, state-level cybersecurity, regional cybersecurity, McCrary Institute, digital future</p><p> </p><p><strong>Summary</strong></p><p>In this episode of chat:CYBR, host James Jacobs and co-host Jordan Deiuliis engage with Frank Cilluffo, director of Auburn University's McCrary Institute for Cyber and Critical Infrastructure Security. They discuss the Cyber Space Solarium Commission's role in shaping U.S. cybersecurity policy, the recent report 'Securing America's Digital Future,' and the importance of viewing cybersecurity as integral to economic competitiveness. Cilluffo emphasizes the need for harmonized regulations, a proactive 'defend forward' strategy, and the role of cybersecurity in U.S. foreign policy. The conversation also touches on best practices for state-level cybersecurity and the importance of regional collaboration.</p><p><strong>Takeaways</strong></p><ul><li>Cybersecurity is a national security issue and an economic issue.</li><li>The Cyber Space Solarium Commission has made significant recommendations.</li><li>Harmonizing regulations is crucial for effective cybersecurity.</li><li>Defend forward is a proactive approach to cybersecurity.</li><li>Cybersecurity must be integrated into U.S. foreign policy.</li><li>Trust and collaboration are essential in cybersecurity efforts.</li><li>State and local agencies face the same threats as larger organizations.</li><li>Regional approaches can enhance cybersecurity effectiveness.</li><li>Empowering the next generation of cybersecurity professionals is vital.</li><li>Cybersecurity is a societal problem that requires collective action.</li></ul><p><strong>Titles</strong></p><ul><li>Securing America's Digital Future: Insights from Frank Salufo</li><li>The Role of Cybersecurity in National and Economic Security</li><li>Harmonizing Cyber Regulations: A Path Forward</li></ul><p><strong>Sound Bites</strong></p><ul><li>"We need to impose costs on bad actors."</li><li>"Defend forward is a proactive strategy."</li><li>"Trust is everything in cybersecurity."</li><li>"It's everyone's problem."</li><li>"We need strong women in cybersecurity."</li><li>"It's a societal problem, not just IT."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity and the Guests</p><p>02:32 The Cyber Space Solarium Commission: Purpose and Impact</p><p>06:55 Securing America's Digital Future: The New Report</p><p>10:31 Cybersecurity as Economic Competitiveness</p><p>12:21 Harmonizing Cybersecurity Regulations</p><p>15:45 Defend Forward: A New Cybersecurity Strategy</p><p>19:39 Cybersecurity in U.S. Foreign Policy</p><p>23:45 Best Practices for State-Level Cybersecurity</p><p>27:26 Regional Approaches to Cybersecurity</p><p>30:11 Closing Thoughts and Future Directions</p>
]]></description>
      <pubDate>Tue, 24 Dec 2024 16:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Frank Cilluffo, McCrary Institute, Cyberspace Solarium Commission, Jordan Deiuliis, Cristina Solis, Cyber Florida, James Jacobs, Ernie Ferraresso, USF)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/frank-cilluffo-chat-cybr-episode-7-hBgmDfHK</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/6a7e8a5a-67c9-4443-b24a-7a2963271c2e/youtube-cover-frank-20c.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>cybersecurity, Cyber Space Solarium Commission, economic competitiveness, regulatory framework, defend forward, cyber diplomacy, state-level cybersecurity, regional cybersecurity, McCrary Institute, digital future</p><p> </p><p><strong>Summary</strong></p><p>In this episode of chat:CYBR, host James Jacobs and co-host Jordan Deiuliis engage with Frank Cilluffo, director of Auburn University's McCrary Institute for Cyber and Critical Infrastructure Security. They discuss the Cyber Space Solarium Commission's role in shaping U.S. cybersecurity policy, the recent report 'Securing America's Digital Future,' and the importance of viewing cybersecurity as integral to economic competitiveness. Cilluffo emphasizes the need for harmonized regulations, a proactive 'defend forward' strategy, and the role of cybersecurity in U.S. foreign policy. The conversation also touches on best practices for state-level cybersecurity and the importance of regional collaboration.</p><p><strong>Takeaways</strong></p><ul><li>Cybersecurity is a national security issue and an economic issue.</li><li>The Cyber Space Solarium Commission has made significant recommendations.</li><li>Harmonizing regulations is crucial for effective cybersecurity.</li><li>Defend forward is a proactive approach to cybersecurity.</li><li>Cybersecurity must be integrated into U.S. foreign policy.</li><li>Trust and collaboration are essential in cybersecurity efforts.</li><li>State and local agencies face the same threats as larger organizations.</li><li>Regional approaches can enhance cybersecurity effectiveness.</li><li>Empowering the next generation of cybersecurity professionals is vital.</li><li>Cybersecurity is a societal problem that requires collective action.</li></ul><p><strong>Titles</strong></p><ul><li>Securing America's Digital Future: Insights from Frank Salufo</li><li>The Role of Cybersecurity in National and Economic Security</li><li>Harmonizing Cyber Regulations: A Path Forward</li></ul><p><strong>Sound Bites</strong></p><ul><li>"We need to impose costs on bad actors."</li><li>"Defend forward is a proactive strategy."</li><li>"Trust is everything in cybersecurity."</li><li>"It's everyone's problem."</li><li>"We need strong women in cybersecurity."</li><li>"It's a societal problem, not just IT."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity and the Guests</p><p>02:32 The Cyber Space Solarium Commission: Purpose and Impact</p><p>06:55 Securing America's Digital Future: The New Report</p><p>10:31 Cybersecurity as Economic Competitiveness</p><p>12:21 Harmonizing Cybersecurity Regulations</p><p>15:45 Defend Forward: A New Cybersecurity Strategy</p><p>19:39 Cybersecurity in U.S. Foreign Policy</p><p>23:45 Best Practices for State-Level Cybersecurity</p><p>27:26 Regional Approaches to Cybersecurity</p><p>30:11 Closing Thoughts and Future Directions</p>
]]></content:encoded>
      <enclosure length="32609508" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/01239074-afa1-4832-aa8f-a73e9d95ace4/audio/a4c29229-17cf-4fb2-ab51-9c325b72bfe8/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Frank Cilluffo - chat:CYBR – Episode 7</itunes:title>
      <itunes:author>Frank Cilluffo, McCrary Institute, Cyberspace Solarium Commission, Jordan Deiuliis, Cristina Solis, Cyber Florida, James Jacobs, Ernie Ferraresso, USF</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/ba5ca56f-dea3-4e6f-80b7-4dd13013daf3/3000x3000/chat-episode-art-20frank-20cilluffo.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:56</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, host James Jacobs and co-host Jordan Deiuliis engage with Frank Cilluffo, director of Auburn University&apos;s McCrary Institute for Cyber and Critical Infrastructure Security. They discuss the Cyberspace Solarium Commission&apos;s role in shaping U.S. cybersecurity policy, the recent report &apos;Securing America&apos;s Digital Future,&apos; and the importance of viewing cybersecurity as integral to economic competitiveness.</itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, host James Jacobs and co-host Jordan Deiuliis engage with Frank Cilluffo, director of Auburn University&apos;s McCrary Institute for Cyber and Critical Infrastructure Security. They discuss the Cyberspace Solarium Commission&apos;s role in shaping U.S. cybersecurity policy, the recent report &apos;Securing America&apos;s Digital Future,&apos; and the importance of viewing cybersecurity as integral to economic competitiveness.</itunes:subtitle>
      <itunes:keywords>economic competitiveness, critical infrastructure, recommendations, defend forward, state-level cybersecurity, government, digital, cybersecurity, ai, regulatory framework, foreign policy, policy, security, report, digital future, cyber diplomacy, regional cybersecurity, regional collaboration</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c194590b-3b34-4e70-b462-247abc223f9c</guid>
