<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/WoZubQcU" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>DailyCyber The Truth About Cyber Security with Brandon Krieger</title>
    <description>The DailyCyber Podcast and New Live Stream every Tuesday evening at 5:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don&apos;t miss an episode. 

IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brandon Krieger and do not necessarily represent those of Brandon Krieger&apos;s employer(s).</description>
    <copyright>2019-2026 KNSS Consulting Group Inc. </copyright>
    <language>en</language>
    <pubDate>Sat, 14 Mar 2026 18:25:33 +0000</pubDate>
    <lastBuildDate>Sat, 14 Mar 2026 18:25:44 +0000</lastBuildDate>
    <image>
      <link>https://www.dailycyber.ca</link>
      <title>DailyCyber The Truth About Cyber Security with Brandon Krieger</title>
      <url>https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/2485fdab-98b5-417c-bc2e-5439aaadb3fb/3000x3000/dailycyber-20simplecast-20-20brandon-20krieger-20vciso-20knss-20consulting.jpg?aid=rss_feed</url>
    </image>
    <link>https://www.dailycyber.ca</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>The DailyCyber Podcast and New Live Stream every Tuesday evening at 5:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don&apos;t miss an episode. 

IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brandon Krieger and do not necessarily represent those of Brandon Krieger&apos;s employer(s).</itunes:summary>
    <itunes:author>Brandon Krieger</itunes:author>
    <itunes:explicit>true</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/2485fdab-98b5-417c-bc2e-5439aaadb3fb/3000x3000/dailycyber-20simplecast-20-20brandon-20krieger-20vciso-20knss-20consulting.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/WoZubQcU</itunes:new-feed-url>
    <itunes:keywords>#cybersecurity, #cybersecurityawareness, #cybersecuritynews, #thedailycyber, #brandonkrieger</itunes:keywords>
    <itunes:owner>
      <itunes:name>Brandon Krieger</itunes:name>
      <itunes:email>info@knssconsulting.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <item>
      <guid isPermaLink="false">b82b41f3-a6bf-4324-97f3-4db2f69cb23c</guid>
      <title>Cyber Resilience, AI Threats &amp; MSP Security Blind Spots| DailyCyber 287 with Andrew Scott</title>
      <description><![CDATA[<p>Cyber Resilience, AI Threats & MSP Security Blind Spots| DailyCyber 287 with Andrew Scott</p>
<p> </p>
<p>Cybersecurity threats are evolving faster than many organizations can adapt. MSPs and SMBs are increasingly being targeted by sophisticated attackers using automation, AI-assisted tools, and highly coordinated attack chains that exploit weaknesses across modern IT environments.</p>
<p>In this episode of DailyCyber, Brandon Krieger speaks with Andrew Scott — Field CISO at Todyl — about the real cyber risks facing service providers today and why organizations must rethink how they approach cybersecurity strategy.</p>
<p> </p>
<p><strong>Episode Overview</strong></p>
<p>Cybersecurity has shifted from a prevention-first mindset to one that increasingly focuses on resilience. Attackers are operating faster, using automation and AI to scale attacks, and targeting MSP ecosystems as high-value entry points into multiple organizations.</p>
<p>Andrew Scott shares insights from working directly with MSPs and partners in the field, helping them strengthen their security posture and evolve their cybersecurity strategies. The conversation explores how providers can move beyond prevention-only models toward security architectures designed to detect, respond to, and recover from attacks quickly.</p>
<p>The discussion also examines the rapidly expanding role of artificial intelligence in cybersecurity. While AI is enabling attackers to automate phishing campaigns, reconnaissance, and vulnerability discovery, it is also providing powerful capabilities for defenders to improve detection, automate SOC operations, and strengthen threat intelligence analysis.</p>
<p>Andrew’s experience spans enterprise security architecture, SOC transformation, and threat intelligence leadership across major organizations including Leidos, CrowdStrike, and IBM.</p>
<p>Now working closely with MSPs as a Field CISO at Todyl, Andrew helps organizations rethink their cybersecurity strategy, identify blind spots in their security programs, and adopt modern platforms designed to simplify and strengthen security operations.</p>
<p> </p>
<p><strong>Topics covered:</strong></p>
<p>• The biggest cyber risks facing MSPs and SMBs today</p>
<p>• Why cyber resilience must replace prevention-only security models</p>
<p>• How AI is reshaping both cyber attacks and defensive capabilities</p>
<p>• The blind spots many service providers still overlook</p>
<p> </p>
<p><strong>Guest:</strong></p>
<p>Andrew Scott — Field CISO, Todyl</p>
<p><a href="https://www.linkedin.com/in/andrew-s-8b691729/" rel="noopener noreferrer">https://www.linkedin.com/in/andrew-s-8b691729/</a></p>
<p><a href="https://www.todyl.com" rel="noopener noreferrer">https://www.todyl.com</a></p>
<p> </p>
<p><strong>Host:</strong></p>
<p>Brandon Krieger — CEO & vCISO Advisor</p>
<p><a href="https://www.linkedin.com/in/brandonkrieger" rel="noopener noreferrer">https://www.linkedin.com/in/brandonkrieger</a></p>
<p><a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
<p> </p>
<p><strong>Listen to the podcast:</strong></p>
<p>DailyCyber.ca</p>
]]></description>
      <pubDate>Sat, 14 Mar 2026 18:25:33 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger, Andrew Scott)</author>
      <link>https://www.dailycyber.ca/episodes/cyber-resilience-ai-threats-msp-security-blind-spots-dailycyber-287-with-andrew-scott-Ac2bK4Zp</link>
      <content:encoded><![CDATA[<p>Cyber Resilience, AI Threats & MSP Security Blind Spots| DailyCyber 287 with Andrew Scott</p>
<p> </p>
<p>Cybersecurity threats are evolving faster than many organizations can adapt. MSPs and SMBs are increasingly being targeted by sophisticated attackers using automation, AI-assisted tools, and highly coordinated attack chains that exploit weaknesses across modern IT environments.</p>
<p>In this episode of DailyCyber, Brandon Krieger speaks with Andrew Scott — Field CISO at Todyl — about the real cyber risks facing service providers today and why organizations must rethink how they approach cybersecurity strategy.</p>
<p> </p>
<p><strong>Episode Overview</strong></p>
<p>Cybersecurity has shifted from a prevention-first mindset to one that increasingly focuses on resilience. Attackers are operating faster, using automation and AI to scale attacks, and targeting MSP ecosystems as high-value entry points into multiple organizations.</p>
<p>Andrew Scott shares insights from working directly with MSPs and partners in the field, helping them strengthen their security posture and evolve their cybersecurity strategies. The conversation explores how providers can move beyond prevention-only models toward security architectures designed to detect, respond to, and recover from attacks quickly.</p>
<p>The discussion also examines the rapidly expanding role of artificial intelligence in cybersecurity. While AI is enabling attackers to automate phishing campaigns, reconnaissance, and vulnerability discovery, it is also providing powerful capabilities for defenders to improve detection, automate SOC operations, and strengthen threat intelligence analysis.</p>
<p>Andrew’s experience spans enterprise security architecture, SOC transformation, and threat intelligence leadership across major organizations including Leidos, CrowdStrike, and IBM.</p>
<p>Now working closely with MSPs as a Field CISO at Todyl, Andrew helps organizations rethink their cybersecurity strategy, identify blind spots in their security programs, and adopt modern platforms designed to simplify and strengthen security operations.</p>
<p> </p>
<p><strong>Topics covered:</strong></p>
<p>• The biggest cyber risks facing MSPs and SMBs today</p>
<p>• Why cyber resilience must replace prevention-only security models</p>
<p>• How AI is reshaping both cyber attacks and defensive capabilities</p>
<p>• The blind spots many service providers still overlook</p>
<p> </p>
<p><strong>Guest:</strong></p>
<p>Andrew Scott — Field CISO, Todyl</p>
<p><a href="https://www.linkedin.com/in/andrew-s-8b691729/" rel="noopener noreferrer">https://www.linkedin.com/in/andrew-s-8b691729/</a></p>
<p><a href="https://www.todyl.com" rel="noopener noreferrer">https://www.todyl.com</a></p>
<p> </p>
<p><strong>Host:</strong></p>
<p>Brandon Krieger — CEO & vCISO Advisor</p>
<p><a href="https://www.linkedin.com/in/brandonkrieger" rel="noopener noreferrer">https://www.linkedin.com/in/brandonkrieger</a></p>
<p><a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
<p> </p>
<p><strong>Listen to the podcast:</strong></p>
<p>DailyCyber.ca</p>
]]></content:encoded>
      <enclosure length="60332698" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/media/audio/transcoded/ab0e1578-947c-4364-a14d-dc7d0b00719d/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/audio/group/1f542a9a-59a6-41c0-a274-8282225c26c3/group-item/28feda36-0f0c-49e2-93f3-03017018b28d/128_default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Cyber Resilience, AI Threats &amp; MSP Security Blind Spots| DailyCyber 287 with Andrew Scott</itunes:title>
      <itunes:author>Brandon Krieger, Andrew Scott</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/7d7e50d5-8058-44e7-8d8f-f7039cbce5ff/3000x3000/cyber_resilience_ai_threats_msp_security_blind_spots_dailycyber_287_with_andrew_scott_watch_now_simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>01:02:50</itunes:duration>
      <itunes:summary>Cyber Resilience, AI Threats &amp; MSP Security Blind Spots| DailyCyber 287 with Andrew Scott

Cybersecurity threats are evolving faster than many organizations can adapt. MSPs and SMBs are increasingly being targeted by sophisticated attackers using automation, AI-assisted tools, and highly coordinated attack chains that exploit weaknesses across modern IT environments.

In this episode of DailyCyber, Brandon Krieger speaks with Andrew Scott — Field CISO at Todyl — about the real cyber risks facing service providers today and why organizations must rethink how they approach cybersecurity strategy.</itunes:summary>
      <itunes:subtitle>Cyber Resilience, AI Threats &amp; MSP Security Blind Spots| DailyCyber 287 with Andrew Scott

Cybersecurity threats are evolving faster than many organizations can adapt. MSPs and SMBs are increasingly being targeted by sophisticated attackers using automation, AI-assisted tools, and highly coordinated attack chains that exploit weaknesses across modern IT environments.

In this episode of DailyCyber, Brandon Krieger speaks with Andrew Scott — Field CISO at Todyl — about the real cyber risks facing service providers today and why organizations must rethink how they approach cybersecurity strategy.</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #msp, #andrewscott, #todyl, #soc, #threatintelligence, #brandonkrieger, #zerotrust, #dailycyber, #cybersecurity, #knssconsulting</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>87</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7447dec2-ce32-4137-af48-cb1cf90fd6c1</guid>
      <title>Quantum Threats, Zero Trust &amp; the Future of Network Security | DailyCyber 286 with Andrew Gault</title>
      <description><![CDATA[<p><strong>Quantum Threats, Zero Trust & the Future of Network Security </strong>| DailyCyber 286 with Andrew Gault ~ Watch Now ~ </p>
<p>In this episode of DailyCyber, Brandon Krieger is joined by Andrew Gault, CEO of ZeroTier, to examine whether quantum computing represents a real cybersecurity threat today or remains theoretical.</p>
<p>The conversation explores what quantum computing could break within current encryption standards, why infrastructure providers should be planning now, and how modern zero trust architecture must evolve in response.</p>
<p>Topics include:</p>
<p>• The realism of quantum cybersecurity risk</p>
<p>• Vulnerabilities in today’s cryptographic stack</p>
<p>• Infrastructure planning for post-quantum security</p>
<p>• CISO strategy for 2026</p>
<p>• Zero trust implications</p>
<p> </p>
<p>Guest: Andrew Gault — CEO, ZeroTier</p>
<p><a href="https://www.linkedin.com/in/andrewgault/" rel="noopener noreferrer">https://www.linkedin.com/in/andrewgault/</a></p>
<p><a href="https://www.zerotier.com/" rel="noopener noreferrer">https://www.zerotier.com/</a></p>
<p> </p>
<p>Host: Brandon Krieger — CEO & vCISO Advisor</p>
<p><a href="https://www.linkedin.com/in/brandonkrieger" rel="noopener noreferrer">https://www.linkedin.com/in/brandonkrieger</a></p>
<p><a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
<p> </p>
<p>Watch: <a href="https://www.youtube.com/BrandonKrieger" rel="noopener noreferrer">https://www.youtube.com/BrandonKrieger</a></p>
<p>Listen: <a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
]]></description>
      <pubDate>Sat, 7 Mar 2026 17:11:23 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger, Andrew Gault)</author>
      <link>https://www.dailycyber.ca/episodes/quantum-threats-zero-trust-the-future-of-network-security-dailycyber-286-with-andrew-gault-Vy6ZazjK</link>
      <content:encoded><![CDATA[<p><strong>Quantum Threats, Zero Trust & the Future of Network Security </strong>| DailyCyber 286 with Andrew Gault ~ Watch Now ~ </p>
<p>In this episode of DailyCyber, Brandon Krieger is joined by Andrew Gault, CEO of ZeroTier, to examine whether quantum computing represents a real cybersecurity threat today or remains theoretical.</p>
<p>The conversation explores what quantum computing could break within current encryption standards, why infrastructure providers should be planning now, and how modern zero trust architecture must evolve in response.</p>
<p>Topics include:</p>
<p>• The realism of quantum cybersecurity risk</p>
<p>• Vulnerabilities in today’s cryptographic stack</p>
<p>• Infrastructure planning for post-quantum security</p>
<p>• CISO strategy for 2026</p>
<p>• Zero trust implications</p>
<p> </p>
<p>Guest: Andrew Gault — CEO, ZeroTier</p>
<p><a href="https://www.linkedin.com/in/andrewgault/" rel="noopener noreferrer">https://www.linkedin.com/in/andrewgault/</a></p>
<p><a href="https://www.zerotier.com/" rel="noopener noreferrer">https://www.zerotier.com/</a></p>
<p> </p>
<p>Host: Brandon Krieger — CEO & vCISO Advisor</p>
<p><a href="https://www.linkedin.com/in/brandonkrieger" rel="noopener noreferrer">https://www.linkedin.com/in/brandonkrieger</a></p>
<p><a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
<p> </p>
<p>Watch: <a href="https://www.youtube.com/BrandonKrieger" rel="noopener noreferrer">https://www.youtube.com/BrandonKrieger</a></p>
<p>Listen: <a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
]]></content:encoded>
      <enclosure length="62538280" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/media/audio/transcoded/ab0e1578-947c-4364-a14d-dc7d0b00719d/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/audio/group/417c3eab-e06d-44a4-a8b3-24e636a655c0/group-item/001cdd95-8cc8-4a63-8bbb-da1281a45d51/128_default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Quantum Threats, Zero Trust &amp; the Future of Network Security | DailyCyber 286 with Andrew Gault</itunes:title>
      <itunes:author>Brandon Krieger, Andrew Gault</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/455d74a6-864d-436e-978c-6ea43196d775/3000x3000/quantum_computing_encryption_risk_zero_trust_architecture_dailycyber_286_with_andrew_gault_watch_now_simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>01:05:08</itunes:duration>
      <itunes:summary>Quantum Threats, Zero Trust &amp; the Future of Network Security | DailyCyber 286 with Andrew Gault ~ Watch Now ~ 

In this episode of DailyCyber, Brandon Krieger is joined by Andrew Gault, CEO of ZeroTier, to examine whether quantum computing represents a real cybersecurity threat today or remains theoretical.</itunes:summary>
      <itunes:subtitle>Quantum Threats, Zero Trust &amp; the Future of Network Security | DailyCyber 286 with Andrew Gault ~ Watch Now ~ 

In this episode of DailyCyber, Brandon Krieger is joined by Andrew Gault, CEO of ZeroTier, to examine whether quantum computing represents a real cybersecurity threat today or remains theoretical.</itunes:subtitle>
      <itunes:keywords>#cyberleadership, knssconsulting, #encryptionrisk, #enterprisesecurity, #zerotrustarchitecture, #quantumsecurity, brandonkrieger, #dailycyber268, #zeroteir</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>86</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ba8c0fc8-771c-4958-b3e5-096b522866b7</guid>
      <title>Web3, Government Adoption &amp; the Future of Scalable Blockchain | DailyCyber 285 with Jeff Mahony</title>
      <description><![CDATA[<p>Web3, Government Adoption & the Future of Scalable Blockchain | DailyCyber 285 with Jeff Mahony</p>
<p>Blockchain has moved beyond experimentation. Governments and enterprises are now evaluating how decentralized technologies can support national infrastructure, financial systems, and next-generation digital economies.</p>
<p>In this episode of DailyCyber, Brandon Krieger speaks with Jeff Mahony, Chief Architect of RYTChain, about scalable blockchain architecture, patented consensus mechanisms, and what it truly takes to onboard the next billion users securely.</p>
<p>Jeff brings more than three decades of experience in fintech, defense, predictive modeling, and enterprise systems architecture. His work on RYT’s Proof of Majority mechanism reflects a systems-oriented approach to transparency, scalability, and security in Web3 environments.</p>
<p>Topics covered:</p>
<p>• The challenges of scaling blockchain for enterprise and government</p>
<p>• How Proof of Majority differs from traditional consensus models</p>
<p>• Nation-level blockchain pilots and digital identity implications</p>
<p>• Security risks in decentralized infrastructure</p>
<p>• Integrating Web3 principles into financial ecosystems</p>
<p>• The future of AI, decentralization, and digital governance</p>
<p> </p>
<p>Guest:</p>
<p>Jeff Mahony — Chief Architect, RYTChain</p>
<p><a href="https://www.linkedin.com/in/jeff-mahony-ba8a591/" rel="noopener noreferrer">https://www.linkedin.com/in/jeff-mahony-ba8a591/</a></p>
<p> </p>
<p>Host:</p>
<p>Brandon Krieger — CEO & vCISO Advisor</p>
<p><a href="https://www.linkedin.com/in/brandonkrieger" rel="noopener noreferrer">https://www.linkedin.com/in/brandonkrieger</a></p>
<p><a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
<p> </p>
<p>📅 Tuesday</p>
<p>🕔 5:00 PM EST</p>
<p>📺 youtube.com/BrandonKrieger</p>
<p> </p>
<p>Listen to the podcast:</p>
<p><a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
<p> </p>
]]></description>
      <pubDate>Sat, 21 Feb 2026 19:40:24 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/web3-government-adoption-the-future-of-scalable-blockchain-dailycyber-285-with-jeff-mahony-4BLihFCR</link>
      <content:encoded><![CDATA[<p>Web3, Government Adoption & the Future of Scalable Blockchain | DailyCyber 285 with Jeff Mahony</p>
<p>Blockchain has moved beyond experimentation. Governments and enterprises are now evaluating how decentralized technologies can support national infrastructure, financial systems, and next-generation digital economies.</p>
<p>In this episode of DailyCyber, Brandon Krieger speaks with Jeff Mahony, Chief Architect of RYTChain, about scalable blockchain architecture, patented consensus mechanisms, and what it truly takes to onboard the next billion users securely.</p>
<p>Jeff brings more than three decades of experience in fintech, defense, predictive modeling, and enterprise systems architecture. His work on RYT’s Proof of Majority mechanism reflects a systems-oriented approach to transparency, scalability, and security in Web3 environments.</p>
<p>Topics covered:</p>
<p>• The challenges of scaling blockchain for enterprise and government</p>
<p>• How Proof of Majority differs from traditional consensus models</p>
<p>• Nation-level blockchain pilots and digital identity implications</p>
<p>• Security risks in decentralized infrastructure</p>
<p>• Integrating Web3 principles into financial ecosystems</p>
<p>• The future of AI, decentralization, and digital governance</p>
<p> </p>
<p>Guest:</p>
<p>Jeff Mahony — Chief Architect, RYTChain</p>
<p><a href="https://www.linkedin.com/in/jeff-mahony-ba8a591/" rel="noopener noreferrer">https://www.linkedin.com/in/jeff-mahony-ba8a591/</a></p>
<p> </p>
<p>Host:</p>
<p>Brandon Krieger — CEO & vCISO Advisor</p>
<p><a href="https://www.linkedin.com/in/brandonkrieger" rel="noopener noreferrer">https://www.linkedin.com/in/brandonkrieger</a></p>
<p><a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
<p> </p>
<p>📅 Tuesday</p>
<p>🕔 5:00 PM EST</p>
<p>📺 youtube.com/BrandonKrieger</p>
<p> </p>
<p>Listen to the podcast:</p>
<p><a href="https://www.DailyCyber.ca" rel="noopener noreferrer">https://www.DailyCyber.ca</a></p>
<p> </p>
]]></content:encoded>
      <enclosure length="58305188" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/media/audio/transcoded/ab0e1578-947c-4364-a14d-dc7d0b00719d/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/audio/group/0f9ef83e-c71f-4f5d-83ac-1f6c3e295db7/group-item/18e9969b-c312-4e64-9296-d2b7732770ea/128_default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Web3, Government Adoption &amp; the Future of Scalable Blockchain | DailyCyber 285 with Jeff Mahony</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/470a4c17-3807-4ad8-9490-c9ae5c4e1170/3000x3000/web3_government_adoption_the_future_of_scalable_blockchain_dailycyber_285_with_jeff_mahony_watch_now_simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:44</itunes:duration>
      <itunes:summary>Web3, Government Adoption &amp; the Future of Scalable Blockchain | DailyCyber 285 with Jeff Mahony

Blockchain has moved beyond experimentation. Governments and enterprises are now evaluating how decentralized technologies can support national infrastructure, financial systems, and next-generation digital economies.

In this episode of DailyCyber, Brandon Krieger speaks with Jeff Mahony, Chief Architect of RYTChain, about scalable blockchain architecture, patented consensus mechanisms, and what it truly takes to onboard the next billion users securely.

Jeff brings more than three decades of experience in fintech, defense, predictive modeling, and enterprise systems architecture. His work on RYT’s Proof of Majority mechanism reflects a systems-oriented approach to transparency, scalability, and security in Web3 environments.</itunes:summary>
      <itunes:subtitle>Web3, Government Adoption &amp; the Future of Scalable Blockchain | DailyCyber 285 with Jeff Mahony

Blockchain has moved beyond experimentation. Governments and enterprises are now evaluating how decentralized technologies can support national infrastructure, financial systems, and next-generation digital economies.

In this episode of DailyCyber, Brandon Krieger speaks with Jeff Mahony, Chief Architect of RYTChain, about scalable blockchain architecture, patented consensus mechanisms, and what it truly takes to onboard the next billion users securely.

Jeff brings more than three decades of experience in fintech, defense, predictive modeling, and enterprise systems architecture. His work on RYT’s Proof of Majority mechanism reflects a systems-oriented approach to transparency, scalability, and security in Web3 environments.</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>85</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8dbd6951-522f-4dfd-bd43-e889ee994073</guid>
      <title>Modern Scams, AI Impersonation &amp; the New Cybercrime Economy | DailyCyber 284 with Chris Nyhuis</title>
      <description><![CDATA[<p><strong>Modern Scams, AI Impersonation & the New Cybercrime Economy | DailyCyber 284 with Chris Nyhuis</strong></p><p>Cybercrime has entered a new phase — one driven by automation, AI impersonation, and criminal ecosystems that operate like legitimate software businesses.</p><p>In this live episode of <i>DailyCyber</i>, Brandon Krieger speaks with <strong>Chris Nyhuis</strong>, CEO and Co-Founder of Vigilant, about how scams now work, why tech-savvy consumers are increasingly targeted, and what practical steps individuals can take to protect themselves in 2026.</p><p> </p><p>Chris brings more than three decades of cybersecurity leadership, multiple patented innovations, and direct experience partnering with law enforcement to dismantle cybercrime and trafficking networks.</p><p> </p><p><strong>Topics covered:</strong></p><p>• Why Gen-Z is being targeted for cybercrime</p><p>• How criminals sell scam tools, bots, and scripts like SaaS products</p><p>• Fake AI agents impersonating banks, retailers, and payment platforms</p><p>• Multi-stage scams combining tech support, spoofed bank calls, and fake government agents</p><p>• Why scams are expanding beyond seniors</p><p>• Practical protection steps for money, identity, and devices</p><p> </p><p><strong>Guest: </strong>Chris Nyhuis — CEO & Co-Founder, Vigilant</p><p><a href="https://www.linkedin.com/in/chris-nyhuis-34427550/">https://www.linkedin.com/in/chris-nyhuis-34427550/</a></p><p> </p><p><strong>Host: </strong>Brandon Krieger — CEO & vCISO Advisor</p><p><a href="https://www.linkedin.com/in/brandonkrieger">https://www.linkedin.com/in/brandonkrieger</a></p><p><a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p><p> </p><p>Watch live or on replay:</p><p><a href="https://www.youtube.com/BrandonKrieger">https://www.youtube.com/BrandonKrieger</a></p><p> </p><p>Listen to the podcast:</p><p><a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p>
]]></description>
      <pubDate>Sat, 7 Feb 2026 10:05:33 +0000</pubDate>
      <author>info@knssconsulting.com (Chris Nyhuis, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/modern-scams-ai-impersonation-the-new-cybercrime-economy-dailycyber-284-with-chris-nyhuis-7zdj8gbd-gJ26pr0t</link>
      <content:encoded><![CDATA[<p><strong>Modern Scams, AI Impersonation & the New Cybercrime Economy | DailyCyber 284 with Chris Nyhuis</strong></p><p>Cybercrime has entered a new phase — one driven by automation, AI impersonation, and criminal ecosystems that operate like legitimate software businesses.</p><p>In this live episode of <i>DailyCyber</i>, Brandon Krieger speaks with <strong>Chris Nyhuis</strong>, CEO and Co-Founder of Vigilant, about how scams now work, why tech-savvy consumers are increasingly targeted, and what practical steps individuals can take to protect themselves in 2026.</p><p> </p><p>Chris brings more than three decades of cybersecurity leadership, multiple patented innovations, and direct experience partnering with law enforcement to dismantle cybercrime and trafficking networks.</p><p> </p><p><strong>Topics covered:</strong></p><p>• Why Gen-Z is being targeted for cybercrime</p><p>• How criminals sell scam tools, bots, and scripts like SaaS products</p><p>• Fake AI agents impersonating banks, retailers, and payment platforms</p><p>• Multi-stage scams combining tech support, spoofed bank calls, and fake government agents</p><p>• Why scams are expanding beyond seniors</p><p>• Practical protection steps for money, identity, and devices</p><p> </p><p><strong>Guest: </strong>Chris Nyhuis — CEO & Co-Founder, Vigilant</p><p><a href="https://www.linkedin.com/in/chris-nyhuis-34427550/">https://www.linkedin.com/in/chris-nyhuis-34427550/</a></p><p> </p><p><strong>Host: </strong>Brandon Krieger — CEO & vCISO Advisor</p><p><a href="https://www.linkedin.com/in/brandonkrieger">https://www.linkedin.com/in/brandonkrieger</a></p><p><a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p><p> </p><p>Watch live or on replay:</p><p><a href="https://www.youtube.com/BrandonKrieger">https://www.youtube.com/BrandonKrieger</a></p><p> </p><p>Listen to the podcast:</p><p><a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p>
]]></content:encoded>
      <enclosure length="72060576" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/06bb2eca-71ec-4717-8b90-909fecca4566/audio/5b029215-ff6d-4530-99c3-cd3c2e3a55c0/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Modern Scams, AI Impersonation &amp; the New Cybercrime Economy | DailyCyber 284 with Chris Nyhuis</itunes:title>
      <itunes:author>Chris Nyhuis, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/93232718-cbbc-4f54-9003-efbc94dd14a0/3000x3000/modern-20scams-20ai-20impersonation-20and-20the-20new-20cybercrime-20economy-20-20dailycyber-20284-20with-20chris-20nyhuis-20-20watch-20now-20-20-20simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>01:15:03</itunes:duration>
      <itunes:summary>Modern Scams, AI Impersonation &amp; the New Cybercrime Economy | DailyCyber 284 with Chris Nyhuis
Cybercrime has entered a new phase — one driven by automation, AI impersonation, and criminal ecosystems that operate like legitimate software businesses.
In this live episode of DailyCyber, Brandon Krieger speaks with Chris Nyhuis, CEO and Co-Founder of Vigilant, about how scams now work, why tech-savvy consumers are increasingly targeted, and what practical steps individuals can take to protect themselves in 2026.</itunes:summary>
      <itunes:subtitle>Modern Scams, AI Impersonation &amp; the New Cybercrime Economy | DailyCyber 284 with Chris Nyhuis
Cybercrime has entered a new phase — one driven by automation, AI impersonation, and criminal ecosystems that operate like legitimate software businesses.
In this live episode of DailyCyber, Brandon Krieger speaks with Chris Nyhuis, CEO and Co-Founder of Vigilant, about how scams now work, why tech-savvy consumers are increasingly targeted, and what practical steps individuals can take to protect themselves in 2026.</itunes:subtitle>
      <itunes:keywords>#cybercrime, #fraud, #aiimpersonation, #leadership, #cybersecuritypodcast, #dailycyber284</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>84</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e542f178-7799-402c-acbb-94bf0c5cab65</guid>
      <title>The Human Blindspot &amp; Behavioral Security with Robert Siciliano | DailyCyber 283</title>
      <description><![CDATA[<p><strong>DailyCyber 283 — The Human Blindspot, AI Fraud & Behavioral Security with Robert Siciliano</strong></p><p>In this episode of <i>DailyCyber</i>, Brandon Krieger is joined by <strong>Robert Siciliano</strong>, CEO of ProtectNow LLC and architect of <strong>The Strategic Human Firewall™</strong>, to discuss why human behavior is now the dominant cybersecurity risk.</p><p>Robert explains how AI-driven fraud exploits trust and urgency, why personal security habits matter in corporate environments, and how leaders can move beyond tools to build effective behavioral governance.</p><p> </p><p><strong>Episode topics include:</strong></p><p>• The Human Blindspot and AI deception</p><p>• Personal security as the foundation of corporate security</p><p>• Speed and secrecy indicators in BEC attacks</p><p>• Leadership’s role in preventing fraud</p><p>• Making security training stick through engagement</p><p> </p><p><strong>Guest:</strong> Robert Siciliano — ProtectNow LLC</p><p><strong>Host:</strong> Brandon Krieger — CEO & vCISO Advisor</p><p>Watch: <a href="https://www.youtube.com/BrandonKrieger">https://www.youtube.com/BrandonKrieger</a></p><p>Listen: <a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p>
]]></description>
      <pubDate>Sat, 31 Jan 2026 13:21:43 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger, Robert Siciliano)</author>
      <link>https://www.dailycyber.ca/episodes/the-human-blindspot-behavioral-security-with-robert-siciliano-dailycyber-283-viqdouqn-B8hp0bVN</link>
      <content:encoded><![CDATA[<p><strong>DailyCyber 283 — The Human Blindspot, AI Fraud & Behavioral Security with Robert Siciliano</strong></p><p>In this episode of <i>DailyCyber</i>, Brandon Krieger is joined by <strong>Robert Siciliano</strong>, CEO of ProtectNow LLC and architect of <strong>The Strategic Human Firewall™</strong>, to discuss why human behavior is now the dominant cybersecurity risk.</p><p>Robert explains how AI-driven fraud exploits trust and urgency, why personal security habits matter in corporate environments, and how leaders can move beyond tools to build effective behavioral governance.</p><p> </p><p><strong>Episode topics include:</strong></p><p>• The Human Blindspot and AI deception</p><p>• Personal security as the foundation of corporate security</p><p>• Speed and secrecy indicators in BEC attacks</p><p>• Leadership’s role in preventing fraud</p><p>• Making security training stick through engagement</p><p> </p><p><strong>Guest:</strong> Robert Siciliano — ProtectNow LLC</p><p><strong>Host:</strong> Brandon Krieger — CEO & vCISO Advisor</p><p>Watch: <a href="https://www.youtube.com/BrandonKrieger">https://www.youtube.com/BrandonKrieger</a></p><p>Listen: <a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p>
]]></content:encoded>
      <enclosure length="57755125" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/0fb6016b-5d95-4cc9-bb41-5dbee7cb7ee2/audio/f941bcc8-4bed-429a-a769-73888a5b810e/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>The Human Blindspot &amp; Behavioral Security with Robert Siciliano | DailyCyber 283</itunes:title>
      <itunes:author>Brandon Krieger, Robert Siciliano</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/6d7e02f8-bf0b-458f-bbf7-e9a0406f9fd9/3000x3000/the-20human-20blindspot-20ai-20fraud-20and-20behavioral-20security-20with-20robert-20siciliano-20-20dailycyber-20283-20-20watch-20now-20-20simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:09</itunes:duration>
      <itunes:summary>DailyCyber 283 — The Human Blindspot, AI Fraud &amp; Behavioral Security with Robert Siciliano

In this episode of DailyCyber, Brandon Krieger is joined by Robert Siciliano, CEO of ProtectNow LLC and architect of The Strategic Human Firewall™, to discuss why human behavior is now the dominant cybersecurity risk.

Robert explains how AI-driven fraud exploits trust and urgency, why personal security habits matter in corporate environments, and how leaders can move beyond tools to build effective behavioral governance.</itunes:summary>
      <itunes:subtitle>DailyCyber 283 — The Human Blindspot, AI Fraud &amp; Behavioral Security with Robert Siciliano

In this episode of DailyCyber, Brandon Krieger is joined by Robert Siciliano, CEO of ProtectNow LLC and architect of The Strategic Human Firewall™, to discuss why human behavior is now the dominant cybersecurity risk.