      <title>Ernie Ferraresso - chat:CYBR – Bonus Episode</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>Cyber Florida, cybersecurity, education, workforce development, Sunshine CyberCon, CyberLaunch, leadership, strategic vision, impact, community engagement, cybersecurity, workforce development, education, cyber range, USF, cyber competitions, resilience, Florida</p><p><strong>Summary</strong></p><p>In this episode of Chat Cyber, hosts James Jacobs and Jordan Deiuliis welcome Ernie Ferraresso, the director of Cyber Florida, to discuss the organization's achievements over the past year and plans for the future. They delve into the impact of Cyber Florida's programs, including the Sunshine CyberCon and CyberLaunch events, and highlight the importance of cybersecurity education and workforce development. The conversation emphasizes the need for leadership in cybersecurity and the significance of community engagement in building a robust cybersecurity workforce. In this conversation, Ernie Ferraresso discusses the advancements in Florida's cybersecurity initiatives, focusing on the Cyber Range Program and its impact on workforce development. He emphasizes the importance of integrating cybersecurity education into K-12 and higher education systems. The conversation also highlights the Student Security Operations Center at USF and the rise of the USF Cyber Herd in competitive cyber challenges, showcasing Florida's growing prominence in the cybersecurity landscape.</p><p><strong>Takeaways</strong></p><ul><li>Cyber Florida has significantly expanded its reach and impact across the state.</li><li>The Sunshine CyberCon event saw over 2000 attendees, marking a successful return post-COVID.</li><li>CyberLaunch is a competition aimed at engaging high school students in cybersecurity.</li><li>The CyberWorks program helps military veterans transition into cybersecurity roles.</li><li>Community engagement is crucial for building a strong cybersecurity workforce.</li><li>Leadership in cybersecurity is essential for organizational success.</li><li>Cybersecurity education is not just for IT professionals; it's for everyone.</li><li>The First Line program has trained 14,000 public sector employees in cybersecurity.</li><li>Cyber self-defense is a proactive approach to cybersecurity awareness.</li><li>The ripple effect of impacting one individual can lead to broader community benefits. The Cyber Range Program has trained over 400 individuals.</li><li>Collaboration with state incident response teams enhances preparedness.</li><li>Mainstreaming cybersecurity in education is crucial for long-term success.</li><li>Cyber resilience is as important as workforce development.</li><li>Florida has established a strong foundation for cybersecurity education.</li><li>The Student Security Operations Center provides hands-on experience for students.</li><li>The USF Cyber Herd is gaining recognition in national competitions.</li><li>Florida's investment in cybersecurity is yielding positive results.</li><li>The integration of cybersecurity into everyday life is essential.</li><li>Community resilience is enhanced through student involvement in cybersecurity projects.</li></ul><p><strong>Titles</strong></p><ul><li>Cybersecurity Initiatives in Florida</li><li>Building a Cyber-Ready Workforce</li><li>Innovations in Cyber Education</li><li>The Rise of USF's Cyber Herd</li></ul><p><strong>Sound Bites</strong></p><ul><li>"It was an emotionally charged event."</li><li>"We are doing it again in the springtime."</li><li>"It's not just the IT person's problem."</li><li>"It's been a tremendous program."</li><li>"It's really been remarkable."</li><li>"The USF cyber herd is stampeding along."</li><li>"We're doing something right down here."</li><li>"We appreciate the listenership."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Holiday Recap</p><p>03:08 Leadership and Strategic Vision of Cyber Florida</p><p>05:55 Impact of Cyber Florida's Programs</p><p>09:05 Sunshine CyberCon and CyberLaunch Events</p><p>11:45 Cybersecurity Education and Workforce Development</p><p>14:57 Full Circle Moments in Cyber Education</p><p>17:48 Target Audience for CyberCon</p><p>21:06 First Line Program and Cyber Range</p><p>24:51 Cyber Range Program and Workforce Development</p><p>27:13 Mainstreaming Cybersecurity in Education</p><p>29:43 Student Security Operations Center and Cyber Herd</p><p>32:41 USF Cyber Herd's Rise in Competitions</p><p>36:32 Florida's Cybersecurity Success Stories</p>
]]></description>
      <pubDate>Tue, 24 Dec 2024 16:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Ernie Ferraresso, Cyber Florida, Cristina Solis, Jordan Deiuliis, James Jacobs, USF)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/ernie-ferraresso-chat-cybr-bonus-episode-gOCXSmIg</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/acdafb79-0a4c-446e-bd7c-10c6f06a35b1/youtube-template-chat-20ernie.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>Cyber Florida, cybersecurity, education, workforce development, Sunshine CyberCon, CyberLaunch, leadership, strategic vision, impact, community engagement, cybersecurity, workforce development, education, cyber range, USF, cyber competitions, resilience, Florida</p><p><strong>Summary</strong></p><p>In this episode of Chat Cyber, hosts James Jacobs and Jordan Deiuliis welcome Ernie Ferraresso, the director of Cyber Florida, to discuss the organization's achievements over the past year and plans for the future. They delve into the impact of Cyber Florida's programs, including the Sunshine CyberCon and CyberLaunch events, and highlight the importance of cybersecurity education and workforce development. The conversation emphasizes the need for leadership in cybersecurity and the significance of community engagement in building a robust cybersecurity workforce. In this conversation, Ernie Ferraresso discusses the advancements in Florida's cybersecurity initiatives, focusing on the Cyber Range Program and its impact on workforce development. He emphasizes the importance of integrating cybersecurity education into K-12 and higher education systems. The conversation also highlights the Student Security Operations Center at USF and the rise of the USF Cyber Herd in competitive cyber challenges, showcasing Florida's growing prominence in the cybersecurity landscape.</p><p><strong>Takeaways</strong></p><ul><li>Cyber Florida has significantly expanded its reach and impact across the state.</li><li>The Sunshine CyberCon event saw over 2000 attendees, marking a successful return post-COVID.</li><li>CyberLaunch is a competition aimed at engaging high school students in cybersecurity.</li><li>The CyberWorks program helps military veterans transition into cybersecurity roles.</li><li>Community engagement is crucial for building a strong cybersecurity workforce.</li><li>Leadership in cybersecurity is essential for organizational success.</li><li>Cybersecurity education is not just for IT professionals; it's for everyone.</li><li>The First Line program has trained 14,000 public sector employees in cybersecurity.</li><li>Cyber self-defense is a proactive approach to cybersecurity awareness.</li><li>The ripple effect of impacting one individual can lead to broader community benefits. The Cyber Range Program has trained over 400 individuals.</li><li>Collaboration with state incident response teams enhances preparedness.</li><li>Mainstreaming cybersecurity in education is crucial for long-term success.</li><li>Cyber resilience is as important as workforce development.</li><li>Florida has established a strong foundation for cybersecurity education.</li><li>The Student Security Operations Center provides hands-on experience for students.</li><li>The USF Cyber Herd is gaining recognition in national competitions.</li><li>Florida's investment in cybersecurity is yielding positive results.</li><li>The integration of cybersecurity into everyday life is essential.</li><li>Community resilience is enhanced through student involvement in cybersecurity projects.</li></ul><p><strong>Titles</strong></p><ul><li>Cybersecurity Initiatives in Florida</li><li>Building a Cyber-Ready Workforce</li><li>Innovations in Cyber Education</li><li>The Rise of USF's Cyber Herd</li></ul><p><strong>Sound Bites</strong></p><ul><li>"It was an emotionally charged event."</li><li>"We are doing it again in the springtime."</li><li>"It's not just the IT person's problem."</li><li>"It's been a tremendous program."</li><li>"It's really been remarkable."</li><li>"The USF cyber herd is stampeding along."</li><li>"We're doing something right down here."</li><li>"We appreciate the listenership."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Holiday Recap</p><p>03:08 Leadership and Strategic Vision of Cyber Florida</p><p>05:55 Impact of Cyber Florida's Programs</p><p>09:05 Sunshine CyberCon and CyberLaunch Events</p><p>11:45 Cybersecurity Education and Workforce Development</p><p>14:57 Full Circle Moments in Cyber Education</p><p>17:48 Target Audience for CyberCon</p><p>21:06 First Line Program and Cyber Range</p><p>24:51 Cyber Range Program and Workforce Development</p><p>27:13 Mainstreaming Cybersecurity in Education</p><p>29:43 Student Security Operations Center and Cyber Herd</p><p>32:41 USF Cyber Herd's Rise in Competitions</p><p>36:32 Florida's Cybersecurity Success Stories</p>
]]></content:encoded>
      <enclosure length="38521775" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/00a24a26-3bb5-48ec-8a8e-f99453fd8fde/audio/ce3fac30-0def-48c1-b515-a8984685afb6/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Ernie Ferraresso - chat:CYBR – Bonus Episode</itunes:title>
      <itunes:author>Ernie Ferraresso, Cyber Florida, Cristina Solis, Jordan Deiuliis, James Jacobs, USF</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/685f5e0b-e1e9-449b-962c-78c0d1154be5/3000x3000/chat-episode-art-20ernie.jpg?aid=rss_feed"/>
      <itunes:duration>00:40:05</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, hosts James Jacobs and Jordan Deiuliis welcome Ernie Ferraresso, the Director of Cyber Florida, to discuss the organization&apos;s achievements over the past year and plans for the future. They delve into the impact of Cyber Florida&apos;s programs, including the Sunshine Cyber Conference and Cyber Launch events, and highlight the importance of the cybersecurity education and workforce development initiatives that Cyber Florida is engaged in.</itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, hosts James Jacobs and Jordan Deiuliis welcome Ernie Ferraresso, the Director of Cyber Florida, to discuss the organization&apos;s achievements over the past year and plans for the future. They delve into the impact of Cyber Florida&apos;s programs, including the Sunshine Cyber Conference and Cyber Launch events, and highlight the importance of the cybersecurity education and workforce development initiatives that Cyber Florida is engaged in.</itunes:subtitle>
      <itunes:keywords>usf, strategic vision, cyber florida, leadership, international, florida, sunshine cybercon, cybersecurity, cyber competitions, cyberlaunch, resilience, students, education, workforce development, cyber range, impact, community engagement</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">778652a5-5f8a-49aa-9bfb-449ede0cb8b2</guid>
      <title>Jack Clabby - chat:CYBR  — Episode 6</title>
      <description><![CDATA[<p><strong>Keywords</strong></p><p>cybersecurity, law, policy, data protection, cyber attacks, legal liability, Florida, cybersecurity attorney, ransomware, business email compromise, cybersecurity, local government, compliance, data management, ransomware, policy recommendations, technology solutions, risk management, Florida cybersecurity act, municipal challenges</p><p><strong>Summary</strong></p><p>In this episode of chat:CYBR, host James Jacobs and co-host Jordan Deiuliis engage with attorney Jack Clabby to explore the intricate world of cybersecurity law and policy. They discuss the role of cybersecurity attorneys, the most common types of cyber attacks, the legal implications of data breaches, and the evolving landscape of cybersecurity legislation in Florida. The conversation highlights the challenges organizations face in navigating legal requirements and the potential costs associated with cyber incidents, as well as the need for a cohesive federal standard to address these issues effectively. In this conversation, the speakers discuss the challenges local governments face in complying with cybersecurity regulations, the importance of data management, and the necessity of simplifying technology solutions. They also explore policy recommendations for improving cybersecurity measures and the implications of Florida's ransomware legislation, including its enforcement and effectiveness.</p><p><strong>Takeaways</strong></p><ul><li>Cybersecurity attorneys intervene before, during, and after incidents.</li><li>Ransomware and business email compromise are prevalent threats.</li><li>Data review costs can be astronomical after a breach.</li><li>Organizations must notify affected individuals after a breach.</li><li>Negligence claims are common in data breach lawsuits.</li><li>Statutory damages could significantly impact liability.</li><li>Software as a service companies are increasingly targeted by cybercriminals.</li><li>Florida lacks a clear safe harbor for organizations regarding cybersecurity.</li><li>Recent legislation aims to improve cybersecurity for local governments.</li><li>Municipalities face challenges in meeting compliance requirements. Local governments often struggle with compliance due to limited manpower.</li><li>Collaboration among municipalities can alleviate compliance burdens.</li><li>Data retention policies should prioritize necessity and security.</li><li>Simplicity in technology solutions can enhance efficiency.</li><li>Ransomware legislation in Florida prohibits state agencies from paying ransoms.</li><li>Best practices in cybersecurity should be clearly defined and separated from standards.</li><li>Effective data management can reduce risks associated with data breaches.</li><li>The necessity of AI in municipal operations should be critically evaluated.</li><li>Reporting requirements for ransomware incidents can provide valuable data for analysis.</li><li>Understanding the motivations behind ransom payments is crucial for policy development.</li></ul><p><strong>Titles</strong></p><ul><li>Sector Vulnerabilities: Who's Most at Risk?</li><li>The Case for Federal Cybersecurity Standards The Importance of Data Management in Cybersecurity</li><li>Simplifying Technology Solutions for Municipalities</li></ul><p><strong>Sound Bites</strong></p><ul><li>"What does a cyber lawyer do?"</li><li>"Ransomware and business email compromise are the big ones."</li><li>"The biggest driver of cost is data review."</li><li>"We can help you with compliance questions."</li><li>"It's a question of manpower, not expertise."</li><li>"Some municipalities think they can hoover up all this data."</li></ul><p>Chapters</p><p>00:00 Introduction to Cybersecurity Law and Policy</p><p>03:09 The Role of a Cybersecurity Attorney</p><p>05:58 Common Cyber Attacks and Their Impact</p><p>08:56 Legal Consequences of Cyber Incidents</p><p>12:09 The Need for Federal Cybersecurity Standards</p><p>14:54 Sector Vulnerabilities in Cybersecurity</p><p>17:57 Liability Protections for Organizations</p><p>20:48 Florida's Cybersecurity Legislation Overview</p><p>24:33 Navigating Compliance Challenges in Local Government</p><p>27:12 Data Management and the Policy of Least Privilege</p><p>29:39 The Necessity of Simplicity in Technology Solutions</p><p>30:10 Policy Recommendations for Cybersecurity</p><p>36:22 Ransomware Legislation: Effectiveness and Enforcement</p>
]]></description>
      <pubDate>Wed, 20 Nov 2024 20:14:09 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Carlton Fields, James Jacobs, Jack Clabby, Jordan Deiuliis, Cyber Florida, Cristina Solis, USF, Ernie Ferraresso)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/jack-clabby-chat-cybr-episode-6-YsnuWRJo</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/92f98054-e6f2-4917-aa12-b00f30539ac3/youtube-template-chat-20ep-206.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Keywords</strong></p><p>cybersecurity, law, policy, data protection, cyber attacks, legal liability, Florida, cybersecurity attorney, ransomware, business email compromise, cybersecurity, local government, compliance, data management, ransomware, policy recommendations, technology solutions, risk management, Florida cybersecurity act, municipal challenges</p><p><strong>Summary</strong></p><p>In this episode of chat:CYBR, host James Jacobs and co-host Jordan Deiuliis engage with attorney Jack Clabby to explore the intricate world of cybersecurity law and policy. They discuss the role of cybersecurity attorneys, the most common types of cyber attacks, the legal implications of data breaches, and the evolving landscape of cybersecurity legislation in Florida. The conversation highlights the challenges organizations face in navigating legal requirements and the potential costs associated with cyber incidents, as well as the need for a cohesive federal standard to address these issues effectively. In this conversation, the speakers discuss the challenges local governments face in complying with cybersecurity regulations, the importance of data management, and the necessity of simplifying technology solutions. They also explore policy recommendations for improving cybersecurity measures and the implications of Florida's ransomware legislation, including its enforcement and effectiveness.</p><p><strong>Takeaways</strong></p><ul><li>Cybersecurity attorneys intervene before, during, and after incidents.</li><li>Ransomware and business email compromise are prevalent threats.</li><li>Data review costs can be astronomical after a breach.</li><li>Organizations must notify affected individuals after a breach.</li><li>Negligence claims are common in data breach lawsuits.</li><li>Statutory damages could significantly impact liability.</li><li>Software as a service companies are increasingly targeted by cybercriminals.</li><li>Florida lacks a clear safe harbor for organizations regarding cybersecurity.</li><li>Recent legislation aims to improve cybersecurity for local governments.</li><li>Municipalities face challenges in meeting compliance requirements. Local governments often struggle with compliance due to limited manpower.</li><li>Collaboration among municipalities can alleviate compliance burdens.</li><li>Data retention policies should prioritize necessity and security.