Robert explains how AI-driven fraud exploits trust and urgency, why personal security habits matter in corporate environments, and how leaders can move beyond tools to build effective behavioral governance.</itunes:subtitle>
      <itunes:keywords>#securitypodcast, #aithreats, #bec, #leadership, #dailycyber283, #cybersecurity, #humanrisk</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>83</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">923bd220-42a7-4e0c-92da-c8d0b38df97f</guid>
      <title>Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya</title>
      <description><![CDATA[<p><strong>Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I sit down with <strong>Oscar Hedaya</strong>, founder and inventor of <strong>The Space Safe</strong>, the world’s first next-generation connected safe designed to bridge the gap between <strong>physical security</strong> and <strong>modern cyber threats</strong>.</p><p>For decades, safes have barely changed. Oscar set out to fix that — by designing a safe that incorporates <strong>WiFi, cameras, sensors, real-time event visibility, and a mobile app</strong> to bring physical protection into the connected era.</p><p>But with innovation comes new questions: does adding connectivity make a safe <i>less secure</i>?</p><p>Do people still need safes in a world that uses less cash?</p><p>And how do you build trust in a product designed to protect what matters most?</p><p>This episode is ideal for cybersecurity leaders, product designers, IoT professionals, and anyone interested in the convergence of hardware and cyber risk.</p><p> </p><p><strong>🔥 Topics We Discuss</strong></p><p><strong>1️⃣ Does modernizing a safe introduce new cyber risks?</strong></p><p>• How threat modeling changes when adding connectivity</p><p>• Why traditional safes fail in modern environments</p><p>• Balancing usability and security-by-design</p><p><strong>2️⃣ Why The Space Safe </strong><i><strong>doesn’t allow remote unlocking</strong></i></p><p>• Exploit scenarios involving remote access</p><p>• Why user safety takes priority over convenience</p><p>• Physical control as a non-negotiable design rule</p><p><strong>3️⃣ Are WiFi-enabled safes hackable?</strong></p><p>• Misconceptions about IoT security</p><p>• Architecture decisions to isolate critical components</p><p>• Why “connected” doesn’t mean “remotely breachable”</p><p><strong>4️⃣ Why not just use a safe + camera?</strong></p><p>• The integration problem</p><p>• Why separate devices leave gaps in awareness</p><p>• The advantage of unified monitoring and real-time detection</p><p><strong>5️⃣ Do people still need safes in a world with less cash?</strong></p><p>• Securing valuables beyond money: identity documents, medication, digital assets, jewelry</p><p>• Why hotels and businesses still rely on safe storage</p><p>• Peace of mind as a technology challenge</p><p><strong>👤 Guest Info</strong></p><p><strong>Oscar Hedaya – Founder & Inventor, The Space Safe</strong></p><p>Website: <a href="https://www.thespacesafe.com">https://www.thespacesafe.com</a></p><p>LinkedIn: <a href="https://www.linkedin.com/in/ohedaya">https://www.linkedin.com/in/ohedaya</a></p><p><strong>👤 Host</strong></p><p><strong>Brandon Krieger — CEO & vCISO Advisor</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/brandonkrieger">https://www.linkedin.com/in/brandonkrieger</a></p><p>Website: <a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p><p>📺 <strong>Watch more episodes:</strong></p><p>YouTube: <a href="https://www.youtube.com/BrandonKrieger">https://www.youtube.com/BrandonKrieger</a></p><p>🎧 <strong>Listen on the go:</strong></p><p>DailyCyber Podcast: <a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p><p>👇 Comment below — Would <i>you</i> trust a connected safe?</p>
]]></description>
      <pubDate>Sun, 14 Dec 2025 20:44:11 +0000</pubDate>
      <author>info@knssconsulting.com (Oscar Hedaya, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/reinventing-physical-security-in-a-cyber-driven-world-dailycyber-282-with-oscar-hedaya-wylz0s7I</link>
      <content:encoded><![CDATA[<p><strong>Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I sit down with <strong>Oscar Hedaya</strong>, founder and inventor of <strong>The Space Safe</strong>, the world’s first next-generation connected safe designed to bridge the gap between <strong>physical security</strong> and <strong>modern cyber threats</strong>.</p><p>For decades, safes have barely changed. Oscar set out to fix that — by designing a safe that incorporates <strong>WiFi, cameras, sensors, real-time event visibility, and a mobile app</strong> to bring physical protection into the connected era.</p><p>But with innovation comes new questions: does adding connectivity make a safe <i>less secure</i>?</p><p>Do people still need safes in a world that uses less cash?</p><p>And how do you build trust in a product designed to protect what matters most?</p><p>This episode is ideal for cybersecurity leaders, product designers, IoT professionals, and anyone interested in the convergence of hardware and cyber risk.</p><p> </p><p><strong>🔥 Topics We Discuss</strong></p><p><strong>1️⃣ Does modernizing a safe introduce new cyber risks?</strong></p><p>• How threat modeling changes when adding connectivity</p><p>• Why traditional safes fail in modern environments</p><p>• Balancing usability and security-by-design</p><p><strong>2️⃣ Why The Space Safe </strong><i><strong>doesn’t allow remote unlocking</strong></i></p><p>• Exploit scenarios involving remote access</p><p>• Why user safety takes priority over convenience</p><p>• Physical control as a non-negotiable design rule</p><p><strong>3️⃣ Are WiFi-enabled safes hackable?</strong></p><p>• Misconceptions about IoT security</p><p>• Architecture decisions to isolate critical components</p><p>• Why “connected” doesn’t mean “remotely breachable”</p><p><strong>4️⃣ Why not just use a safe + camera?</strong></p><p>• The integration problem</p><p>• Why separate devices leave gaps in awareness</p><p>• The advantage of unified monitoring and real-time detection</p><p><strong>5️⃣ Do people still need safes in a world with less cash?</strong></p><p>• Securing valuables beyond money: identity documents, medication, digital assets, jewelry</p><p>• Why hotels and businesses still rely on safe storage</p><p>• Peace of mind as a technology challenge</p><p><strong>👤 Guest Info</strong></p><p><strong>Oscar Hedaya – Founder & Inventor, The Space Safe</strong></p><p>Website: <a href="https://www.thespacesafe.com">https://www.thespacesafe.com</a></p><p>LinkedIn: <a href="https://www.linkedin.com/in/ohedaya">https://www.linkedin.com/in/ohedaya</a></p><p><strong>👤 Host</strong></p><p><strong>Brandon Krieger — CEO & vCISO Advisor</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/brandonkrieger">https://www.linkedin.com/in/brandonkrieger</a></p><p>Website: <a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p><p>📺 <strong>Watch more episodes:</strong></p><p>YouTube: <a href="https://www.youtube.com/BrandonKrieger">https://www.youtube.com/BrandonKrieger</a></p><p>🎧 <strong>Listen on the go:</strong></p><p>DailyCyber Podcast: <a href="https://www.DailyCyber.ca">https://www.DailyCyber.ca</a></p><p>👇 Comment below — Would <i>you</i> trust a connected safe?</p>
]]></content:encoded>
      <enclosure length="51649876" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/8b6aa168-5797-491a-b4b6-8313b20ebf81/audio/5aa1f01e-24d3-46b0-aa6f-881bddf8613a/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya</itunes:title>
      <itunes:author>Oscar Hedaya, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/fa464483-27aa-4af6-8a00-f9627f313d2f/3000x3000/reinventing-20physical-20security-20in-20a-20cyber-driven-20world-20-20dailycyber-20282-20with-20oscar-20hedaya-20-20simple-20cast.jpg?aid=rss_feed"/>
      <itunes:duration>00:53:48</itunes:duration>
      <itunes:summary>Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~

In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world’s first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats.
For decades, safes have barely changed. Oscar set out to fix that — by designing a safe that incorporates WiFi, cameras, sensors, real-time event visibility, and a mobile app to bring physical protection into the connected era.
But with innovation comes new questions: does adding connectivity make a safe less secure?
Do people still need safes in a world that uses less cash?
And how do you build trust in a product designed to protect what matters most?
This episode is ideal for cybersecurity leaders, product designers, IoT professionals, and anyone interested in the convergence of hardware and cyber risk.</itunes:summary>
      <itunes:subtitle>Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~

In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world’s first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats.
For decades, safes have barely changed. Oscar set out to fix that — by designing a safe that incorporates WiFi, cameras, sensors, real-time event visibility, and a mobile app to bring physical protection into the connected era.
But with innovation comes new questions: does adding connectivity make a safe less secure?
Do people still need safes in a world that uses less cash?
And how do you build trust in a product designed to protect what matters most?
This episode is ideal for cybersecurity leaders, product designers, IoT professionals, and anyone interested in the convergence of hardware and cyber risk.</itunes:subtitle>
      <itunes:keywords>hotel safes, threat modeling, space safe review, cyber risk, cybersecurity podcast, brandon krieger, the space safe, home safes, physical security, iot security, connected safe, hardware security, dailycyber, product security</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>82</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ef5fd06c-f058-4afb-8dc3-5b3c8ab6ee3b</guid>
      <title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~</title>
      <description><![CDATA[<p><strong>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~</strong></p><p>In this AMA edition of <i>DailyCyber</i>, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios.</p><p>This episode is packed with insights on mindset, leadership, communication, and technical decision-making.</p><p> </p><p><strong>🔥 Topics Covered</strong></p><p><strong>1️⃣ How I Rebuilt Income After a Layoff</strong></p><p>• Turning a setback into a strategy</p><p>• Building momentum when everything restarts at zero</p><p>• Leveraging relationships without “selling”</p><p>• Mindset shifts for resilience in cybersecurity careers</p><p><strong>2️⃣ How I Rebuilt My Cybersecurity Consulting Business</strong></p><p>• The vCISO model and packaging expertise</p><p>• How to identify ideal clients</p><p>• Retainer building & predictable revenue</p><p>• Why trust, clarity, and specialization win</p><p><strong>3️⃣ How To Sell a SIEM To Your Board — Quantify Downtime</strong></p><p>• Boards buy <i>business outcomes</i>, not logs</p><p>• Framing SIEM value in terms of downtime, legal exposure, and financial impact</p><p>• Metrics that resonate with executives</p><p>• How to turn risk language into business language</p><p><strong>4️⃣ Immediate Actions After an Account Compromise — And Why</strong></p><p>• Session invalidation</p><p>• Identity isolation</p><p>• MFA & token checks</p><p>• Reviewing cloud logs and lateral movement indicators</p><p>• Rebuilding trust in the identity</p><p><strong>5️⃣ When Fortinet Looks Like a Cyber Threat</strong></p><p>• Why some Fortinet behavior resembles attacker traffic</p><p>• Logging quirks that cause SOC confusion</p><p>• Detecting real threats vs benign appliance behavior</p><p>• How to improve tool context for analysts</p><p> </p><p>👤 <strong>Host:</strong></p><p><strong>Brandon Krieger — CEO & vCISO Advisor</strong></p><p>🔗 <a href="http://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the episode: youtube.com/BrandonKrieger</p><p>🎧 Listen: DailyCyber.ca</p><p>👇 Share your questions — another AMA is coming soon.</p><p> </p>
]]></description>
      <pubDate>Sun, 7 Dec 2025 12:48:20 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ask-me-anything-vciso-strategy-ir-and-cyber-leadership-dailycyber-281-watch-now-JYHNCDEd</link>
      <content:encoded><![CDATA[<p><strong>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~</strong></p><p>In this AMA edition of <i>DailyCyber</i>, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios.</p><p>This episode is packed with insights on mindset, leadership, communication, and technical decision-making.</p><p> </p><p><strong>🔥 Topics Covered</strong></p><p><strong>1️⃣ How I Rebuilt Income After a Layoff</strong></p><p>• Turning a setback into a strategy</p><p>• Building momentum when everything restarts at zero</p><p>• Leveraging relationships without “selling”</p><p>• Mindset shifts for resilience in cybersecurity careers</p><p><strong>2️⃣ How I Rebuilt My Cybersecurity Consulting Business</strong></p><p>• The vCISO model and packaging expertise</p><p>• How to identify ideal clients</p><p>• Retainer building & predictable revenue</p><p>• Why trust, clarity, and specialization win</p><p><strong>3️⃣ How To Sell a SIEM To Your Board — Quantify Downtime</strong></p><p>• Boards buy <i>business outcomes</i>, not logs</p><p>• Framing SIEM value in terms of downtime, legal exposure, and financial impact</p><p>• Metrics that resonate with executives</p><p>• How to turn risk language into business language</p><p><strong>4️⃣ Immediate Actions After an Account Compromise — And Why</strong></p><p>• Session invalidation</p><p>• Identity isolation</p><p>• MFA & token checks</p><p>• Reviewing cloud logs and lateral movement indicators</p><p>• Rebuilding trust in the identity</p><p><strong>5️⃣ When Fortinet Looks Like a Cyber Threat</strong></p><p>• Why some Fortinet behavior resembles attacker traffic</p><p>• Logging quirks that cause SOC confusion</p><p>• Detecting real threats vs benign appliance behavior</p><p>• How to improve tool context for analysts</p><p> </p><p>👤 <strong>Host:</strong></p><p><strong>Brandon Krieger — CEO & vCISO Advisor</strong></p><p>🔗 <a href="http://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the episode: youtube.com/BrandonKrieger</p><p>🎧 Listen: DailyCyber.ca</p><p>👇 Share your questions — another AMA is coming soon.</p><p> </p>
]]></content:encoded>
      <enclosure length="52920994" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/90f56dd1-9653-44d5-b718-67f22b589c52/audio/1b417031-2d9f-4395-bd54-45032ee017b2/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/b177056b-a1b0-4b5b-8d04-f3d140fcb17f/3000x3000/ask-20me-20anything-20vciso-20strategy-20ir-20and-20cyber-20leadership-20-20dailycyber-20281-20-20watch-20now-20-20-20simple-20cast-20template.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:07</itunes:duration>
      <itunes:summary>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~

In this AMA edition of DailyCyber, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios. This episode is packed with insights on mindset, leadership, communication, and technical decision-making.
</itunes:summary>
      <itunes:subtitle>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~

In this AMA edition of DailyCyber, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios. This episode is packed with insights on mindset, leadership, communication, and technical decision-making.
</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7684a8be-9193-4fcd-a843-086407288c5a</guid>
      <title>The Explosion of Security Data &amp; Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~</title>
      <description><![CDATA[<p><strong>The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~</strong></p><p>In this episode of <i>DailyCyber</i>, I sit down with <strong>Joshua Scott</strong>, VP of Security at <strong>Hydrolix</strong>, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product security.</p><p>Joshua has built and led security programs in every major function — from enterprise GRC and security engineering to cloud security, DevSecOps, threat detection, incident response, IAM, and data governance. Today, he leads security for Hydrolix, a platform built to help organizations query terabytes to petabytes of security data <i>at speed</i>.</p><p>This episode is for CISOs, vCISOs, architects, analysts, SOC leads, and anyone trying to navigate today’s overwhelming security landscape.</p><p> </p><p><strong>🔐 What We Discuss:</strong></p><p><strong>1️⃣ Why Has the Amount of Security Exploded?</strong></p><p>• Tool sprawl across endpoint, cloud, data, identities & apps</p><p>• AI, cloud, SaaS, microservices — multiplying the attack surface</p><p>• The shift from logs → events → telemetry → full-fidelity everything</p><p><strong>2️⃣ When Did This Explosion Start — And What Triggered It?</strong></p><p>• Cloud acceleration as the main catalyst</p><p>• Compliance frameworks multiplying requirements</p><p>• The “everything must be logged” mindset</p><p>• GenAI widening the data gap even further</p><p><strong>3️⃣ The Headaches: Complexity, Noise & Burnout</strong></p><p>• Detection engineering overload</p><p>• Noisy SIEMs and high ingestion bills</p><p>• Cloud logs, identity logs, app logs — everywhere</p><p>• Why teams burn out before they innovate</p><p><strong>4️⃣ What Companies Should Do to Fix This</strong></p><p>• Consolidation and prioritization</p><p>• Building minimum viable detection</p><p>• Logging with intention — not “log everything”</p><p>• Risk-driven filtering & smart data pipelines</p><p><strong>5️⃣ How Hydrolix Helps Teams Analyze Massive Datasets Fast</strong></p><p>• Querying petabyte-scale data <i>in seconds</i></p><p>• Reducing cost + noise</p><p>• Empowering analysts and IR teams with usable data</p><p>• Why scalable data architecture is the real future of detection</p><p> </p><p>👤 <strong>Guest Info:</strong></p><p>🔗 Hydrolix: <a href="https://hydrolix.io">https://hydrolix.io</a></p><p>🔗 LinkedIn: <a href="https://www.linkedin.com/in/joshuascott">https://www.linkedin.com/in/joshuascott</a></p><p> </p><p>👤 <strong>Hosted by:</strong></p><p><strong>Brandon Krieger – CEO & vCISO Advisor</strong></p><p>🔗 <a href="http://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the full episode: youtube.com/BrandonKrieger</p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Leave a comment — What security data challenge is overwhelming you the most right now?</p>
]]></description>
      <pubDate>Sat, 22 Nov 2025 14:56:35 +0000</pubDate>
      <author>info@knssconsulting.com (Joshua Scot, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/the-explosion-of-security-data-modern-detection-with-joshua-scott-dailycyber-280-watch-now-TE_w_mYB</link>
      <content:encoded><![CDATA[<p><strong>The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~</strong></p><p>In this episode of <i>DailyCyber</i>, I sit down with <strong>Joshua Scott</strong>, VP of Security at <strong>Hydrolix</strong>, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product security.</p><p>Joshua has built and led security programs in every major function — from enterprise GRC and security engineering to cloud security, DevSecOps, threat detection, incident response, IAM, and data governance. Today, he leads security for Hydrolix, a platform built to help organizations query terabytes to petabytes of security data <i>at speed</i>.</p><p>This episode is for CISOs, vCISOs, architects, analysts, SOC leads, and anyone trying to navigate today’s overwhelming security landscape.</p><p> </p><p><strong>🔐 What We Discuss:</strong></p><p><strong>1️⃣ Why Has the Amount of Security Exploded?</strong></p><p>• Tool sprawl across endpoint, cloud, data, identities & apps</p><p>• AI, cloud, SaaS, microservices — multiplying the attack surface</p><p>• The shift from logs → events → telemetry → full-fidelity everything</p><p><strong>2️⃣ When Did This Explosion Start — And What Triggered It?</strong></p><p>• Cloud acceleration as the main catalyst</p><p>• Compliance frameworks multiplying requirements</p><p>• The “everything must be logged” mindset</p><p>• GenAI widening the data gap even further</p><p><strong>3️⃣ The Headaches: Complexity, Noise & Burnout</strong></p><p>• Detection engineering overload</p><p>• Noisy SIEMs and high ingestion bills</p><p>• Cloud logs, identity logs, app logs — everywhere</p><p>• Why teams burn out before they innovate</p><p><strong>4️⃣ What Companies Should Do to Fix This</strong></p><p>• Consolidation and prioritization</p><p>• Building minimum viable detection</p><p>• Logging with intention — not “log everything”</p><p>• Risk-driven filtering & smart data pipelines</p><p><strong>5️⃣ How Hydrolix Helps Teams Analyze Massive Datasets Fast</strong></p><p>• Querying petabyte-scale data <i>in seconds</i></p><p>• Reducing cost + noise</p><p>• Empowering analysts and IR teams with usable data</p><p>• Why scalable data architecture is the real future of detection</p><p> </p><p>👤 <strong>Guest Info:</strong></p><p>🔗 Hydrolix: <a href="https://hydrolix.io">https://hydrolix.io</a></p><p>🔗 LinkedIn: <a href="https://www.linkedin.com/in/joshuascott">https://www.linkedin.com/in/joshuascott</a></p><p> </p><p>👤 <strong>Hosted by:</strong></p><p><strong>Brandon Krieger – CEO & vCISO Advisor</strong></p><p>🔗 <a href="http://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the full episode: youtube.com/BrandonKrieger</p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Leave a comment — What security data challenge is overwhelming you the most right now?</p>
]]></content:encoded>
      <enclosure length="58730163" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/f4f984df-9b55-4ad6-8216-2ee9e4f46be8/audio/b4899544-bf36-4731-90a7-78580f246102/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>The Explosion of Security Data &amp; Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~</itunes:title>
      <itunes:author>Joshua Scot, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/32e6ff70-23f0-4a6e-aff5-c3fd6747a0a9/3000x3000/the-20explosion-20of-20security-20data-20and-20modern-20detection-20-7c-20joshua-20scott-20-7c-20dailycyber-20280-20-20watch-20now-20-20simple-20cast.jpg?aid=rss_feed"/>
      <itunes:duration>01:01:10</itunes:duration>
      <itunes:summary>In this episode of DailyCyber, I sit down with Joshua Scott, VP of Security at Hydrolix, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product security.

Joshua has built and led security programs in every major function — from enterprise GRC and security engineering to cloud security, DevSecOps, threat detection, incident response, IAM, and data governance. Today, he leads security for Hydrolix, a platform built to help organizations query terabytes to petabytes of security data at speed.

This episode is for CISOs, vCISOs, architects, analysts, SOC leads, and anyone trying to navigate today’s overwhelming security landscape.</itunes:summary>
      <itunes:subtitle>In this episode of DailyCyber, I sit down with Joshua Scott, VP of Security at Hydrolix, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product security.

Joshua has built and led security programs in every major function — from enterprise GRC and security engineering to cloud security, DevSecOps, threat detection, incident response, IAM, and data governance. Today, he leads security for Hydrolix, a platform built to help organizations query terabytes to petabytes of security data at speed.

This episode is for CISOs, vCISOs, architects, analysts, SOC leads, and anyone trying to navigate today’s overwhelming security landscape.</itunes:subtitle>
      <itunes:keywords>#cloudsecurity, #securitypodcast, #securitydata, #siem, #hydrolix, #securityanalytics, #securityoperations, #detectionengineering, #vciso, #ciso, #dailycyber280, #loganalytics, #cybersecurity, #securityleadership</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2ecf97d8-3e3f-4847-8f6b-f314e1a41a98</guid>
      <title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~</title>
      <description><![CDATA[<p><strong>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~</strong></p><p>In this AMA edition of <i>DailyCyber</i>, we go deep on what’s actually happening in cybersecurity leadership today.</p><p>From emotional regulation in the SOC to unapproved AI tools in the workplace, this episode unpacks the <i>real conversations</i> CISOs and vCISOs are having behind closed doors.</p><p>🔥 <strong>Topics Covered:</strong></p><p><strong>1️⃣ Don’t Paste This Into ChatGPT — A Work-Safe AI Warning</strong></p><ul><li>Why public AI tools can leak sensitive data.</li><li>How Shadow AI is creating hidden organizational risk.</li><li>Safe policies for innovation without exposure.</li></ul><p><strong>2️⃣ How To Be The Calm In The Storm — Psychology & Emotions in Security</strong></p><ul><li>Managing stress, burnout, and leadership tone under fire.</li><li>How nervous system regulation improves decision quality.</li><li>Emotional resilience as a cybersecurity skillset.</li></ul><p><strong>3️⃣ How To Use AI To Prepare For a Cybersecurity Interview</strong></p><ul><li>Using AI to practice, research, and rehearse — safely.</li><li>The right way to integrate AI feedback for interview prep.</li><li>Balancing authenticity with automation.</li></ul><p><strong>4️⃣ Right-Sizing Security — Stop Checkbox Compliance</strong></p><ul><li>Why “audit-ready” ≠ “attack-ready.”</li><li>How to build a security program that actually works.</li><li>The business case for maturity over compliance theater.</li></ul><p><strong>5️⃣ Shadow AI Is Everywhere — How Employees Secretly Use It</strong></p><ul><li>Employees are bringing AI into workflows — often unknowingly.</li><li>How to detect and guide safe AI use.</li><li>Building trust and governance instead of fear-driven restrictions.</li></ul><p> </p><p>👤 <strong>Hosted by:</strong></p><p><strong>Brandon Krieger – CEO & vCISO Advisor</strong></p><p>🔗 <a href="https://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Join the conversation — what’s your biggest cybersecurity challenge right now?</p><p> </p>
]]></description>
      <pubDate>Sun, 9 Nov 2025 18:42:58 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ask-me-anything-vciso-strategy-ir-and-cyber-leadership-dailycyber-279-watch-now-ztKVRVkn</link>
      <content:encoded><![CDATA[<p><strong>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~</strong></p><p>In this AMA edition of <i>DailyCyber</i>, we go deep on what’s actually happening in cybersecurity leadership today.</p><p>From emotional regulation in the SOC to unapproved AI tools in the workplace, this episode unpacks the <i>real conversations</i> CISOs and vCISOs are having behind closed doors.</p><p>🔥 <strong>Topics Covered:</strong></p><p><strong>1️⃣ Don’t Paste This Into ChatGPT — A Work-Safe AI Warning</strong></p><ul><li>Why public AI tools can leak sensitive data.</li><li>How Shadow AI is creating hidden organizational risk.</li><li>Safe policies for innovation without exposure.</li></ul><p><strong>2️⃣ How To Be The Calm In The Storm — Psychology & Emotions in Security</strong></p><ul><li>Managing stress, burnout, and leadership tone under fire.</li><li>How nervous system regulation improves decision quality.</li><li>Emotional resilience as a cybersecurity skillset.</li></ul><p><strong>3️⃣ How To Use AI To Prepare For a Cybersecurity Interview</strong></p><ul><li>Using AI to practice, research, and rehearse — safely.</li><li>The right way to integrate AI feedback for interview prep.</li><li>Balancing authenticity with automation.</li></ul><p><strong>4️⃣ Right-Sizing Security — Stop Checkbox Compliance</strong></p><ul><li>Why “audit-ready” ≠ “attack-ready.”</li><li>How to build a security program that actually works.</li><li>The business case for maturity over compliance theater.</li></ul><p><strong>5️⃣ Shadow AI Is Everywhere — How Employees Secretly Use It</strong></p><ul><li>Employees are bringing AI into workflows — often unknowingly.</li><li>How to detect and guide safe AI use.</li><li>Building trust and governance instead of fear-driven restrictions.</li></ul><p> </p><p>👤 <strong>Hosted by:</strong></p><p><strong>Brandon Krieger – CEO & vCISO Advisor</strong></p><p>🔗 <a href="https://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Join the conversation — what’s your biggest cybersecurity challenge right now?</p><p> </p>
]]></content:encoded>
      <enclosure length="57673916" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/c2ee64aa-39dc-4f06-90ce-774966bbbabe/audio/6e6e3e87-53b6-4f29-9b86-31f64113ccf6/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/09ca0ff7-77d6-4f22-a8d0-bdaa9da15e2b/3000x3000/ask-20me-20anything-20vciso-20strategy-20-20ir-20-20and-20cyber-20leadership-20-7c-20dailycyber-20279-20-simple-20cast-20template.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:04</itunes:duration>
      <itunes:summary>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~

In this AMA edition of DailyCyber, we go deep on what’s actually happening in cybersecurity leadership today.
From emotional regulation in the SOC to unapproved AI tools in the workplace, this episode unpacks the real conversations CISOs and vCISOs are having behind closed doors.
</itunes:summary>
      <itunes:subtitle>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~

In this AMA edition of DailyCyber, we go deep on what’s actually happening in cybersecurity leadership today.
From emotional regulation in the SOC to unapproved AI tools in the workplace, this episode unpacks the real conversations CISOs and vCISOs are having behind closed doors.
</itunes:subtitle>
      <itunes:keywords>#securitypodcast, #incidentresponse, #aithreats, #dailycyber279, #shadowai, #riskmanagement, #leadership, #vciso, #ciso, #resilience, #cybersecurity, #cyberpsychology</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a4471d9c-82f5-4788-a448-be8f455c799a</guid>
      <title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 278 ~ Watch Now ~</title>
      <description><![CDATA[<p>In this AMA edition of <i>DailyCyber</i>, I explore the challenges and opportunities defining the next wave of cybersecurity leadership.</p><p>From AI threats to emotional intelligence, this session breaks down what’s shaping 2025’s security landscape — and how to stay ahead.</p><p> </p><p>🔥 <strong>What We’ll Cover:</strong></p><p>1️⃣ <strong>AI-Driven Threats & Deepfakes</strong></p><p>– How attackers are using AI to manipulate trust</p><p>– What leaders can do to strengthen detection and awareness</p><p>2️⃣ <strong>The Evolution of Cyber Leadership</strong></p><p>– Why emotional intelligence matters more than technical control</p><p>– How the CISO role continues to expand into business strategy</p><p>3️⃣ <strong>Third-Party Risk & Vendor Due Diligence</strong></p><p>– Why security questionnaires are getting tougher</p><p>– How to build transparency and accountability across partners</p><p>4️⃣ <strong>Incident Response & Automation</strong></p><p>– How speed and strategy must coexist</p><p>– Leveraging AI tools for faster containment and triage</p><p>5️⃣ <strong>The Future of Cyber Risk</strong></p><p>– What resilience means in 2025 and beyond</p><p>– Why adaptability is the most critical skill in cybersecurity</p><p> </p><p>👤 <strong>Hosted by:</strong></p><p><strong>Brandon Krieger – CEO & vCISO Advisor</strong></p><p>🔗 <a href="https://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave your questions and join the conversation in the comments!</p>
]]></description>
      <pubDate>Sun, 26 Oct 2025 22:07:25 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ask-me-anything-vciso-strategy-ir-and-cyber-leadership-dailycyber-278-watch-now-c_ja9v3e</link>
      <content:encoded><![CDATA[<p>In this AMA edition of <i>DailyCyber</i>, I explore the challenges and opportunities defining the next wave of cybersecurity leadership.</p><p>From AI threats to emotional intelligence, this session breaks down what’s shaping 2025’s security landscape — and how to stay ahead.</p><p> </p><p>🔥 <strong>What We’ll Cover:</strong></p><p>1️⃣ <strong>AI-Driven Threats & Deepfakes</strong></p><p>– How attackers are using AI to manipulate trust</p><p>– What leaders can do to strengthen detection and awareness</p><p>2️⃣ <strong>The Evolution of Cyber Leadership</strong></p><p>– Why emotional intelligence matters more than technical control</p><p>– How the CISO role continues to expand into business strategy</p><p>3️⃣ <strong>Third-Party Risk & Vendor Due Diligence</strong></p><p>– Why security questionnaires are getting tougher</p><p>– How to build transparency and accountability across partners</p><p>4️⃣ <strong>Incident Response & Automation</strong></p><p>– How speed and strategy must coexist</p><p>– Leveraging AI tools for faster containment and triage</p><p>5️⃣ <strong>The Future of Cyber Risk</strong></p><p>– What resilience means in 2025 and beyond</p><p>– Why adaptability is the most critical skill in cybersecurity</p><p> </p><p>👤 <strong>Hosted by:</strong></p><p><strong>Brandon Krieger – CEO & vCISO Advisor</strong></p><p>🔗 <a href="https://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave your questions and join the conversation in the comments!</p>
]]></content:encoded>
      <enclosure length="50992421" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/1844699f-6507-48bf-8780-204c8d64e591/audio/ae62a381-b1bd-4838-ae78-bfa023f31360/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 278 ~ Watch Now ~</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/5d2787bf-e776-497b-8daa-cbd7b5ba7fda/3000x3000/ask-20me-20anything-20vciso-20strategy-20ir-20and-20cyber-20leadership-20-7c-20dailycyber-20278-20-20watch-20now-20-20simple-20cast.jpg?aid=rss_feed"/>
      <itunes:duration>00:53:06</itunes:duration>
      <itunes:summary>In this AMA edition of DailyCyber, I explore the challenges and opportunities defining the next wave of cybersecurity leadership.
From AI threats to emotional intelligence, this session breaks down what’s shaping 2025’s security landscape — and how to stay ahead.</itunes:summary>
      <itunes:subtitle>In this AMA edition of DailyCyber, I explore the challenges and opportunities defining the next wave of cybersecurity leadership.
From AI threats to emotional intelligence, this session breaks down what’s shaping 2025’s security landscape — and how to stay ahead.</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #cyberleadership, #securitypodcast, #incidentresponse, #aithreats, #riskmanagement, #brandonkrieger, #ama, #vciso, #ciso, #cybersecurity, #dailycyber278</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3abcc5ee-5cb6-461a-a7c6-cf86a8932132</guid>
      <title>Reverse Engineering, AI, and the Economics of Malware with Danny Quist| DailyCyber 277  ~Watch Now ~</title>
      <description><![CDATA[<p>AI, Reverse Engineering & the Economics of Malware | Danny Quist | DailyCyber 277 ~ Watch Now ~</p><p>In this episode of <i>DailyCyber</i>, I sit down with <strong>Danny Quist</strong>, Chief Technology Officer at <strong>PolySwarm</strong>, to unpack the intersection of AI, reverse engineering, and cybersecurity economics.</p><p>Danny brings nearly two decades of experience leading research and analysis teams at Redacted, Bechtel, MIT Lincoln Laboratory, and Los Alamos National Laboratory. As a Ph.D. in Computer Science and educator at New Mexico Tech, he bridges deep technical expertise with practical guidance for cybersecurity professionals.</p><p> </p><p>🔥 <strong>What we discussed:</strong></p><p>1️⃣ <strong>AI & Reverse Engineering</strong></p><p>– How AI is transforming malware and software analysis</p><p>– What the future looks like for defenders and reverse engineers</p><p>2️⃣ <strong>Demystifying Cybersecurity’s “Dark Arts”</strong></p><p>– Teaching complex topics like reverse engineering in an accessible way</p><p>– How to guide teams through frustration and failure</p><p>3️⃣ <strong>Software Supply Chain Complexity</strong></p><p>– Verifying what commercial software actually does</p><p>– The new challenges of trust in third-party code</p><p>4️⃣ <strong>Cybersecurity Economics</strong></p><p>– The financial logic that keeps malware profitable</p><p>– How the industry can disrupt malicious incentive structures</p><p> </p><p>👤 <strong>Guest:</strong></p><p><strong>Danny Quist</strong> – Chief Technology Officer, PolySwarm</p><p>🔗 <a href="https://www.linkedin.com/in/dannyquist">https://www.linkedin.com/in/dannyquist</a></p><p>🔗 <a href="https://polyswarm.io">https://polyswarm.io</a></p><p> </p><p>👤 <strong>Hosted by:</strong></p><p><strong>Brandon Krieger</strong> – CEO & vCISO Advisor</p><p>🔗 <a href="https://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave your thoughts or questions in the comments!</p>
]]></description>
      <pubDate>Sat, 18 Oct 2025 13:00:00 +0000</pubDate>
      <author>info@knssconsulting.com (Danny Quist, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/reverse-engineering-ai-and-the-economics-of-malware-with-danny-quist-dailycyber-277-watch-now-zowg6eV3</link>
      <content:encoded><![CDATA[<p>AI, Reverse Engineering & the Economics of Malware | Danny Quist | DailyCyber 277 ~ Watch Now ~</p><p>In this episode of <i>DailyCyber</i>, I sit down with <strong>Danny Quist</strong>, Chief Technology Officer at <strong>PolySwarm</strong>, to unpack the intersection of AI, reverse engineering, and cybersecurity economics.</p><p>Danny brings nearly two decades of experience leading research and analysis teams at Redacted, Bechtel, MIT Lincoln Laboratory, and Los Alamos National Laboratory. As a Ph.D. in Computer Science and educator at New Mexico Tech, he bridges deep technical expertise with practical guidance for cybersecurity professionals.</p><p> </p><p>🔥 <strong>What we discussed:</strong></p><p>1️⃣ <strong>AI & Reverse Engineering</strong></p><p>– How AI is transforming malware and software analysis</p><p>– What the future looks like for defenders and reverse engineers</p><p>2️⃣ <strong>Demystifying Cybersecurity’s “Dark Arts”</strong></p><p>– Teaching complex topics like reverse engineering in an accessible way</p><p>– How to guide teams through frustration and failure</p><p>3️⃣ <strong>Software Supply Chain Complexity</strong></p><p>– Verifying what commercial software actually does</p><p>– The new challenges of trust in third-party code</p><p>4️⃣ <strong>Cybersecurity Economics</strong></p><p>– The financial logic that keeps malware profitable</p><p>– How the industry can disrupt malicious incentive structures</p><p> </p><p>👤 <strong>Guest:</strong></p><p><strong>Danny Quist</strong> – Chief Technology Officer, PolySwarm</p><p>🔗 <a href="https://www.linkedin.com/in/dannyquist">https://www.linkedin.com/in/dannyquist</a></p><p>🔗 <a href="https://polyswarm.io">https://polyswarm.io</a></p><p> </p><p>👤 <strong>Hosted by:</strong></p><p><strong>Brandon Krieger</strong> – CEO & vCISO Advisor</p><p>🔗 <a href="https://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave your thoughts or questions in the comments!</p>
]]></content:encoded>
      <enclosure length="62756196" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/57de0680-adaa-4152-9b08-b7c33a193865/audio/d18e8638-cbfb-4a68-b22a-54b90125442d/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Reverse Engineering, AI, and the Economics of Malware with Danny Quist| DailyCyber 277  ~Watch Now ~</itunes:title>
      <itunes:author>Danny Quist, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/b332fb9e-d153-4f5d-9018-b0dabccb6cda/3000x3000/reverse-20engineering-20ai-20and-20the-20economics-20of-20malware-20with-20danny-20quist-20dailycyber-20277-20-20simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>01:05:22</itunes:duration>
      <itunes:summary>AI, Reverse Engineering &amp; the Economics of Malware | Danny Quist | DailyCyber 277 ~ Watch Now ~

In this episode of DailyCyber, I sit down with Danny Quist, Chief Technology Officer at PolySwarm, to unpack the intersection of AI, reverse engineering, and cybersecurity economics.

Danny brings nearly two decades of experience leading research and analysis teams at Redacted, Bechtel, MIT Lincoln Laboratory, and Los Alamos National Laboratory. As a Ph.D. in Computer Science and educator at New Mexico Tech, he bridges deep technical expertise with practical guidance for cybersecurity professionals.

🔥 What we discussed:
1️⃣ AI &amp; Reverse Engineering
– How AI is transforming malware and software analysis
– What the future looks like for defenders and reverse engineers
2️⃣ Demystifying Cybersecurity’s “Dark Arts”
– Teaching complex topics like reverse engineering in an accessible way
– How to guide teams through frustration and failure
3️⃣ Software Supply Chain Complexity
– Verifying what commercial software actually does
– The new challenges of trust in third-party code
4️⃣ Cybersecurity Economics
– The financial logic that keeps malware profitable
– How the industry can disrupt malicious incentive structures</itunes:summary>
      <itunes:subtitle>AI, Reverse Engineering &amp; the Economics of Malware | Danny Quist | DailyCyber 277 ~ Watch Now ~

In this episode of DailyCyber, I sit down with Danny Quist, Chief Technology Officer at PolySwarm, to unpack the intersection of AI, reverse engineering, and cybersecurity economics.

Danny brings nearly two decades of experience leading research and analysis teams at Redacted, Bechtel, MIT Lincoln Laboratory, and Los Alamos National Laboratory. As a Ph.D. in Computer Science and educator at New Mexico Tech, he bridges deep technical expertise with practical guidance for cybersecurity professionals.