</li><li>Simplicity in technology solutions can enhance efficiency.</li><li>Ransomware legislation in Florida prohibits state agencies from paying ransoms.</li><li>Best practices in cybersecurity should be clearly defined and separated from standards.</li><li>Effective data management can reduce risks associated with data breaches.</li><li>The necessity of AI in municipal operations should be critically evaluated.</li><li>Reporting requirements for ransomware incidents can provide valuable data for analysis.</li><li>Understanding the motivations behind ransom payments is crucial for policy development.</li></ul><p><strong>Titles</strong></p><ul><li>Sector Vulnerabilities: Who's Most at Risk?</li><li>The Case for Federal Cybersecurity Standards The Importance of Data Management in Cybersecurity</li><li>Simplifying Technology Solutions for Municipalities</li></ul><p><strong>Sound Bites</strong></p><ul><li>"What does a cyber lawyer do?"</li><li>"Ransomware and business email compromise are the big ones."</li><li>"The biggest driver of cost is data review."</li><li>"We can help you with compliance questions."</li><li>"It's a question of manpower, not expertise."</li><li>"Some municipalities think they can hoover up all this data."</li></ul><p>Chapters</p><p>00:00 Introduction to Cybersecurity Law and Policy</p><p>03:09 The Role of a Cybersecurity Attorney</p><p>05:58 Common Cyber Attacks and Their Impact</p><p>08:56 Legal Consequences of Cyber Incidents</p><p>12:09 The Need for Federal Cybersecurity Standards</p><p>14:54 Sector Vulnerabilities in Cybersecurity</p><p>17:57 Liability Protections for Organizations</p><p>20:48 Florida's Cybersecurity Legislation Overview</p><p>24:33 Navigating Compliance Challenges in Local Government</p><p>27:12 Data Management and the Policy of Least Privilege</p><p>29:39 The Necessity of Simplicity in Technology Solutions</p><p>30:10 Policy Recommendations for Cybersecurity</p><p>36:22 Ransomware Legislation: Effectiveness and Enforcement</p>
]]></content:encoded>
      <enclosure length="41096674" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/c74a4626-f848-4122-8726-ed8296dff349/audio/1e559e13-3975-44ba-806b-47ef078f702f/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Jack Clabby - chat:CYBR  — Episode 6</itunes:title>
      <itunes:author>Carlton Fields, James Jacobs, Jack Clabby, Jordan Deiuliis, Cyber Florida, Cristina Solis, USF, Ernie Ferraresso</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/64ee7fed-b46d-4479-90ca-fd46d5143c27/3000x3000/chat-episode-art-20ep-206.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:46</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, attorney Jack Clabby discusses the evolving landscape of cybersecurity law and policy. Through this conversation, they dive into the challenges organizations face, the costs of cyber incidents, the need for a cohesive federal standard, and the importance of simplifying technology solutions for local governments.</itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, attorney Jack Clabby discusses the evolving landscape of cybersecurity law and policy. Through this conversation, they dive into the challenges organizations face, the costs of cyber incidents, the need for a cohesive federal standard, and the importance of simplifying technology solutions for local governments.</itunes:subtitle>
      <itunes:keywords>cyber, risk management, compliance, disclosure, municipal challenges, government, data protection, technology solutions, law, extorsion, legal liability, policy recommendations, cybersecurity, data management, cybersecurity attorney, ransomware, ransomware, policy, cyber attacks, prevention, data</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">05bcb7e4-c98f-4903-8a8f-fb9ed2e6a73c</guid>
      <title>Joan Wooward - chat:CYBR – Episode 5</title>
      <description><![CDATA[<p><strong>Summary</strong></p><p>In this episode of chat:CYBR, James Jacobs and Jordan Deiuliis discuss the role of the Travelers Institute in public policy and cybersecurity with Joan Woodward, the president of the Institute. They explore the evolution of the Institute, the importance of cybersecurity awareness, and the intersection of cybersecurity and insurance. Joan shares insights from recent studies on CFO concerns regarding cybersecurity and emphasizes the need for proactive measures to mitigate risks. The conversation concludes with recommendations for policymakers to enhance cybersecurity strategies.</p><p> </p><p><strong>Keywords: </strong>Travelers Institute, cybersecurity, public policy, risk management, insurance, business engagement, cyber awareness, proactive measures, CFO concerns, policy recommendations</p><p><strong>Takeaways</strong></p><ul><li>The Travelers Institute serves as a public policy educational platform.</li><li>Cybersecurity Awareness Month highlights the importance of protecting businesses.</li><li>Cyber risk is a leading concern for business owners.</li><li>CFOs rank cybersecurity as a significant challenge in risk management.</li><li>Proactive measures are essential for managing cybersecurity risks.</li><li>Multi-factor authentication is a key practice for security.</li><li>Organizations should have an incident response plan in place.</li><li>Cyber insurance helps businesses prepare for potential breaches.</li><li>The Travelers Institute offers free resources for businesses.</li><li>Collaboration with government agencies enhances cybersecurity efforts.</li></ul><p><strong>Titles</strong></p><ul><li>Best Practices for Cyber Resilience</li><li>CFO Perspectives on Cybersecurity Challenges</li></ul><p><strong>Sound Bites</strong></p><ul><li>"It's an important topic for us to talk about."</li><li>"Cyber risk reclaim the number one spot."</li><li>"Cybersecurity is a major initiative of the Travelers Institute."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to the Travelers Institute and Its Mission</p><p>04:01 Cybersecurity Awareness and Business Engagement</p><p>09:02 CFO Concerns and Cybersecurity Ranking</p><p>11:56 Proactive Cybersecurity Measures for Organizations</p><p>14:58 The Intersection of Cybersecurity and Insurance</p><p>17:02 Recommendations for Policymakers on Cybersecurity</p>
]]></description>
      <pubDate>Tue, 22 Oct 2024 17:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Travelers Institute, Cyber Florida, Jordan Deiuliis, James Jacobs, Joan Woodward, Ernie Ferraresso, Cristina Solis, USF)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/joan-wooward-chat-cybr-episode-5-6Srtur6i</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/bc38d050-71ca-455a-8d21-e86a512e50e2/youtube-cover-ep-5.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Summary</strong></p><p>In this episode of chat:CYBR, James Jacobs and Jordan Deiuliis discuss the role of the Travelers Institute in public policy and cybersecurity with Joan Woodward, the president of the Institute. They explore the evolution of the Institute, the importance of cybersecurity awareness, and the intersection of cybersecurity and insurance. Joan shares insights from recent studies on CFO concerns regarding cybersecurity and emphasizes the need for proactive measures to mitigate risks. The conversation concludes with recommendations for policymakers to enhance cybersecurity strategies.</p><p> </p><p><strong>Keywords: </strong>Travelers Institute, cybersecurity, public policy, risk management, insurance, business engagement, cyber awareness, proactive measures, CFO concerns, policy recommendations</p><p><strong>Takeaways</strong></p><ul><li>The Travelers Institute serves as a public policy educational platform.</li><li>Cybersecurity Awareness Month highlights the importance of protecting businesses.</li><li>Cyber risk is a leading concern for business owners.</li><li>CFOs rank cybersecurity as a significant challenge in risk management.</li><li>Proactive measures are essential for managing cybersecurity risks.</li><li>Multi-factor authentication is a key practice for security.</li><li>Organizations should have an incident response plan in place.</li><li>Cyber insurance helps businesses prepare for potential breaches.</li><li>The Travelers Institute offers free resources for businesses.</li><li>Collaboration with government agencies enhances cybersecurity efforts.</li></ul><p><strong>Titles</strong></p><ul><li>Best Practices for Cyber Resilience</li><li>CFO Perspectives on Cybersecurity Challenges</li></ul><p><strong>Sound Bites</strong></p><ul><li>"It's an important topic for us to talk about."</li><li>"Cyber risk reclaim the number one spot."</li><li>"Cybersecurity is a major initiative of the Travelers Institute."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to the Travelers Institute and Its Mission</p><p>04:01 Cybersecurity Awareness and Business Engagement</p><p>09:02 CFO Concerns and Cybersecurity Ranking</p><p>11:56 Proactive Cybersecurity Measures for Organizations</p><p>14:58 The Intersection of Cybersecurity and Insurance</p><p>17:02 Recommendations for Policymakers on Cybersecurity</p>
]]></content:encoded>
      <enclosure length="16703273" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/2a640a7b-1bc3-4195-aa7e-66bfd3a13169/audio/9ffe6620-97ce-4021-a2c5-e90ebb8b25f6/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Joan Wooward - chat:CYBR – Episode 5</itunes:title>
      <itunes:author>Travelers Institute, Cyber Florida, Jordan Deiuliis, James Jacobs, Joan Woodward, Ernie Ferraresso, Cristina Solis, USF</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/a7be253f-6084-49ae-b17e-aeed765ab39c/3000x3000/chat-episode5-art-joan-woodward.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:21</itunes:duration>
      <itunes:summary>In this episode of chat:CYBR, Joan Woodward, the President of the Travelers Institute discusses the role of the Institute in public policy and cybersecurity. As they explore the evolution of the Travelers Institute, they go in depth on the importance of cybersecurity awareness, and the intersection of cybersecurity and insurance. </itunes:summary>
      <itunes:subtitle>In this episode of chat:CYBR, Joan Woodward, the President of the Travelers Institute discusses the role of the Institute in public policy and cybersecurity. As they explore the evolution of the Travelers Institute, they go in depth on the importance of cybersecurity awareness, and the intersection of cybersecurity and insurance. </itunes:subtitle>
      <itunes:keywords>mitigation, cyber, cybersecurity education, risk management, public policy, government, business owners, cybercrime, risk, cybersecurity awareness month, government relations, insurance, policy recommendations, cybersecurity, cyber resilience, cyber awareness, policy, security, business engagement, cyber insurance, cfo</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">33c2da15-c515-4b6b-8dad-2e316b6b14fc</guid>
      <title>Dr. Stephen Neely - chat:CYBR — Episode 4</title>
      <description><![CDATA[<p><strong>Summary</strong></p><p>Dr. Stephen Neely, an Associate Professor and Director of the Master of Public Administration program at the University of South Florida, discusses ransomware attacks and the need for ransomware readiness in organizations. Ransomware attacks use malicious software to gain unauthorized access to computer systems and demand a ransom in exchange for releasing information or restoring access. These attacks can have severe consequences, such as disrupting essential services and causing reputational damage. The conversation highlights the importance of closing the maturity gap for basic ransomware readiness and provides recommendations for the state legislature, including coordination, delegation, tracking progress, and providing informational and resource support. Cyber Florida is recognized as an organization that can play a significant role in society's relationship with ransomware by providing coordination, research support, technical support, and training for the future cyber workforce.</p><p><strong>Keywords</strong></p><p>ransomware attacks, ransomware readiness, malicious software, cyber resiliency, critical infrastructure, state legislature, coordination, delegation, tracking progress, resource support, Cyber Florida</p><p><strong>Takeaways</strong></p><ul><li>Ransomware attacks use malicious software to gain unauthorized access to computer systems and demand a ransom in exchange for releasing information or restoring access.</li><li>Closing the maturity gap for basic ransomware readiness is crucial to protect organizations from evolving threats.</li><li>Recommendations for the state legislature include coordination, delegation, tracking progress, and providing informational and resource support.</li><li>Cyber Florida can play a significant role in society's relationship with ransomware by providing coordination, research support, technical support, and training for the future cyber workforce.</li></ul><p><strong>Titles</strong></p><ul><li>Recommendations for the State Legislature</li><li>Understanding Ransomware Attacks and Their Impact</li></ul><p><strong>Sound Bites</strong></p><ul><li>"Can you briefly explain ransomware attacks, what they are and how they negatively impact organizations and provide a few examples?"</li><li>"What makes ransomware attacks so effective is that they're simple."</li><li>"A ransom isn't going to be an outrageous demand that no organization is going to meet."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Background of Dr. Steven Neely</p><p>02:08 Understanding Ransomware Attacks</p><p>06:17 Closing the Maturity Gap for Ransomware Readiness</p><p>09:55 Gaps in Readiness and Recommendations</p><p>13:40 The Role of Cyber Florida in Ransomware Readiness</p>
]]></description>
      <pubDate>Fri, 19 Jul 2024 10:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Dr. Stephen Neely, USF, Cyber Florida, Jordan Deiuliis, Ernie Ferraresso, James Jacobs, Cristina Solis)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/dr-stephen-neely-chat-cybr-episode-4-2MD5bPKU</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/7c19d1fa-3ae4-4fde-a6a6-3b57e337fe67/youtube-template-chat-ep-4.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Summary</strong></p><p>Dr. Stephen Neely, an Associate Professor and Director of the Master of Public Administration program at the University of South Florida, discusses ransomware attacks and the need for ransomware readiness in organizations. Ransomware attacks use malicious software to gain unauthorized access to computer systems and demand a ransom in exchange for releasing information or restoring access. These attacks can have severe consequences, such as disrupting essential services and causing reputational damage. The conversation highlights the importance of closing the maturity gap for basic ransomware readiness and provides recommendations for the state legislature, including coordination, delegation, tracking progress, and providing informational and resource support. Cyber Florida is recognized as an organization that can play a significant role in society's relationship with ransomware by providing coordination, research support, technical support, and training for the future cyber workforce.</p><p><strong>Keywords</strong></p><p>ransomware attacks, ransomware readiness, malicious software, cyber resiliency, critical infrastructure, state legislature, coordination, delegation, tracking progress, resource support, Cyber Florida</p><p><strong>Takeaways</strong></p><ul><li>Ransomware attacks use malicious software to gain unauthorized access to computer systems and demand a ransom in exchange for releasing information or restoring access.</li><li>Closing the maturity gap for basic ransomware readiness is crucial to protect organizations from evolving threats.</li><li>Recommendations for the state legislature include coordination, delegation, tracking progress, and providing informational and resource support.</li><li>Cyber Florida can play a significant role in society's relationship with ransomware by providing coordination, research support, technical support, and training for the future cyber workforce.</li></ul><p><strong>Titles</strong></p><ul><li>Recommendations for the State Legislature</li><li>Understanding Ransomware Attacks and Their Impact</li></ul><p><strong>Sound Bites</strong></p><ul><li>"Can you briefly explain ransomware attacks, what they are and how they negatively impact organizations and provide a few examples?"</li><li>"What makes ransomware attacks so effective is that they're simple."</li><li>"A ransom isn't going to be an outrageous demand that no organization is going to meet."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Background of Dr. Steven Neely</p><p>02:08 Understanding Ransomware Attacks</p><p>06:17 Closing the Maturity Gap for Ransomware Readiness</p><p>09:55 Gaps in Readiness and Recommendations</p><p>13:40 The Role of Cyber Florida in Ransomware Readiness</p>
]]></content:encoded>
      <enclosure length="18578587" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/ec21b6b1-b8da-41fa-b342-e5e2f624bc9a/audio/a853e5cc-985c-4cfd-bf27-4df7cba2aaf8/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Dr. Stephen Neely - chat:CYBR — Episode 4</itunes:title>
      <itunes:author>Dr. Stephen Neely, USF, Cyber Florida, Jordan Deiuliis, Ernie Ferraresso, James Jacobs, Cristina Solis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/a6aac424-4fd4-4cbc-8a29-b497d7025a99/3000x3000/episode-4-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:16</itunes:duration>
      <itunes:summary>In this episode of Chat:CYBR, Dr. Stephen Neely discusses ransomware attacks and the importance of closing the maturity gap for basic ransomware readiness. Dr. Neely provides recommendations for the state legislature regarding ransomware readiness, and recognizes Cyber Florida as a key player in supporting this crucial effort.