🔥 What we discussed:
1️⃣ AI &amp; Reverse Engineering
– How AI is transforming malware and software analysis
– What the future looks like for defenders and reverse engineers
2️⃣ Demystifying Cybersecurity’s “Dark Arts”
– Teaching complex topics like reverse engineering in an accessible way
– How to guide teams through frustration and failure
3️⃣ Software Supply Chain Complexity
– Verifying what commercial software actually does
– The new challenges of trust in third-party code
4️⃣ Cybersecurity Economics
– The financial logic that keeps malware profitable
– How the industry can disrupt malicious incentive structures</itunes:subtitle>
      <itunes:keywords>#securitypodcast, #aithreats, #polyswarm, #reverseengineering, #threatintelligence, #brandonkrieger, #dannyquist, #aiinsecurity, #vciso, #ciso, #cybereconomics, #malwareanalysis, #cybersecurity, #dailycyber277</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">158691fb-1655-4328-9dd8-fcaeb0c7ec81</guid>
      <title>CISO Roles, Talent Crisis &amp; AI Tools with Michael Reichstein | DailyCyber 276 ~ Watch Now ~</title>
      <description><![CDATA[<p><strong>CISO Roles, Talent Crisis & AI Tools | DailyCyber 276 with Michael Reichstein ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I’m joined by <strong>Michael Reichstein</strong>, a global cybersecurity executive with more than 20 years of experience leading security programs across multiple continents. His journey spans military service, enterprise GRC integration, and Fortune 500 leadership. Michael brings a people-first perspective to security, emphasizing communication, culture, and aligning security with business goals.</p><p> </p><p>🔐 What we discuss:</p><p>1️⃣ <strong>The Talent Crisis</strong> – Why the cybersecurity workforce gap keeps growing and what can be done.</p><p>2️⃣ <strong>The CISO Role</strong> – How it’s evolving under pressure from boards, regulators, and AI disruption.</p><p>3️⃣ <strong>The Job Market</strong> – Why security careers are both in demand and unstable in 2025.</p><p>4️⃣ <strong>AI Tool Inflation</strong> – Sorting hype from real value in the flood of AI solutions.</p><p> </p><p>🧠 <strong>Guest Bio:</strong></p><p>Michael Reichstein is a global cybersecurity executive with over two decades of leadership experience across North America, Europe, and beyond. A dual US-German citizen and strongman training enthusiast, Michael has built resilient teams, advanced enterprise security maturity, and believes great security begins with great communication.</p><p> </p><p>📌 Guest: Michael Reichstein, Chief Executive Officer | Chief Information Security Officer</p><p>🔗 <a href="https://quon.tech/">https://quon.tech/</a></p><p>🔗 <a href="https://www.linkedin.com/in/mreichstein">https://www.linkedin.com/in/mreichstein</a></p><p> </p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👤 Host: Brandon Krieger, CEO & vCISO Advisor</p><p> </p><p>👇 Share your takeaways and join the conversation.</p>
]]></description>
      <pubDate>Sat, 11 Oct 2025 10:21:21 +0000</pubDate>
      <author>info@knssconsulting.com (Michael Reichstein, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ciso-roles-talent-crisis-ai-tools-with-michael-reichstein-dailycyber-276-watch-now-BwYm0kVA</link>
      <content:encoded><![CDATA[<p><strong>CISO Roles, Talent Crisis & AI Tools | DailyCyber 276 with Michael Reichstein ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I’m joined by <strong>Michael Reichstein</strong>, a global cybersecurity executive with more than 20 years of experience leading security programs across multiple continents. His journey spans military service, enterprise GRC integration, and Fortune 500 leadership. Michael brings a people-first perspective to security, emphasizing communication, culture, and aligning security with business goals.</p><p> </p><p>🔐 What we discuss:</p><p>1️⃣ <strong>The Talent Crisis</strong> – Why the cybersecurity workforce gap keeps growing and what can be done.</p><p>2️⃣ <strong>The CISO Role</strong> – How it’s evolving under pressure from boards, regulators, and AI disruption.</p><p>3️⃣ <strong>The Job Market</strong> – Why security careers are both in demand and unstable in 2025.</p><p>4️⃣ <strong>AI Tool Inflation</strong> – Sorting hype from real value in the flood of AI solutions.</p><p> </p><p>🧠 <strong>Guest Bio:</strong></p><p>Michael Reichstein is a global cybersecurity executive with over two decades of leadership experience across North America, Europe, and beyond. A dual US-German citizen and strongman training enthusiast, Michael has built resilient teams, advanced enterprise security maturity, and believes great security begins with great communication.</p><p> </p><p>📌 Guest: Michael Reichstein, Chief Executive Officer | Chief Information Security Officer</p><p>🔗 <a href="https://quon.tech/">https://quon.tech/</a></p><p>🔗 <a href="https://www.linkedin.com/in/mreichstein">https://www.linkedin.com/in/mreichstein</a></p><p> </p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👤 Host: Brandon Krieger, CEO & vCISO Advisor</p><p> </p><p>👇 Share your takeaways and join the conversation.</p>
]]></content:encoded>
      <enclosure length="60976526" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/d4eab0a0-d943-4b9b-a253-feb63666608f/audio/005ce4c5-5cc8-48f2-b2ab-c886662c41b0/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>CISO Roles, Talent Crisis &amp; AI Tools with Michael Reichstein | DailyCyber 276 ~ Watch Now ~</itunes:title>
      <itunes:author>Michael Reichstein, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/307b9703-3618-4ad5-8306-128ae72a8af5/3000x3000/ciso-20roles-20talent-20crisis-20and-20ai-20tools-20with-20michael-20reichstein-20-20dailycyber-20276-20-20watch-20now-20-20simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>01:03:31</itunes:duration>
      <itunes:summary>CISO Roles, Talent Crisis &amp; AI Tools | DailyCyber 276 with Michael Reichstein ~ Watch Now ~

In this episode of DailyCyber, I’m joined by Michael Reichstein, a global cybersecurity executive with more than 20 years of experience leading security programs across multiple continents. His journey spans military service, enterprise GRC integration, and Fortune 500 leadership. Michael brings a people-first perspective to security, emphasizing communication, culture, and aligning security with business goals.

🔐 What we discuss:
1️⃣ The Talent Crisis – Why the cybersecurity workforce gap keeps growing and what can be done.
2️⃣ The CISO Role – How it’s evolving under pressure from boards, regulators, and AI disruption.
3️⃣ The Job Market – Why security careers are both in demand and unstable in 2025.
4️⃣ AI Tool Inflation – Sorting hype from real value in the flood of AI solutions.
</itunes:summary>
      <itunes:subtitle>CISO Roles, Talent Crisis &amp; AI Tools | DailyCyber 276 with Michael Reichstein ~ Watch Now ~

In this episode of DailyCyber, I’m joined by Michael Reichstein, a global cybersecurity executive with more than 20 years of experience leading security programs across multiple continents. His journey spans military service, enterprise GRC integration, and Fortune 500 leadership. Michael brings a people-first perspective to security, emphasizing communication, culture, and aligning security with business goals.

🔐 What we discuss:
1️⃣ The Talent Crisis – Why the cybersecurity workforce gap keeps growing and what can be done.
2️⃣ The CISO Role – How it’s evolving under pressure from boards, regulators, and AI disruption.
3️⃣ The Job Market – Why security careers are both in demand and unstable in 2025.
4️⃣ AI Tool Inflation – Sorting hype from real value in the flood of AI solutions.
</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #cyberleadership, #securitypodcast, #talentcrisis, #aitools, #michaelreichstein, #cyberjobs, #brandonkrieger, #ciso, #cybersecurity, #dailycyber276, #cyberawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4bd28481-b1fa-40ea-ae14-e997cea06c12</guid>
      <title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~</title>
      <description><![CDATA[<p><strong>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~</strong></p><p> </p><p>In this AMA edition of DailyCyber, I break down some of the most pressing issues in cybersecurity today. No guest—just me sharing unfiltered insights from the frontlines of vCISO advisory and leadership.</p><p> </p><p>🔥 <strong>What we cover in this AMA:</strong></p><p>1️⃣ The Cybersecurity Talent Shortage & Burnout Crisis</p><p>– Why the global skills gap keeps growing</p><p>– How burnout is reshaping the workforce</p><p>– Creative strategies for retention and resilience</p><p>2️⃣ Shadow IT & SaaS Sprawl – The Hidden Security Risk</p><p>– Why unauthorized apps and tools create blind spots</p><p>– How to regain visibility and control</p><p>– Shifting the culture from security-as-blocker to enabler</p><p>3️⃣ Third-Party Risk & the Supply Chain Security Gap</p><p>– Why attackers love vendor ecosystems</p><p>– The growing demand for security questionnaires</p><p>– How to balance compliance vs. real resilience</p><p>4️⃣ Cloud Security Myths That Put Companies at Risk</p><p>– Why “the cloud provider secures everything” is a dangerous myth</p><p>– Common misconfigurations that cause breaches</p><p>– Affordable security wins for SMBs</p><p>5️⃣ Cybersecurity Leadership in the Age of AI</p><p>– Balancing hype vs. reality in AI tools</p><p>– How attackers are weaponizing AI</p><p>– Building responsible AI governance in security programs</p><p> </p><p>👤 Hosted by:</p><p>Brandon Krieger – CEO & vCISO Advisor</p><p>🔗 <a href="http://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave your thoughts or questions in the comments!</p><p> </p><p>#DailyCyber275, #BrandonKrieger, #CyberSecurity, #vCISO, #IncidentResponse, #CyberLeadership, #Compliance, #SMBSecurity, #CloudSecurity, #AIThreats, #SecurityPodcast, #AMA</p>
]]></description>
      <pubDate>Sat, 20 Sep 2025 04:00:00 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ask-me-anything-vciso-strategy-ir-and-cyber-leadership-dailycyber-275-watch-now-beAEIfHn</link>
      <content:encoded><![CDATA[<p><strong>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~</strong></p><p> </p><p>In this AMA edition of DailyCyber, I break down some of the most pressing issues in cybersecurity today. No guest—just me sharing unfiltered insights from the frontlines of vCISO advisory and leadership.</p><p> </p><p>🔥 <strong>What we cover in this AMA:</strong></p><p>1️⃣ The Cybersecurity Talent Shortage & Burnout Crisis</p><p>– Why the global skills gap keeps growing</p><p>– How burnout is reshaping the workforce</p><p>– Creative strategies for retention and resilience</p><p>2️⃣ Shadow IT & SaaS Sprawl – The Hidden Security Risk</p><p>– Why unauthorized apps and tools create blind spots</p><p>– How to regain visibility and control</p><p>– Shifting the culture from security-as-blocker to enabler</p><p>3️⃣ Third-Party Risk & the Supply Chain Security Gap</p><p>– Why attackers love vendor ecosystems</p><p>– The growing demand for security questionnaires</p><p>– How to balance compliance vs. real resilience</p><p>4️⃣ Cloud Security Myths That Put Companies at Risk</p><p>– Why “the cloud provider secures everything” is a dangerous myth</p><p>– Common misconfigurations that cause breaches</p><p>– Affordable security wins for SMBs</p><p>5️⃣ Cybersecurity Leadership in the Age of AI</p><p>– Balancing hype vs. reality in AI tools</p><p>– How attackers are weaponizing AI</p><p>– Building responsible AI governance in security programs</p><p> </p><p>👤 Hosted by:</p><p>Brandon Krieger – CEO & vCISO Advisor</p><p>🔗 <a href="http://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave your thoughts or questions in the comments!</p><p> </p><p>#DailyCyber275, #BrandonKrieger, #CyberSecurity, #vCISO, #IncidentResponse, #CyberLeadership, #Compliance, #SMBSecurity, #CloudSecurity, #AIThreats, #SecurityPodcast, #AMA</p>
]]></content:encoded>
      <enclosure length="52832173" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/47727ee0-bcf0-45d0-8862-9e6131ac628e/audio/d4f9ea72-3565-445e-b0e6-4da273254ee2/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/20abebc2-f11a-4967-b927-a3868f77cc4b/3000x3000/ask-20me-20anything-20-20vciso-20strategy-20ir-20and-20cyber-20leadership-20-20dailycyber-20275-20-20simple-20cast-20.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:01</itunes:duration>
      <itunes:summary>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~

In this AMA edition of DailyCyber, I break down some of the most pressing issues in cybersecurity today. No guest—just me sharing unfiltered insights from the frontlines of vCISO advisory and leadership.</itunes:summary>
      <itunes:subtitle>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~

In this AMA edition of DailyCyber, I break down some of the most pressing issues in cybersecurity today. No guest—just me sharing unfiltered insights from the frontlines of vCISO advisory and leadership.</itunes:subtitle>
      <itunes:keywords>#cloudsecurity, #cyberleadership, #securitypodcast, #incidentresponse, #aithreats, #compliance, #brandonkrieger, #ama, #vciso, #smbsecurity, #dailycyber275, #cybersecurity</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4d004b5d-b256-483c-98d2-2ef6c2079fc4</guid>
      <title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 274 ~ Watch Now ~</title>
      <description><![CDATA[<p><strong>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 274 ~ Watch Now ~</strong></p><p> </p><p>In this special AMA edition of DailyCyber, I take your questions and dig into the hottest issues facing cybersecurity leaders today. No guest—just unfiltered insights from the frontlines of vCISO work.</p><p> </p><p>🔥 <strong>What we cover in this AMA:</strong></p><p>1️⃣ SMB security—minimum essentials every business needs</p><p>2️⃣ Why vendors and partners are demanding more detailed security questionnaires</p><p>3️⃣ Incident response—speed vs strategy when ransomware hits</p><p>4️⃣ AI-powered phishing & deepfakes—what leaders must prepare for</p><p>5️⃣ vCISO realities—what it takes to succeed as a fractional security leader</p><p> </p><p>🧠 Bonus: I’ll also cover <strong>breaking cyber news</strong>, including:</p><ul><li>Jaguar Land Rover’s recent <strong>cyber incident</strong> disrupting production</li><li>Warnings on <strong>autonomous AI attacks</strong> from threat researchers</li><li><strong>September Patch Tuesday</strong> and critical Microsoft/Adobe updates</li><li>Reports on <strong>burnout in cybersecurity teams</strong></li></ul><p> </p><p>👤 Hosted by:</p><p>Brandon Krieger – CEO & vCISO Advisor</p><p>🔗 <a href="http://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave your questions or comments below—let’s keep the conversation going!</p><p> </p>
]]></description>
      <pubDate>Sun, 14 Sep 2025 15:46:45 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ask-me-anything-vciso-strategy-ir-and-cyber-leadership-dailycyber-274-watch-now-svLRMQir</link>
      <content:encoded><![CDATA[<p><strong>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 274 ~ Watch Now ~</strong></p><p> </p><p>In this special AMA edition of DailyCyber, I take your questions and dig into the hottest issues facing cybersecurity leaders today. No guest—just unfiltered insights from the frontlines of vCISO work.</p><p> </p><p>🔥 <strong>What we cover in this AMA:</strong></p><p>1️⃣ SMB security—minimum essentials every business needs</p><p>2️⃣ Why vendors and partners are demanding more detailed security questionnaires</p><p>3️⃣ Incident response—speed vs strategy when ransomware hits</p><p>4️⃣ AI-powered phishing & deepfakes—what leaders must prepare for</p><p>5️⃣ vCISO realities—what it takes to succeed as a fractional security leader</p><p> </p><p>🧠 Bonus: I’ll also cover <strong>breaking cyber news</strong>, including:</p><ul><li>Jaguar Land Rover’s recent <strong>cyber incident</strong> disrupting production</li><li>Warnings on <strong>autonomous AI attacks</strong> from threat researchers</li><li><strong>September Patch Tuesday</strong> and critical Microsoft/Adobe updates</li><li>Reports on <strong>burnout in cybersecurity teams</strong></li></ul><p> </p><p>👤 Hosted by:</p><p>Brandon Krieger – CEO & vCISO Advisor</p><p>🔗 <a href="http://www.linkedin.com/in/brandonkrieger">www.linkedin.com/in/brandonkrieger</a></p><p>🔗 <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>📺 Watch the full episode: <a href="https://www.youtube.com/BrandonKrieger">youtube.com/BrandonKrieger</a></p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave your questions or comments below—let’s keep the conversation going!</p><p> </p>
]]></content:encoded>
      <enclosure length="57734416" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/178088e9-99da-43bd-b1b2-e019fdd2aa29/audio/0cedc92e-95de-4857-b74d-376ee79850a4/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 274 ~ Watch Now ~</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/2a56ea0f-ac5a-40db-b6ba-417dd69f8eca/3000x3000/ask-20me-20anything-20-20vciso-20strategy-20ir-20and-20cyber-20leadership-20-7c-20dailycyber-20274-20-20simple-20cast.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:08</itunes:duration>
      <itunes:summary>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 274 ~ Watch Now ~

In this special AMA edition of DailyCyber, I take your questions and dig into the hottest issues facing cybersecurity leaders today. No guest—just unfiltered insights from the frontlines of vCISO work.
</itunes:summary>
      <itunes:subtitle>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 274 ~ Watch Now ~

In this special AMA edition of DailyCyber, I take your questions and dig into the hottest issues facing cybersecurity leaders today. No guest—just unfiltered insights from the frontlines of vCISO work.
</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #securitypodcast, #incidentresponse, #dailycyber274, #aithreats, #compliance, #brandonkrieger, #ama, #vciso, #smbsecurity, #securityquestionnaires, #cybersecurity, #deepfakes</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6d4da06e-4cfe-4ea4-a386-e4bb8979fb6c</guid>
      <title>Global Threats, Deepfakes &amp; Quantum Risk | DailyCyber 273 with Evgueni Erchov</title>
      <description><![CDATA[<p><strong>Global Threats, Deepfakes & Quantum Risk | DailyCyber 273 with Evgueni Erchov ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I’m joined by Evgueni Erchov, Sr. Director of Research & Threat Intelligence at Cypfer. With more than 25 years of experience in IT security, forensics, blockchain, and cybercrime investigations, Evgueni shares his perspective on the ever-evolving global cyber threat landscape.</p><p>🔐 What we discuss:</p><p>1️⃣ <strong>Geopolitics & Cybercrime</strong> – How the Ukraine/Russia conflict has reshaped ransomware groups – The role of nation-states vs. independent actors</p><p>2️⃣ <strong>AI & Deepfakes in Cybercrime</strong> – How threat actors are weaponizing AI – Emerging risks from synthetic content</p><p>3️⃣ <strong>Law Enforcement Operations</strong> – The impact of takedowns on ransomware gangs – Where law enforcement is winning—and where it’s not</p><p>4️⃣ <strong>Blockchain Analytics & Cryptocurrency</strong> – Following the money through blockchain – Why cryptocurrency still fuels cybercrime</p><p>5️⃣ <strong>Quantum Computing & the Future of Security</strong> – Will quantum break encryption—or help defenders? – What CISOs and security leaders should start planning for now</p><p>🧠 <strong>Guest Bio:</strong> Evgueni Erchov is the Sr. Director of Research & Threat Intelligence at <strong>Cypfer</strong>, where he leads a global team tracking ransomware and emerging threats. With over 25 years in application development, IT security, federal investigations, and private sector leadership, his expertise spans forensics, blockchain, cybercrime, and advanced threat intelligence.</p><p>📌 <strong>Guest Info:</strong> </p><p>🔗 <a href="https://cypfer.com/">https://cypfer.com/</a> </p><p>🔗 <a href="https://www.linkedin.com/in/eerchov/">https://www.linkedin.com/in/eerchov/</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Share your takeaways or questions in the comments.</p><h3><br /> </h3><p>#DailyCyber273, #BrandonKrieger, #EvgueniErchov, #Cypfer, #CyberSecurity, #ThreatIntelligence, #Ransomware, #CyberCrime, #QuantumComputing, #BlockchainAnalytics, #Deepfakes, #AIThreats, #SecurityPodcast, #CyberResilience, #CyberAwareness, #IncidentResponse, #GlobalCyberThreats</p>
]]></description>
      <pubDate>Sat, 23 Aug 2025 14:02:40 +0000</pubDate>
      <author>info@knssconsulting.com (Evgueni Erchov, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/global-threats-deepfakes-quantum-risk-dailycyber-273-with-evgueni-erchov-UHeIYuzT</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/32eb6a91-593a-442d-ae31-7c210b280469/global-20threats-20deepfakes-20and-20quantum-20risk-20-7c-20dailycyber-20273-20with-20evgueni-20erchov-20-20simple-20cast.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Global Threats, Deepfakes & Quantum Risk | DailyCyber 273 with Evgueni Erchov ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I’m joined by Evgueni Erchov, Sr. Director of Research & Threat Intelligence at Cypfer. With more than 25 years of experience in IT security, forensics, blockchain, and cybercrime investigations, Evgueni shares his perspective on the ever-evolving global cyber threat landscape.</p><p>🔐 What we discuss:</p><p>1️⃣ <strong>Geopolitics & Cybercrime</strong> – How the Ukraine/Russia conflict has reshaped ransomware groups – The role of nation-states vs. independent actors</p><p>2️⃣ <strong>AI & Deepfakes in Cybercrime</strong> – How threat actors are weaponizing AI – Emerging risks from synthetic content</p><p>3️⃣ <strong>Law Enforcement Operations</strong> – The impact of takedowns on ransomware gangs – Where law enforcement is winning—and where it’s not</p><p>4️⃣ <strong>Blockchain Analytics & Cryptocurrency</strong> – Following the money through blockchain – Why cryptocurrency still fuels cybercrime</p><p>5️⃣ <strong>Quantum Computing & the Future of Security</strong> – Will quantum break encryption—or help defenders? – What CISOs and security leaders should start planning for now</p><p>🧠 <strong>Guest Bio:</strong> Evgueni Erchov is the Sr. Director of Research & Threat Intelligence at <strong>Cypfer</strong>, where he leads a global team tracking ransomware and emerging threats. With over 25 years in application development, IT security, federal investigations, and private sector leadership, his expertise spans forensics, blockchain, cybercrime, and advanced threat intelligence.</p><p>📌 <strong>Guest Info:</strong> </p><p>🔗 <a href="https://cypfer.com/">https://cypfer.com/</a> </p><p>🔗 <a href="https://www.linkedin.com/in/eerchov/">https://www.linkedin.com/in/eerchov/</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Share your takeaways or questions in the comments.</p><h3><br /> </h3><p>#DailyCyber273, #BrandonKrieger, #EvgueniErchov, #Cypfer, #CyberSecurity, #ThreatIntelligence, #Ransomware, #CyberCrime, #QuantumComputing, #BlockchainAnalytics, #Deepfakes, #AIThreats, #SecurityPodcast, #CyberResilience, #CyberAwareness, #IncidentResponse, #GlobalCyberThreats</p>
]]></content:encoded>
      <enclosure length="57034753" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/54cc8998-b443-43b4-b9b8-0005564b5e5e/audio/189ea619-41e2-4bb5-b91f-071714fd29b8/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Global Threats, Deepfakes &amp; Quantum Risk | DailyCyber 273 with Evgueni Erchov</itunes:title>
      <itunes:author>Evgueni Erchov, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/2485fdab-98b5-417c-bc2e-5439aaadb3fb/3000x3000/dailycyber-20simplecast-20-20brandon-20krieger-20vciso-20knss-20consulting.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:24</itunes:duration>
      <itunes:summary>Global Threats, Deepfakes &amp; Quantum Risk | DailyCyber 273 with Evgueni Erchov ~ Watch Now ~
In this episode of DailyCyber, I’m joined by Evgueni Erchov, Sr. Director of Research &amp; Threat Intelligence at Cypfer. With more than 25 years of experience in IT security, forensics, blockchain, and cybercrime investigations, Evgueni shares his perspective on the ever-evolving global cyber threat landscape.</itunes:summary>
      <itunes:subtitle>Global Threats, Deepfakes &amp; Quantum Risk | DailyCyber 273 with Evgueni Erchov ~ Watch Now ~
In this episode of DailyCyber, I’m joined by Evgueni Erchov, Sr. Director of Research &amp; Threat Intelligence at Cypfer. With more than 25 years of experience in IT security, forensics, blockchain, and cybercrime investigations, Evgueni shares his perspective on the ever-evolving global cyber threat landscape.</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #securitypodcast, #incidentresponse, #quantumcomputing, #evguenierchov, #blockchainanalytics, #cybercrime, #threatintelligence, #ransomware, #cypfer, #vciso, #cybersecurity, #deepfakes, #dailycyber273, #cyberawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3a3dec81-6ae2-4c1d-874c-28ba49187276</guid>
      <title>Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor</title>
      <description><![CDATA[<p><strong>Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I’m joined by <strong>Craig M. Taylor</strong>, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes.</p><p>Craig believes cybersecurity awareness should be <strong>short, engaging, and even fun</strong>—because punishment-based training and fear tactics don’t work.</p><p>🔐 What we discuss:</p><p>1️⃣ <strong>The Employee Factor</strong> – Why employees are still the #1 target – How to reduce human risk without blame</p><p>2️⃣ <strong>Why Traditional Training Fails</strong> – The psychology of why people click phishing emails – How behavioral science and gamification make training stick</p><p>3️⃣ <strong>Building a Cyber-Aware Culture</strong> – The leadership and culture shifts required – The biggest mistakes companies make in awareness programs</p><p>4️⃣ <strong>The SMB Security Gap</strong> – Why compliance ≠ security – Common blind spots in small and mid-sized businesses</p><p>5️⃣ <strong>AI & Phishing Evolution</strong> – How deepfakes, smishing, and vishing are changing the threat landscape – What to implement now for phishing-resistant authentication</p><p>🧠 <strong>Guest Bio:</strong> Craig M. Taylor is Co-Founder & CISO at CyberHoot, helping organizations eliminate risky employee behaviors with positive reinforcement security training. His background in psychology and decades of leadership at companies like Chase Paymentech, Vistaprint, and DXC Technology give him a unique edge in combining human behavior with cybersecurity strategy.</p><p>📌 <strong>Guest Info:</strong> </p><p>🔗 <a href="https://cyberhoot.com/">https://cyberhoot.com/</a> </p><p>🔗 <a href="https://www.linkedin.com/in/craigmtaylor/">https://www.linkedin.com/in/craigmtaylor/</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Share your takeaways or questions in the comments.</p>
]]></description>
      <pubDate>Sun, 17 Aug 2025 18:11:35 +0000</pubDate>
      <author>info@knssconsulting.com (Craig M Taylor, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/fixing-broken-security-training-dailycyber-272-with-craig-m-taylor-e386DZfp</link>
      <content:encoded><![CDATA[<p><strong>Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I’m joined by <strong>Craig M. Taylor</strong>, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes.</p><p>Craig believes cybersecurity awareness should be <strong>short, engaging, and even fun</strong>—because punishment-based training and fear tactics don’t work.</p><p>🔐 What we discuss:</p><p>1️⃣ <strong>The Employee Factor</strong> – Why employees are still the #1 target – How to reduce human risk without blame</p><p>2️⃣ <strong>Why Traditional Training Fails</strong> – The psychology of why people click phishing emails – How behavioral science and gamification make training stick</p><p>3️⃣ <strong>Building a Cyber-Aware Culture</strong> – The leadership and culture shifts required – The biggest mistakes companies make in awareness programs</p><p>4️⃣ <strong>The SMB Security Gap</strong> – Why compliance ≠ security – Common blind spots in small and mid-sized businesses</p><p>5️⃣ <strong>AI & Phishing Evolution</strong> – How deepfakes, smishing, and vishing are changing the threat landscape – What to implement now for phishing-resistant authentication</p><p>🧠 <strong>Guest Bio:</strong> Craig M. Taylor is Co-Founder & CISO at CyberHoot, helping organizations eliminate risky employee behaviors with positive reinforcement security training. His background in psychology and decades of leadership at companies like Chase Paymentech, Vistaprint, and DXC Technology give him a unique edge in combining human behavior with cybersecurity strategy.</p><p>📌 <strong>Guest Info:</strong> </p><p>🔗 <a href="https://cyberhoot.com/">https://cyberhoot.com/</a> </p><p>🔗 <a href="https://www.linkedin.com/in/craigmtaylor/">https://www.linkedin.com/in/craigmtaylor/</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Share your takeaways or questions in the comments.</p>
]]></content:encoded>
      <enclosure length="63027870" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/a10a5678-72b5-4be4-a71d-774d1f31e4fe/audio/aee39c97-35bc-407f-a176-3fb2132db6b6/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor</itunes:title>
      <itunes:author>Craig M Taylor, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/72aa5b4c-030e-4c3e-9344-ccb7e511676e/3000x3000/fixing-20broken-20security-20training-20with-20craig-20m-20taylor-20-7c-20dailycyber-20272-20-20watch-20now-20-20simple-20cast.jpg?aid=rss_feed"/>
      <itunes:duration>01:05:39</itunes:duration>
      <itunes:summary>Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor 

In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder &amp; CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes.
Craig believes cybersecurity awareness should be short, engaging, and even fun—because punishment-based training and fear tactics don’t work.</itunes:summary>
      <itunes:subtitle>Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor 

In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder &amp; CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes.
Craig believes cybersecurity awareness should be short, engaging, and even fun—because punishment-based training and fear tactics don’t work.</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #craigmtaylor, #securitypodcast, #dailycyber272, #incidentresponse, #humanriskmanagement, #cyberrisk, #securityawareness, #cyberculture, #aithreats, #brandonkrieger, #cyberhoot, #smbsecurity, #phishingdefense, #cybersecurity</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a0809d8-0a51-42ed-ba9c-4424c5de0655</guid>
      <title>Making Tech Work for SMBs with Steve Massaro | DailyCyber 271</title>
      <description><![CDATA[<p><strong>Making Tech Work for SMBs with Steve Massaro | DailyCyber 271 </strong></p><p>In this episode of DailyCyber, I’m joined by <strong>Steve Massaro</strong>, IT consultant, MSP owner, and strategic technologist with over 20 years of experience helping businesses succeed through managed services and secure IT leadership.</p><p>Steve shares insight from his years building MSPs in Hawaii and Kansas—from scaling tech teams to keeping SMB clients safe in today’s evolving threat landscape.</p><p>🔐 What we discuss:</p><p> 1️⃣ What “We Make Technology Work for You” really means – The customer mindset behind that promise – Strategic tech adoption for business outcomes</p><p>2️⃣ What “Secure” Actually Means – How Steve defines secure – What his clients need to maintain it over time</p><p>3️⃣ Keeping Clients Safe – Unique security strategies for small & mid-sized businesses – Practical steps every MSP should be implementing</p><p>4️⃣ Generative AI + Security – Is it a threat, a tool, or both? – Steve’s take on how it changes the game for IT service providers</p><p>5️⃣ Who Really Needs a Cybersecurity Program – The SMB sectors lagging behind – Why security isn’t optional in 2025</p><p> </p><p>🧠 Guest Bio: Steve Massaro is the owner of BITS Midwest, providing IT consulting and managed services to SMBs across Kansas. He previously co-owned and scaled IT Kauai over 17 years, serving clients across the state of Hawaii. With a balance of hands-on technical knowledge and business-minded strategy, Steve helps his clients secure, modernize, and grow.</p><p>📌 Guest Info: </p><p>🔗 <a href="https://bitsmw.com">https://bitsmw.com</a> </p><p>🔗 <a href="https://www.linkedin.com/in/steve-massaro/">https://www.linkedin.com/in/steve-massaro/</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Join the conversation in the comments.</p><h3> </h3><p> </p>
]]></description>
      <pubDate>Fri, 8 Aug 2025 15:24:28 +0000</pubDate>
      <author>info@knssconsulting.com (Steve Massaro, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/making-tech-work-for-smbs-with-steve-massaro-dailycyber-271-PGM_4p6A</link>
      <content:encoded><![CDATA[<p><strong>Making Tech Work for SMBs with Steve Massaro | DailyCyber 271 </strong></p><p>In this episode of DailyCyber, I’m joined by <strong>Steve Massaro</strong>, IT consultant, MSP owner, and strategic technologist with over 20 years of experience helping businesses succeed through managed services and secure IT leadership.</p><p>Steve shares insight from his years building MSPs in Hawaii and Kansas—from scaling tech teams to keeping SMB clients safe in today’s evolving threat landscape.</p><p>🔐 What we discuss:</p><p> 1️⃣ What “We Make Technology Work for You” really means – The customer mindset behind that promise – Strategic tech adoption for business outcomes</p><p>2️⃣ What “Secure” Actually Means – How Steve defines secure – What his clients need to maintain it over time</p><p>3️⃣ Keeping Clients Safe – Unique security strategies for small & mid-sized businesses – Practical steps every MSP should be implementing</p><p>4️⃣ Generative AI + Security – Is it a threat, a tool, or both? – Steve’s take on how it changes the game for IT service providers</p><p>5️⃣ Who Really Needs a Cybersecurity Program – The SMB sectors lagging behind – Why security isn’t optional in 2025</p><p> </p><p>🧠 Guest Bio: Steve Massaro is the owner of BITS Midwest, providing IT consulting and managed services to SMBs across Kansas. He previously co-owned and scaled IT Kauai over 17 years, serving clients across the state of Hawaii. With a balance of hands-on technical knowledge and business-minded strategy, Steve helps his clients secure, modernize, and grow.</p><p>📌 Guest Info: </p><p>🔗 <a href="https://bitsmw.com">https://bitsmw.com</a> </p><p>🔗 <a href="https://www.linkedin.com/in/steve-massaro/">https://www.linkedin.com/in/steve-massaro/</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Join the conversation in the comments.</p><h3> </h3><p> </p>
]]></content:encoded>
      <enclosure length="55355811" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/f0b78ceb-5790-4624-b192-f87f511426a8/audio/f34aa1cd-cfc3-4cc5-a8a6-6d269e39ce3d/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Making Tech Work for SMBs with Steve Massaro | DailyCyber 271</itunes:title>
      <itunes:author>Steve Massaro, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/8f9704a7-7bef-4eed-8649-016f3a0470b7/3000x3000/making-tech-work-for-smbs-with-steve-massaro-20-7c-20dailycyber-271-20-20watch-20now-20-20-20simple-20cast.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:39</itunes:duration>
      <itunes:summary>DailyCyber Episode 271 – This Wednesday!

I’m joined by Steve Massaro, longtime MSP leader and IT business owner with 20+ years of hands-on experience in both strategy and service delivery. He’s built and led MSPs in both Hawaii and Kansas, and brings a clear, customer-focused mindset to every tech challenge.

🎙 In this episode, we unpack:
⚙️ What “We Make Technology Work for You” really means
🔐 What it takes to define and maintain a truly secure state
🛡️ Unique strategies for keeping small and mid-sized clients safe
🤖 How generative AI is changing the threat landscape
📊 Who really needs a cybersecurity program—and who’s still ignoring the risk

Steve’s mix of deep technical skill, big-picture strategy, and real-world client experience makes this a must-watch for MSPs, vCISOs, and IT leaders alike.</itunes:summary>
      <itunes:subtitle>DailyCyber Episode 271 – This Wednesday!

I’m joined by Steve Massaro, longtime MSP leader and IT business owner with 20+ years of hands-on experience in both strategy and service delivery. He’s built and led MSPs in both Hawaii and Kansas, and brings a clear, customer-focused mindset to every tech challenge.