 </itunes:summary>
      <itunes:subtitle>In this episode of Chat:CYBR, Dr. Stephen Neely discusses ransomware attacks and the importance of closing the maturity gap for basic ransomware readiness. Dr. Neely provides recommendations for the state legislature regarding ransomware readiness, and recognizes Cyber Florida as a key player in supporting this crucial effort.
 </itunes:subtitle>
      <itunes:keywords>critical infrastructure, ransomware readiness, malicious software, government, cyber florida, cybercrime, tracking progress, coordination, leadership, government relations, cybersecurity, delegation, ai, ransomware attacks, artificial intelligence, cyber resiliency, policy, resource support, state legislature, cyberwarfare, cyber policy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2a74b0e5-768f-47cd-bd0c-b199fc4b607d</guid>
      <title>Mark Walsh - chat:CYBR — Episode 2</title>
      <description><![CDATA[<p><strong>Summary</strong></p><p>In this episode of Chat:CYBR, the hosts interview Mark Walsh, the Assistant Vice President for Government Relations at the University of South Florida (USF), to discuss the creation of Cyber Florida. The idea for Cyber Florida originated from discussions with personnel at MacDill Air Force Base, who identified cyber warfare as a major national security threat. With the support of Speaker Weatherford and the Board of Governors, Cyber Florida was established to address the shortage of cyber-trained professionals and enhance cybersecurity in the state. Over the years, Cyber Florida has provided workforce development, education, risk assessment, and training for state and local government employees. The recent formation of the new College of Cyber and AI at USF further strengthens the state's cybersecurity capabilities.</p><p><strong>Keywords</strong></p><p>Cyber Florida, USF, cybersecurity, government relations, MacDill Air Force Base, national security, workforce development, education, risk assessment, training, College of Cyber and AI</p><p><strong>Takeaways</strong></p><ul><li>Cyber Florida was created in response to the identified national security threat of cyber warfare.</li><li>The establishment of Cyber Florida was supported by Speaker Weatherford and the Board of Governors.</li><li>Cyber Florida has provided workforce development, education, risk assessment, and training for state and local government employees.</li><li>The formation of the new College of Cyber and AI at USF further strengthens the state's cybersecurity capabilities.</li></ul><p><strong>Titles</strong></p><ul><li>Expanding Capabilities: The Formation of the College of Cybersecurity, AI and Computing</li><li>Enhancing Cybersecurity: Workforce Development, Education, and Training</li></ul><p><strong>Sound Bites</strong></p><ul><li>"The genesis of Cyber Florida, where did it come from? It started with discussions that USF leadership was engaged in with MacDill Air Force base personnel."</li><li>"The legislature enacted a little piece of proviso language in the state budget that didn't have any money attached to it, but it did say, we wanna have the Florida Center for Cybersecurity."</li><li>"Cyber Florida has been a resource to the state of Florida by conducting a risk assessment, training state and local government employees, and providing workforce development and education."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to Chat:CYBER and Guest Introduction</p><p>02:02 The Genesis of Cyber Florida: Addressing the National Security Threat of Cyber Warfare</p><p>05:16 Building Partnerships: The Support of Speaker Weatherford and the Board of Governors</p><p>13:50 Enhancing Cybersecurity: Workforce Development, Education, and Training</p><p>21:56 Expanding Capabilities: The Formation of the College of Cyber and AI</p>
]]></description>
      <pubDate>Fri, 19 Jul 2024 10:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Mark Walsh, MacDill Air Force Base, Will Weatherford, washington dc, Cyber Florida, James Jacobs, Ernie Ferraresso, USF, Cristina Solis, Jordan Deiuliis)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/mark-walsh-chat-cybr-episode-2-6AMOYEgs</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/e1898957-9474-4a5c-a1c7-d908e37d1e89/youtube-template-chat-ep-2.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Summary</strong></p><p>In this episode of Chat:CYBR, the hosts interview Mark Walsh, the Assistant Vice President for Government Relations at the University of South Florida (USF), to discuss the creation of Cyber Florida. The idea for Cyber Florida originated from discussions with personnel at MacDill Air Force Base, who identified cyber warfare as a major national security threat. With the support of Speaker Weatherford and the Board of Governors, Cyber Florida was established to address the shortage of cyber-trained professionals and enhance cybersecurity in the state. Over the years, Cyber Florida has provided workforce development, education, risk assessment, and training for state and local government employees. The recent formation of the new College of Cyber and AI at USF further strengthens the state's cybersecurity capabilities.</p><p><strong>Keywords</strong></p><p>Cyber Florida, USF, cybersecurity, government relations, MacDill Air Force Base, national security, workforce development, education, risk assessment, training, College of Cyber and AI</p><p><strong>Takeaways</strong></p><ul><li>Cyber Florida was created in response to the identified national security threat of cyber warfare.</li><li>The establishment of Cyber Florida was supported by Speaker Weatherford and the Board of Governors.</li><li>Cyber Florida has provided workforce development, education, risk assessment, and training for state and local government employees.</li><li>The formation of the new College of Cyber and AI at USF further strengthens the state's cybersecurity capabilities.</li></ul><p><strong>Titles</strong></p><ul><li>Expanding Capabilities: The Formation of the College of Cybersecurity, AI and Computing</li><li>Enhancing Cybersecurity: Workforce Development, Education, and Training</li></ul><p><strong>Sound Bites</strong></p><ul><li>"The genesis of Cyber Florida, where did it come from? It started with discussions that USF leadership was engaged in with MacDill Air Force base personnel."</li><li>"The legislature enacted a little piece of proviso language in the state budget that didn't have any money attached to it, but it did say, we wanna have the Florida Center for Cybersecurity."</li><li>"Cyber Florida has been a resource to the state of Florida by conducting a risk assessment, training state and local government employees, and providing workforce development and education."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction to Chat:CYBER and Guest Introduction</p><p>02:02 The Genesis of Cyber Florida: Addressing the National Security Threat of Cyber Warfare</p><p>05:16 Building Partnerships: The Support of Speaker Weatherford and the Board of Governors</p><p>13:50 Enhancing Cybersecurity: Workforce Development, Education, and Training</p><p>21:56 Expanding Capabilities: The Formation of the College of Cyber and AI</p>
]]></content:encoded>
      <enclosure length="24312410" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/4e7d1610-e964-4d83-8d06-c31557e4b941/audio/15f4f003-1c74-4cf8-b868-b7a1e3aeac54/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Mark Walsh - chat:CYBR — Episode 2</itunes:title>
      <itunes:author>Mark Walsh, MacDill Air Force Base, Will Weatherford, washington dc, Cyber Florida, James Jacobs, Ernie Ferraresso, USF, Cristina Solis, Jordan Deiuliis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/330f8e8e-2bec-49ec-83c3-c020ca3ff2d7/3000x3000/episode-2-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:16</itunes:duration>
      <itunes:summary>In this episode of Chat:CYBR, Mark Walsh provides a brief background on the creation of Cyber Florida at the University of South Florida. He highlights the various successes of the Center since its inception, as well as Cyber Florida&apos;s continuous efforts to enhance the cyber capabilities of the state.