🎙 In this episode, we unpack:
⚙️ What “We Make Technology Work for You” really means
🔐 What it takes to define and maintain a truly secure state
🛡️ Unique strategies for keeping small and mid-sized clients safe
🤖 How generative AI is changing the threat landscape
📊 Who really needs a cybersecurity program—and who’s still ignoring the risk

Steve’s mix of deep technical skill, big-picture strategy, and real-world client experience makes this a must-watch for MSPs, vCISOs, and IT leaders alike.</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #msp, #securitypodcast, #incidentresponse, #itconsulting, #stevemassaro, #dailycyber271, #smb, #brandonkrieger, #vciso, #businesscontinuity, #bits, #generativeai, #cybersecurity, #cyberawareness, #techleadership</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b0ad039e-4919-468c-81a2-5df7973f667c</guid>
      <title>Digital Power Shifts, Cybercrime, &amp; AI Conflict with Martin Hinton | DailyCyber 270</title>
      <description><![CDATA[<p><strong>Digital Power Shifts, Cybercrime, & AI Conflict | DailyCyber 270 with Martin Hinton ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I’m joined by <strong>Martin Hinton</strong>, Executive Editor of Cyber Insurance News & Information and former Executive Producer at Fox News. With decades of experience in journalism, storytelling, and strategic communications, Martin brings a sharp lens to the world of cyber risk, insurance, and geopolitical change.</p><p>🔐 What we explore: </p><p>1️⃣ Nation-state vs non-state actors – Who holds the upper hand in cyber conflict? – How cybercriminal groups rival traditional military powers</p><p>2️⃣ Motivation behind modern attacks – Has money taken a backseat to control, ideology, and disruption? – Historical parallels to cyber escalation</p><p>3️⃣ The paradox of digital borders – Why geography still matters—even in cyberspace – How conflict zones shape digital attack surfaces</p><p>4️⃣ Insurance as cyber frontline – How insurers are influencing response decisions – Risk shaping at the board level</p><p>5️⃣ AI in cyber conflict – Will AI equalize the playing field—or escalate the risk? – What history tells us about tech-driven tipping points</p><p> </p><p>🧠 Guest Bio: Martin Hinton is an award-winning journalist, international storyteller, and Executive Editor at Cyber Insurance News & Information. Formerly with Fox News, Martin has developed and produced major programs ranging from military history to true crime, and now leads content at Rhetorical Ronin.</p><p> </p><p>📌 Guest Info: </p><p>🔗 <a href="https://www.linkedin.com/in/martinfhinton">https://www.linkedin.com/in/martinfhinton</a> </p><p>🔗 <a href="https://cyberinsurancenews.org/">https://cyberinsurancenews.org/</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Leave your thoughts and join the conversation.</p>
]]></description>
      <pubDate>Sat, 2 Aug 2025 13:32:04 +0000</pubDate>
      <author>info@knssconsulting.com (Martin Hinton, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/digital-power-shifts-cybercrime-ai-conflict-with-martin-hinton-dailycyber-270-4ZqPjYPV</link>
      <content:encoded><![CDATA[<p><strong>Digital Power Shifts, Cybercrime, & AI Conflict | DailyCyber 270 with Martin Hinton ~ Watch Now ~</strong></p><p>In this episode of DailyCyber, I’m joined by <strong>Martin Hinton</strong>, Executive Editor of Cyber Insurance News & Information and former Executive Producer at Fox News. With decades of experience in journalism, storytelling, and strategic communications, Martin brings a sharp lens to the world of cyber risk, insurance, and geopolitical change.</p><p>🔐 What we explore: </p><p>1️⃣ Nation-state vs non-state actors – Who holds the upper hand in cyber conflict? – How cybercriminal groups rival traditional military powers</p><p>2️⃣ Motivation behind modern attacks – Has money taken a backseat to control, ideology, and disruption? – Historical parallels to cyber escalation</p><p>3️⃣ The paradox of digital borders – Why geography still matters—even in cyberspace – How conflict zones shape digital attack surfaces</p><p>4️⃣ Insurance as cyber frontline – How insurers are influencing response decisions – Risk shaping at the board level</p><p>5️⃣ AI in cyber conflict – Will AI equalize the playing field—or escalate the risk? – What history tells us about tech-driven tipping points</p><p> </p><p>🧠 Guest Bio: Martin Hinton is an award-winning journalist, international storyteller, and Executive Editor at Cyber Insurance News & Information. Formerly with Fox News, Martin has developed and produced major programs ranging from military history to true crime, and now leads content at Rhetorical Ronin.</p><p> </p><p>📌 Guest Info: </p><p>🔗 <a href="https://www.linkedin.com/in/martinfhinton">https://www.linkedin.com/in/martinfhinton</a> </p><p>🔗 <a href="https://cyberinsurancenews.org/">https://cyberinsurancenews.org/</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Leave your thoughts and join the conversation.</p>
]]></content:encoded>
      <enclosure length="53008970" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/49ff736a-897f-4175-8813-1e9ea74953bf/audio/40f2b601-55bb-4bb1-9b9a-335c0e9325c4/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Digital Power Shifts, Cybercrime, &amp; AI Conflict with Martin Hinton | DailyCyber 270</itunes:title>
      <itunes:author>Martin Hinton, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/a2707c66-a7ab-477b-953b-b27b44c50a6d/3000x3000/digital-20power-20shifts-20cybercrime-20and-20ai-20conflict-20with-20martin-20hinton-20-7c-20dailycyber-20270-20-20watch-20now-20simple-20cast.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:13</itunes:duration>
      <itunes:summary>Digital Power Shifts, Cybercrime, &amp; AI Conflict | DailyCyber 270 with Martin Hinton

In this episode of DailyCyber, I’m joined by Martin Hinton, Executive Editor of Cyber Insurance News &amp; Information and former Executive Producer at Fox News. With decades of experience in journalism, storytelling, and strategic communications, Martin brings a sharp lens to the world of cyber risk, insurance, and geopolitical change.</itunes:summary>
      <itunes:subtitle>Digital Power Shifts, Cybercrime, &amp; AI Conflict | DailyCyber 270 with Martin Hinton

In this episode of DailyCyber, I’m joined by Martin Hinton, Executive Editor of Cyber Insurance News &amp; Information and former Executive Producer at Fox News. With decades of experience in journalism, storytelling, and strategic communications, Martin brings a sharp lens to the world of cyber risk, insurance, and geopolitical change.</itunes:subtitle>
      <itunes:keywords>#securitypodcast, #incidentresponse, #cyberrisk, #digitalborders, #cyberwarfare, #geopolitics, #dailycyber270, #cybercrime, #brandonkrieger, #cyberinsurance, #aiinsecurity, #cyberinsecurity, #vciso, #ciso, #businesscontinuity, #martinhinton, #cyberstrategy</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">433d2ca0-125e-4960-ad13-e2a8a65132ed</guid>
      <title>Scaling Security and Resilience with John Christly | DailyCyber-269</title>
      <description><![CDATA[<p><strong>Scaling Security & Resilience in Regulated Industries with John Christly | DailyCyber 269 ~ Watch Now ~</strong></p><p>In this episode of the DailyCyber Podcast, I’m joined by <strong>John Christly</strong>, Vice President of Commercial Services at OneZero Solutions, and a seasoned cybersecurity executive with 30+ years in the field.</p><p>John has served as a CISO, CIO, and consultant across healthcare, government, and critical infrastructure—and brings a deep understanding of the intersection between <strong>business strategy, regulatory compliance, and operational resilience.</strong></p><p>🔐 What we discussed:</p><p>1️⃣ Building Security in Regulated Spaces</p><p>How to align cybersecurity with regulatory expectations</p><p>Common challenges in healthcare, critical infrastructure, and defense sectors</p><p>Why compliance alone doesn’t equal security</p><p>2️⃣ Cyber in Mergers & Acquisitions</p><p>What companies get wrong when merging security programs</p><p>Due diligence, red flags, and post-acquisition integration</p><p>3️⃣ Educating & Enabling</p><p>John’s approach to making security programs stick</p><p>How training and education impact long-term resilience</p><p>4️⃣ Preparing for AI Governance</p><p>The future of AI regulation in cybersecurity</p><p>What organizations should do <i>now</i> to get ahead</p><p>🧠 Guest Bio: John Christly is the Vice President of Commercial Services at OneZero Solutions and has over 30 years of experience in cybersecurity and IT leadership. He has served as CISO and CIO for organizations across healthcare, government, and the defense industrial base. John is also a successful educator and thought leader, known for creating courses on cybersecurity, compliance, and AI governance.</p><p>📌 Guest Info: 🔗 <a href="https://www.onezerollc.com">https://www.onezerollc.com</a> 🔗 <a href="https://www.linkedin.com/in/johnchristly">https://www.linkedin.com/in/johnchristly</a></p><p><br /> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> 🎧 Or listen to the podcast at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave a comment or question and join the conversation!</p>
]]></description>
      <pubDate>Thu, 24 Jul 2025 08:53:28 +0000</pubDate>
      <author>info@knssconsulting.com (John Christly, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/scaling-security-and-resilience-with-john-christly-dailycyber-269-W9LCc_uc</link>
      <content:encoded><![CDATA[<p><strong>Scaling Security & Resilience in Regulated Industries with John Christly | DailyCyber 269 ~ Watch Now ~</strong></p><p>In this episode of the DailyCyber Podcast, I’m joined by <strong>John Christly</strong>, Vice President of Commercial Services at OneZero Solutions, and a seasoned cybersecurity executive with 30+ years in the field.</p><p>John has served as a CISO, CIO, and consultant across healthcare, government, and critical infrastructure—and brings a deep understanding of the intersection between <strong>business strategy, regulatory compliance, and operational resilience.</strong></p><p>🔐 What we discussed:</p><p>1️⃣ Building Security in Regulated Spaces</p><p>How to align cybersecurity with regulatory expectations</p><p>Common challenges in healthcare, critical infrastructure, and defense sectors</p><p>Why compliance alone doesn’t equal security</p><p>2️⃣ Cyber in Mergers & Acquisitions</p><p>What companies get wrong when merging security programs</p><p>Due diligence, red flags, and post-acquisition integration</p><p>3️⃣ Educating & Enabling</p><p>John’s approach to making security programs stick</p><p>How training and education impact long-term resilience</p><p>4️⃣ Preparing for AI Governance</p><p>The future of AI regulation in cybersecurity</p><p>What organizations should do <i>now</i> to get ahead</p><p>🧠 Guest Bio: John Christly is the Vice President of Commercial Services at OneZero Solutions and has over 30 years of experience in cybersecurity and IT leadership. He has served as CISO and CIO for organizations across healthcare, government, and the defense industrial base. John is also a successful educator and thought leader, known for creating courses on cybersecurity, compliance, and AI governance.</p><p>📌 Guest Info: 🔗 <a href="https://www.onezerollc.com">https://www.onezerollc.com</a> 🔗 <a href="https://www.linkedin.com/in/johnchristly">https://www.linkedin.com/in/johnchristly</a></p><p><br /> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> 🎧 Or listen to the podcast at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p>👇 Leave a comment or question and join the conversation!</p>
]]></content:encoded>
      <enclosure length="57104970" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/d33be892-950b-435c-b292-cfefd9dc42bb/audio/f49ef0c4-7f08-4f22-8b78-b5df34df877c/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Scaling Security and Resilience with John Christly | DailyCyber-269</itunes:title>
      <itunes:author>John Christly, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/01b1ed1c-619c-4047-9078-b218e99c142b/3000x3000/scaling-20security-20and-20resilience-20with-20john-20christly-20-7c-20dailycyber-20269-20-20simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:29</itunes:duration>
      <itunes:summary>Scaling Security &amp; Resilience in Regulated Industries with John Christly | DailyCyber 269 ~ Watch Now ~

In this episode of the DailyCyber Podcast, I’m joined by John Christly, Vice President of Commercial Services at OneZero Solutions, and a seasoned cybersecurity executive with 30+ years in the field.

John has served as a CISO, CIO, and consultant across healthcare, government, and critical infrastructure—and brings a deep understanding of the intersection between business strategy, regulatory compliance, and operational resilience.</itunes:summary>
      <itunes:subtitle>Scaling Security &amp; Resilience in Regulated Industries with John Christly | DailyCyber 269 ~ Watch Now ~

In this episode of the DailyCyber Podcast, I’m joined by John Christly, Vice President of Commercial Services at OneZero Solutions, and a seasoned cybersecurity executive with 30+ years in the field.

John has served as a CISO, CIO, and consultant across healthcare, government, and critical infrastructure—and brings a deep understanding of the intersection between business strategy, regulatory compliance, and operational resilience.</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #cyberriskmanagement, #cybermaturity, #cyberleadership, #securitypodcast, #cybercompliance, #incidentresponse, #brandonkrieger, #johnchristly, #businesscontinuity, #mergersandacquisitions, #onezerosolutions, #healthcarecyber, #cybersecurity, #aigovernance, #dailycyber269, #defensecyber, #regulatedindustries</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c74fc9f1-dae7-4d33-a40f-22e5e997ae9f</guid>
      <title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 268 ~ Watch Now ~</title>
      <description><![CDATA[<p>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 268 ~ Watch Now ~</p><p>In this special AMA edition of the DailyCyber Podcast, I go live solo to answer your biggest questions about cybersecurity, incident response, and what it really takes to succeed as a Fractional vCISO in 2025.</p><p>Whether you’re building a security program, managing client risk, or navigating the transition from security engineer to executive advisor, this episode is packed with actionable insights and behind-the-scenes lessons.</p><p> </p><p>🧠 What we covered:</p><p>👥 vCISO vs CISO—what’s right for your org? </p><p>📉 Cyber risk ≠ just IT—what execs must know </p><p>🧱 Building security programs that <i>actually</i> work </p><p>💰 ROI of security—how to justify the budget </p><p>🗺 Mid-market roadmaps—what to do and when </p><p>⚠️ Scaling mistakes that wreck cyber maturity</p><p> </p><p>👤 Hosted by: Brandon Krieger – President & CEO, Fractional vCISO & Host of DailyCyber </p><p>🔗 <a href="https://www.linkedin.com/in/brandonkrieger">https://www.linkedin.com/in/brandonkrieger</a> </p><p>🔗 <a href="http://www.knssconsulting.com">www.knssconsulting.com</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen to the podcast at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Drop your questions or reflections in the comments—let’s keep the conversation going.</p>
]]></description>
      <pubDate>Sun, 20 Jul 2025 09:55:02 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ask-me-anything-vciso-strategy-ir-and-cyber-leadership-dailycyber-268-watch-now-hsrzNTlT</link>
      <content:encoded><![CDATA[<p>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 268 ~ Watch Now ~</p><p>In this special AMA edition of the DailyCyber Podcast, I go live solo to answer your biggest questions about cybersecurity, incident response, and what it really takes to succeed as a Fractional vCISO in 2025.</p><p>Whether you’re building a security program, managing client risk, or navigating the transition from security engineer to executive advisor, this episode is packed with actionable insights and behind-the-scenes lessons.</p><p> </p><p>🧠 What we covered:</p><p>👥 vCISO vs CISO—what’s right for your org? </p><p>📉 Cyber risk ≠ just IT—what execs must know </p><p>🧱 Building security programs that <i>actually</i> work </p><p>💰 ROI of security—how to justify the budget </p><p>🗺 Mid-market roadmaps—what to do and when </p><p>⚠️ Scaling mistakes that wreck cyber maturity</p><p> </p><p>👤 Hosted by: Brandon Krieger – President & CEO, Fractional vCISO & Host of DailyCyber </p><p>🔗 <a href="https://www.linkedin.com/in/brandonkrieger">https://www.linkedin.com/in/brandonkrieger</a> </p><p>🔗 <a href="http://www.knssconsulting.com">www.knssconsulting.com</a></p><p> </p><p>📺 Watch the full episode: <a href="http://www.youtube.com/knssconsulting">www.youtube.com/knssconsulting</a> </p><p>🎧 Listen to the podcast at: <a href="http://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Drop your questions or reflections in the comments—let’s keep the conversation going.</p>
]]></content:encoded>
      <enclosure length="60324609" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/7a0c1ecc-ea1d-40dc-be5c-d2963cd2a21e/audio/04feba2b-a298-46a7-a976-f6acc7a91b8d/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 268 ~ Watch Now ~</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/f4d3dc30-9ce1-4ce8-880c-dbb9af9e8a78/3000x3000/ask-20me-20anything-20vciso-20strategy-20ir-20and-20cyber-20leadership-20-7c-20dailycyber-20268-20-simple-20cast.jpg?aid=rss_feed"/>
      <itunes:duration>01:02:50</itunes:duration>
      <itunes:summary>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 268 ~ Watch Now ~

In this special AMA edition of the DailyCyber Podcast, I go live solo to answer your biggest questions about cybersecurity, incident response, and what it really takes to succeed as a Fractional vCISO in 2025.

Whether you’re building a security program, managing client risk, or navigating the transition from security engineer to executive advisor, this episode is packed with actionable insights and behind-the-scenes lessons.</itunes:summary>
      <itunes:subtitle>Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 268 ~ Watch Now ~

In this special AMA edition of the DailyCyber Podcast, I go live solo to answer your biggest questions about cybersecurity, incident response, and what it really takes to succeed as a Fractional vCISO in 2025.

Whether you’re building a security program, managing client risk, or navigating the transition from security engineer to executive advisor, this episode is packed with actionable insights and behind-the-scenes lessons.</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #cyberriskmanagement, #cyberleadership, #securitypodcast, #incidentresponse, #compliance, #brandonkrieger, #ama, #vciso, #ciso, #businesscontinuity, #ransomwarerecovery, #cybersecurity, #askmeanything, #dailycyber268, #cyberstrategy</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6ffa2af3-42de-4617-a7c6-1742b48f86b7</guid>
      <title>Inside IR and AI with Paul Caron | DailyCyber 267</title>
      <description><![CDATA[<p><strong>Inside IR and AI with Paul Caron | DailyCyber 267 ~ Watch Now ~</strong></p><p>In today’s DailyCyber Podcast, I’m joined by <strong>Paul Caron</strong>, Head of Cyber Security, Americas at <strong>S-RM</strong>.</p><p>Paul brings over 20 years of experience across military intelligence, counterterrorism, and cybersecurity leadership—including senior roles at PwC and as Managing Director of Incident Response at a global consulting firm. We dive deep into <strong>Incident Response</strong> realities and how <strong>AI is reshaping the security landscape</strong>.</p><p>🔐 <strong>What we discussed:</strong> 1️⃣ <strong>Incident Response: What Security Experts Need to Know</strong></p><ul><li>The role of compliance and breach coaches (cyber lawyers)</li><li>Why speed matters: response time and containment</li><li>The value of critical partnerships during a breach</li><li>Backup realities and where organizations fail</li><li>The ripple effect of extortion: how it impacts your team, your brand, and your clients</li></ul><p>2️⃣ <strong>AI in Cybersecurity: Paul’s Perspective as a Subject Matter Expert</strong></p><ul><li>How AI is being used today (offensively and defensively)</li><li>Where it’s headed—and what security leaders should be watching for</li></ul><p>🧠 <strong>Guest Bio:</strong> Paul is S-RM's Head of Cyber Security, Americas. He has over 20 years of experience spanning the private and government sectors, with expertise in military intelligence, special operations, counterterrorism, and cybersecurity leadership. He has advised Fortune 100 companies on cyber strategy, post-breach remediation, and program maturity.</p><p>Paul holds an MBA from Norwich University and is the co-author of <i>"Security Supervision and Management: Theory and Practice of Asset Protection."</i></p><p>📌 <strong>Guest Info:</strong> </p><p>🔗 <a href="https://www.linkedin.com/in/paulcaron/">https://www.linkedin.com/in/paulcaron/</a> </p><p>🔗 <a href="https://www.s-rminform.com/">https://www.s-rminform.com/</a></p><p><br /> </p><p>📺 <strong>Watch the full episode: www.youtube.com/knssconsulting</strong> </p><p>🎧 Or listen to the podcast at: <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Leave your thoughts or questions in the comments!</p><h3> </h3><p>#DailyCyber267, #BrandonKrieger, #PaulCaron, #SRM, #CyberSecurity, #IncidentResponse, #RansomwareRecovery, #CyberLeadership, #CyberResilience, #BusinessContinuity, #CyberThreats, #AIinSecurity, #StrategicCyber, #CyberRiskManagement, #CISO, #vCISO, #PostBreachResponse, #CyberAwareness, #SecurityPodcast</p>
]]></description>
      <pubDate>Sat, 12 Jul 2025 16:45:18 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/inside-ir-and-ai-with-paul-caron-dailycyber-267-FCKHkDsh</link>
      <content:encoded><![CDATA[<p><strong>Inside IR and AI with Paul Caron | DailyCyber 267 ~ Watch Now ~</strong></p><p>In today’s DailyCyber Podcast, I’m joined by <strong>Paul Caron</strong>, Head of Cyber Security, Americas at <strong>S-RM</strong>.</p><p>Paul brings over 20 years of experience across military intelligence, counterterrorism, and cybersecurity leadership—including senior roles at PwC and as Managing Director of Incident Response at a global consulting firm. We dive deep into <strong>Incident Response</strong> realities and how <strong>AI is reshaping the security landscape</strong>.</p><p>🔐 <strong>What we discussed:</strong> 1️⃣ <strong>Incident Response: What Security Experts Need to Know</strong></p><ul><li>The role of compliance and breach coaches (cyber lawyers)</li><li>Why speed matters: response time and containment</li><li>The value of critical partnerships during a breach</li><li>Backup realities and where organizations fail</li><li>The ripple effect of extortion: how it impacts your team, your brand, and your clients</li></ul><p>2️⃣ <strong>AI in Cybersecurity: Paul’s Perspective as a Subject Matter Expert</strong></p><ul><li>How AI is being used today (offensively and defensively)</li><li>Where it’s headed—and what security leaders should be watching for</li></ul><p>🧠 <strong>Guest Bio:</strong> Paul is S-RM's Head of Cyber Security, Americas. He has over 20 years of experience spanning the private and government sectors, with expertise in military intelligence, special operations, counterterrorism, and cybersecurity leadership. He has advised Fortune 100 companies on cyber strategy, post-breach remediation, and program maturity.</p><p>Paul holds an MBA from Norwich University and is the co-author of <i>"Security Supervision and Management: Theory and Practice of Asset Protection."</i></p><p>📌 <strong>Guest Info:</strong> </p><p>🔗 <a href="https://www.linkedin.com/in/paulcaron/">https://www.linkedin.com/in/paulcaron/</a> </p><p>🔗 <a href="https://www.s-rminform.com/">https://www.s-rminform.com/</a></p><p><br /> </p><p>📺 <strong>Watch the full episode: www.youtube.com/knssconsulting</strong> </p><p>🎧 Or listen to the podcast at: <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a></p><p> </p><p>👇 Leave your thoughts or questions in the comments!</p><h3> </h3><p>#DailyCyber267, #BrandonKrieger, #PaulCaron, #SRM, #CyberSecurity, #IncidentResponse, #RansomwareRecovery, #CyberLeadership, #CyberResilience, #BusinessContinuity, #CyberThreats, #AIinSecurity, #StrategicCyber, #CyberRiskManagement, #CISO, #vCISO, #PostBreachResponse, #CyberAwareness, #SecurityPodcast</p>
]]></content:encoded>
      <enclosure length="58633029" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/f1208dc4-e8f1-4d8e-84cc-5b3a317c168a/audio/aeb22e63-a67e-4b13-b0cd-e26a55a515d4/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Inside IR and AI with Paul Caron | DailyCyber 267</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/1fe67a1b-f722-416e-8623-dff33f40130b/3000x3000/inside-20ir-20and-20ai-20with-20paul-20caron-20-20dailycyber-20267-20-20simple-20cast-20.jpg?aid=rss_feed"/>
      <itunes:duration>01:01:04</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast, I’m joined by Paul Caron, Head of Cyber Security, Americas at S-RM.
Paul brings over 20 years of experience across military intelligence, counterterrorism, and cybersecurity leadership—including senior roles at PwC and as Managing Director of Incident Response at a global consulting firm. We dive deep into Incident Response realities and how AI is reshaping the security landscape.</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast, I’m joined by Paul Caron, Head of Cyber Security, Americas at S-RM.
Paul brings over 20 years of experience across military intelligence, counterterrorism, and cybersecurity leadership—including senior roles at PwC and as Managing Director of Incident Response at a global consulting firm. We dive deep into Incident Response realities and how AI is reshaping the security landscape.</itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d05bfac1-e8e1-438a-9152-e1676c460ec8</guid>
      <title>Ransomware Recovery Realities with Andy Maus | DailyCyber 266 ~ Watch Now ~</title>
      <description><![CDATA[<p><strong>Ransomware Recovery Realities with Andy Maus | DailyCyber 266 ~ Watch Now ~</strong></p><p>In today’s DailyCyber Podcast, I’m joined by <strong>Andy Maus</strong>, Head of Business Development, Cyber Recovery Services at <strong>DriveSavers Data Recovery</strong>.</p><p>We dive into the <i>realities of ransomware recovery</i>—from corrupted files to deleted backups—and what actually works when everything goes sideways.</p><p>With over 20 years of experience in data protection and cyber response, Andy shares hard-earned insight from his work with cyber insurers, IR teams, and legal experts navigating high-stakes breaches.</p><p> </p><p>🔐 <strong>Questions we cover:</strong></p><ol><li>What’s the difference between <strong>data restoration</strong>, <strong>disaster recovery</strong>, and <strong>data recovery</strong>?</li><li>Can you really recover backups that were <strong>deleted by threat actors</strong>?</li><li>Does paying the ransom guarantee you’ll get your data back?</li><li>What are your options when <strong>critical databases are corrupted</strong>?</li><li>What separates <strong>free</strong>, <strong>commercial</strong>, and <strong>enterprise-grade</strong> recovery tools?</li></ol><p>Learn what to expect <strong>after a ransomware attack</strong>—and what smart organizations do to prepare for the worst.</p><p>🧠 Guest Info: </p><p>🔗 <a href="https://drivesaversdatarecovery.com/">https://drivesaversdatarecovery.com/</a></p><p>🔗 <a href="https://www.linkedin.com/in/andymaus/">https://www.linkedin.com/in/andymaus/</a></p><p>Watch the episode or listen to the podcast at <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a> </p><p>👇 Leave your questions and comments below!</p>
]]></description>
      <pubDate>Fri, 4 Jul 2025 17:45:37 +0000</pubDate>
      <author>info@knssconsulting.com (Andy Maus, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ransomware-recovery-realities-with-andy-maus-dailycyber-266-watch-now-Tzn_SJHE</link>
      <content:encoded><![CDATA[<p><strong>Ransomware Recovery Realities with Andy Maus | DailyCyber 266 ~ Watch Now ~</strong></p><p>In today’s DailyCyber Podcast, I’m joined by <strong>Andy Maus</strong>, Head of Business Development, Cyber Recovery Services at <strong>DriveSavers Data Recovery</strong>.</p><p>We dive into the <i>realities of ransomware recovery</i>—from corrupted files to deleted backups—and what actually works when everything goes sideways.</p><p>With over 20 years of experience in data protection and cyber response, Andy shares hard-earned insight from his work with cyber insurers, IR teams, and legal experts navigating high-stakes breaches.</p><p> </p><p>🔐 <strong>Questions we cover:</strong></p><ol><li>What’s the difference between <strong>data restoration</strong>, <strong>disaster recovery</strong>, and <strong>data recovery</strong>?</li><li>Can you really recover backups that were <strong>deleted by threat actors</strong>?</li><li>Does paying the ransom guarantee you’ll get your data back?</li><li>What are your options when <strong>critical databases are corrupted</strong>?</li><li>What separates <strong>free</strong>, <strong>commercial</strong>, and <strong>enterprise-grade</strong> recovery tools?</li></ol><p>Learn what to expect <strong>after a ransomware attack</strong>—and what smart organizations do to prepare for the worst.</p><p>🧠 Guest Info: </p><p>🔗 <a href="https://drivesaversdatarecovery.com/">https://drivesaversdatarecovery.com/</a></p><p>🔗 <a href="https://www.linkedin.com/in/andymaus/">https://www.linkedin.com/in/andymaus/</a></p><p>Watch the episode or listen to the podcast at <a href="https://www.DailyCyber.ca">www.DailyCyber.ca</a> </p><p>👇 Leave your questions and comments below!</p>
]]></content:encoded>
      <enclosure length="54260758" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/572d424c-8ee5-40ea-87ba-f2cdf3566833/audio/955e769f-f481-4450-b01f-18939b0338b8/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ransomware Recovery Realities with Andy Maus | DailyCyber 266 ~ Watch Now ~</itunes:title>
      <itunes:author>Andy Maus, Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/c7462142-4178-42e8-81d2-ca6f5824bd97/3000x3000/ransomware-20recovery-20realities-20with-20andy-20maus-20-7c-20dailycyber-20266-20-20watch-20now-20.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:31</itunes:duration>
      <itunes:summary>Ransomware Recovery Realities with Andy Maus | DailyCyber 266 ~ Watch Now ~
In today’s DailyCyber Podcast, I’m joined by Andy Maus, Head of Business Development, Cyber Recovery Services at DriveSavers Data Recovery.</itunes:summary>
      <itunes:subtitle>Ransomware Recovery Realities with Andy Maus | DailyCyber 266 ~ Watch Now ~
In today’s DailyCyber Podcast, I’m joined by Andy Maus, Head of Business Development, Cyber Recovery Services at DriveSavers Data Recovery.</itunes:subtitle>
      <itunes:keywords>#cyberresilience, #incidentresponse, #immutablebackups, #brandonkrieger, #ransomware, #cyberrecovery, #vciso, #datarecovery, #andymaus, #ciso, #businesscontinuity, #cybersecurity, #dailycyber266, #cyberthreats, #drivesavers, #cybersecurityawareness, #disasterrecovery</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9a53f8eb-ea17-4505-a009-ed6ffd6c5bed</guid>
      <title>Ask Real Life CISO Mike Melo Your Cyber Security Questions | DailyCyber 265</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to have Mike Melo CISO of LifeLabs on my DailyCyber stream. He answers real life questions to give you insight into the real world of Cyber Security.  </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sat, 11 Nov 2023 01:48:32 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ask-real-life-ciso-mike-melo-your-cyber-security-questions-dailycyber-265-K0RBcl6f</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to have Mike Melo CISO of LifeLabs on my DailyCyber stream. He answers real life questions to give you insight into the real world of Cyber Security.  </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="81813147" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/cab75b66-9cee-4dc4-a39d-a9a472425d70/audio/88fe02ee-9dd7-4efc-8158-89ce2cdf821d/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ask Real Life CISO Mike Melo Your Cyber Security Questions | DailyCyber 265</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/84de9f10-0e82-4c8c-9271-7f6b0c9bd07b/a5143c43-7cda-4610-86b0-399ddd9838be/3000x3000/ask-real-life-ciso-mike-melo-your-cyber-security-questions-or-dailycyber-265.jpg?aid=rss_feed"/>
      <itunes:duration>01:25:13</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am fortunate to have Mike Melo CISO of LifeLabs on my DailyCyber stream. He answers real life questions to give you insight into the real world of Cyber Security.  </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am fortunate to have Mike Melo CISO of LifeLabs on my DailyCyber stream. He answers real life questions to give you insight into the real world of Cyber Security.  </itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #vciso, #ciso, #cybersecurity, #cyberthreats, #mikemelo, #cybersecuritynews, #cybersecurityawareness, #dailycyber265</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e461c814-f5f0-4cf2-82cf-54531114ca50</guid>
      <title>Brandon&apos;s Life In Cyber Security</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast Brandon discusses life in CyberSecurity and what you should expect. He also answers questions from the community. </p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below </p>
]]></description>
      <pubDate>Sun, 15 Aug 2021 18:13:56 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/brandons-life-in-cyber-security-CfU1zeDS</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast Brandon discusses life in CyberSecurity and what you should expect. He also answers questions from the community. </p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below </p>
]]></content:encoded>
      <enclosure length="65582818" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/5d30cd16-7c7d-4dc9-90ac-5d10ff2d9b43/audio/d9f372cb-befe-4748-a0c1-c23f96a896b2/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Brandon&apos;s Life In Cyber Security</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:08:18</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast Brandon discusses life in CyberSecurity and what you should expect. He also answers questions from the community. 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast Brandon discusses life in CyberSecurity and what you should expect. He also answers questions from the community. 
</itunes:subtitle>
      <itunes:keywords>#dailycyber263, #brandonkrieger, #cybersecuritycareer, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a196ba43-179d-421c-9650-121dd80da133</guid>
      <title>Why Go Into A Cyber Security Career?</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast Brandon discusses why you should go into Cyber Security. What are the things you need to know before you jump into a Cyber Security Career. </p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 4 Jun 2021 21:38:26 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/why-go-into-a-cyber-security-career-uFDEqIAv</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast Brandon discusses why you should go into Cyber Security. What are the things you need to know before you jump into a Cyber Security Career. </p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="66343007" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/fe0d0ab8-f4f5-4da2-b604-134fd10b5899/audio/29939ff8-8bc2-4c88-933d-bd86d1c009fa/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Why Go Into A Cyber Security Career?</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:09:06</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast Brandon discusses why you should go into Cyber Security. What are the things you need to know before you jump into a Cyber Security Career. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast Brandon discusses why you should go into Cyber Security. What are the things you need to know before you jump into a Cyber Security Career. </itunes:subtitle>
      <itunes:keywords>#dailycyber262, #brandonkrieger, #cybersecuritycareer, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bdd14d5b-102b-48b1-85ac-a810aa1bb591</guid>
      <title>Ask Real Life CISO Allan Alford Your Cyber Security Questions</title>
      <description><![CDATA[<p>Ask Real Life CISO Allan Alford Your Cyber Security Questions | DailyCyber 261 ~ Watch Now ~</p><p><br /> </p><p><a href="https://youtu.be/CSMuUkv7j-o">https://youtu.be/CSMuUkv7j-o</a></p><p><br /> </p><p>In today’s DailyCyber Podcast I am fortunate to have Allan Alford as a guest to answer real life Cyber Security questions that Cyber Security professionals want to know. </p><p><br /> </p><p><a href="https://allanalford.com/">https://allanalford.com/</a></p><p><a href="https://www.linkedin.com/in/allanalford/">https://www.linkedin.com/in/allanalford/</a></p><p><a href="https://twitter.com/AllanAlfordinTX">https://twitter.com/AllanAlfordinTX</a></p><p><br /> </p><p>Recommended links we discuss through the stream: </p><p>https://hackervalley.com/cyberranch</p><p><a href="https://www.linkedin.com/in/naomi-buckwalter/">https://www.linkedin.com/in/naomi-buckwalter/</a></p><p><a href="https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698">https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698</a></p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 14 May 2021 15:46:25 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ask-real-life-ciso-allan-alford-your-cyber-security-questions-8Lo3Sk0u</link>
      <content:encoded><![CDATA[<p>Ask Real Life CISO Allan Alford Your Cyber Security Questions | DailyCyber 261 ~ Watch Now ~</p><p><br /> </p><p><a href="https://youtu.be/CSMuUkv7j-o">https://youtu.be/CSMuUkv7j-o</a></p><p><br /> </p><p>In today’s DailyCyber Podcast I am fortunate to have Allan Alford as a guest to answer real life Cyber Security questions that Cyber Security professionals want to know. </p><p><br /> </p><p><a href="https://allanalford.com/">https://allanalford.com/</a></p><p><a href="https://www.linkedin.com/in/allanalford/">https://www.linkedin.com/in/allanalford/</a></p><p><a href="https://twitter.com/AllanAlfordinTX">https://twitter.com/AllanAlfordinTX</a></p><p><br /> </p><p>Recommended links we discuss through the stream: </p><p>https://hackervalley.com/cyberranch</p><p><a href="https://www.linkedin.com/in/naomi-buckwalter/">https://www.linkedin.com/in/naomi-buckwalter/</a></p><p><a href="https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698">https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698</a></p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="73453746" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/af24b329-420c-40be-aec2-61cb0dfc6aad/audio/12babc9e-241a-4936-8006-c04fd0b19972/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ask Real Life CISO Allan Alford Your Cyber Security Questions</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:16:31</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am fortunate to have Allan Alford as a guest to answer real life Cyber Security questions that Cyber Security professionals want to know. 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am fortunate to have Allan Alford as a guest to answer real life Cyber Security questions that Cyber Security professionals want to know. 
</itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #allanalford, #vciso, #ciso, #cybersecurity, #cyberthreats, #cybersecuritynews, #dailycyber261, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2170d695-6d10-44f2-abc9-4eefa169cd37</guid>
      <title>Advance Life Hacks for Cyber Security Professionals Part 2</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </p><p><br /><br />To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p><br /> </p><p>#DailyCyber260, #BrandonKrieger, #Cybersecurity, #cybersecuritynews, #Cybersecurityawareness, #Cyberthreats, </p>
]]></description>
      <pubDate>Fri, 7 May 2021 19:34:39 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/advance-life-hacks-for-cyber-security-professionals-part-2-LDLYF9pk</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </p><p><br /><br />To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p><br /> </p><p>#DailyCyber260, #BrandonKrieger, #Cybersecurity, #cybersecuritynews, #Cybersecurityawareness, #Cyberthreats, </p>
]]></content:encoded>
      <enclosure length="59009913" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/4889dcce-58c5-409a-88c2-cba4fbaf8de5/audio/00673706-36e9-4fa0-ae6d-20ceeb9d481c/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Advance Life Hacks for Cyber Security Professionals Part 2</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:01:28</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. 
</itunes:subtitle>
      <itunes:keywords>#dailycyber260, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e1b076db-97a5-476c-9f43-5ef728e53e09</guid>
      <title>Advance Life Hacks for Cyber Security Professionals</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 29 Apr 2021 21:43:38 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/advance-life-hacks-for-cyber-security-professionals-i7tkmy0C</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="85195474" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/eaf245bf-a976-4028-a070-56379e8768b8/audio/d8eb45af-6f12-4ced-b3a4-40dfb1c67f8e/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Advance Life Hacks for Cyber Security Professionals</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:28:45</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast Brandon is going to share some advance Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </itunes:subtitle>
      <itunes:keywords>#dailycyber259, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">88971731-bfeb-4ebd-b2f4-f3b215052d38</guid>
      <title>Life Hacks for Cyber Security Professionals with Brandon Krieger</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast Brandon is going to share some Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sat, 17 Apr 2021 15:42:41 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/life-hacks-for-cyber-security-professionals-with-brandon-krieger-5xbnMLa6</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast Brandon is going to share some Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="57875990" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/26b4485d-32fb-4218-91df-655fb8b0da5f/audio/927b63d0-d219-42f0-8606-a97c68ec8dec/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Life Hacks for Cyber Security Professionals with Brandon Krieger</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:00:17</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast Brandon is going to share some Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast Brandon is going to share some Life Hacks for Cyber Security Professionals that he has learned over the years mentoring business professionals. </itunes:subtitle>
      <itunes:keywords>#lifehacks, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #dailycyber258, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a7a96ade-8a16-4b32-b71e-10885745bdd9</guid>
      <title>Cyber Security AMA with Brandon Krieger</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. </p><p><br /> </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sun, 11 Apr 2021 01:06:53 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/cyber-security-ama-with-brandon-krieger-4w6hadT_</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. </p><p><br /> </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="73033697" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/19977092-6d0d-4c4a-ac1c-6ae73fad41ec/audio/46855bf2-e860-43f6-b9f7-aa4091e221b2/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Cyber Security AMA with Brandon Krieger</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:16:05</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. 
</itunes:subtitle>
      <itunes:keywords>#dailycyber257, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">520328b3-2e18-4c85-a545-d00b98e5d5d5</guid>
      <title>What is Cyber Threat Intelligence with Jim McKee</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Jim McKee who is an expert in Cyber Threat Intelligence. We are going to dive in deep why Cyber Threat Intelligence is important to protect your business. </p><p><br /> </p><p>Website:  <a href="https://www.wapacklabs.com/">https://www.wapacklabs.com</a></p><p>Linkedin:  <a href="https://www.linkedin.com/in/jimckee/">https://www.linkedin.com/in/jimckee/</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sat, 27 Mar 2021 22:17:55 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger, Jim Mckee)</author>
      <link>https://www.dailycyber.ca/episodes/what-is-cyber-threat-intelligence-with-jim-mckee-z0ofukAV</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Jim McKee who is an expert in Cyber Threat Intelligence. We are going to dive in deep why Cyber Threat Intelligence is important to protect your business. </p><p><br /> </p><p>Website:  <a href="https://www.wapacklabs.com/">https://www.wapacklabs.com</a></p><p>Linkedin:  <a href="https://www.linkedin.com/in/jimckee/">https://www.linkedin.com/in/jimckee/</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="593430" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/c4b031e5-b7f3-424c-9e6e-15b854df911c/audio/ecfeb76e-8f21-428e-8f25-a13cca7c79a3/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>What is Cyber Threat Intelligence with Jim McKee</itunes:title>
      <itunes:author>Brandon Krieger, Jim Mckee</itunes:author>
      <itunes:duration>00:00:37</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Jim McKee who is an expert in Cyber Threat Intelligence. We are going to dive in deep why Cyber Threat Intelligence is important to protect your business. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Jim McKee who is an expert in Cyber Threat Intelligence. We are going to dive in deep why Cyber Threat Intelligence is important to protect your business. </itunes:subtitle>
      <itunes:keywords>#dailycyber256, #jimmckee, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness, #cyberthreatintelligence</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b5f99a82-c67a-4445-8504-b763a3fae343</guid>
      <title>AMA with Brandon Krieger</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. </p><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 26 Mar 2021 20:02:13 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ama-with-brandon-krieger-9x850I9R</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. </p><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="56877067" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/17e495f5-1912-461e-9b23-5bb1bc8251ab/audio/95d532be-961d-4bfb-8b13-efbd5dd79bc4/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>AMA with Brandon Krieger</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:59:15</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I answer questions from the Cyber Insecurity community that Cyber Security professionals are dying to know about. 
</itunes:subtitle>
      <itunes:keywords>#dailycyber255, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cdea978a-cda5-409b-8257-b3181223333e</guid>
      <title>What is Data Breach Planning and Response with Debbie Reynolds</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Debbie Reynolds who is an expert in the Cyber Security industry with data breach planning and response. We are going to dive in deep into how you can be prepared to respond to a breach. </p><p><br /> </p><p>Website: <a href="https://www.debbiereynoldsconsulting.com/">https://www.debbiereynoldsconsulting.com/</a></p><p>Linkedin: <a href="https://www.linkedin.com/in/debbieareynolds/">https://www.linkedin.com/in/debbieareynolds/</a></p><p>YouTube:  <a href="https://www.youtube.com/channel/UCVZ2nIE9bw43aH1QZVJh2UQ/videos">https://www.youtube.com/channel/UCVZ2nIE9bw43aH1QZVJh2UQ/videos</a></p><p>Twitter: <a href="https://twitter.com/DebbieDataDiv">https://twitter.com/DebbieDataDiv</a></p><p><br /><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Mon, 22 Mar 2021 00:31:44 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/what-is-data-breach-planning-and-response-with-debbie-reynolds-McEpSxyI</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Debbie Reynolds who is an expert in the Cyber Security industry with data breach planning and response. We are going to dive in deep into how you can be prepared to respond to a breach. </p><p><br /> </p><p>Website: <a href="https://www.debbiereynoldsconsulting.com/">https://www.debbiereynoldsconsulting.com/</a></p><p>Linkedin: <a href="https://www.linkedin.com/in/debbieareynolds/">https://www.linkedin.com/in/debbieareynolds/</a></p><p>YouTube:  <a href="https://www.youtube.com/channel/UCVZ2nIE9bw43aH1QZVJh2UQ/videos">https://www.youtube.com/channel/UCVZ2nIE9bw43aH1QZVJh2UQ/videos</a></p><p>Twitter: <a href="https://twitter.com/DebbieDataDiv">https://twitter.com/DebbieDataDiv</a></p><p><br /><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="60571408" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/4266af92-6588-4413-aef2-bdccda438927/audio/6d13e178-86ce-4320-9904-0655b25fe001/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>What is Data Breach Planning and Response with Debbie Reynolds</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:03:06</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Debbie Reynolds who is an expert in the Cyber Security industry with data breach planning and response. We are going to dive in deep into how you can be prepared to respond to a breach. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Debbie Reynolds who is an expert in the Cyber Security industry with data breach planning and response. We are going to dive in deep into how you can be prepared to respond to a breach. </itunes:subtitle>
      <itunes:keywords>#breachresponse, #dailycyber254, #brandonkrieger, #debbiereynolds, #cybersecurity, #breachplanning, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9b0acd9a-a874-4ff9-b5ff-fb29aa405c8f</guid>
      <title>Passwordless Authentication with Simon Law</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I interviewed Simon Law, CEO and Co-Founder of LoginID regarding Passwordless Authentication solution. </p><p> </p><p>To connect with Simon visit </p><p>Website: https://LoginID.io</p><p>Twitter: @simoninnovates</p><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Mon, 22 Mar 2021 00:31:27 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/passwordless-authentication-with-simon-law-uO7gxT9C</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I interviewed Simon Law, CEO and Co-Founder of LoginID regarding Passwordless Authentication solution. </p><p> </p><p>To connect with Simon visit </p><p>Website: https://LoginID.io</p><p>Twitter: @simoninnovates</p><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="61130638" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/de30e164-7d23-4574-92c4-2837ed1fdf5a/audio/3ccae587-44f2-484a-aa69-7c1ca8e2d59b/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Passwordless Authentication with Simon Law</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:03:41</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I interviewed Simon Law, CEO and Co-Founder of LoginID regarding Passwordless Authentication solution. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I interviewed Simon Law, CEO and Co-Founder of LoginID regarding Passwordless Authentication solution. </itunes:subtitle>
      <itunes:keywords>#loginid, #2fa, #brandonkrieger, #passwordless, #dailycyber252, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness, #fido</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9021f893-7b1a-48a6-96a8-adc86ff51b8b</guid>
      <title>New Toronto Lockdown 2020</title>
      <description><![CDATA[<p>New Toronto Lockdown 2020 | DailyCyber 242 ~ Watch Now ~ </p><p>In today’s DailyCyber Podcast I discuss the new General Toronto COVID-19 Pandemic lockdown and how it is affecting the GTA. I Also go over what is going in the Cyber Security Industry.</p><p> </p><p>Articles I cover:   </p><p>3 Steps CISOs Can Take to Convey Strategy for Budget Presentations</p><p>https://www.darkreading.com/operations/3-steps-cisos-can-take-to-convey-strategy-for-budget-presentations-/a/d-id/1339337?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</p><p> </p><p> </p><p>How Retailers Can Fight Fraud and Abuse This Holiday Season</p><p>https://www.darkreading.com/cloud/how-retailers-can-fight-fraud-and-abuse-this-holiday-season/a/d-id/1339470?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</p><p>  </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below </p><p> </p>
]]></description>
      <pubDate>Mon, 22 Mar 2021 00:31:08 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/new-toronto-lockdown-2020-8fYswG_O</link>
      <content:encoded><![CDATA[<p>New Toronto Lockdown 2020 | DailyCyber 242 ~ Watch Now ~ </p><p>In today’s DailyCyber Podcast I discuss the new General Toronto COVID-19 Pandemic lockdown and how it is affecting the GTA. I Also go over what is going in the Cyber Security Industry.</p><p> </p><p>Articles I cover:   </p><p>3 Steps CISOs Can Take to Convey Strategy for Budget Presentations</p><p>https://www.darkreading.com/operations/3-steps-cisos-can-take-to-convey-strategy-for-budget-presentations-/a/d-id/1339337?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</p><p> </p><p> </p><p>How Retailers Can Fight Fraud and Abuse This Holiday Season</p><p>https://www.darkreading.com/cloud/how-retailers-can-fight-fraud-and-abuse-this-holiday-season/a/d-id/1339470?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</p><p>  </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below </p><p> </p>
]]></content:encoded>
      <enclosure length="36978866" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/7682e974-2d4d-4ed0-9db3-e1b9ed708213/audio/0f890f79-f1fd-4efc-926d-eaba1ed33195/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>New Toronto Lockdown 2020</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:38:31</itunes:duration>
      <itunes:summary>New Toronto Lockdown 2020 | DailyCyber 242 ~ Watch Now ~

In today’s DailyCyber Podcast I discuss the new General Toronto COVID-19 Pandemic lockdown and how it is affecting the GTA. I Also go over what is going in the Cyber Security Industry.
</itunes:summary>
      <itunes:subtitle>New Toronto Lockdown 2020 | DailyCyber 242 ~ Watch Now ~

In today’s DailyCyber Podcast I discuss the new General Toronto COVID-19 Pandemic lockdown and how it is affecting the GTA. I Also go over what is going in the Cyber Security Industry.
</itunes:subtitle>
      <itunes:keywords>#newlockdown, #covid19, #pandemic, #brandonkrieger, #dailycyber242, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cb729bbe-5bc1-4fa8-b374-33e331edf879</guid>
      <title>How To Become a CISO with Dr. Eric Cole</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. Today we are going to dive deep into how to become a CISO.</p><p> </p><p>You can connect with Dr. Eric Cole here:</p><p><br /> </p><p>Website: <a href="https://secure-anchor.com/">https://secure-anchor.com/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/company/secure-anchor-consulting/">https://www.linkedin.com/company/secure-anchor-consulting/</a></p><p>Twitter: <a href="https://twitter.com/drericcole">https://twitter.com/drericcole</a></p><p>YouTube: <a href="https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA">https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA</a></p><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 25 Feb 2021 20:18:11 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/how-to-become-a-ciso-with-dr-eric-cole-Ay5u1rCQ</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. Today we are going to dive deep into how to become a CISO.</p><p> </p><p>You can connect with Dr. Eric Cole here:</p><p><br /> </p><p>Website: <a href="https://secure-anchor.com/">https://secure-anchor.com/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/company/secure-anchor-consulting/">https://www.linkedin.com/company/secure-anchor-consulting/</a></p><p>Twitter: <a href="https://twitter.com/drericcole">https://twitter.com/drericcole</a></p><p>YouTube: <a href="https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA">https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA</a></p><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="59045857" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/7a76f5d5-34ae-45c7-b446-c49a884a56ec/audio/246f3517-735e-4e95-82a1-d1d6d82e8c44/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>How To Become a CISO with Dr. Eric Cole</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:01:30</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. Today we are going to dive deep into how to become a CISO.
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. Today we are going to dive deep into how to become a CISO.
</itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #ciso, #dailycyber253, #drericcole, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e96cbc3f-bc1b-4170-bb43-ef2c2c1a4d93</guid>
      <title>Live Cybersecurity Career Q &amp; A with Brandon Krieger</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I host a live Cybersecurity Q & A answering numerous questions on a career in Cybersecurity. From how to break into the industry, certification, to what does an average day look like in the SOC</p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 11 Feb 2021 20:50:32 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/live-cybersecurity-career-q-a-with-brandon-krieger-_VZq3I0N</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I host a live Cybersecurity Q & A answering numerous questions on a career in Cybersecurity. From how to break into the industry, certification, to what does an average day look like in the SOC</p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="59533616" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/06e155ef-6685-4e94-b267-70e087478a13/audio/964291f8-d05f-47c5-b3e8-dcb342c6aea7/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Live Cybersecurity Career Q &amp; A with Brandon Krieger</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:02:01</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I host a live Cybersecurity Q &amp; A answering numerous questions on a career in Cybersecurity. From how to break into the industry, certification, to what does an average day look like in the SOC</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I host a live Cybersecurity Q &amp; A answering numerous questions on a career in Cybersecurity. From how to break into the industry, certification, to what does an average day look like in the SOC</itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #cybersecuritycareer, #cybersecurity, #cybersecuritynews, #dailycyber251, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">552fb717-2008-43cb-9e04-2b50b13ddbf7</guid>
      <title>Becoming a InfoSec RockStar with Ted Demopoulos</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I interview Ted Demopoulos about how to be a InfoSec Rockstar in the growing Cybersecurity industry. </p>
]]></description>
      <pubDate>Thu, 4 Feb 2021 19:15:55 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/becoming-a-infosec-rockstar-with-ted-demopoulos-5H0kVeid</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I interview Ted Demopoulos about how to be a InfoSec Rockstar in the growing Cybersecurity industry. </p>
]]></content:encoded>
      <enclosure length="57492303" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/b6b7dda7-3a5b-4d64-a17b-51a197dcb8a9/audio/19c0d4ab-9acb-48fc-8d6e-932465865144/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Becoming a InfoSec RockStar with Ted Demopoulos</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:59:53</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I interview Ted Demopoulos about how to be a InfoSec Rockstar in the growing Cybersecurity industry. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I interview Ted Demopoulos about how to be a InfoSec Rockstar in the growing Cybersecurity industry. </itunes:subtitle>
      <itunes:keywords>#dailycyber250, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #infosecrockstar, #cybersecurityawareness, #teddemopoulos</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3c50492c-212e-4098-9f80-4b6b3d9dff9b</guid>
      <title>Live Cybersecurity Career Advice</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I answer Cybersecurity career questions from the community. </p><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 28 Jan 2021 19:08:40 +0000</pubDate>
      <author>info@knssconsulting.com (Brandonkrieger)</author>
      <link>https://www.dailycyber.ca/episodes/live-cybersecurity-career-advice-PhWZJnuG</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I answer Cybersecurity career questions from the community. </p><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="56915101" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/4eda2a5b-dd2c-40a1-9464-597912e06d89/audio/ad9f7d3b-c247-4bcc-88ce-35b8750b35c8/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Live Cybersecurity Career Advice</itunes:title>
      <itunes:author>Brandonkrieger</itunes:author>
      <itunes:duration>00:59:17</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I answer Cybersecurity career questions from the community. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I answer Cybersecurity career questions from the community. </itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #cybersecuritycareer, #dailycyber249, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3d9eb574-8f60-4679-94d3-775b99c221ee</guid>
      <title>5 Cybersecurity Best Practices</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I am go over these two articles below and discuss the new changes with DailyCyber’s schedule. </p><p><br /> </p><p>5 Cybersecurity Best Practices For Planning Ahead</p><p><a href="https://securityintelligence.com/articles/five-cybersecurity-best-practices-for-planning-ahead/">https://securityintelligence.com/articles/five-cybersecurity-best-practices-for-planning-ahead/</a></p><p> </p><p>CES 2021 Gadgets: Worst in Privacy and Security Awards</p><p><a href="https://threatpost.com/tractors-pod-ice-cream-lipstick-ces-2021-worst/163117/">https://threatpost.com/tractors-pod-ice-cream-lipstick-ces-2021-worst/163117/</a></p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sat, 23 Jan 2021 00:41:25 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/5-cybersecurity-best-practices-ytfa0XVf</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I am go over these two articles below and discuss the new changes with DailyCyber’s schedule. </p><p><br /> </p><p>5 Cybersecurity Best Practices For Planning Ahead</p><p><a href="https://securityintelligence.com/articles/five-cybersecurity-best-practices-for-planning-ahead/">https://securityintelligence.com/articles/five-cybersecurity-best-practices-for-planning-ahead/</a></p><p> </p><p>CES 2021 Gadgets: Worst in Privacy and Security Awards</p><p><a href="https://threatpost.com/tractors-pod-ice-cream-lipstick-ces-2021-worst/163117/">https://threatpost.com/tractors-pod-ice-cream-lipstick-ces-2021-worst/163117/</a></p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="53641227" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/8d2cca98-5574-4b3c-b30d-e6d7b3095050/audio/f12dd01c-ad66-4929-bcfc-10e74df4c85a/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>5 Cybersecurity Best Practices</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:55:53</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am go over these two articles below and discuss the new changes with DailyCyber’s schedule. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am go over these two articles below and discuss the new changes with DailyCyber’s schedule. </itunes:subtitle>
      <itunes:keywords>#dailycyber248, #5cybersecuritybestpractices, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a161505-20fd-4ef0-883a-2111a8635cb4</guid>
      <title>Cloud Security with Robert McFeely from Octiga</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to interview Robert McFeely from Octiga. We discuss what companies should be focusing on Cyber Security for 2021 and how to harden their cloud security</p><p> </p><p>Robert McFeely: </p><p>Linked: <a href="https://www.linkedin.com/company/octiga/">https://www.linkedin.com/company/octiga/</a></p><p>Twitter: https://www.Twitter.com/octiga_io</p><p>Website: <a href="https://www.octiga.io/">https://www.Octiga.io</a></p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 15 Jan 2021 19:34:13 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/cloud-security-with-robert-mcfeely-from-octiga-G9DFnlsN</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to interview Robert McFeely from Octiga. We discuss what companies should be focusing on Cyber Security for 2021 and how to harden their cloud security</p><p> </p><p>Robert McFeely: </p><p>Linked: <a href="https://www.linkedin.com/company/octiga/">https://www.linkedin.com/company/octiga/</a></p><p>Twitter: https://www.Twitter.com/octiga_io</p><p>Website: <a href="https://www.octiga.io/">https://www.Octiga.io</a></p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="53338625" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/02903a6b-d69e-4bbd-9906-b625d3a5f7ae/audio/4c78d2a9-b0a9-4b2a-99b5-0f90e0e1a725/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Cloud Security with Robert McFeely from Octiga</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:55:34</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am fortunate to interview Robert McFeely from Octiga. We discuss what companies should be focusing on Cyber Security for 2021 and how to harden their cloud security

Robert McFeely: 

Linked: https://www.linkedin.com/company/octiga/

Twitter: https://www.Twitter.com/octiga_io

Website: https://www.Octiga.io</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am fortunate to interview Robert McFeely from Octiga. We discuss what companies should be focusing on Cyber Security for 2021 and how to harden their cloud security

Robert McFeely: 

Linked: https://www.linkedin.com/company/octiga/

Twitter: https://www.Twitter.com/octiga_io

Website: https://www.Octiga.io</itunes:subtitle>
      <itunes:keywords>#octiga, #dailycyber247, #brandonkrieger, #robertmcfeely, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">35523db6-5cdf-4369-8e69-a901f7fc4c30</guid>
      <title>Strong Cyber Security Start for 2021</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I first want to wish you a Happy 2021 and hope you, your family are healthy as well as safe. In this podcast I am going to covering my goals for 2021 and what I am seeing for this year in Cyber Security.  </p><p> </p><p>Articles I cover: </p><p>2021 Cyber Security Predictions:</p><p>https://cisomag.eccouncil.org/cybersecurity-predictions-2021/</p><p> </p><p>CCIO Certification</p><p>https://ciso.eccouncil.org/cciso-certification/</p><p> </p><p>Brandon’s Speaking Engagement </p><p><a href="https://brandonknss.krtra.com/t/qZwG0D7FJyXc">https://brandonknss.krtra.com/t/qZwG0D7FJyXc</a></p><p> </p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below </p><p> </p>
]]></description>
      <pubDate>Sun, 10 Jan 2021 16:41:35 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/strong-cyber-security-start-for-2021-IAXOmar3</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I first want to wish you a Happy 2021 and hope you, your family are healthy as well as safe. In this podcast I am going to covering my goals for 2021 and what I am seeing for this year in Cyber Security.  </p><p> </p><p>Articles I cover: </p><p>2021 Cyber Security Predictions:</p><p>https://cisomag.eccouncil.org/cybersecurity-predictions-2021/</p><p> </p><p>CCIO Certification</p><p>https://ciso.eccouncil.org/cciso-certification/</p><p> </p><p>Brandon’s Speaking Engagement </p><p><a href="https://brandonknss.krtra.com/t/qZwG0D7FJyXc">https://brandonknss.krtra.com/t/qZwG0D7FJyXc</a></p><p> </p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below </p><p> </p>
]]></content:encoded>
      <enclosure length="48458533" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/e2539c01-743d-4c95-a634-48cea5871db2/audio/1abafdcd-a3de-4b09-9ce1-a882b04d25d4/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Strong Cyber Security Start for 2021</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:50:29</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I first want to wish you a Happy 2021 and hope you, your family are healthy as well as safe. In this podcast I am going to covering my goals for 2021 and what I am seeing for this year in Cyber Security. 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I first want to wish you a Happy 2021 and hope you, your family are healthy as well as safe. In this podcast I am going to covering my goals for 2021 and what I am seeing for this year in Cyber Security. 
</itunes:subtitle>
      <itunes:keywords>#dailycyber246, #covid19, #pandemic, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0564e1de-66f5-4bd2-9add-a66b83492c58</guid>
      <title>Happy Holiday DailyCyber Live</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss what I am working on, a few articles in the Cyber Security News and wishing you and your family a Happy Holiday!  </p><p> </p><p>Articles I cover: </p><p>Microsoft Warns CrowdStrike of Hackers Targeting Azure Cloud Customers</p><p>https://thehackernews.com/2020/12/microsoft-warns-crowdstrike-of-hackers.html</p><p> </p><p>Windows Zero-Day Still Circulating After Faulty Fix</p><p>https://threatpost.com/windows-zero-day-circulating-faulty-fix/162610/</p><p> </p><p> </p><p>Why cybersecurity tools fail when it comes to ambiguity</p><p>https://www.techrepublic.com/article/why-cybersecurity-tools-fail-when-it-comes-to-ambiguity/#ftag=RSS56d97e7</p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below </p><p> </p>
]]></description>
      <pubDate>Thu, 31 Dec 2020 21:19:34 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/happy-holiday-dailycyber-live-c01OkI_8</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss what I am working on, a few articles in the Cyber Security News and wishing you and your family a Happy Holiday!  </p><p> </p><p>Articles I cover: </p><p>Microsoft Warns CrowdStrike of Hackers Targeting Azure Cloud Customers</p><p>https://thehackernews.com/2020/12/microsoft-warns-crowdstrike-of-hackers.html</p><p> </p><p>Windows Zero-Day Still Circulating After Faulty Fix</p><p>https://threatpost.com/windows-zero-day-circulating-faulty-fix/162610/</p><p> </p><p> </p><p>Why cybersecurity tools fail when it comes to ambiguity</p><p>https://www.techrepublic.com/article/why-cybersecurity-tools-fail-when-it-comes-to-ambiguity/#ftag=RSS56d97e7</p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below </p><p> </p>
]]></content:encoded>
      <enclosure length="47004871" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/b7fa2f17-b2af-4bbb-bd61-64822d776f76/audio/57a960ef-d27d-44d7-9c3b-7833e0dfb726/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Happy Holiday DailyCyber Live</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:48:58</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss what I am working on, a few articles in the Cyber Security News and wishing you and your family a Happy Holiday! </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss what I am working on, a few articles in the Cyber Security News and wishing you and your family a Happy Holiday! </itunes:subtitle>
      <itunes:keywords>#dailycyber245, #covid19, #happyholiday, #pandemic, #brandonkrieger, #happynewyear2021, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">77a11694-0718-4e5b-9aaa-22f4ebf12fab</guid>
      <title>How to Think Like a CISO with Dr. Eric Cole</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. He helps companies and CISO protect their organizations. </p><p><br /> </p><p>You can connect with Dr. Eric Cole here:<br /> </p><p>Website: <a href="https://secure-anchor.com/">https://secure-anchor.com/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/company/secure-anchor-consulting/">https://www.linkedin.com/company/secure-anchor-consulting/</a></p><p>Twitter: <a href="https://twitter.com/drericcole">https://twitter.com/drericcole</a></p><p>YouTube: <a href="https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA">https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA</a></p><p><br /> </p><p> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 24 Dec 2020 12:28:21 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/how-to-think-like-a-ciso-with-dr-eric-cole-xRA_5kN9</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. He helps companies and CISO protect their organizations. </p><p><br /> </p><p>You can connect with Dr. Eric Cole here:<br /> </p><p>Website: <a href="https://secure-anchor.com/">https://secure-anchor.com/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/company/secure-anchor-consulting/">https://www.linkedin.com/company/secure-anchor-consulting/</a></p><p>Twitter: <a href="https://twitter.com/drericcole">https://twitter.com/drericcole</a></p><p>YouTube: <a href="https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA">https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA</a></p><p><br /> </p><p> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="61005668" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/b73b31f5-ed9c-41be-b661-25151127b663/audio/23deebb4-c6ea-4198-b0b5-5ade6ee3ccf2/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>How to Think Like a CISO with Dr. Eric Cole</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:03:33</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. He helps companies and CISO protect their organizations. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have the fortunate opportunity to interview Dr. Eric Cole who is an expert in Cyber Security industry. He helps companies and CISO protect their organizations. </itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #ciso, #drericcole, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness, #dailycyber244</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f464e544-7f94-42dc-8487-ed58cc071fdc</guid>
      <title>SolarWinds Cyber Security Breach</title>
      <description><![CDATA[<p>SolarWinds Cyber Security Breach | DailyCyber 243 ~ Watch Now ~</p><p>In today’s DailyCyber Podcast I discuss how are things going in the Pandemic in the GTA. I also go through the SolarWinds and FireEye Breach. </p><p> </p><p>Microsoft, FireEye confirm SolarWinds supply chain attack</p><p><a href="https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack">https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack</a></p><p> </p><p>The CyberWire DailyBriefing For 12.14.20</p><p>[<a href="https://thecyberwire.com/newsletters/daily-briefing/9/239%5D">https://thecyberwire.com/newsletters/daily-briefing/9/239]</a></p><p> </p><p>Cozy Bear</p><p><a href="https://en.wikipedia.org/wiki/Cozy_Bear">https://en.wikipedia.org/wiki/Cozy_Bear</a></p><p> </p><p> </p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below</p>
]]></description>
      <pubDate>Sat, 19 Dec 2020 21:19:28 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/solarwinds-cyber-security-breach-kvRHiBEV</link>
      <content:encoded><![CDATA[<p>SolarWinds Cyber Security Breach | DailyCyber 243 ~ Watch Now ~</p><p>In today’s DailyCyber Podcast I discuss how are things going in the Pandemic in the GTA. I also go through the SolarWinds and FireEye Breach. </p><p> </p><p>Microsoft, FireEye confirm SolarWinds supply chain attack</p><p><a href="https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack">https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack</a></p><p> </p><p>The CyberWire DailyBriefing For 12.14.20</p><p>[<a href="https://thecyberwire.com/newsletters/daily-briefing/9/239%5D">https://thecyberwire.com/newsletters/daily-briefing/9/239]</a></p><p> </p><p>Cozy Bear</p><p><a href="https://en.wikipedia.org/wiki/Cozy_Bear">https://en.wikipedia.org/wiki/Cozy_Bear</a></p><p> </p><p> </p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below</p>
]]></content:encoded>
      <enclosure length="38035049" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/809468aa-2930-4546-95d5-5b8a121134d1/audio/73465049-b1f4-41ec-8dff-46deb7773cca/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>SolarWinds Cyber Security Breach</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:39:37</itunes:duration>
      <itunes:summary>SolarWinds Cyber Security Breach | DailyCyber 243 ~ Watch Now ~

In today’s DailyCyber Podcast I discuss how are things going in the Pandemic in the GTA. I also go through the SolarWinds and FireEye Breach. 
</itunes:summary>
      <itunes:subtitle>SolarWinds Cyber Security Breach | DailyCyber 243 ~ Watch Now ~

In today’s DailyCyber Podcast I discuss how are things going in the Pandemic in the GTA. I also go through the SolarWinds and FireEye Breach. 
</itunes:subtitle>
      <itunes:keywords>#dailycyber243, #covid19, #pandemic, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness, #solarwinds, #fireeye</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f027fd53-c8c5-406d-9a25-24ad9da999df</guid>
      <title>November 2020 Cyber Security News</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I share what I have been working on, new Meetup group, CISSP study group…etc I also discuss what I am finding in the news. See articles below  </p><p> </p><p>Toymaker Mattel Hit by Ransomware Attack</p><p>https://threatpost.com/mattel-hit-by-ransomware/160947/</p><p> </p><p> </p><p>Endpoint Security Extends to the Cloud</p><p>https://cisomag.eccouncil.org/endpoint-security-cloud/</p><p> </p><p>What is the “Cyberchology of Human Error” in Cybersecurity?</p><p>https://cisomag.eccouncil.org/human-error-in-cybersecurity/</p><p> </p><p> </p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below</p><p> </p>
]]></description>
      <pubDate>Thu, 12 Nov 2020 16:56:11 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/november-2020-cyber-security-news-hqveHvvG</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I share what I have been working on, new Meetup group, CISSP study group…etc I also discuss what I am finding in the news. See articles below  </p><p> </p><p>Toymaker Mattel Hit by Ransomware Attack</p><p>https://threatpost.com/mattel-hit-by-ransomware/160947/</p><p> </p><p> </p><p>Endpoint Security Extends to the Cloud</p><p>https://cisomag.eccouncil.org/endpoint-security-cloud/</p><p> </p><p>What is the “Cyberchology of Human Error” in Cybersecurity?</p><p>https://cisomag.eccouncil.org/human-error-in-cybersecurity/</p><p> </p><p> </p><p> </p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below</p><p> </p>
]]></content:encoded>
      <enclosure length="34341126" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/6c8a6199-31f7-4f0d-8002-2b6f5e7e62d6/audio/7db89fd3-e5eb-4c0e-aae4-ab5fc2f09b1c/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>November 2020 Cyber Security News</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:35:46</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I share what I have been working on, new Meetup group, CISSP study group…etc I also discuss what I am finding in the news. See articles below  </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I share what I have been working on, new Meetup group, CISSP study group…etc I also discuss what I am finding in the news. See articles below  </itunes:subtitle>
      <itunes:keywords>#dailycyber241, #covid19, #pandemic, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dc0fdcf1-b6b2-40e0-b889-2549d588b6f8</guid>
      <title>Cyber Security Success or Failures Through the Pandemic</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss the successes and failures of Cyber Security through the Pandemic. </p><p>New Normal Effect! 85% of Organizations Say Cybersecurity is More Important than Ever</p><p><a href="https://cisomag.eccouncil.org/new-normal-effect-85-of-organizations-say-cybersecurity-is-more-important-than-ever/">https://cisomag.eccouncil.org/new-normal-effect-85-of-organizations-say-cybersecurity-is-more-important-than-ever/</a></p><p> </p><p>Security Officers, Are Your Employees Practicing Good Habits from Home?</p><p><a href="https://www.darkreading.com/vulnerabilities---threats/security-officers-are-your-employers-practicing-good-habits-from-home/a/d-id/1338986?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple">https://www.darkreading.com/vulnerabilities---threats/security-officers-are-your-employers-practicing-good-habits-from-home/a/d-id/1338986?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</a></p><p> </p><p>Netflix: The Social Dilemma </p><p><a href="https://www.netflix.com/ca/title/81254224">https://www.netflix.com/ca/title/81254224</a></p><p> </p><p>Guide: Scale or Fail — Why MSSPs Need Multitenant Security Solutions**</p><p><a href="https://thehackernews.com/2020/10/multitenant-cybersecurity-solution.html">https://thehackernews.com/2020/10/multitenant-cybersecurity-solution.html</a></p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below</p>
]]></description>
      <pubDate>Thu, 29 Oct 2020 23:22:58 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/cyber-security-success-or-failures-through-the-pandemic-vwXgc2wA</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss the successes and failures of Cyber Security through the Pandemic. </p><p>New Normal Effect! 85% of Organizations Say Cybersecurity is More Important than Ever</p><p><a href="https://cisomag.eccouncil.org/new-normal-effect-85-of-organizations-say-cybersecurity-is-more-important-than-ever/">https://cisomag.eccouncil.org/new-normal-effect-85-of-organizations-say-cybersecurity-is-more-important-than-ever/</a></p><p> </p><p>Security Officers, Are Your Employees Practicing Good Habits from Home?</p><p><a href="https://www.darkreading.com/vulnerabilities---threats/security-officers-are-your-employers-practicing-good-habits-from-home/a/d-id/1338986?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple">https://www.darkreading.com/vulnerabilities---threats/security-officers-are-your-employers-practicing-good-habits-from-home/a/d-id/1338986?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</a></p><p> </p><p>Netflix: The Social Dilemma </p><p><a href="https://www.netflix.com/ca/title/81254224">https://www.netflix.com/ca/title/81254224</a></p><p> </p><p>Guide: Scale or Fail — Why MSSPs Need Multitenant Security Solutions**</p><p><a href="https://thehackernews.com/2020/10/multitenant-cybersecurity-solution.html">https://thehackernews.com/2020/10/multitenant-cybersecurity-solution.html</a></p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below</p>
]]></content:encoded>
      <enclosure length="45967079" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/86d30cc7-64fe-4b7c-afd1-73292e5c6672/audio/51419178-12a3-461d-bae3-4aafe64fedd6/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Cyber Security Success or Failures Through the Pandemic</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:47:53</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss the successes and failures of Cyber Security through the Pandemic. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss the successes and failures of Cyber Security through the Pandemic. </itunes:subtitle>
      <itunes:keywords>#dailycyber240, #covid19, #pandemic, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e94d80c5-1d0c-4f6a-b608-e48b136bbc19</guid>
      <title>Neal Bridges Discusses Cyber Security Posture Through The Pandemic</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have a good friend of mine Neal Bridges on the Podcast to discuss the current Cyber Security posture companies should be looking at through the Pandemic. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Mon, 26 Oct 2020 13:00:00 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger, Neal Bridges)</author>
      <link>https://www.dailycyber.ca/episodes/neal-bridges-discusses-cyber-security-posture-through-the-pandemic-6H42DPml</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have a good friend of mine Neal Bridges on the Podcast to discuss the current Cyber Security posture companies should be looking at through the Pandemic. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="61798537" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/14a98d7e-505e-4455-ba4d-b2941087cedd/audio/1c4f328d-7527-4b6c-97d6-9287001999b6/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Neal Bridges Discusses Cyber Security Posture Through The Pandemic</itunes:title>
      <itunes:author>Brandon Krieger, Neal Bridges</itunes:author>
      <itunes:duration>01:04:22</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have a good friend of mine Neal Bridges on the Podcast to discuss the current Cyber Security posture companies should be looking at through the Pandemic. 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have a good friend of mine Neal Bridges on the Podcast to discuss the current Cyber Security posture companies should be looking at through the Pandemic. 
</itunes:subtitle>
      <itunes:keywords>nealbridges, #covid-19, #brandonkrieger, pandemic, #cybersecurity, #cyberthreats, #cybersecuritynews, #dailycyber239, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4bec7f9e-8fc1-4cc8-974f-5fac879993e3</guid>
      <title>Cyber Security Legal Discussion</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I dive into the legal side of Cyber Security and why it’s important to understand these principals. I also cover these news articles:</p><p><br /> </p><p><a href="https://www.bleepingcomputer.com/news/security/new-ransomware-vaccine-kills-programs-wiping-windows-shadow-volumes/">https://www.bleepingcomputer.com/news/security/new-ransomware-vaccine-kills-programs-wiping-windows-shadow-volumes/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/why-everyone-should-disable-vssadminexe-now/">https://www.bleepingcomputer.com/news/security/why-everyone-should-disable-vssadminexe-now/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-jersey-hospital-paid-ransomware-gang-670k-to-prevent-data-leak/">https://www.bleepingcomputer.com/news/security/new-jersey-hospital-paid-ransomware-gang-670k-to-prevent-data-leak/</a></p><p><a href="https://www.techrepublic.com/article/vulnerable-supply-chains-introduce-increasingly-interconnected-attack-surfaces/#ftag=RSS56d97e7">https://www.techrepublic.com/article/vulnerable-supply-chains-introduce-increasingly-interconnected-attack-surfaces/#ftag=RSS56d97e7</a></p><p><a href="https://cisomag.eccouncil.org/4-83-mn-ddos-attacks-reported-globally-in-h1-2020/">https://cisomag.eccouncil.org/4-83-mn-ddos-attacks-reported-globally-in-h1-2020/</a></p><p><a href="https://www.securitymagazine.com/articles/93482-uhs-hospitals-hit-by-ryuk-ransomware-forced-to-shut-down-systems">https://www.securitymagazine.com/articles/93482-uhs-hospitals-hit-by-ryuk-ransomware-forced-to-shut-down-systems</a></p><p><a href="https://youtu.be/u0Q8OzTicnw">https://youtu.be/u0Q8OzTicnw</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sun, 11 Oct 2020 21:12:37 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/cyber-security-legal-discussion-figlhoCi</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I dive into the legal side of Cyber Security and why it’s important to understand these principals. I also cover these news articles:</p><p><br /> </p><p><a href="https://www.bleepingcomputer.com/news/security/new-ransomware-vaccine-kills-programs-wiping-windows-shadow-volumes/">https://www.bleepingcomputer.com/news/security/new-ransomware-vaccine-kills-programs-wiping-windows-shadow-volumes/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/why-everyone-should-disable-vssadminexe-now/">https://www.bleepingcomputer.com/news/security/why-everyone-should-disable-vssadminexe-now/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-jersey-hospital-paid-ransomware-gang-670k-to-prevent-data-leak/">https://www.bleepingcomputer.com/news/security/new-jersey-hospital-paid-ransomware-gang-670k-to-prevent-data-leak/</a></p><p><a href="https://www.techrepublic.com/article/vulnerable-supply-chains-introduce-increasingly-interconnected-attack-surfaces/#ftag=RSS56d97e7">https://www.techrepublic.com/article/vulnerable-supply-chains-introduce-increasingly-interconnected-attack-surfaces/#ftag=RSS56d97e7</a></p><p><a href="https://cisomag.eccouncil.org/4-83-mn-ddos-attacks-reported-globally-in-h1-2020/">https://cisomag.eccouncil.org/4-83-mn-ddos-attacks-reported-globally-in-h1-2020/</a></p><p><a href="https://www.securitymagazine.com/articles/93482-uhs-hospitals-hit-by-ryuk-ransomware-forced-to-shut-down-systems">https://www.securitymagazine.com/articles/93482-uhs-hospitals-hit-by-ryuk-ransomware-forced-to-shut-down-systems</a></p><p><a href="https://youtu.be/u0Q8OzTicnw">https://youtu.be/u0Q8OzTicnw</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="45919013" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/0bbe3e19-36bb-44d4-ad9c-b4d2bba7e1a1/audio/bc16d5c6-0daa-4796-8aa5-aee5b3a75f48/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Cyber Security Legal Discussion</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:47:50</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I dive into the legal side of Cyber Security and why it’s important to understand these principals. I also cover these news articles:
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I dive into the legal side of Cyber Security and why it’s important to understand these principals. I also cover these news articles:
</itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #ransomware, #dailycyber238, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5dca2970-36e5-4b50-97b7-942d5813513d</guid>
      <title>Deception Cyber Security Interview with Al White</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to interview with Al White and discuss Deception Cyber Security. We all so discuss the state of Cyber Security and what companies need to know. </p><p>To contact Al White his email address is awhite@wricanada.com</p>
]]></description>
      <pubDate>Mon, 5 Oct 2020 13:00:00 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/deception-cyber-security-interview-with-al-white-AFx1p_IA</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to interview with Al White and discuss Deception Cyber Security. We all so discuss the state of Cyber Security and what companies need to know. </p><p>To contact Al White his email address is awhite@wricanada.com</p>
]]></content:encoded>
      <enclosure length="65682048" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/203f7fb5-5379-4318-b2e9-af7b53673808/audio/aa5f88e1-0838-40fa-b790-fea1d7291c60/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Deception Cyber Security Interview with Al White</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:08:25</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am fortunate to interview with Al White and discuss Deception Cyber Security. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am fortunate to interview with Al White and discuss Deception Cyber Security. </itunes:subtitle>
      <itunes:keywords>#dailycyber237, #brandonkrieger, #deceptioncybersecurity, #wricanada, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">066ece42-5d65-4531-8912-105d27b3fa65</guid>
      <title>Update on Pandemic Cyber Security</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I provide an update on what is going on with companies Cyber Security and what you should be aware of. </p><p><br /> </p><p>Today I cover these Cyber Security articles: </p><p><br /><a href="https://cisomag.eccouncil.org/under-attack-2000-magento-stores-hacked-in-a-magecart-campaign/">https://cisomag.eccouncil.org/under-attack-2000-magento-stores-hacked-in-a-magecart-campaign/</a></p><p><br /><a href="https://www.darkreading.com/iot/more-printers-could-mean-security-problems-for-home-bound-workers/d/d-id/1338895?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple">https://www.darkreading.com/iot/more-printers-could-mean-security-problems-for-home-bound-workers/d/d-id/1338895?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 1 Oct 2020 18:11:21 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/update-on-pandemic-cyber-security-15MTonX5</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I provide an update on what is going on with companies Cyber Security and what you should be aware of. </p><p><br /> </p><p>Today I cover these Cyber Security articles: </p><p><br /><a href="https://cisomag.eccouncil.org/under-attack-2000-magento-stores-hacked-in-a-magecart-campaign/">https://cisomag.eccouncil.org/under-attack-2000-magento-stores-hacked-in-a-magecart-campaign/</a></p><p><br /><a href="https://www.darkreading.com/iot/more-printers-could-mean-security-problems-for-home-bound-workers/d/d-id/1338895?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple">https://www.darkreading.com/iot/more-printers-could-mean-security-problems-for-home-bound-workers/d/d-id/1338895?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="26403663" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/7a86584d-ca72-4257-992d-317f40fab88b/audio/8fd86258-7503-480b-b6c8-943bfd10e756/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Update on Pandemic Cyber Security</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:27:30</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I provide an update on what is going on with companies Cyber Security and what you should be aware of. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I provide an update on what is going on with companies Cyber Security and what you should be aware of. </itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #cybersecurity, #cyberthreats, #dailycyber236, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5633c8ab-46f7-4fe8-9478-14c4bd608a0c</guid>
      <title>Psychology of Human Error - Security Breaches</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have my guest host Neal Bridges Cyber Security influencer on my Podcast with me. We discuss what is going on in the industry, sales strategies and Cyber Security advice. </p><p> </p><p>Today we cover these three news articles to share what is going on in the industry: </p><p> </p><p><a href="https://cisomag.eccouncil.org/cyber-insurance-claims/">https://cisomag.eccouncil.org/cyber-insurance-claims/</a></p><p><a href="https://cisomag.eccouncil.org/implementing-zero-trust-network/">https://cisomag.eccouncil.org/implementing-zero-trust-network/</a></p><p><a href="https://cisomag.eccouncil.org/psychology-of-human-error-could-help-businesses-prevent-security-breaches/">https://cisomag.eccouncil.org/psychology-of-human-error-could-help-businesses-prevent-security-breaches/</a></p><p><br /> </p><p><br /> </p><p>To follow Neal check him out: </p><p><a href="https://www.twitch.tv/cyber_insecurity">https://www.twitch.tv/cyber_insecurity</a></p><p><a href="https://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kg">https://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kg</a></p><p><a href="https://twitter.com/ITJunkie">https://twitter.com/ITJunkie</a></p><p><br /> </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p> </p><p> </p>
]]></description>
      <pubDate>Sat, 26 Sep 2020 00:19:34 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/psychology-of-human-error-security-breaches-jIWtOUGi</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have my guest host Neal Bridges Cyber Security influencer on my Podcast with me. We discuss what is going on in the industry, sales strategies and Cyber Security advice. </p><p> </p><p>Today we cover these three news articles to share what is going on in the industry: </p><p> </p><p><a href="https://cisomag.eccouncil.org/cyber-insurance-claims/">https://cisomag.eccouncil.org/cyber-insurance-claims/</a></p><p><a href="https://cisomag.eccouncil.org/implementing-zero-trust-network/">https://cisomag.eccouncil.org/implementing-zero-trust-network/</a></p><p><a href="https://cisomag.eccouncil.org/psychology-of-human-error-could-help-businesses-prevent-security-breaches/">https://cisomag.eccouncil.org/psychology-of-human-error-could-help-businesses-prevent-security-breaches/</a></p><p><br /> </p><p><br /> </p><p>To follow Neal check him out: </p><p><a href="https://www.twitch.tv/cyber_insecurity">https://www.twitch.tv/cyber_insecurity</a></p><p><a href="https://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kg">https://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kg</a></p><p><a href="https://twitter.com/ITJunkie">https://twitter.com/ITJunkie</a></p><p><br /> </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="64200966" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c825755-136a-40ca-83b0-4c692b3b7aff/episodes/228e2307-8709-43d1-9df5-ed7e5fb25dc6/audio/ec935bd3-f291-4d1e-9edb-45abfa03421a/default_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Psychology of Human Error - Security Breaches</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:06:53</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have my guest host Neal Bridges Cyber Security influencer on my Podcast with me. We discuss what is going on in the industry, sales strategies and Cyber Security advice. 