 </itunes:summary>
      <itunes:subtitle>In this episode of Chat:CYBR, Mark Walsh provides a brief background on the creation of Cyber Florida at the University of South Florida. He highlights the various successes of the Center since its inception, as well as Cyber Florida&apos;s continuous efforts to enhance the cyber capabilities of the state.
 </itunes:subtitle>
      <itunes:keywords>cyberattack, cyber, usf, macdill air force base, government, cyber training, cyber florida, cybercrime, leadership, government relations, risk assessment, cyber professionals, cybersecurity, ai, artificial intelligence, policy, cyberpolicy, education, workforce development, research, cyberwarfare, training, computing, national security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fe925248-19d6-4b9e-831d-0f97feab2b2c</guid>
      <title>Brian Fonseca - chat:CYBR — Episode 1</title>
      <description><![CDATA[<p><strong>Summary</strong></p><p>In this episode of Chat:CYBR, the hosts interview Brian Fonseca about artificial intelligence (AI) and its implications for policy. They discuss the definition of AI, the importance of workforce development, the need for security and accountability in AI systems, and the challenges of data privacy and integrity. They also explore the impact of AI on critical infrastructure and academia, and the role of quantum computing in enhancing AI capabilities. Overall, the conversation highlights the need for thoughtful and responsible policy-making to harness the potential of AI while addressing its risks.</p><p><strong>Keywords</strong></p><p>artificial intelligence, AI, policy, workforce development, security, accountability, data privacy, data integrity, critical infrastructure, academia, quantum computing</p><p><strong>Takeaways</strong></p><ul><li>AI has the potential to revolutionize various sectors and impact society in significant ways.</li><li>Workforce development is crucial to ensure that individuals have the skills to adapt to the changes brought about by AI.</li><li>Security and accountability are essential considerations in the integration of AI into different domains.</li><li>Data privacy and integrity are important challenges in AI, and policies should address these issues.</li><li>AI has implications for critical infrastructure, and policymakers need to consider its impact on utilities and other sectors.</li><li>In academia, AI raises questions about academic integrity and the need to teach students how to responsibly and ethically use AI tools.</li><li>Quantum computing has the potential to enhance the power and capabilities of AI systems.</li><li>Policy-making in the AI space requires agility and the ability to keep pace with rapid technological advancements.</li></ul><p><strong>Titles</strong></p><ul><li>The Impact of AI on Critical Infrastructure</li><li>Preparing the Workforce for the AI Revolution</li></ul><p><strong>Sound Bites</strong></p><ul><li>"What is AI? Artificial intelligence. I mean, it is intelligent machines, right?"</li><li>"There is going to be a tectonic shift in the job market and in the workforce in terms of the types of skills that are needed."</li><li>"If you're going to integrate AI into every facet of society, how are you ensuring that it is done in a secure way? An accountable way."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Background of the Guest</p><p>02:00 Defining Artificial Intelligence</p><p>03:42 Policy Considerations for AI</p><p>09:19 Data Privacy and Integrity</p><p>12:35 AI's Impact on Critical Infrastructure</p><p>14:29 AI in Academia</p><p>19:07 The Role of Quantum Computing</p><p>21:57 Policy-Making in the AI Era</p>
]]></description>
      <pubDate>Fri, 19 Jul 2024 10:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Brian Fonseca, James Jacobs, Cristina Solis, USF, FIU, Jack D. Gordon Institute, Jordan Deiuliis, Cyber Florida, Ernie Ferraresso)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/brian-fonseca-chat-cybr-episode-1-FAmTiEtg</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/fdeaa60c-5733-4889-ae38-751767359ff5/youtube-template-chat-ep-1.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Summary</strong></p><p>In this episode of Chat:CYBR, the hosts interview Brian Fonseca about artificial intelligence (AI) and its implications for policy. They discuss the definition of AI, the importance of workforce development, the need for security and accountability in AI systems, and the challenges of data privacy and integrity. They also explore the impact of AI on critical infrastructure and academia, and the role of quantum computing in enhancing AI capabilities. Overall, the conversation highlights the need for thoughtful and responsible policy-making to harness the potential of AI while addressing its risks.</p><p><strong>Keywords</strong></p><p>artificial intelligence, AI, policy, workforce development, security, accountability, data privacy, data integrity, critical infrastructure, academia, quantum computing</p><p><strong>Takeaways</strong></p><ul><li>AI has the potential to revolutionize various sectors and impact society in significant ways.</li><li>Workforce development is crucial to ensure that individuals have the skills to adapt to the changes brought about by AI.</li><li>Security and accountability are essential considerations in the integration of AI into different domains.</li><li>Data privacy and integrity are important challenges in AI, and policies should address these issues.</li><li>AI has implications for critical infrastructure, and policymakers need to consider its impact on utilities and other sectors.</li><li>In academia, AI raises questions about academic integrity and the need to teach students how to responsibly and ethically use AI tools.</li><li>Quantum computing has the potential to enhance the power and capabilities of AI systems.</li><li>Policy-making in the AI space requires agility and the ability to keep pace with rapid technological advancements.</li></ul><p><strong>Titles</strong></p><ul><li>The Impact of AI on Critical Infrastructure</li><li>Preparing the Workforce for the AI Revolution</li></ul><p><strong>Sound Bites</strong></p><ul><li>"What is AI? Artificial intelligence. I mean, it is intelligent machines, right?"</li><li>"There is going to be a tectonic shift in the job market and in the workforce in terms of the types of skills that are needed."</li><li>"If you're going to integrate AI into every facet of society, how are you ensuring that it is done in a secure way? An accountable way."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Background of the Guest</p><p>02:00 Defining Artificial Intelligence</p><p>03:42 Policy Considerations for AI</p><p>09:19 Data Privacy and Integrity</p><p>12:35 AI's Impact on Critical Infrastructure</p><p>14:29 AI in Academia</p><p>19:07 The Role of Quantum Computing</p><p>21:57 Policy-Making in the AI Era</p>
]]></content:encoded>
      <enclosure length="24168988" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/401a44dd-9f71-4ea0-9125-0e3c762fb714/audio/6a99556b-f597-4c1c-a25c-4f6e025ac5e1/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>Brian Fonseca - chat:CYBR — Episode 1</itunes:title>
      <itunes:author>Brian Fonseca, James Jacobs, Cristina Solis, USF, FIU, Jack D. Gordon Institute, Jordan Deiuliis, Cyber Florida, Ernie Ferraresso</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/ef406476-28dc-41f0-9f13-064b6c608898/3000x3000/episode-1-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:06</itunes:duration>
      <itunes:summary>In this episode of Chat:CYBR, we talk with Brian Fonseca about artificial intelligence (AI) and its implications for policy. Brian provides insight on the importance of workforce development, the need for security and accountability in AI systems, and the impact of AI on critical infrastructure and academia. 
 </itunes:summary>
      <itunes:subtitle>In this episode of Chat:CYBR, we talk with Brian Fonseca about artificial intelligence (AI) and its implications for policy. Brian provides insight on the importance of workforce development, the need for security and accountability in AI systems, and the impact of AI on critical infrastructure and academia. 