Today we cover these three news articles to share what is going on in the industry: 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have my guest host Neal Bridges Cyber Security influencer on my Podcast with me. We discuss what is going on in the industry, sales strategies and Cyber Security advice. 

Today we cover these three news articles to share what is going on in the industry: 
</itunes:subtitle>
      <itunes:keywords>#nealbridges, #brandonkrieger, #cyberinsecurity, #cybersecurity, #dailycyber235, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">acffa861-aabc-4d25-9a35-db0f54c7d0f8</guid>
      <title>Interview with Neal Bridges Cyber Security</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast is my first Live Stream with my friend and Cyber Security influencer Neal Bridges. We discuss what is going on in the industry, sales strategies and Cyber Security advice</p><p><br /> </p><p>To follow Neal check him out: </p><p><a href="https://www.twitch.tv/cyber_insecurity">https://www.twitch.tv/cyber_insecurity</a></p><p><a href="https://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kg">https://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kg</a></p><p><a href="https://twitter.com/ITJunkie">https://twitter.com/ITJunkie</a></p><p><br /> </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Tue, 1 Sep 2020 02:31:20 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger, Neal Bridges)</author>
      <link>https://www.dailycyber.ca/episodes/interview-with-neal-bridges-cyber-security-sUToW8u9</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast is my first Live Stream with my friend and Cyber Security influencer Neal Bridges. We discuss what is going on in the industry, sales strategies and Cyber Security advice</p><p><br /> </p><p>To follow Neal check him out: </p><p><a href="https://www.twitch.tv/cyber_insecurity">https://www.twitch.tv/cyber_insecurity</a></p><p><a href="https://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kg">https://www.youtube.com/channel/UCL4JGzitDkX5TOwzs9A02Kg</a></p><p><a href="https://twitter.com/ITJunkie">https://twitter.com/ITJunkie</a></p><p><br /> </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="102761472" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/c561e77e-1a8c-4c74-b045-353287dce93e/dailycyber-234-48-khz_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Interview with Neal Bridges Cyber Security</itunes:title>
      <itunes:author>Brandon Krieger, Neal Bridges</itunes:author>
      <itunes:duration>01:47:03</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast is my first Live Stream with my friend and Cyber Security influencer Neal Bridges. We discuss what is going on in the industry, sales strategies and Cyber Security advice</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast is my first Live Stream with my friend and Cyber Security influencer Neal Bridges. We discuss what is going on in the industry, sales strategies and Cyber Security advice</itunes:subtitle>
      <itunes:keywords>#dailycyber234, #nealbridges, #brandonkrieger, #cyberinsecurity, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dd5e1ab9-c624-4926-9ae1-6266c8dd57df</guid>
      <title>Building a Cyber Security Team with Jason Nickola</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I get the opportunity to interview Jason Nickola and discuss the Cyber Security industry, building a team, education and so much more. This is an interview you don’t want to miss.</p><p> </p><p>To connect with Jason visit: <br /> </p><p>Website:  <a href="http://www.pulsarsecurity.com/">www.pulsarsecurity.com</a></p><p>Podcast: <a href="http://giac.org/podcasts">Giac.org/podcasts</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 23 Jul 2020 17:49:34 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/building-a-cyber-security-team-with-jason-nickola-RakpCGaW</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I get the opportunity to interview Jason Nickola and discuss the Cyber Security industry, building a team, education and so much more. This is an interview you don’t want to miss.</p><p> </p><p>To connect with Jason visit: <br /> </p><p>Website:  <a href="http://www.pulsarsecurity.com/">www.pulsarsecurity.com</a></p><p>Podcast: <a href="http://giac.org/podcasts">Giac.org/podcasts</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="91603206" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/87979c9a-62cc-4648-8eb4-fe1374775b1a/building-a-cyber-security-team-with-jason-nickola-or-dailycyber-233-watch-now_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Building a Cyber Security Team with Jason Nickola</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:35:25</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I get the opportunity to interview Jason Nickola and discuss the Cyber Security industry, building a team, education and so much more. This is an interview you don’t want to miss.</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I get the opportunity to interview Jason Nickola and discuss the Cyber Security industry, building a team, education and so much more. This is an interview you don’t want to miss.</itunes:subtitle>
      <itunes:keywords>#pulsarsecurity, #brandonkrieger, #jasonnickola, #cybersecurity, #cybersecuritynews, #cybersecurityawareness, #dailycyber233</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b37960c8-c02a-4aa3-80a5-f37c75ecd5d8</guid>
      <title>Interview with Karl Galbraith- vCISO Top Down Discussion</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I interview Karl Galbraith vCISO. Karl shares his view from being a CISO and now a vCISO about what companies need to focus on to enhance their security posture in 2020. <br /><br />Karl Galbraith Website: </p><p><a href="https://can01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fgalbraithandassociates.ca%2F&data=02%7C01%7C%7Cae62f16217af4a30087908d8242f2512%7C622d6f051935461c9cb0da4ef02e1e63%7C0%7C1%7C637299132193192196&sdata=Ktxy193r%2Fu9ZGEBn2P%2Bzg3LAQZEMhoo3Hep56VIMLLg%3D&reserved=0">http://galbraithandassociates.ca/</a></p><p>Podcast:</p><p><a href="https://open.spotify.com/show/0dLJ2TpWljyb40omiunVZt?si=Hnuo2zPSTda6SDj-AwrPWQ">https://open.spotify.com/show/0dLJ2TpWljyb40omiunVZt?si=Hnuo2zPSTda6SDj-AwrPWQ</a></p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p> </p>
]]></description>
      <pubDate>Fri, 17 Jul 2020 01:16:09 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/interview-with-karl-galbraith-vciso-top-down-discussion-LdT8O7lS</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I interview Karl Galbraith vCISO. Karl shares his view from being a CISO and now a vCISO about what companies need to focus on to enhance their security posture in 2020. <br /><br />Karl Galbraith Website: </p><p><a href="https://can01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fgalbraithandassociates.ca%2F&data=02%7C01%7C%7Cae62f16217af4a30087908d8242f2512%7C622d6f051935461c9cb0da4ef02e1e63%7C0%7C1%7C637299132193192196&sdata=Ktxy193r%2Fu9ZGEBn2P%2Bzg3LAQZEMhoo3Hep56VIMLLg%3D&reserved=0">http://galbraithandassociates.ca/</a></p><p>Podcast:</p><p><a href="https://open.spotify.com/show/0dLJ2TpWljyb40omiunVZt?si=Hnuo2zPSTda6SDj-AwrPWQ">https://open.spotify.com/show/0dLJ2TpWljyb40omiunVZt?si=Hnuo2zPSTda6SDj-AwrPWQ</a></p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p> </p>
]]></content:encoded>
      <enclosure length="72251278" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/5ad065d5-9bd7-463c-9189-cb1f0f4ab2c0/interview-with-karl-galbraith-vciso-top-down-discussion-or-dailycyber-232-watch-now_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Interview with Karl Galbraith- vCISO Top Down Discussion</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:15:16</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I interview Karl Galbraith vCISO. Karl shares his view from being a CISO and now a vCISO about what companies need to focus on to enhance their security posture in 2020. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I interview Karl Galbraith vCISO. Karl shares his view from being a CISO and now a vCISO about what companies need to focus on to enhance their security posture in 2020. </itunes:subtitle>
      <itunes:keywords>#dailycyber232, #brandonkrieger, #vciso, #cybersecurity, #cybersecurityindustry, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">94fb87ff-7828-4b28-b667-e1029d839883</guid>
      <title>Interview with Sumit Bhatia- Rogers Cybersecure Catalyst</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I interview Sumit Bhatia from Rogers Cybersecure Catalyst. We discuss what is going on in the Cyber Security Industry. How Rogers Cybersecure Catalyst is helping the Cyber Security industry and so much more. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sat, 11 Jul 2020 18:11:10 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/interview-with-sumit-bhatia-rogers-cybersecure-catalyst-vrShHSiz</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I interview Sumit Bhatia from Rogers Cybersecure Catalyst. We discuss what is going on in the Cyber Security Industry. How Rogers Cybersecure Catalyst is helping the Cyber Security industry and so much more. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="66097665" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/b776144c-9658-4ca5-84cb-149cf7e1aa6d/interview-with-sumit-bhatia-rogers-cybersecure-catalyst-or-dailycyber-231-watch-now_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Interview with Sumit Bhatia- Rogers Cybersecure Catalyst</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:08:51</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I interview Sumit Bhatia from Rogers Cybersecure Catalyst. We discuss what is going on in the Cyber Security Industry. How Rogers Cybersecure Catalyst is helping the Cyber Security industry and so much more. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I interview Sumit Bhatia from Rogers Cybersecure Catalyst. We discuss what is going on in the Cyber Security Industry. How Rogers Cybersecure Catalyst is helping the Cyber Security industry and so much more. </itunes:subtitle>
      <itunes:keywords>#dailycyber231, #brandonkrieger, #cybersecurity, #cybersecurityindustry, #rogerscybersecurecatalyst, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">62df2c5c-9ea1-4835-9007-83e1d3189460</guid>
      <title>How To Optimize Your Security Budget</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss two topics I keep hearing more about through my conversations with colleagues and through Cyber Security news:</p><p> </p><p> </p><p><strong>CISO Dialogue: How to Optimize Your Security Budget</strong></p><p> </p><p>"There are many different approaches to managing a security budget, and CISOs organize and prioritize uniquely based on the company, industry, and threats. Three consistent areas of spending are identity and access management (IAM), global risk and compliance (GRC), and security operations,” Brett Wahlin CISO of Amazon Prime Video noting:</p><p> </p><p>* IAM is always a mess because no one wants to deal with access management, passwords, access sprawl, and so on.  </p><p>* GRC is difficult because there are always new regulations to remain compliant with; privacy, in particular, is an ongoing challenge.</p><p>* With security operations, levels of effectiveness vary. Wahlin posed several questions for consideration. "Is it in-house? Are you outsourcing to an MSSP? How are you measuring effectiveness? It's an area where I often have to retool from a people, process, and technology standpoint."</p><p> </p><p>Top Tips for New CISOs</p><p>Brett Wahlin concluded with a breakdown of the most important things he would recommend a new CISO look at, both budgetary and beyond:</p><p>* Look at the three most problematic areas: IAM, GRC, and SecOps. You can always find things to fix, and it will give you some quick wins.</p><p>* Know your industry and how your security program can help the company grow.</p><p>* You need to be able to constantly communicate the value you're bringing to the table — it's how you'll get budget and, more importantly, it's how you keep it.</p><p>* "Partnering with the business" is not just a catch phrase batted around at security conferences. Learn what it means for your company and be a good partner.</p><p>* Think like an architect: As you build a program, how do the different functions interact with each other? How do you plan to grow based on shared communication?</p><p>* Don't be afraid to pull something out if it's not raising the security bar for your company.  </p><p> </p><p>https://www.darkreading.com/operations/ciso-dialogue-how-to-optimize-your-security-budget-/a/d-id/1338055</p><p> </p><p> </p><p><strong>76.36% Believe Cloud Service Provider is Responsible for Security: CISO MAG Market Trends Report</strong></p><p>From CISO Mag’s Cloud Security survey then found</p><p>76.36% said that cloud service providers (CSP) is entirely responsible for the security of the cloud</p><p>23.64% they said 40% in the article - stated the responsibility is on the cloud consumer  </p><p>Looking at these numbers you can tell that the “Shared Responsibility” as Amazon refers to it. Is not truly understood just by this survey alone.  </p><p>AWS defined a Shared Responsibility model that says “Security of the Cloud” is the responsibility of the CSP (Cloud Security Provider), but “Security in the cloud” is the responsibility of the customer. This model is gradually being accepted in the industry.</p><p> </p><p>https://www.cisomag.com/shared-responsibility-model/</p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below</p><p> </p>
]]></description>
      <pubDate>Fri, 19 Jun 2020 00:26:38 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/how-to-optimize-your-security-budget-Bp83XdSV</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss two topics I keep hearing more about through my conversations with colleagues and through Cyber Security news:</p><p> </p><p> </p><p><strong>CISO Dialogue: How to Optimize Your Security Budget</strong></p><p> </p><p>"There are many different approaches to managing a security budget, and CISOs organize and prioritize uniquely based on the company, industry, and threats. Three consistent areas of spending are identity and access management (IAM), global risk and compliance (GRC), and security operations,” Brett Wahlin CISO of Amazon Prime Video noting:</p><p> </p><p>* IAM is always a mess because no one wants to deal with access management, passwords, access sprawl, and so on.  </p><p>* GRC is difficult because there are always new regulations to remain compliant with; privacy, in particular, is an ongoing challenge.</p><p>* With security operations, levels of effectiveness vary. Wahlin posed several questions for consideration. "Is it in-house? Are you outsourcing to an MSSP? How are you measuring effectiveness? It's an area where I often have to retool from a people, process, and technology standpoint."</p><p> </p><p>Top Tips for New CISOs</p><p>Brett Wahlin concluded with a breakdown of the most important things he would recommend a new CISO look at, both budgetary and beyond:</p><p>* Look at the three most problematic areas: IAM, GRC, and SecOps. You can always find things to fix, and it will give you some quick wins.</p><p>* Know your industry and how your security program can help the company grow.</p><p>* You need to be able to constantly communicate the value you're bringing to the table — it's how you'll get budget and, more importantly, it's how you keep it.</p><p>* "Partnering with the business" is not just a catch phrase batted around at security conferences. Learn what it means for your company and be a good partner.</p><p>* Think like an architect: As you build a program, how do the different functions interact with each other? How do you plan to grow based on shared communication?</p><p>* Don't be afraid to pull something out if it's not raising the security bar for your company.  </p><p> </p><p>https://www.darkreading.com/operations/ciso-dialogue-how-to-optimize-your-security-budget-/a/d-id/1338055</p><p> </p><p> </p><p><strong>76.36% Believe Cloud Service Provider is Responsible for Security: CISO MAG Market Trends Report</strong></p><p>From CISO Mag’s Cloud Security survey then found</p><p>76.36% said that cloud service providers (CSP) is entirely responsible for the security of the cloud</p><p>23.64% they said 40% in the article - stated the responsibility is on the cloud consumer  </p><p>Looking at these numbers you can tell that the “Shared Responsibility” as Amazon refers to it. Is not truly understood just by this survey alone.  </p><p>AWS defined a Shared Responsibility model that says “Security of the Cloud” is the responsibility of the CSP (Cloud Security Provider), but “Security in the cloud” is the responsibility of the customer. This model is gradually being accepted in the industry.</p><p> </p><p>https://www.cisomag.com/shared-responsibility-model/</p><p> </p><p>To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below</p><p> </p>
]]></content:encoded>
      <enclosure length="16359686" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/d995474f-84be-4890-aac9-b2950ff97b82/how-to-optimize-your-security-budget-or-dailycyber-230_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>How To Optimize Your Security Budget</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:17:02</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss two topics I keep hearing more about through my conversations with colleagues and through Cyber Security news: 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss two topics I keep hearing more about through my conversations with colleagues and through Cyber Security news: 
</itunes:subtitle>
      <itunes:keywords>#dailycyber230, #brandonkrieger, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness, #securitybudget</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">28136592-6b29-43bd-a3e4-5b60b07f8a3e</guid>
      <title>Ransomware Threats Increase by 25% in 2020</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss the 25% increase in Ransomware in the first quarter in 2020. What to know and what should you do.</p><p>Here are some facts for you from the Beazley Breach Insight Report: </p><p>-Manufacturing Sector 156 % increase off incidents quarter to quarter</p><p>-Financial Sector and Healthcare continue to be the most affected which together account to almost 50% of all ransomware attacks reported in Q1 of 2020 </p><p> </p><p>Q1 2020 Ransomware incidents:</p><p>26% Financial Institution </p><p>24% Healthcare </p><p>9% Manufacturing </p><p>7% Professional services </p><p>6% Retail</p><p>6% Education </p><p><br /> </p><p>For more information </p><p><a href="https://www.cisomag.com/ransomware-attacks-rise-q1-2020/">https://www.cisomag.com/ransomware-attacks-rise-q1-2020/</a></p><p><br /> </p><p>How to protect you and your company:</p><p>1. Security systems are up to date</p><p>2. Work from home systems</p><p>   1. Are up to date and patched</p><p>   2. Have up to date endpoint and/or anti-virus protection</p><p>   3. Home network is secure</p><p>   4. VPN connect to work</p><p>   5. Family members on the home network are secure as well</p><p>3. Cyber Security Awareness training</p><p>   1. For employees and their families who are using the home network</p><p>4. Corporate polices are up to date</p><p>   1. Acceptable Use Policy</p><p>   2. Disaster Recovery</p><p>   3. Business Continuity</p><p>   4. Incident Response</p><p>   5. Breach Response</p><p><br /> </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 12 Jun 2020 00:38:07 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ransomware-threats-increase-by-25-in-2020-e_I0_AyH</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss the 25% increase in Ransomware in the first quarter in 2020. What to know and what should you do.</p><p>Here are some facts for you from the Beazley Breach Insight Report: </p><p>-Manufacturing Sector 156 % increase off incidents quarter to quarter</p><p>-Financial Sector and Healthcare continue to be the most affected which together account to almost 50% of all ransomware attacks reported in Q1 of 2020 </p><p> </p><p>Q1 2020 Ransomware incidents:</p><p>26% Financial Institution </p><p>24% Healthcare </p><p>9% Manufacturing </p><p>7% Professional services </p><p>6% Retail</p><p>6% Education </p><p><br /> </p><p>For more information </p><p><a href="https://www.cisomag.com/ransomware-attacks-rise-q1-2020/">https://www.cisomag.com/ransomware-attacks-rise-q1-2020/</a></p><p><br /> </p><p>How to protect you and your company:</p><p>1. Security systems are up to date</p><p>2. Work from home systems</p><p>   1. Are up to date and patched</p><p>   2. Have up to date endpoint and/or anti-virus protection</p><p>   3. Home network is secure</p><p>   4. VPN connect to work</p><p>   5. Family members on the home network are secure as well</p><p>3. Cyber Security Awareness training</p><p>   1. For employees and their families who are using the home network</p><p>4. Corporate polices are up to date</p><p>   1. Acceptable Use Policy</p><p>   2. Disaster Recovery</p><p>   3. Business Continuity</p><p>   4. Incident Response</p><p>   5. Breach Response</p><p><br /> </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="18545195" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/6a3f16c8-9d0e-47d3-ab2a-4910d18413b0/ransomware-threats-increase-by-25-in-2020-or-dailycyber-229_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ransomware Threats Increase by 25% in 2020</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:19:19</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss the 25% increase in Ransomware in the first quarter in 2020. What to know and what should you do.

Here are some facts for you from the Beazley Breach Insight Report: 

* Manufacturing Sector 156 % increase off incidents quarter to quarter
* Financial Sector and Healthcare continue to be the most affected which together account to almost 50% of all ransomware attacks reported in Q1 of 2020 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss the 25% increase in Ransomware in the first quarter in 2020. What to know and what should you do.

Here are some facts for you from the Beazley Breach Insight Report: 