 </itunes:subtitle>
      <itunes:keywords>quantum computing, critical infrastructure, cyber, public policy, government, decision makers, leadership, government relations, washington dc, cybersecurity, data integrity, ai, academia, artificial intelligence, policy, accountability, security, data privacy, policy makers, cyberpolicy, education, legislation, workforce development, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2208328a-c695-468d-9eac-2c7e8e35871a</guid>
      <title>General Frank McKenzie - chat:CYBR — Episode 3</title>
      <description><![CDATA[<p><strong>Summary</strong></p><p>In this episode of Chat:CYBR, General Frank McKenzie discusses cyber warfare and its importance in defending the nation. He defines cyber warfare as a new domain of warfare that is limited only by the human mind and explains how it affects various aspects of society, including healthcare, transportation, and military operations. General McKenzie highlights the vulnerabilities of the United States in cyber warfare and the need for effective cyber defenses. He also discusses the concepts of cyber deterrence and defense, emphasizing the importance of protecting the civilian population. The conversation touches on the role of Cyber Florida in policy development and the challenges of dealing with terrorist organizations and criminal elements in the cyber domain.</p><p><strong>Keywords</strong></p><p>cyber warfare, defense, cyber deterrence, vulnerabilities, cyber domain, cyber defenses, civilian protection, policy development, terrorist organizations, criminal elements</p><p><strong>Takeaways</strong></p><ul><li>Cyber warfare is a new domain of warfare that is limited only by the human mind and affects various aspects of society.</li><li>The United States is uniquely vulnerable in cyber warfare due to its dependence on cyber systems.</li><li>Cyber deterrence and defense are important strategies in protecting the nation, with a focus on balancing the potential effects against the civilian population.</li><li>Cyber Florida plays a role in policy development and bridging the gap between the state and federal government in cybersecurity.</li><li>Dealing with terrorist organizations and criminal elements in the cyber domain presents unique challenges.</li></ul><p><strong>Titles</strong></p><ul><li>The Role of Cyber Florida in Policy Development</li><li>Understanding Cyber Warfare and Its Impact on Society</li></ul><p><strong>Sound Bites</strong></p><ul><li>"How would you define cyber warfare? And when did you realize that cyber matters in terms of defending the nation?"</li><li>"The United States is a prize fighter with a glass jaw."</li><li>"What are some of our cyber defenses? And so for example, maybe cyber deterrence."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Background of General Frank McKenzie</p><p>01:10 Defining Cyber Warfare and Its Importance</p><p>04:24 The Vulnerabilities of the United States</p><p>07:10 Cyber Deterrence and Defense</p><p>09:40 The Role of Cyber Florida in Policy Development</p><p>13:43 Protecting the General Public in Cyber Warfare</p><p>16:28 The Inevitability of Cyber Dimension in Conflicts</p><p>17:34 Cyber Priorities and Advice for Policymakers</p><p>18:34 Closing Remarks</p>
]]></description>
      <pubDate>Fri, 19 Jul 2024 10:00:00 +0000</pubDate>
      <author>jdeiuliis@cyberflorida.org (Global and National Security Institute, James Jacobs, Ernie Ferraresso, USF, Jordan Deiuliis, Cyber Florida, Cristina Solis, General (Ret.) Frank McKenzie)</author>
      <link>https://chat-cybr-eba1c7e7.simplecast.com/episodes/general-frank-mckenzie-chat-cybr-episode-3-0JWUY2b5</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/1ff399dd-9396-4225-b006-fb148142e8e7/youtube-template-chat-ep-3.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Summary</strong></p><p>In this episode of Chat:CYBR, General Frank McKenzie discusses cyber warfare and its importance in defending the nation. He defines cyber warfare as a new domain of warfare that is limited only by the human mind and explains how it affects various aspects of society, including healthcare, transportation, and military operations. General McKenzie highlights the vulnerabilities of the United States in cyber warfare and the need for effective cyber defenses. He also discusses the concepts of cyber deterrence and defense, emphasizing the importance of protecting the civilian population. The conversation touches on the role of Cyber Florida in policy development and the challenges of dealing with terrorist organizations and criminal elements in the cyber domain.</p><p><strong>Keywords</strong></p><p>cyber warfare, defense, cyber deterrence, vulnerabilities, cyber domain, cyber defenses, civilian protection, policy development, terrorist organizations, criminal elements</p><p><strong>Takeaways</strong></p><ul><li>Cyber warfare is a new domain of warfare that is limited only by the human mind and affects various aspects of society.</li><li>The United States is uniquely vulnerable in cyber warfare due to its dependence on cyber systems.</li><li>Cyber deterrence and defense are important strategies in protecting the nation, with a focus on balancing the potential effects against the civilian population.</li><li>Cyber Florida plays a role in policy development and bridging the gap between the state and federal government in cybersecurity.</li><li>Dealing with terrorist organizations and criminal elements in the cyber domain presents unique challenges.</li></ul><p><strong>Titles</strong></p><ul><li>The Role of Cyber Florida in Policy Development</li><li>Understanding Cyber Warfare and Its Impact on Society</li></ul><p><strong>Sound Bites</strong></p><ul><li>"How would you define cyber warfare? And when did you realize that cyber matters in terms of defending the nation?"</li><li>"The United States is a prize fighter with a glass jaw."</li><li>"What are some of our cyber defenses? And so for example, maybe cyber deterrence."</li></ul><p><strong>Chapters</strong></p><p>00:00 Introduction and Background of General Frank McKenzie</p><p>01:10 Defining Cyber Warfare and Its Importance</p><p>04:24 The Vulnerabilities of the United States</p><p>07:10 Cyber Deterrence and Defense</p><p>09:40 The Role of Cyber Florida in Policy Development</p><p>13:43 Protecting the General Public in Cyber Warfare</p><p>16:28 The Inevitability of Cyber Dimension in Conflicts</p><p>17:34 Cyber Priorities and Advice for Policymakers</p><p>18:34 Closing Remarks</p>
]]></content:encoded>
      <enclosure length="18222514" type="audio/mpeg" url="https://cdn.simplecast.com/audio/6604c7d2-4731-4b02-aa53-2a368a135b96/episodes/7e895536-3856-4101-b7ce-bf6dbf92e48d/audio/8f066db1-f812-4bb0-a697-b8872e46861e/default_tc.mp3?aid=rss_feed&amp;feed=0XHaP_ro"/>
      <itunes:title>General Frank McKenzie - chat:CYBR — Episode 3</itunes:title>
      <itunes:author>Global and National Security Institute, James Jacobs, Ernie Ferraresso, USF, Jordan Deiuliis, Cyber Florida, Cristina Solis, General (Ret.) Frank McKenzie</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/dcd85eaa-7d50-4b20-bead-4d1a9e405faa/3000x3000/episode-3-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:54</itunes:duration>
      <itunes:summary>In this episode of Chat:CYBR, General Frank McKenzie discusses cyber warfare as a new domain and offers valuable insight on the concepts of cyber deterrence and defense. General McKenzie further discusses the impact of cyber on various aspects of society, including healthcare, transportation, and military operations, and touches on the importance of cyber policy development.
 </itunes:summary>
      <itunes:subtitle>In this episode of Chat:CYBR, General Frank McKenzie discusses cyber warfare as a new domain and offers valuable insight on the concepts of cyber deterrence and defense. General McKenzie further discusses the impact of cyber on various aspects of society, including healthcare, transportation, and military operations, and touches on the importance of cyber policy development.
 </itunes:subtitle>
      <itunes:keywords>cyber domain, critical infrastructure, cyber, terrorist organizations, government, policy development, leadership, government relations, cyber defenses, washington dc, cybersecurity, defense, ai, cyber deterrence, artificial intelligence, cyber attacks, security, cyber warfare, civilian protection, vulnerabilities, criminal elements, cyber policy, national security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
  </channel>
</rss>