* Manufacturing Sector 156 % increase off incidents quarter to quarter
* Financial Sector and Healthcare continue to be the most affected which together account to almost 50% of all ransomware attacks reported in Q1 of 2020 
</itunes:subtitle>
      <itunes:keywords>#dailycyber229, #brandonkrieger, #ransomware, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a05873b9-7322-42cb-94a1-7c136e194b56</guid>
      <title>The Biggest Cyber Security Challenges for Companies for the Next 12 Months</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss what are the biggest Cyber Security challenges for companies for the next 12 months. <br /> </p><ul><li>Digital Transformation “DX” (DX spending globally is estimated at $7.4 trillion between 2020 and 2024)</li><li>Digital Transformation Vulnerabilities</li><li>Ransomware attack costs on average $80,000 to restore data</li><li>The biggest challenge that will impact organizations within the next 12 months is cyberthreats (32%). Shortage of skills to implement technology (30%) and meeting changing customer needs (29%) were also cited as key hurdles.</li><li>Lack of staff to work on new initiatives (42%) was cited as the most impactful data protection challenge organizations currently have. Lack of budget for new initiatives and lack of visibility on operational performance were also cited.</li><li>Over a third (39%) of respondents said the ability to improve the reliability of backups is the most likely reason to drive their organization to change its primary backup solution.</li><li>Over a quarter (27%) of organizations’ data is backed up to the cloud by a Backup as a Service (BaaS) provider. 14% of data across organizations globally is not backed up.</li><li>Over two in five (43%) organizations plan to leverage cloud-based backup managed by a BaaS provider within the next two years.</li></ul><p> </p><p><a href="https://www.cisomag.com/cyberattacks-on-business-2020/">https://www.cisomag.com/cyberattacks-on-business-2020/</a></p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 5 Jun 2020 12:16:25 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/the-biggest-cyber-security-challenges-for-companies-for-the-next-12-months-_N_dR_9Q</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss what are the biggest Cyber Security challenges for companies for the next 12 months. <br /> </p><ul><li>Digital Transformation “DX” (DX spending globally is estimated at $7.4 trillion between 2020 and 2024)</li><li>Digital Transformation Vulnerabilities</li><li>Ransomware attack costs on average $80,000 to restore data</li><li>The biggest challenge that will impact organizations within the next 12 months is cyberthreats (32%). Shortage of skills to implement technology (30%) and meeting changing customer needs (29%) were also cited as key hurdles.</li><li>Lack of staff to work on new initiatives (42%) was cited as the most impactful data protection challenge organizations currently have. Lack of budget for new initiatives and lack of visibility on operational performance were also cited.</li><li>Over a third (39%) of respondents said the ability to improve the reliability of backups is the most likely reason to drive their organization to change its primary backup solution.</li><li>Over a quarter (27%) of organizations’ data is backed up to the cloud by a Backup as a Service (BaaS) provider. 14% of data across organizations globally is not backed up.</li><li>Over two in five (43%) organizations plan to leverage cloud-based backup managed by a BaaS provider within the next two years.</li></ul><p> </p><p><a href="https://www.cisomag.com/cyberattacks-on-business-2020/">https://www.cisomag.com/cyberattacks-on-business-2020/</a></p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="16586638" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/df937304-d9c5-472d-bb04-393e9766c1ea/the-biggest-cyber-security-challenges-for-companies-for-the-next-12-months_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>The Biggest Cyber Security Challenges for Companies for the Next 12 Months</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:17:17</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss what are the biggest Cyber Security challenges for companies for the next 12 months. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss what are the biggest Cyber Security challenges for companies for the next 12 months. </itunes:subtitle>
      <itunes:keywords>#dailycyber228, #brandonkrieger, #ransomware, #cybersecurity, #cyberthreats, #cybersecuritynews, #cybersecurityawareness, #businescontinuity</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8011ab60-6554-484c-b9b1-1bad62057f17</guid>
      <title>Are Law Firms Under Cyber Security Attack?</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss are Law Firms under Cyber Security Attack?  On May 12, 2020 we started to see news articles that Grubman, Shire Meiselas & Sack was compromised. They hackers stole 756 gigabytes of data, including celebrity contracts and personal emails. Reported by BBC News</p><p> </p><p><a href="https://www.bbc.com/news/technology-52632729">https://www.bbc.com/news/technology-52632729</a></p><p> </p><p>With COVID-19 and the increase of Cyber Attacks up 140% since the Pandemic started companies need to protect themselves. </p><p> </p><p>Things Companies need to focus on</p><ol><li>Security Awareness training</li><li>Business Continuity</li><li>Cost Cutting Measures</li><li>Compliance</li><li>Assessments to validate your security posture</li></ol><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 28 May 2020 23:38:34 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/are-law-firms-under-cyber-security-attack-MtEWVrJ1</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss are Law Firms under Cyber Security Attack?  On May 12, 2020 we started to see news articles that Grubman, Shire Meiselas & Sack was compromised. They hackers stole 756 gigabytes of data, including celebrity contracts and personal emails. Reported by BBC News</p><p> </p><p><a href="https://www.bbc.com/news/technology-52632729">https://www.bbc.com/news/technology-52632729</a></p><p> </p><p>With COVID-19 and the increase of Cyber Attacks up 140% since the Pandemic started companies need to protect themselves. </p><p> </p><p>Things Companies need to focus on</p><ol><li>Security Awareness training</li><li>Business Continuity</li><li>Cost Cutting Measures</li><li>Compliance</li><li>Assessments to validate your security posture</li></ol><p><br /><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="20158935" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/70ff0db3-4991-4457-b4f1-584a14d1084e/are-law-firms-under-cyber-security-attack-or-dailycyber-227_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Are Law Firms Under Cyber Security Attack?</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:21:00</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss are Law Firms under Cyber Security Attack?  On May 12, 2020 we started to see news articles that Grubman, Shire Meiselas &amp; Sack was compromised. They hackers stole 756 gigabytes of data, including celebrity contracts and personal emails. Reported by BBC News</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss are Law Firms under Cyber Security Attack?  On May 12, 2020 we started to see news articles that Grubman, Shire Meiselas &amp; Sack was compromised. They hackers stole 756 gigabytes of data, including celebrity contracts and personal emails. Reported by BBC News</itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #ransomware, #lawfirms, #cybersecurity, #cybersecuritynews, #dailycyber227, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8a607898-28b4-4e6d-be47-eba2b52b3e02</guid>
      <title>Cyber Security COVID-19 Update</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I catch up with you to see how you and your family are doing through this COVID-19 Pandemic. I also share what Cyber Security challenges I am seeing through this COVID-19 Pandemic. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 15 May 2020 00:42:04 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/cyber-security-covid-19-update-BdipKjhk</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I catch up with you to see how you and your family are doing through this COVID-19 Pandemic. I also share what Cyber Security challenges I am seeing through this COVID-19 Pandemic. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="19978377" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/bed43707-aaf5-474c-8718-2b4cd2649634/cyber-security-covid-19-update-or-dailycyber-226_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Cyber Security COVID-19 Update</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:20:49</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I catch up with you to see how you and your family are doing through this COVID-19 Pandemic. I also share what Cyber Security challenges I am seeing through this COVID-19 Pandemic. 
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I catch up with you to see how you and your family are doing through this COVID-19 Pandemic. I also share what Cyber Security challenges I am seeing through this COVID-19 Pandemic. 
</itunes:subtitle>
      <itunes:keywords>#dailycyber226, #covid-19, #brandonkrieger, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">95cd3214-62dd-4897-9b05-1dd54dbabd19</guid>
      <title>Red Team Discussion with Joe Vest</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast Joe Vest and I discuss his book Red Team Development and Operations. This is such a import conversation as companies work hard to maintain businesses through the pandemic. </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p><br /> </p><p>To purchase the Red Team Development and Operation book visit <a href="http://threatexpress.com/">http://threatexpress.com/</a></p>
]]></description>
      <pubDate>Sat, 9 May 2020 19:08:01 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/red-team-discussion-with-joe-vest-KZMTZvkE</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast Joe Vest and I discuss his book Red Team Development and Operations. This is such a import conversation as companies work hard to maintain businesses through the pandemic. </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p><br /> </p><p>To purchase the Red Team Development and Operation book visit <a href="http://threatexpress.com/">http://threatexpress.com/</a></p>
]]></content:encoded>
      <enclosure length="59564096" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/1540fd33-3426-4494-98ed-64d472047208/red-team-discussion-with-joe-vest-or-dailycyber-225_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Red Team Discussion with Joe Vest</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:02:03</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast Joe Vest and I discuss his book Red Team Development and Operations. This is such a import conversation as companies work hard to maintain businesses through the pandemic. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast Joe Vest and I discuss his book Red Team Development and Operations. This is such a import conversation as companies work hard to maintain businesses through the pandemic. </itunes:subtitle>
      <itunes:keywords>#joevest, #redteam, #penetrationtesting, #brandonkrieger, #dailycyber225, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8990593a-7e25-436d-9e61-2d5348d5dcd4</guid>
      <title>How To Protect Your Brand Discussion with David Stitt</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast David Stitt and I discuss how to protect your brand through the COVID-19 Pandemic. This is such a import conversation as companies work hard to maintain businesses through the pandemic. <br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 24 Apr 2020 23:37:43 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/how-to-protect-your-brand-discussion-with-david-stitt-P5PVwk3I</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast David Stitt and I discuss how to protect your brand through the COVID-19 Pandemic. This is such a import conversation as companies work hard to maintain businesses through the pandemic. <br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="65741564" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/2656e6eb-8ae2-4a31-a55f-8af8857951f0/how-to-protect-your-brand-discussion-with-david-stitt-or-dailycyber-224_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>How To Protect Your Brand Discussion with David Stitt</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:08:29</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast David Stitt and I discuss how to protect your brand through the COVID-19 Pandemic. This is such a import conversation as companies work hard to maintain businesses through the pandemic. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast David Stitt and I discuss how to protect your brand through the COVID-19 Pandemic. This is such a import conversation as companies work hard to maintain businesses through the pandemic. </itunes:subtitle>
      <itunes:keywords>#covid-19, #coronavirus, #brandonkrieger, #businessbrand, #dailycyber224, #cybersecurity, #cybersecuritynews, #davidstitt, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">110e8aef-0e75-4eb7-ab25-26820c694b4d</guid>
      <title>COVID-19  Cyber Security Discussion with vCISO Dominic Vogel</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have the pleasure to speak to Dominic Vogel who is an expert vCISO. His company is helping small to medium business stay protected through the COVID-19 Pandemic.  We discuss tips and strategies to help people through this stressful time. <br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below <br /> </p><p>Dominic’s website: www.cyber.sc</p>
]]></description>
      <pubDate>Sun, 19 Apr 2020 12:30:25 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/covid-19-cyber-security-discussion-with-vciso-domenic-vogel-KSxEhxbM</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have the pleasure to speak to Dominic Vogel who is an expert vCISO. His company is helping small to medium business stay protected through the COVID-19 Pandemic.  We discuss tips and strategies to help people through this stressful time. <br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below <br /> </p><p>Dominic’s website: www.cyber.sc</p>
]]></content:encoded>
      <enclosure length="42508466" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/6ee66e97-e05f-4aa4-9b28-2a946e38c118/covid-19-cyber-security-discussion-with-vciso-domenic-vogel-or-dailycyber-223-watch-now_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>COVID-19  Cyber Security Discussion with vCISO Dominic Vogel</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:44:17</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have the pleasure to speak to Dominic Vogel who is an expert vCISO. His company is helping small to medium business stay protected through the COVID-19 Pandemic.  We discuss tips and strategies to help people through this stressful time. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have the pleasure to speak to Dominic Vogel who is an expert vCISO. His company is helping small to medium business stay protected through the COVID-19 Pandemic.  We discuss tips and strategies to help people through this stressful time. </itunes:subtitle>
      <itunes:keywords>#covid-19, #coronavirus, #brandonkrieger, dominicvogel, #cybersecurity, #dailycyber223, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">71cb2cda-038a-44c0-b9a5-86e052af4a29</guid>
      <title>COVID-19 Mental Health Discussion with Catherine Moore</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have the pleasure to speak to Catherine Moore who is a Social Worker about the Mental Health issues she is seeing durning the COVID-19 Pandemic.  We discuss tips and strategies to help people through this stressful time. </p><p> </p><p>Follow Catherine Moore on Instagram: @SocialWokersRise </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sun, 5 Apr 2020 21:06:55 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/covid-19-mental-health-discussion-with-catherine-moore-j__4kcbL</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have the pleasure to speak to Catherine Moore who is a Social Worker about the Mental Health issues she is seeing durning the COVID-19 Pandemic.  We discuss tips and strategies to help people through this stressful time. </p><p> </p><p>Follow Catherine Moore on Instagram: @SocialWokersRise </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="29706377" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/a53b44c8-1c78-493c-b3fd-628840095c37/covid-19-mental-health-discussion-with-catherine-moore-or-dailycyber-222_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>COVID-19 Mental Health Discussion with Catherine Moore</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:30:57</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have the pleasure to speak to Catherine Moore who is a Social Worker about the Mental Health issues she is seeing durning the COVID-19 Pandemic.  We discuss tips and strategies to help people through this stressful time. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have the pleasure to speak to Catherine Moore who is a Social Worker about the Mental Health issues she is seeing durning the COVID-19 Pandemic.  We discuss tips and strategies to help people through this stressful time. </itunes:subtitle>
      <itunes:keywords>#socialwokersrise, #covid19, #dailycyber222, #coronavirus, #brandonkrieger, #cybersecurity, #mentalhealth, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a3f0e35f-564c-4e35-b410-538d5bb0613d</guid>
      <title>Enterprise Resource Planning (ERP) Discussion with Diogène Ntirandekura</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have the pleasure to speak to Diogène about Enterprise Resource Planning (ERP) and what companies need to look at through this COVID-19 Pandemic.  </p><p><br /> </p><p>Diogène Ntirandekura Website: <a href="https://consultinglifestyle.fm/">https://consultinglifestyle.fm</a></p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 3 Apr 2020 14:19:33 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/enterprise-resource-planning-erp-discussion-with-diogene-ntirandekura-e6U7kUJJ</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have the pleasure to speak to Diogène about Enterprise Resource Planning (ERP) and what companies need to look at through this COVID-19 Pandemic.  </p><p><br /> </p><p>Diogène Ntirandekura Website: <a href="https://consultinglifestyle.fm/">https://consultinglifestyle.fm</a></p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="54921854" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/0c8deebf-51b4-4f18-ae0e-bed078008c09/enterprise-resource-planning-erp-discussion-with-diogene-ntirandekura-or-dailycyber-221_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Enterprise Resource Planning (ERP) Discussion with Diogène Ntirandekura</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:57:13</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have the pleasure to speak to Diogène about Enterprise Resource Planning (ERP) and what companies need to look at through this COVID-19 Pandemic.  </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have the pleasure to speak to Diogène about Enterprise Resource Planning (ERP) and what companies need to look at through this COVID-19 Pandemic.  </itunes:subtitle>
      <itunes:keywords>#dailycyber221, #covid19, #erp, #coronavirus, #brandonkrieger, #enterpriseresourceplanning, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d8c7b579-de08-469e-9094-af8af6e9aec2</guid>
      <title>Coronavirus - COVID-19 Insurance Discussion with Aun Japanwala</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I have the pleasure to catch up with Aun Japanwala. A friend and colleague who specializes in the insurance industry for small to medium size businesses. We discuss what is going on in the industry with Cyber Security Insurance, COVID-19 and much more.  </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Sun, 29 Mar 2020 13:51:43 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/coronavirus-covid-19-insurance-discussion-with-aun-japanwala-0cqWpOo_</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I have the pleasure to catch up with Aun Japanwala. A friend and colleague who specializes in the insurance industry for small to medium size businesses. We discuss what is going on in the industry with Cyber Security Insurance, COVID-19 and much more.  </p><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="64331369" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/b6947f79-69b1-465c-b297-4f22b02e5f51/coronavirus-covid-19-insurance-discussion-with-aun-japanwala-or-dailycyber-220_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Coronavirus - COVID-19 Insurance Discussion with Aun Japanwala</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:07:01</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I have the pleasure to catch up with Aun Japanwala. A friend and colleague who specializes in the insurance industry for small to medium size businesses. We discuss what is going on in the industry with Cyber Security Insurance, COVID-19 and much more.  
</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I have the pleasure to catch up with Aun Japanwala. A friend and colleague who specializes in the insurance industry for small to medium size businesses. We discuss what is going on in the industry with Cyber Security Insurance, COVID-19 and much more.  
</itunes:subtitle>
      <itunes:keywords>#insurance, #covid-19, #coronavirus, #brandonkrieger, #cybersecurity, #cybersecuritynews, #dailycyber220, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b5617249-46f1-435f-ae24-c5260897da49</guid>
      <title>COVID- 19 Discussion with Two Ontario Nurses</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss what is going on with the COVID 19 Pandemic with two GTA Nurses Sara and Amie. They host their own podcast called The Gritty Nurse Podcast where they share their experiences asnurses, former co-workers, and friends. Together they tackle hot topics related to nursing and healthcare, with grit!</p><p><br /> </p><p>Listen to The Gritty Nurse Podcast on Apple Podcasts. <a href="https://podcasts.apple.com/ca/podcast/the-gritty-nurse-podcast/id1493290782">https://podcasts.apple.com/ca/podcast/the-gritty-nurse-podcast/id1493290782</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Wed, 25 Mar 2020 23:38:42 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/covid-19-discussion-with-two-ontario-nurses-yeLqE5O0</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss what is going on with the COVID 19 Pandemic with two GTA Nurses Sara and Amie. They host their own podcast called The Gritty Nurse Podcast where they share their experiences asnurses, former co-workers, and friends. Together they tackle hot topics related to nursing and healthcare, with grit!</p><p><br /> </p><p>Listen to The Gritty Nurse Podcast on Apple Podcasts. <a href="https://podcasts.apple.com/ca/podcast/the-gritty-nurse-podcast/id1493290782">https://podcasts.apple.com/ca/podcast/the-gritty-nurse-podcast/id1493290782</a></p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="68962775" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/682e251e-192c-4d4f-ad4d-3be877366616/covid-19-discussion-with-two-ontario-nurses-or-dailycyber-219_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>COVID- 19 Discussion with Two Ontario Nurses</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:11:50</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss what is going on with the COVID 19 Pandemic with two GTA Nurses Sara and Amie. They host their own podcast called The Gritty Nurse Podcast where they share their experiences as nurses, former co-workers, and friends. Together they tackle hot topics related to nursing and healthcare, with grit!</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss what is going on with the COVID 19 Pandemic with two GTA Nurses Sara and Amie. They host their own podcast called The Gritty Nurse Podcast where they share their experiences as nurses, former co-workers, and friends. Together they tackle hot topics related to nursing and healthcare, with grit!</itunes:subtitle>
      <itunes:keywords>#dailycyber219, #covid19, #coronavirus, #brandonkrieger, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9ad1cc82-7b97-4fac-af86-140b5c57ff3b</guid>
      <title>Coronavirus - COVID-19 Panel Discussion</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to have a panel discussion regarding the COVID-19 Pandemic. I have Dr. April Moreno - PhD health and informatics, Monica Noy - Osteopathic Manual Practitioner, Drew Prescott - Financial Advisor, and Joseph Carnevale - Partner & Managing Director of Sales. All to discuss what is COVID-19, what we need to think about and recommended actions we should take. </p><p> </p><p>This is a podcast you don't want to miss. <br /> </p><p>Dr. April Moreno - PhD Public Health and Informatics</p><p><strong>Website- </strong><a href="http://www.doctoraprilwellness.podbean.com/?fbclid=IwAR0QEtqIewNlypSd7nO4jxX2gkANneLxFN8hticuDUF26JHLwqZE05YbE4I">www.doctoraprilwellness.podbean.com</a></p><p>Questions: </p><p>1)What do we need to know about COVID-19? </p><p>2)Why do I need to quarantine myself?  </p><p>3)Can you tell us about Autoimmune diseases? What do we need to know about them?</p><p>4)What resources would you recommend to people for the lay person? <br /> </p><p><strong>Monica Noy - Osteopathic Manual Practitioner </strong></p><p><strong>Website-</strong><a href="https://www.monicanoy.com/"><strong>https://www.monicanoy.com/</strong></a><br /><br />Questions : </p><p>1)Why do I need to self quarantine?</p><p>2)Why do healthy people have to go through this process?</p><p>3)What do we need to focus on?</p><p>4)What are the responsibilities of health practitioners in this pandemic?</p><p>5)What are your recommendations we can do durning this Pandemic?   </p><p> </p><p><strong>Drew Prescott - Financial Advisor</strong></p><p><strong>Podcast- </strong><a href="https://soundcloud.com/collar-city-financial-strategies"><strong>https://soundcloud.com/collar-city-financial-strategies</strong></a></p><p><strong>Website- </strong><a href="http://www.collarcityfs.com/"><strong>www.collarcityfs.com</strong></a></p><p>Questions:</p><p>1)Do you know if people can collect Temporary Aid or Unemployment benefits if they have been laid off due to the corona virus? </p><p>2)What would you say to someone who is invested at this time and may be a little nervous? </p><p>3)Obviously hind sight is 20/20 but what are some good practices for the listeners to work on going forward? So that they can be better prepared for an even like this in the future? </p><p>4)What would you say to that person who is concerned they are short for their current bills?</p><p> </p><p><strong>Joseph Carnevale - Insurance Broker</strong></p><p>Website: <a href="https://brokerstrust.ca/about/team/joseph-carnevale/">https://brokerstrust.ca/about/team/joseph-carnevale/</a></p><p>Questions: </p><p>1) What is the current challenges people are facing with insurance personally as well as professionally?</p><p>2) What do people need to know?</p><p>3) What should they do going forward? This question is to help reduce the state of panic that everyone is in. </p>
]]></description>
      <pubDate>Mon, 23 Mar 2020 13:45:32 +0000</pubDate>
      <author>info@knssconsulting.com (Joseph Carnevale, Brandon Krieger, Monica Nay, Dr April Moreno)</author>
      <link>https://www.dailycyber.ca/episodes/coronavirus-covid-19-panel-discussion-FzrE27WD</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to have a panel discussion regarding the COVID-19 Pandemic. I have Dr. April Moreno - PhD health and informatics, Monica Noy - Osteopathic Manual Practitioner, Drew Prescott - Financial Advisor, and Joseph Carnevale - Partner & Managing Director of Sales. All to discuss what is COVID-19, what we need to think about and recommended actions we should take. </p><p> </p><p>This is a podcast you don't want to miss. <br /> </p><p>Dr. April Moreno - PhD Public Health and Informatics</p><p><strong>Website- </strong><a href="http://www.doctoraprilwellness.podbean.com/?fbclid=IwAR0QEtqIewNlypSd7nO4jxX2gkANneLxFN8hticuDUF26JHLwqZE05YbE4I">www.doctoraprilwellness.podbean.com</a></p><p>Questions: </p><p>1)What do we need to know about COVID-19? </p><p>2)Why do I need to quarantine myself?  </p><p>3)Can you tell us about Autoimmune diseases? What do we need to know about them?</p><p>4)What resources would you recommend to people for the lay person? <br /> </p><p><strong>Monica Noy - Osteopathic Manual Practitioner </strong></p><p><strong>Website-</strong><a href="https://www.monicanoy.com/"><strong>https://www.monicanoy.com/</strong></a><br /><br />Questions : </p><p>1)Why do I need to self quarantine?</p><p>2)Why do healthy people have to go through this process?</p><p>3)What do we need to focus on?</p><p>4)What are the responsibilities of health practitioners in this pandemic?</p><p>5)What are your recommendations we can do durning this Pandemic?   </p><p> </p><p><strong>Drew Prescott - Financial Advisor</strong></p><p><strong>Podcast- </strong><a href="https://soundcloud.com/collar-city-financial-strategies"><strong>https://soundcloud.com/collar-city-financial-strategies</strong></a></p><p><strong>Website- </strong><a href="http://www.collarcityfs.com/"><strong>www.collarcityfs.com</strong></a></p><p>Questions:</p><p>1)Do you know if people can collect Temporary Aid or Unemployment benefits if they have been laid off due to the corona virus? </p><p>2)What would you say to someone who is invested at this time and may be a little nervous? </p><p>3)Obviously hind sight is 20/20 but what are some good practices for the listeners to work on going forward? So that they can be better prepared for an even like this in the future? </p><p>4)What would you say to that person who is concerned they are short for their current bills?</p><p> </p><p><strong>Joseph Carnevale - Insurance Broker</strong></p><p>Website: <a href="https://brokerstrust.ca/about/team/joseph-carnevale/">https://brokerstrust.ca/about/team/joseph-carnevale/</a></p><p>Questions: </p><p>1) What is the current challenges people are facing with insurance personally as well as professionally?</p><p>2) What do people need to know?</p><p>3) What should they do going forward? This question is to help reduce the state of panic that everyone is in. </p>
]]></content:encoded>
      <enclosure length="78608019" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/a21716bc-a298-4d06-ab0f-0ba4b9c0a67f/coronavirus-covid-19-panel-discussion-or-dailycyber-218_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Coronavirus - COVID-19 Panel Discussion</itunes:title>
      <itunes:author>Joseph Carnevale, Brandon Krieger, Monica Nay, Dr April Moreno</itunes:author>
      <itunes:duration>01:21:53</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am fortunate to have a panel discussion regarding the COVID-19 Pandemic. I have Dr. April Moreno - PhD health and informatics, Monica Noy - Osteopathic Manual Practitioner, Drew Prescott - Financial Advisor, and Joseph Carnevale - Partner &amp; Managing Director of Sales.</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am fortunate to have a panel discussion regarding the COVID-19 Pandemic. I have Dr. April Moreno - PhD health and informatics, Monica Noy - Osteopathic Manual Practitioner, Drew Prescott - Financial Advisor, and Joseph Carnevale - Partner &amp; Managing Director of Sales.</itunes:subtitle>
      <itunes:keywords>#dailycyber218, #covid-19, #coronavirus, #brandonkrieger, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7dc71c56-08b4-47f0-a5b2-69c1ed3e995b</guid>
      <title>Coronavirus - Cyber Security</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss the basics about the Coronavirus. What I am hearing companies are starting to do ie. restrict travel, work from home, educate their employees to not go to events with more than 10 people and much more. </p><p><br /> </p><p>"Coronaviruses (CoV) are a large family of viruses that cause illness ranging from the common cold to more severe diseases such as Middle East Respiratory Syndrome (MERS-CoV) and Severe Acute Respiratory Syndrome (SARS-CoV). A novel coronavirus (nCoV) is a new strain that has not been previously identified in humans.  </p><p>Coronaviruses are zoonotic, meaning they are transmitted between animals and people.  Detailed investigations found that SARS-CoV was transmitted from civet cats to humans and MERS-CoV from dromedary camels to humans. Several known coronaviruses are circulating in animals that have not yet infected humans.</p><p>Common signs of infection include respiratory symptoms, fever, cough, shortness of breath and breathing difficulties. In more severe cases, infection can cause pneumonia, severe acute respiratory syndrome, kidney failure and even death. </p><p>Standard recommendations to prevent infection spread include regular hand washing, covering mouth and nose when coughing and sneezing, thoroughly cooking meat and eggs. Avoid close contact with anyone showing symptoms of respiratory illness such as coughing and sneezing.”</p><p>Reference: https://www.who.int/health-topics/coronavirus</p><p><br /> </p><p>"Researchers first isolated a coronavirus in 1937. They found a coronavirus responsible for an infectious bronchitis virus in birds that had the ability to devastate poultry stocks.</p><p>Scientists first found evidence of human coronaviruses (HCoV) in the 1960s in the noses of people with the common cold. Two human coronaviruses are responsible for a large proportion of common colds: OC43 and 229E.</p><p>The name “coronavirus” comes from the crown-like projections on their surfaces. “Corona” in Latin means “halo” or “crown.”</p><p>Among humans, coronavirus infections most often occur during the winter months and early spring. People regularly become ill with a cold due to a coronavirus and may catch the same one about 4 months later.</p><p>This is because coronavirus antibodies do not last for a long time. Also, the antibodies for one strain of coronavirus may be ineffective against another one.</p><h2><strong>Symptoms</strong></h2><p>Cold- or flu-like symptoms usually set in from 2–4 days after a coronavirus infection and are typically mild. However, symptoms vary from person-to-person, and some forms of the virus can be fatal.</p><p>Symptoms include:</p><p>sneezing</p><p>runny nose</p><p>fatigue</p><p>cough</p><p>fever in rare cases</p><p>sore throat</p><p>exacerbated asthma</p><p>Scientists cannot easily cultivate human coronaviruses in the laboratory unlike the rhinovirus, which is another cause of the common cold. This makes it difficult to gauge the impact of the coronavirus on national economies and public health.</p><p>There is no cure, so treatments include self-care and over-the-counter (OTC) medication. People can take several steps, including:</p><p>resting and avoiding overexertion</p><p>drinking enough water</p><p>avoiding smoking and smoky areas</p><p>taking acetaminophen, ibuprofen, or naproxen for pain and fever</p><p>using a clean humidifier or cool mist vaporizer</p><p>A doctor can diagnose the virus responsible by taking a sample of respiratory fluids, such as mucus from the nose, or blood."</p><p>Reference: <a href="https://www.medicalnewstoday.com/articles/256521#types">https://www.medicalnewstoday.com/articles/256521#types</a></p><p><br /> </p><p>Preventative Measures: </p><p>-Wash your hands frequently </p><p>-Practice Good respiratory hygiene </p><p>-How to deal with stress </p><p><br /> </p><p><a href="https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public">https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public</a></p><p><br /> </p><p><br /> </p><p>See all article here: </p><p><a href="https://www.who.int/health-topics/coronavirus">https://www.who.int/health-topics/coronavirus</a></p><p><a href="https://www.medicalnewstoday.com/articles/256521">https://www.medicalnewstoday.com/articles/256521</a></p><p><a href="https://www.medicalnewstoday.com/articles/256521#types">https://www.medicalnewstoday.com/articles/256521#types</a></p><p><a href="https://www.who.int/emergencies/diseases/novel-coronavirus-2019">https://www.who.int/emergencies/diseases/novel-coronavirus-2019</a></p><p><a href="https://www.who.int/health-topics/coronavirus">https://www.who.int/health-topics/coronavirus</a></p><p><a href="https://covid19info.live/">https://covid19info.live/</a></p>
]]></description>
      <pubDate>Fri, 6 Mar 2020 18:43:09 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/coronavirus-cyber-security-AnSEDAol</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss the basics about the Coronavirus. What I am hearing companies are starting to do ie. restrict travel, work from home, educate their employees to not go to events with more than 10 people and much more. </p><p><br /> </p><p>"Coronaviruses (CoV) are a large family of viruses that cause illness ranging from the common cold to more severe diseases such as Middle East Respiratory Syndrome (MERS-CoV) and Severe Acute Respiratory Syndrome (SARS-CoV). A novel coronavirus (nCoV) is a new strain that has not been previously identified in humans.  </p><p>Coronaviruses are zoonotic, meaning they are transmitted between animals and people.  Detailed investigations found that SARS-CoV was transmitted from civet cats to humans and MERS-CoV from dromedary camels to humans. Several known coronaviruses are circulating in animals that have not yet infected humans.</p><p>Common signs of infection include respiratory symptoms, fever, cough, shortness of breath and breathing difficulties. In more severe cases, infection can cause pneumonia, severe acute respiratory syndrome, kidney failure and even death. </p><p>Standard recommendations to prevent infection spread include regular hand washing, covering mouth and nose when coughing and sneezing, thoroughly cooking meat and eggs. Avoid close contact with anyone showing symptoms of respiratory illness such as coughing and sneezing.”</p><p>Reference: https://www.who.int/health-topics/coronavirus</p><p><br /> </p><p>"Researchers first isolated a coronavirus in 1937. They found a coronavirus responsible for an infectious bronchitis virus in birds that had the ability to devastate poultry stocks.</p><p>Scientists first found evidence of human coronaviruses (HCoV) in the 1960s in the noses of people with the common cold. Two human coronaviruses are responsible for a large proportion of common colds: OC43 and 229E.</p><p>The name “coronavirus” comes from the crown-like projections on their surfaces. “Corona” in Latin means “halo” or “crown.”</p><p>Among humans, coronavirus infections most often occur during the winter months and early spring. People regularly become ill with a cold due to a coronavirus and may catch the same one about 4 months later.</p><p>This is because coronavirus antibodies do not last for a long time. Also, the antibodies for one strain of coronavirus may be ineffective against another one.</p><h2><strong>Symptoms</strong></h2><p>Cold- or flu-like symptoms usually set in from 2–4 days after a coronavirus infection and are typically mild. However, symptoms vary from person-to-person, and some forms of the virus can be fatal.</p><p>Symptoms include:</p><p>sneezing</p><p>runny nose</p><p>fatigue</p><p>cough</p><p>fever in rare cases</p><p>sore throat</p><p>exacerbated asthma</p><p>Scientists cannot easily cultivate human coronaviruses in the laboratory unlike the rhinovirus, which is another cause of the common cold. This makes it difficult to gauge the impact of the coronavirus on national economies and public health.</p><p>There is no cure, so treatments include self-care and over-the-counter (OTC) medication. People can take several steps, including:</p><p>resting and avoiding overexertion</p><p>drinking enough water</p><p>avoiding smoking and smoky areas</p><p>taking acetaminophen, ibuprofen, or naproxen for pain and fever</p><p>using a clean humidifier or cool mist vaporizer</p><p>A doctor can diagnose the virus responsible by taking a sample of respiratory fluids, such as mucus from the nose, or blood."</p><p>Reference: <a href="https://www.medicalnewstoday.com/articles/256521#types">https://www.medicalnewstoday.com/articles/256521#types</a></p><p><br /> </p><p>Preventative Measures: </p><p>-Wash your hands frequently </p><p>-Practice Good respiratory hygiene </p><p>-How to deal with stress </p><p><br /> </p><p><a href="https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public">https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public</a></p><p><br /> </p><p><br /> </p><p>See all article here: </p><p><a href="https://www.who.int/health-topics/coronavirus">https://www.who.int/health-topics/coronavirus</a></p><p><a href="https://www.medicalnewstoday.com/articles/256521">https://www.medicalnewstoday.com/articles/256521</a></p><p><a href="https://www.medicalnewstoday.com/articles/256521#types">https://www.medicalnewstoday.com/articles/256521#types</a></p><p><a href="https://www.who.int/emergencies/diseases/novel-coronavirus-2019">https://www.who.int/emergencies/diseases/novel-coronavirus-2019</a></p><p><a href="https://www.who.int/health-topics/coronavirus">https://www.who.int/health-topics/coronavirus</a></p><p><a href="https://covid19info.live/">https://covid19info.live/</a></p>
]]></content:encoded>
      <enclosure length="22573067" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/23b155f0-73f2-43e7-b317-4e53c6e5f424/coronavirus-cyber-security-or-dailycyber-217_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Coronavirus - Cyber Security</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:23:31</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss the basics about the Coronavirus. What I am hearing companies are starting to do ie. restrict travel, work from home, educate their employees to not go to events with more than 10 people and much more. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss the basics about the Coronavirus. What I am hearing companies are starting to do ie. restrict travel, work from home, educate their employees to not go to events with more than 10 people and much more. </itunes:subtitle>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">82714fa3-d3da-43af-b209-140e52a19f0c</guid>
      <title>Separation of Duties -Cyber Security</title>
      <description><![CDATA[<p>Separation of Duties - Cyber Security | DailyCyber 216 ~ Watch Now ~</p><p>In today’s DailyCyber Podcast I discuss separation of duties and why it is so important to have a layered approach in your business. This video is because of Barbara Corcoran lost $400,000 USD from her staff being tricked by an email scam. <br /> </p><p>See article here: </p><p>   <a href="https://www.cnn.com/2020/02/27/business/barbara-corcoran-email-hack-trnd/index.html">https://www.cnn.com/2020/02/27/business/barbara-corcoran-email-hack-trnd/index.html</a></p>
]]></description>
      <pubDate>Fri, 28 Feb 2020 15:43:00 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/separation-of-duties-cyber-security-E9kQQLJz</link>
      <content:encoded><![CDATA[<p>Separation of Duties - Cyber Security | DailyCyber 216 ~ Watch Now ~</p><p>In today’s DailyCyber Podcast I discuss separation of duties and why it is so important to have a layered approach in your business. This video is because of Barbara Corcoran lost $400,000 USD from her staff being tricked by an email scam. <br /> </p><p>See article here: </p><p>   <a href="https://www.cnn.com/2020/02/27/business/barbara-corcoran-email-hack-trnd/index.html">https://www.cnn.com/2020/02/27/business/barbara-corcoran-email-hack-trnd/index.html</a></p>
]]></content:encoded>
      <enclosure length="15093688" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/ebd43a9c-75b4-4485-839b-b552764235f5/separation-of-duties-cyber-security-or-dailycyber-216_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Separation of Duties -Cyber Security</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:15:43</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss separation of duties and why it is so important to have a layered approach in your business. This video is because of Barbara Corcoran lost $400,000 USD from her staff being tricked by an email scam. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss separation of duties and why it is so important to have a layered approach in your business. This video is because of Barbara Corcoran lost $400,000 USD from her staff being tricked by an email scam. </itunes:subtitle>
      <itunes:keywords>#sharktank, #barbaracorcoran, #brandonkrieger, #cybersecurity, #cybersecuritynews, #cybersecurityawareness, #dailycyber216</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8bceba2e-2a3d-4757-93ab-c259ddaf49f4</guid>
      <title>What I&apos;ve Been Working On</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss what I have been working on over the last few weeks. I’ve really excited to share with you and get your feedback.   </p>
]]></description>
      <pubDate>Wed, 26 Feb 2020 02:46:32 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/what-ive-been-working-on-MWAF9dyY</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss what I have been working on over the last few weeks. I’ve really excited to share with you and get your feedback.   </p>
]]></content:encoded>
      <enclosure length="12431706" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/f4aedf7f-0bb6-411c-b010-474f6a6a76d8/what-i-ve-been-working-on-or-dailycyber-215_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>What I&apos;ve Been Working On</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:12:57</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss what I have been working on over the last few weeks. I’ve really excited to share with you and get your feedback.   </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss what I have been working on over the last few weeks. I’ve really excited to share with you and get your feedback.   </itunes:subtitle>
      <itunes:keywords>#dailycyber215, #brandonkrieger, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">36d42153-50bd-4cd2-a4cb-1893ed02bdca</guid>
      <title>Cybersecurity First Quarter of 2020</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss a quick look at Cyber Security in the first quarter of 2020. What are companies looking at and why: </p><p><br /> </p><p>-Cloud Security</p><p>-2 Factor Authentication “2FA”</p><p>-Security Triad - SEIM, NDR, EDR</p><p>-Data Security </p><p>-Security Awareness Training  </p>
]]></description>
      <pubDate>Fri, 14 Feb 2020 01:12:12 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/cybersecurity-first-quarter-of-2020-RYE7t4aI</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss a quick look at Cyber Security in the first quarter of 2020. What are companies looking at and why: </p><p><br /> </p><p>-Cloud Security</p><p>-2 Factor Authentication “2FA”</p><p>-Security Triad - SEIM, NDR, EDR</p><p>-Data Security </p><p>-Security Awareness Training  </p>
]]></content:encoded>
      <enclosure length="31374034" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/c93ea042-c892-4c7a-b738-15b51d852363/cybersecurity-first-quarter-of-2020-or-dailycyber-214-watch_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Cybersecurity First Quarter of 2020</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:32:41</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss a quick look at Cyber Security in the first quarter of 2020. What are companies looking at and why: </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss a quick look at Cyber Security in the first quarter of 2020. What are companies looking at and why: </itunes:subtitle>
      <itunes:keywords>#scottschober, #brandonkrieger, #cybersecurityfirstquarter2020, #cybersecurity, #cybersecuritynews, #dailycyber214, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d4eb6b3a-50ee-4034-bfc4-1b2fa9c4ad6b</guid>
      <title>Scott Schober: Cybersecurity Is Everyone&apos;s Business</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I am excited to have the opportunity to interview Scott Schober. Scott is the author of Hacked Again, Cybersecurity Is Everyone’s Business and he has a third book coming out this year.</p><p>Scott and I chat about why Cybersecurity is everyones business and things everyone should know to be able to protect themselves.</p>
]]></description>
      <pubDate>Tue, 11 Feb 2020 16:44:54 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger, Scott Schober)</author>
      <link>https://www.dailycyber.ca/episodes/scott-schober-cybersecurity-is-everyones-business-xS4nItQ0</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I am excited to have the opportunity to interview Scott Schober. Scott is the author of Hacked Again, Cybersecurity Is Everyone’s Business and he has a third book coming out this year.</p><p>Scott and I chat about why Cybersecurity is everyones business and things everyone should know to be able to protect themselves.</p>
]]></content:encoded>
      <enclosure length="106615046" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/c313226d-9f61-4288-a382-d6fb4f036801/scott-schober-cybersecurity-is-everyones-business-or-dailycyber-213-watch-audio-only_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Scott Schober: Cybersecurity Is Everyone&apos;s Business</itunes:title>
      <itunes:author>Brandon Krieger, Scott Schober</itunes:author>
      <itunes:duration>01:51:03</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am excited to have the opportunity to interview Scott Schober. Scott is the author of Hacked Again, Cybersecurity Is Everyone’s Business and he has a third book coming out this year. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am excited to have the opportunity to interview Scott Schober. Scott is the author of Hacked Again, Cybersecurity Is Everyone’s Business and he has a third book coming out this year. </itunes:subtitle>
      <itunes:keywords>#scottschober, #dailycyber213, #brandonkrieger, #cybersecurity, #cybersecurityiseveryonesbusiness, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1ccf43b1-93a7-4a6a-8827-5aca19525061</guid>
      <title>Tim Medin: Understanding Penetration Testing</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to interview Tim Medin the Principal Consultant Red Siege Information Security. We discuss the Cyber Security industry, Penetration Testing and much more. If you are interested in Penetration Testing this is a Podcast you don’t want to miss. </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p><br /> </p><p><br /> </p><p>Join me for the ride by subscribing to the channel and don't forget to say hi on my social links below!</p><p><br /> </p><p>► SOCIAL</p><p>Website: <a href="https://www.dailycyber.ca/">https://www.DailyCyber.ca</a></p><p>Linkedin:  <a href="https://www.linkedin.com/in/brandonkrieger/">https://www.linkedin.com/in/brandonkrieger/</a></p><p>Twitter: <a href="https://www.twitter.com/BrandonKrieger">https://www.Twitter.com/BrandonKrieger</a></p><p>Instagram: <a href="https://www.instagram.com/BrandonKrieger">https://www.Instagram.com/BrandonKrieger</a></p><p><br /> </p><p><br /> </p><p>► GEAR & FAVORITES</p><p>Camera 1: <a href="https://amzn.to/31qb1yr">https://amzn.to/31qb1yr</a></p><p>Future Camera 2: <a href="https://amzn.to/2B8YjJK">https://amzn.to/2B8YjJK</a></p><p>Camera Mic: <a href="https://amzn.to/2KG2Msq">https://amzn.to/2KG2Msq</a></p><p>Podcast Mic: <a href="https://amzn.to/2QDlepu">https://amzn.to/2QDlepu</a><br /> </p><p>Music by from: <a href="http://www.artlist.io/">www.Artlist.io</a></p><p><br /> </p><p>This video is not sponsored.</p><p>All products I purchase myself unless otherwise stated in the video.</p><p>This post contains affiliate links at no additional cost to you. They help to keep this channel up and running. I appreciate your support!!</p>
]]></description>
      <pubDate>Fri, 7 Feb 2020 14:25:02 +0000</pubDate>
      <author>info@knssconsulting.com (Tim Medin, Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/tim-medin-understanding-penetration-testing-QLeq2iOk</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate to interview Tim Medin the Principal Consultant Red Siege Information Security. We discuss the Cyber Security industry, Penetration Testing and much more. If you are interested in Penetration Testing this is a Podcast you don’t want to miss. </p><p><br /> </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p><p><br /> </p><p><br /> </p><p>Join me for the ride by subscribing to the channel and don't forget to say hi on my social links below!</p><p><br /> </p><p>► SOCIAL</p><p>Website: <a href="https://www.dailycyber.ca/">https://www.DailyCyber.ca</a></p><p>Linkedin:  <a href="https://www.linkedin.com/in/brandonkrieger/">https://www.linkedin.com/in/brandonkrieger/</a></p><p>Twitter: <a href="https://www.twitter.com/BrandonKrieger">https://www.Twitter.com/BrandonKrieger</a></p><p>Instagram: <a href="https://www.instagram.com/BrandonKrieger">https://www.Instagram.com/BrandonKrieger</a></p><p><br /> </p><p><br /> </p><p>► GEAR & FAVORITES</p><p>Camera 1: <a href="https://amzn.to/31qb1yr">https://amzn.to/31qb1yr</a></p><p>Future Camera 2: <a href="https://amzn.to/2B8YjJK">https://amzn.to/2B8YjJK</a></p><p>Camera Mic: <a href="https://amzn.to/2KG2Msq">https://amzn.to/2KG2Msq</a></p><p>Podcast Mic: <a href="https://amzn.to/2QDlepu">https://amzn.to/2QDlepu</a><br /> </p><p>Music by from: <a href="http://www.artlist.io/">www.Artlist.io</a></p><p><br /> </p><p>This video is not sponsored.</p><p>All products I purchase myself unless otherwise stated in the video.</p><p>This post contains affiliate links at no additional cost to you. They help to keep this channel up and running. I appreciate your support!!</p>
]]></content:encoded>
      <enclosure length="98590648" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/766edf21-ba30-4d3c-ab8b-b260df1e402b/tim-medin-understanding-penetration-testing-or-dailycyber-212-audio-only_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Tim Medin: Understanding Penetration Testing</itunes:title>
      <itunes:author>Tim Medin, Brandon Krieger</itunes:author>
      <itunes:duration>01:42:42</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am fortunate to interview Tim Medin the Principal Consultant Red Siege Information Security. We discuss the Cyber Security industry, Penetration Testing and much more.</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am fortunate to interview Tim Medin the Principal Consultant Red Siege Information Security. We discuss the Cyber Security industry, Penetration Testing and much more.</itunes:subtitle>
      <itunes:keywords>#redsiege, #timmedin, #penetrationtesting, #brandonkrieger, #cybersecurity, #cybersecuritynews, #dailycyber212, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">34ecccc6-0719-47ff-898e-36399a443319</guid>
      <title>A Brief Discussion About Scammers</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I go through a brief discussion about different types of scams and scammers like messaging Scam and phone Scams:</p><ol><li>CRA/IRS scam </li><li>Sick family member away</li><li>Claim your inheritance of Millions of dollars </li></ol><p> </p><p>I also discuss about social media and how to protect your mental health. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 31 Jan 2020 01:31:48 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/a-brief-discussion-about-scammers-_lGv6iUC</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I go through a brief discussion about different types of scams and scammers like messaging Scam and phone Scams:</p><ol><li>CRA/IRS scam </li><li>Sick family member away</li><li>Claim your inheritance of Millions of dollars </li></ol><p> </p><p>I also discuss about social media and how to protect your mental health. </p><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="39138879" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/b50d58a5-3674-4be7-8248-9949191e3b78/a-brief-discussion-about-scammers-or-dailycyber-211_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>A Brief Discussion About Scammers</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:40:46</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I go through a brief discussion about different types of scams and scammers like messaging Scam and phone Scams:</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I go through a brief discussion about different types of scams and scammers like messaging Scam and phone Scams:</itunes:subtitle>
      <itunes:keywords>#scammers, #brandonkrieger, #dailycyber211, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4503cc4c-223a-40b6-8328-5bb45aabbc57</guid>
      <title>Why I Was On A Break</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I share with you why I was on a forced break for about two months. Some security tips when traveling and what I am working on in 2020. </p>
]]></description>
      <pubDate>Wed, 29 Jan 2020 02:16:16 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/why-i-was-on-a-break-36Mdf0b5</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I share with you why I was on a forced break for about two months. Some security tips when traveling and what I am working on in 2020. </p>
]]></content:encoded>
      <enclosure length="25900858" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/89fbef44-774b-420f-82ff-4af7afa04d4f/why-i-was-on-a-break-or-dailycyber-210_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Why I Was On A Break</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:26:59</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I share with you why I was on a forced break for about two months. Some security tips when traveling and what I am working on in 2020. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I share with you why I was on a forced break for about two months. Some security tips when traveling and what I am working on in 2020. </itunes:subtitle>
      <itunes:keywords>#dailycyber209, #whyiwasonabreak, #brandonkrieger, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">60eca8de-bd77-463e-8913-a80304065bc6</guid>
      <title>7 Simple Core Principals You Need To Know Before...</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss 7 simple core principals you need to know before you transition to a new career like Cyber Security or start a business. </p><ol><li>Know yourself </li><li>Figure out your path</li><li>Write out a plan </li><li>S.M.A.R.T. goals </li><li>Test to measurable results </li><li>Be accountable </li><li>Understand your finances</li></ol><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Thu, 12 Dec 2019 19:25:35 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/7-simple-core-principals-you-need-to-know-before-OTAJFNWw</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss 7 simple core principals you need to know before you transition to a new career like Cyber Security or start a business. </p><ol><li>Know yourself </li><li>Figure out your path</li><li>Write out a plan </li><li>S.M.A.R.T. goals </li><li>Test to measurable results </li><li>Be accountable </li><li>Understand your finances</li></ol><p><br /> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="35015712" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/9e9f9f03-2c0d-472f-aa71-02c60855af24/7-simple-core-principals-you-need-to-know-before-or-dailycyber-209_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>7 Simple Core Principals You Need To Know Before...</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:36:28</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss 7 simple core principals you need to know before you transition to a new career like Cyber Security or start a business. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss 7 simple core principals you need to know before you transition to a new career like Cyber Security or start a business. </itunes:subtitle>
      <itunes:keywords>#dailycyber209, #brandonkrieger, #7coreprincipals, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dae6bc24-54be-4c07-823f-42b507d5b02b</guid>
      <title>The 5 A&apos;s in Cyber Security You Need To Know About</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss the 5 A’s in Cyber Security you need to know about. Also, my up-coming interview with Scott Schober and his two books I am reading below to prepare for this interview. </p><p> </p><p>Hacked Again by Scott N. Schober - <a href="https://amzn.to/2YfxtKo">https://amzn.to/2YfxtKo</a></p><p>CyberSecurity Is Everybody’s Business by Scott N. Schober <a href="https://amzn.to/360H1vw">https://amzn.to/360H1vw</a></p><p> </p><p><strong>The Five A’s are:</strong></p><ol><li>Accountability </li><li>Authentication </li><li>Authorization </li><li>Accounting</li><li>Assurance</li></ol><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Wed, 4 Dec 2019 16:55:23 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/the-5-as-in-cyber-security-you-need-to-know-about-TKYj1UoZ</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss the 5 A’s in Cyber Security you need to know about. Also, my up-coming interview with Scott Schober and his two books I am reading below to prepare for this interview. </p><p> </p><p>Hacked Again by Scott N. Schober - <a href="https://amzn.to/2YfxtKo">https://amzn.to/2YfxtKo</a></p><p>CyberSecurity Is Everybody’s Business by Scott N. Schober <a href="https://amzn.to/360H1vw">https://amzn.to/360H1vw</a></p><p> </p><p><strong>The Five A’s are:</strong></p><ol><li>Accountability </li><li>Authentication </li><li>Authorization </li><li>Accounting</li><li>Assurance</li></ol><p> </p><p>To learn more watch the video or listen to the podcast at <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="17521613" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/e65b58c4-845a-4add-aca0-0d41c0b8bc69/the-5-as-in-cyber-security-you-need-to-know-about-or-dailycyber-208_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>The 5 A&apos;s in Cyber Security You Need To Know About</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:18:15</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss the 5 A’s in Cyber Security you need to know about. Also, my up-coming interview with Scott Schober and his two books I am reading below to prepare for this interview. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss the 5 A’s in Cyber Security you need to know about. Also, my up-coming interview with Scott Schober and his two books I am reading below to prepare for this interview. </itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #cybersecurity, #cybersecuritynews, #dailycyber208, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6c1e94b7-67b5-4cd8-ae92-4be0ee1f3896</guid>
      <title>Ted Demopoulos: How To Be A Cyber Security Consultant</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate enough to interview Ted Demopoulos a Cyber Security Consultant with over 30 years of experience about what it takes to be a Cyber Security Consultant. <br /> </p><p>Ted Demopouios Bio:</p><p>Ted Demopoulos’ professional background includes over 30 years of experience in Information Security and Business, including over 25 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent speaker at conferences, conventions, and other business events, author of "Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far" and two other books. Ted conducts Leadership and Information Security Bootcamps for The SANS Institute, and is the principal of Demopoulos Associates, a consulting organization specializing in information security.<br /> </p><p>We discuss these top 5 questions about being a Cyber Security Consultant and much more. </p><p>1) Are many people interested in infosec consulting and why?</p><p>2) Why you? Why did you get started on this path?</p><p>3) What is the most important thing you can tell someone who is considering consuting?</p><p>4) What about clients - how do people find them?</p><p>5) How does pricing usually work?</p><p><br /> </p><p>To learn more watch the video or listen to the podcast <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 29 Nov 2019 19:17:39 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/ted-demopoulos-how-to-be-a-cyber-security-consultant-6jh_d5Rm</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I am fortunate enough to interview Ted Demopoulos a Cyber Security Consultant with over 30 years of experience about what it takes to be a Cyber Security Consultant. <br /> </p><p>Ted Demopouios Bio:</p><p>Ted Demopoulos’ professional background includes over 30 years of experience in Information Security and Business, including over 25 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent speaker at conferences, conventions, and other business events, author of "Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far" and two other books. Ted conducts Leadership and Information Security Bootcamps for The SANS Institute, and is the principal of Demopoulos Associates, a consulting organization specializing in information security.<br /> </p><p>We discuss these top 5 questions about being a Cyber Security Consultant and much more. </p><p>1) Are many people interested in infosec consulting and why?</p><p>2) Why you? Why did you get started on this path?</p><p>3) What is the most important thing you can tell someone who is considering consuting?</p><p>4) What about clients - how do people find them?</p><p>5) How does pricing usually work?</p><p><br /> </p><p>To learn more watch the video or listen to the podcast <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="91321084" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/23df1781-d28c-4fc0-87ca-f70f7aa522c8/ted-demopoulos-how-to-be-a-cyber-security-consultant-or-dailycyber-207_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Ted Demopoulos: How To Be A Cyber Security Consultant</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>01:35:08</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I am fortunate enough to interview Ted Demopoulos a Cyber Security Consultant with over 30 years of experience about what it takes to be a Cyber Security Consultant. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I am fortunate enough to interview Ted Demopoulos a Cyber Security Consultant with over 30 years of experience about what it takes to be a Cyber Security Consultant. </itunes:subtitle>
      <itunes:keywords>#cybersecurityconsultant, #brandonkrieger, #dailycyber207, #cybersecurity, #cybersecuritynews, #cybersecurityawareness, #teddemopoulos</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9df37b4b-df56-4134-8a33-f16cb0a83b99</guid>
      <title>How To Deal With a Compromise</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss how to mentally and emotionally deal with a compromise. Most of the time you will hear about the technical information but it’s rare you will hear about the mental and emotional aspect. <br /> </p><p>To learn more watch the video or listen to the podcast <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Fri, 22 Nov 2019 12:42:24 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/how-to-deal-with-a-compromise-Dne_bROv</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss how to mentally and emotionally deal with a compromise. Most of the time you will hear about the technical information but it’s rare you will hear about the mental and emotional aspect. <br /> </p><p>To learn more watch the video or listen to the podcast <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="17707604" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/16d58f85-0a8c-468d-94e7-d2e15ec04b00/how-to-deal-with-a-compromise-or-dailycyber-206_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>How To Deal With a Compromise</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:18:27</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss how to mentally and emotionally deal with a compromise.</itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss how to mentally and emotionally deal with a compromise.</itunes:subtitle>
      <itunes:keywords>dailycyber206, brandonkrieger, cybersecurity, howtodealwithacompromise, cybersecurityawareness, cybersecuritynews</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c23d4c2f-abc0-470b-98b6-d00f22568fc4</guid>
      <title>Top Cyber Security Solution Providers</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss the top Cyber Security solution providers and the Cyber Security solutions that you should be aware of:  </p><p> </p><p><strong>Top Cyber Security Solution Providers </strong></p><ol><li>Beyond Trust</li><li>Black Berry - Cylance</li><li>Carbon Black</li><li>Check Point </li><li>Cisco </li><li>Crowdstrike</li><li>CyberArk </li><li>Dark Trace</li><li>Force Point </li><li>Fortinet</li><li>KnowBe4 </li><li>IBM</li><li>Palo Alto</li><li>ProofPoint </li><li>RSA Networks</li><li>Symantec</li><li>Splunk </li><li>Sophos</li><li>Transmit Security</li><li>TrendMicro</li><li>Vectra </li></ol><p><br /> </p><p><strong>Top Cyber Security solutions </strong></p><p> </p><p><strong>Categories: </strong><br />Software</p><p>Hardware </p><p>Services/Consulting </p><p><br /> </p><p><strong>Different Solutions: </strong></p><p>-Data Loss Prevention</p><p>-Identity and Access Management - IAM</p><p>-Priviedge Access Management - PAM</p><p>-Risk and compliance management </p><p>-Encryption</p><p>-Unified Threat Management (UTM)</p><p>-Firewall </p><p>-Antivirus/Antimalware Solutions </p><p>-Intrusion Detection Systems (IDS)</p><p>-Intrusion Prevention Systems (IPS)</p><p>-Network Detection System (NDS)</p><p>-Network Prevention System (NPS)</p><p>-Disaster Recover </p><p>-Email Security </p><p>-End Point Security </p><p>-Network Detection Security </p><p>-Security Information and Event Management (SIEM) </p><p>-Advance Threat Protection (ATP)</p><p>-Cloud Access Security Broker </p><p>-Secure Web Gateway </p><p>-Internet of Things Security (IoT)</p><p>-Network Access Control (NAC) <br /><br /><br /> </p><p>To learn more watch the video or listen to the podcast <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Wed, 20 Nov 2019 15:47:50 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/top-cyber-security-solution-providers-O2wUfAya</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss the top Cyber Security solution providers and the Cyber Security solutions that you should be aware of:  </p><p> </p><p><strong>Top Cyber Security Solution Providers </strong></p><ol><li>Beyond Trust</li><li>Black Berry - Cylance</li><li>Carbon Black</li><li>Check Point </li><li>Cisco </li><li>Crowdstrike</li><li>CyberArk </li><li>Dark Trace</li><li>Force Point </li><li>Fortinet</li><li>KnowBe4 </li><li>IBM</li><li>Palo Alto</li><li>ProofPoint </li><li>RSA Networks</li><li>Symantec</li><li>Splunk </li><li>Sophos</li><li>Transmit Security</li><li>TrendMicro</li><li>Vectra </li></ol><p><br /> </p><p><strong>Top Cyber Security solutions </strong></p><p> </p><p><strong>Categories: </strong><br />Software</p><p>Hardware </p><p>Services/Consulting </p><p><br /> </p><p><strong>Different Solutions: </strong></p><p>-Data Loss Prevention</p><p>-Identity and Access Management - IAM</p><p>-Priviedge Access Management - PAM</p><p>-Risk and compliance management </p><p>-Encryption</p><p>-Unified Threat Management (UTM)</p><p>-Firewall </p><p>-Antivirus/Antimalware Solutions </p><p>-Intrusion Detection Systems (IDS)</p><p>-Intrusion Prevention Systems (IPS)</p><p>-Network Detection System (NDS)</p><p>-Network Prevention System (NPS)</p><p>-Disaster Recover </p><p>-Email Security </p><p>-End Point Security </p><p>-Network Detection Security </p><p>-Security Information and Event Management (SIEM) </p><p>-Advance Threat Protection (ATP)</p><p>-Cloud Access Security Broker </p><p>-Secure Web Gateway </p><p>-Internet of Things Security (IoT)</p><p>-Network Access Control (NAC) <br /><br /><br /> </p><p>To learn more watch the video or listen to the podcast <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="24130801" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/72e06467-8a30-4542-acc9-1301ab49213b/top-cyber-security-solution-providers-or-dailycyber-205_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Top Cyber Security Solution Providers</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:25:08</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss the top Cyber Security solution providers and the Cyber Security solutions that you should be aware of:  </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss the top Cyber Security solution providers and the Cyber Security solutions that you should be aware of:  </itunes:subtitle>
      <itunes:keywords>dailycyber205, cybersecuritysolutions, brandonkrieger, cybersecurity, cybersecurityawareness, cybersecuritynews</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4f42107b-cd6b-42cf-bf34-e1eb863e5072</guid>
      <title>Disney Plus Was Hacked</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast I discuss how Disney Plus got hacked and what we can do to protect ourselves going forward. I also start the discussion into the fundamentals principals of Cyber Security. </p><p> </p><p><strong>News: </strong></p><p><i><strong>Disney Plus Accounts Are Already Being Hacked and Sold online</strong></i><br /> </p><p>On November 12th, 2019 the day Disney Plus went live user accounts where hacked. </p><p>"Hijacked <a href="https://www.techradar.com/news/disney-plus-shows-movies-sign-up">Disney+</a> accounts are being sold online just hours after Disney's new <a href="https://www.techradar.com/best/best-tv-streaming-service-cord-cutting-compare">streaming service</a> launched, reports have claimed.</p><p>Many of these stolen accounts are being offered for free on hacking forums or are available for sale with prices ranging from $3 to $11, despite the fact that a legitimate Disney+ subscription only costs $7."<br /> </p><p>“ <strong>Disney+ credentials</strong></p><p>The hackers behind these account takeovers were able to mobilize quickly to steal Disney+ account credentials and make them available for sale online. This suggests that they either gained access to these accounts by either using leaked credentials from past data breaches or by using info-stealing <a href="https://www.techradar.com/best/best-free-anti-malware-software">malware</a>.</p><p>Hacking forums now have thousands of Disney+ accounts available for sale but <i>ZDNet</i> also discovered that some forums were giving away these credentials for free so that the hacker community could use and share them with others.<br /> </p><p><a href="https://www.techradar.com/news/hacked-disney-accounts-are-already-available-for-sale-online">https://www.techradar.com/news/hacked-disney-accounts-are-already-available-for-sale-online</a></p><p><br /> </p><p><strong>Fundamental Principals of Cyber Security </strong></p><ol><li>Personal Security </li><li>Risk Management </li><li>Business Continuity </li><li>Laws, Regulations and Compliance </li><li>Investigation and Ethics </li></ol><p> </p><p><strong>C.I.A - "Confidentiality, Integrity and Availability”</strong><br /> </p><p><strong>Confidentiality</strong> - is the concept of the measures used to ensure the protection of the secrecy of data, objects, or resources. The goal of confidentiality protection is to prevent or minimize unauthorized access to people, places or things.</p><p><strong>Integrity</strong> - is the concept of protecting the reliability and integrity. Integrity protection prevents unauthorized alternation. </p><p><strong>Availability</strong> - Which means authorized subjects are granted timely and uninterrupted access. </p><p> </p><p>To learn more watch the video or listen to the podcast <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></description>
      <pubDate>Tue, 19 Nov 2019 13:36:18 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/disney-plus-was-hacked-eZPCkxGJ</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast I discuss how Disney Plus got hacked and what we can do to protect ourselves going forward. I also start the discussion into the fundamentals principals of Cyber Security. </p><p> </p><p><strong>News: </strong></p><p><i><strong>Disney Plus Accounts Are Already Being Hacked and Sold online</strong></i><br /> </p><p>On November 12th, 2019 the day Disney Plus went live user accounts where hacked. </p><p>"Hijacked <a href="https://www.techradar.com/news/disney-plus-shows-movies-sign-up">Disney+</a> accounts are being sold online just hours after Disney's new <a href="https://www.techradar.com/best/best-tv-streaming-service-cord-cutting-compare">streaming service</a> launched, reports have claimed.</p><p>Many of these stolen accounts are being offered for free on hacking forums or are available for sale with prices ranging from $3 to $11, despite the fact that a legitimate Disney+ subscription only costs $7."<br /> </p><p>“ <strong>Disney+ credentials</strong></p><p>The hackers behind these account takeovers were able to mobilize quickly to steal Disney+ account credentials and make them available for sale online. This suggests that they either gained access to these accounts by either using leaked credentials from past data breaches or by using info-stealing <a href="https://www.techradar.com/best/best-free-anti-malware-software">malware</a>.</p><p>Hacking forums now have thousands of Disney+ accounts available for sale but <i>ZDNet</i> also discovered that some forums were giving away these credentials for free so that the hacker community could use and share them with others.<br /> </p><p><a href="https://www.techradar.com/news/hacked-disney-accounts-are-already-available-for-sale-online">https://www.techradar.com/news/hacked-disney-accounts-are-already-available-for-sale-online</a></p><p><br /> </p><p><strong>Fundamental Principals of Cyber Security </strong></p><ol><li>Personal Security </li><li>Risk Management </li><li>Business Continuity </li><li>Laws, Regulations and Compliance </li><li>Investigation and Ethics </li></ol><p> </p><p><strong>C.I.A - "Confidentiality, Integrity and Availability”</strong><br /> </p><p><strong>Confidentiality</strong> - is the concept of the measures used to ensure the protection of the secrecy of data, objects, or resources. The goal of confidentiality protection is to prevent or minimize unauthorized access to people, places or things.</p><p><strong>Integrity</strong> - is the concept of protecting the reliability and integrity. Integrity protection prevents unauthorized alternation. </p><p><strong>Availability</strong> - Which means authorized subjects are granted timely and uninterrupted access. </p><p> </p><p>To learn more watch the video or listen to the podcast <a href="http://www.dailycyber.ca/">www.DailyCyber.ca</a> and comment below </p>
]]></content:encoded>
      <enclosure length="23845753" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/7dade78e-b702-4681-ba61-56b7979a0802/disney-plus-hacked-or-dailycyber-204_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Disney Plus Was Hacked</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:24:50</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss how Disney Plus got hacked and what we can do to protect ourselves going forward. I also start the discussion into the fundamentals principals of Cyber Security. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss how Disney Plus got hacked and what we can do to protect ourselves going forward. I also start the discussion into the fundamentals principals of Cyber Security. </itunes:subtitle>
      <itunes:keywords>disneyplushacked, dailycyber204, brandonkrieger, cybersecurity, cybersecurityawareness, cybersecuritynews</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2291e443-db33-4f31-94ba-ca8138ab58bf</guid>
      <title>List of Careers in Cyber Security</title>
      <description><![CDATA[<p>In today’s DailyCyber Podcast which you can listen to on the go. I discuss different positions in Cyber Security to help you as you are researching for your career. I also share what questions I would recommend you should ask yourself.</p><p>To learn more watch the video or listen to the podcast and comment below</p><p><strong>50 Cybersecurity Titles That Every Job Seeker Should Know About</strong></p><p>From: Cybercrime Magazine</p><p>Editor: Steve Morgan</p><p>https://cybersecurityventures.com/50-cybersecurity-titles-that-every-job-seeker-should-know-about/</p><p> </p><p>1.  Application Security Administrator – Keep software / apps safe and secure.</p><p>2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime</p><p>3. Automotive Security Engineer – Protect cars from cyber intrusions.</p><p>4. Blockchain Developer / Engineer – Code the future of secure transactions.</p><p>5. Blue Team Member – Design defensive measures / harden operating systems.</p><p>6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.</p><p>7. Cybersecurity Scrum Master – Watch over and protect all data.</p><p>8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.</p><p>9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.</p><p>10. Cloud Security Architect – Secure apps and data in the cloud.</p><p> </p><p> </p><p> </p><p><strong>SANS</strong></p><p>https://www.sans.org/security-trends/2019/08/29/20-coolest-cyber-security-jobs</p><p><strong>20 Coolest Cyber Security Jobs:</strong></p><p>1.  Application Security Administrator</p><p>– Keep software / apps safe and secure.2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime.3. Automotive Security Engineer – Protect cars from cyber intrusions.4. Blockchain Developer / Engineer – Code the future of secure transactions.5. Blue Team Member – Design defensive measures / harden operating systems.6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.7. Cybersecurity Scrum Master – Watch over and protect all data.8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.10. Cloud Security Architect – Secure apps and data in the cloud.</p><p> </p><p>2. Threat Hunter</p><p>Featured top of the list for good reason, Threat Hunters are one of the most valuable jobs to the IT industry, with skills shown to improve the speed of threat detection and response more than two-fold, in comparison to teams without this dedicated resource. Enjoy job security by offering a 64% improvement in the detection of advanced threats, and a 63% reduction in investigation time according to the 2018 Threat Hunting Report.</p><p>Related SANS courses and GIAC Certification: FOR578 (GCTI Certification), FOR572 (GNFA Certification), FOR508 (GCFA Certification), FOR526, FOR610 (GREM Certification) and SEC487</p><p> </p><p>3. Penetration Tester</p><p>"Penetration testing is the active circumvention of security features in networks, systems, and applications. This is where the penetration tester emulates threats by attempting to access alternative functionality. A penetration tester will also assess data or functionality in a manner not anticipated by the group designing that system. A good penetration tester will need to be highly technical and will also require a level of skill that enables meaningful communication of risk to management. Pen testing is a critical capability that most organisations will require, and it can also be quite fun, if not sometimes tedious. I love what I do, both as a tester and as an instructor for SANS."</p><p>Adrien De Beaupre SANS SEC642 Instructor</p><p>Related SANS courses: SEC487, SEC401 (GSEC Certification), SEC560 (GPEN Certification) and SEC660 (GXPN Certification)</p><p> </p><p>4. Forensic Computer Analyst</p><p>Analyst findings might be used as evidence in a criminal investigation, to resolve a business or legal dispute, to uncover specific targets or to detect suspicious activity.</p><p>Related SANS courses: All FOR classes plus SEC504, (GCIH Certification), SEC401 (GSEC Certification) and SEC487</p><p> </p><p>5. Incident Responder</p><p>When you're passionate about fighting cyber-crime, being an incident responder will bring a great deal of job satisfaction. Learn to discover the issue, mitigate the damages and investigate the situation from all angles.</p><p>Related SANS courses: All FOR classes plus SEC504 (GCIH Certification), SEC501 (GCED Certification) and SEC487</p><p> </p><p>6. Security Architect</p><p>Design, build and supervise the implementation of network and computer security. As a Network Security Architect, you will test for vulnerabilities and install firewalls, along with various security policies and procedures.</p><p>Related SANS courses: SEC450, SEC503 (GCIA Certification), SEC511 (GMON Certification), SEC530, (GDSA Certification), FOR572 (GNFA Certification), SEC501 (GCED Certification) and MGT516</p><p> </p><p>7. Malware Analyst</p><p>For those that like to fight the breach head on, a Malware Analyst will ensure the fast and effective response and containment to a cyber-attack.</p><p>Related SANS courses: FOR610 (GREM Certification)</p><p> </p><p>8. CISO/ISO or Director of Security</p><p>As a chief information security officer, you will be the balance between the IT department and the boardroom, with an equal understanding of both business and information security. Together with the ability to influence and negotiate, you will also have a thorough knowledge of global markets, policy, and legislation. With the ability to think creatively, the CISO will be a natural problem solver and will find ways to jump into the mind of a cyber criminal, discovering new threats and their solutions.</p><p>Related SANS courses: SEC401 (GSEC Certification), MGT414 (GISP Certification), MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)</p><p> </p><p>9. Security Software Developer</p><p>As a senior developer, this creative position requires the ability to design secure software using protected programming techniques, that are free from vulnerabilities which could be abused by hackers. You will have the ability to incorporate security analysis, defences and countermeasures in order to ensure strong and reliable software.</p><p> </p><p>Related SANS courses: MGT525 (GCPM Certification), DEV522 (GWEB Certification), DEV541, DEV544, and SEC540 (GIAC Certification coming soon)</p><p> </p><p>10. Media Exploitation Analyst/Law Enforcement Computer Crime Investigator</p><p>If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked or damaged, then this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.</p><p> </p><p>Related SANS courses: FOR500 (GCFE Certification), FOR585 (GASF Certification), FOR518 and FOR498</p><p> </p><p>11. Software Validation Engineer</p><p>As a software validation engineer, you will assess software in order to verify issues and log defects. You will be responsible for developing summary reports for tests performed and will review data with all team members. In summary, to fill this role you will be a qualified engineer responsible for managing, inspecting, testing and modifying the equipment and procedures used to manufacture various products.</p><p> </p><p>Related SANS courses: MGT525 (GCPM Certification) and SEC540 (GIAC Certification coming soon)</p><p> </p><p>12. Security Operations Centre Analyst</p><p>SOC Analysts work alongside security engineers and SOC managers, to provide situational awareness through detecting, containing, and resolving IT threats. Working closely with incident response teams, a SOC analyst will address security issues - when detected, quickly and effectively.</p><p> </p><p>Related SANS courses: SEC501 (GCED Certification), SEC540 (GIAC Certification coming soon), SEC450, SEC511 (GMON Certification) and SEC555 (GCDA Certification)</p><p> </p><p>13. Vulnerability Researcher/Exploit Developer</p><p>As one of the fastest growing careers in the tech industry, this vital role is responsible for research and analysis of new exploits and will hold experience in penetration testing and writing exploit code.</p><p> </p><p>Related SANS courses: SEC460, SEC401 (GSEC Certification), SEC560 (GPEN Certification) and SEC660 (GXPN Certification)</p><p> </p><p>14. Security Audit and Risk Management Specialist</p><p>As the role responsible for identifying and assessing a company's potential risks to safety, reputation and financial prosperity, the security audit and risk management specialist will have strong problem solving and analytical skills together with an ability to negotiate and be diplomatic while working under pressure.</p><p> </p><p>Related SANS courses: SEC401 (GSEC Certification), MGT516, MGT525 (GCPM Certification), DEV522 (GWEB Certification) and SEC540 (GIAC Certification coming soon)</p><p> </p><p>15. Cyber Security Analyst/Engineer</p><p>As one of the highest-paid jobs in the field, the skills required to gain footing in this role are advanced. You must be highly competent in threat detection, threat analysis, and protection, broken authentication, cross-site scripting and cross-site request forgery. This is a vital role in preserving the security and integrity of an organisation's data.</p><p> </p><p>Related SANS courses: SEC401 (GSEC Certification), SEC501 (GCED Certification), MGT516, MGT525 (GCPM Certification), SEC540 (GIAC Certification coming soon), SEC450, SEC511 (GMON Certification), SEC503 (GCIA Certification), SEC530 (GDSA Certification) and SEC555 (GCDA Certification)</p><p> </p><p>16. Mobile Security Manager</p><p>Taking care of an organisation's mobile device safety, as a Mobile Security Manager you are responsible for monitoring and securing all of a companies' Smartphones, laptops, smartwatches, and other connected devices. Managing the collective tools, technologies, and processes that enable the securing of a mobile device or mobile computing environment, you will be part of a broader information security management policy that focusses mainly on mobile IT assets.</p><p>Related SANS courses: FOR585 (GASF Certification), plus SEC575 (GMOB Certification) and MGT514 (GSTRT Certification)</p><p> </p><p>17. Application Penetration Tester</p><p>One of the most exciting roles within the cyber security industry, you will be responsible for the penetration testing (or ethical hacking), of applications; a significantly vulnerable point. The objective is to find security weaknesses before a cyber criminal does.</p><p>Related SANS courses: DEV522 (GWEB Certification)</p><p> </p><p>18. Disaster Recovery/Business Continuity Analyst/Manager</p><p>Level up your skills and earn your place as a disaster recovery manager, where you will be responsible for managing the design, implementation, and communication of organisations continuance and disaster recovery plans. Your processes will ensure the safeguarding of business data, technology, information systems, and databases.</p><p>Related SANS courses: SEC501 (GCED Certification), MGT414 (GISP Certification), MGT514 (GSTRT Certification) and MGT516</p><p> </p><p>19: Technical Director and Deputy CISO</p><p>Would you like to train and develop future leaders in the cyber security department? You will be responsible for deciding on the costs needed to develop senior roles, on executing the security strategy consistently throughout the department and identifying and managing the skills and weaknesses of associates.</p><p>Related SANS courses: SEC501 (GCED Certification), MGT414 (GISP Certification), MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)</p><p> </p><p>20: Intrusion Analyst</p><p>"I've come to realise that network monitoring, intrusion detection, and packet analysis represent some of the very best data sources within our enterprise. These can be used to very rapidly confirm whether or not an incident has occurred, and allow an experienced analyst to determine, often in seconds or minutes, what the extent of a compromise might be. In a very real sense, I have found this to be the most important course that SANS has to offer. Not only will it cause you to think about your network in a very different way as a defender, but it is incredibly relevant for penetration testers who are looking to "fly under the radar." The concepts that you will learn in this course apply to every single role in an information security organisation!"</p><p>David Hoelzer — SANS SEC503 Instructor</p><p>Related SANS courses: SEC503 (GCIA Certification) and SEC401 (GSEC Certification)</p><p> </p><p>21: IoT/Critical Infrastructure Security Director</p><p>A crucial role within today's world where cyber attacks to our critical infrastructure are increasing in risk. In an age where almost every devise or piece of machinery can be connected to the internet, they too are at risk of being hacked. The Internet of Things (IoT) has evolved so quickly that managing its security has become a minefield. When we look broadly into the matter, Critical Infrastructure is at risk to foul play. Power grids, chemical plants, and transportation systems are being attacked by hackers. In a report by Business Insider, ?A new front in cybersecurity', investigations found that companies operating critical infrastructure reported 295 cyber attacks in 2015. While technology is consistently evolving, so too will attacks to this industry.</p><p>The role of security director to IoT and Critical Infrastructure is invaluable - some might say indispensable.</p><p>Related SANS courses: All SANS ICS Courses and Certifications, plus MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)</p><p>https://www.sans.org/security-trends/2019/08/29/20-coolest-cyber-security-jobs</p>
]]></description>
      <pubDate>Sat, 16 Nov 2019 13:23:46 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/list-of-careers-in-cyber-security-rullK9Mn</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber Podcast which you can listen to on the go. I discuss different positions in Cyber Security to help you as you are researching for your career. I also share what questions I would recommend you should ask yourself.</p><p>To learn more watch the video or listen to the podcast and comment below</p><p><strong>50 Cybersecurity Titles That Every Job Seeker Should Know About</strong></p><p>From: Cybercrime Magazine</p><p>Editor: Steve Morgan</p><p>https://cybersecurityventures.com/50-cybersecurity-titles-that-every-job-seeker-should-know-about/</p><p> </p><p>1.  Application Security Administrator – Keep software / apps safe and secure.</p><p>2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime</p><p>3. Automotive Security Engineer – Protect cars from cyber intrusions.</p><p>4. Blockchain Developer / Engineer – Code the future of secure transactions.</p><p>5. Blue Team Member – Design defensive measures / harden operating systems.</p><p>6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.</p><p>7. Cybersecurity Scrum Master – Watch over and protect all data.</p><p>8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.</p><p>9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.</p><p>10. Cloud Security Architect – Secure apps and data in the cloud.</p><p> </p><p> </p><p> </p><p><strong>SANS</strong></p><p>https://www.sans.org/security-trends/2019/08/29/20-coolest-cyber-security-jobs</p><p><strong>20 Coolest Cyber Security Jobs:</strong></p><p>1.  Application Security Administrator</p><p>– Keep software / apps safe and secure.2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime.3. Automotive Security Engineer – Protect cars from cyber intrusions.4. Blockchain Developer / Engineer – Code the future of secure transactions.5. Blue Team Member – Design defensive measures / harden operating systems.6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.7. Cybersecurity Scrum Master – Watch over and protect all data.8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.10. Cloud Security Architect – Secure apps and data in the cloud.</p><p> </p><p>2. Threat Hunter</p><p>Featured top of the list for good reason, Threat Hunters are one of the most valuable jobs to the IT industry, with skills shown to improve the speed of threat detection and response more than two-fold, in comparison to teams without this dedicated resource. Enjoy job security by offering a 64% improvement in the detection of advanced threats, and a 63% reduction in investigation time according to the 2018 Threat Hunting Report.</p><p>Related SANS courses and GIAC Certification: FOR578 (GCTI Certification), FOR572 (GNFA Certification), FOR508 (GCFA Certification), FOR526, FOR610 (GREM Certification) and SEC487</p><p> </p><p>3. Penetration Tester</p><p>"Penetration testing is the active circumvention of security features in networks, systems, and applications. This is where the penetration tester emulates threats by attempting to access alternative functionality. A penetration tester will also assess data or functionality in a manner not anticipated by the group designing that system. A good penetration tester will need to be highly technical and will also require a level of skill that enables meaningful communication of risk to management. Pen testing is a critical capability that most organisations will require, and it can also be quite fun, if not sometimes tedious. I love what I do, both as a tester and as an instructor for SANS."</p><p>Adrien De Beaupre SANS SEC642 Instructor</p><p>Related SANS courses: SEC487, SEC401 (GSEC Certification), SEC560 (GPEN Certification) and SEC660 (GXPN Certification)</p><p> </p><p>4. Forensic Computer Analyst</p><p>Analyst findings might be used as evidence in a criminal investigation, to resolve a business or legal dispute, to uncover specific targets or to detect suspicious activity.</p><p>Related SANS courses: All FOR classes plus SEC504, (GCIH Certification), SEC401 (GSEC Certification) and SEC487</p><p> </p><p>5. Incident Responder</p><p>When you're passionate about fighting cyber-crime, being an incident responder will bring a great deal of job satisfaction. Learn to discover the issue, mitigate the damages and investigate the situation from all angles.</p><p>Related SANS courses: All FOR classes plus SEC504 (GCIH Certification), SEC501 (GCED Certification) and SEC487</p><p> </p><p>6. Security Architect</p><p>Design, build and supervise the implementation of network and computer security. As a Network Security Architect, you will test for vulnerabilities and install firewalls, along with various security policies and procedures.</p><p>Related SANS courses: SEC450, SEC503 (GCIA Certification), SEC511 (GMON Certification), SEC530, (GDSA Certification), FOR572 (GNFA Certification), SEC501 (GCED Certification) and MGT516</p><p> </p><p>7. Malware Analyst</p><p>For those that like to fight the breach head on, a Malware Analyst will ensure the fast and effective response and containment to a cyber-attack.</p><p>Related SANS courses: FOR610 (GREM Certification)</p><p> </p><p>8. CISO/ISO or Director of Security</p><p>As a chief information security officer, you will be the balance between the IT department and the boardroom, with an equal understanding of both business and information security. Together with the ability to influence and negotiate, you will also have a thorough knowledge of global markets, policy, and legislation. With the ability to think creatively, the CISO will be a natural problem solver and will find ways to jump into the mind of a cyber criminal, discovering new threats and their solutions.</p><p>Related SANS courses: SEC401 (GSEC Certification), MGT414 (GISP Certification), MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)</p><p> </p><p>9. Security Software Developer</p><p>As a senior developer, this creative position requires the ability to design secure software using protected programming techniques, that are free from vulnerabilities which could be abused by hackers. You will have the ability to incorporate security analysis, defences and countermeasures in order to ensure strong and reliable software.</p><p> </p><p>Related SANS courses: MGT525 (GCPM Certification), DEV522 (GWEB Certification), DEV541, DEV544, and SEC540 (GIAC Certification coming soon)</p><p> </p><p>10. Media Exploitation Analyst/Law Enforcement Computer Crime Investigator</p><p>If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked or damaged, then this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.</p><p> </p><p>Related SANS courses: FOR500 (GCFE Certification), FOR585 (GASF Certification), FOR518 and FOR498</p><p> </p><p>11. Software Validation Engineer</p><p>As a software validation engineer, you will assess software in order to verify issues and log defects. You will be responsible for developing summary reports for tests performed and will review data with all team members. In summary, to fill this role you will be a qualified engineer responsible for managing, inspecting, testing and modifying the equipment and procedures used to manufacture various products.</p><p> </p><p>Related SANS courses: MGT525 (GCPM Certification) and SEC540 (GIAC Certification coming soon)</p><p> </p><p>12. Security Operations Centre Analyst</p><p>SOC Analysts work alongside security engineers and SOC managers, to provide situational awareness through detecting, containing, and resolving IT threats. Working closely with incident response teams, a SOC analyst will address security issues - when detected, quickly and effectively.</p><p> </p><p>Related SANS courses: SEC501 (GCED Certification), SEC540 (GIAC Certification coming soon), SEC450, SEC511 (GMON Certification) and SEC555 (GCDA Certification)</p><p> </p><p>13. Vulnerability Researcher/Exploit Developer</p><p>As one of the fastest growing careers in the tech industry, this vital role is responsible for research and analysis of new exploits and will hold experience in penetration testing and writing exploit code.</p><p> </p><p>Related SANS courses: SEC460, SEC401 (GSEC Certification), SEC560 (GPEN Certification) and SEC660 (GXPN Certification)</p><p> </p><p>14. Security Audit and Risk Management Specialist</p><p>As the role responsible for identifying and assessing a company's potential risks to safety, reputation and financial prosperity, the security audit and risk management specialist will have strong problem solving and analytical skills together with an ability to negotiate and be diplomatic while working under pressure.</p><p> </p><p>Related SANS courses: SEC401 (GSEC Certification), MGT516, MGT525 (GCPM Certification), DEV522 (GWEB Certification) and SEC540 (GIAC Certification coming soon)</p><p> </p><p>15. Cyber Security Analyst/Engineer</p><p>As one of the highest-paid jobs in the field, the skills required to gain footing in this role are advanced. You must be highly competent in threat detection, threat analysis, and protection, broken authentication, cross-site scripting and cross-site request forgery. This is a vital role in preserving the security and integrity of an organisation's data.</p><p> </p><p>Related SANS courses: SEC401 (GSEC Certification), SEC501 (GCED Certification), MGT516, MGT525 (GCPM Certification), SEC540 (GIAC Certification coming soon), SEC450, SEC511 (GMON Certification), SEC503 (GCIA Certification), SEC530 (GDSA Certification) and SEC555 (GCDA Certification)</p><p> </p><p>16. Mobile Security Manager</p><p>Taking care of an organisation's mobile device safety, as a Mobile Security Manager you are responsible for monitoring and securing all of a companies' Smartphones, laptops, smartwatches, and other connected devices. Managing the collective tools, technologies, and processes that enable the securing of a mobile device or mobile computing environment, you will be part of a broader information security management policy that focusses mainly on mobile IT assets.</p><p>Related SANS courses: FOR585 (GASF Certification), plus SEC575 (GMOB Certification) and MGT514 (GSTRT Certification)</p><p> </p><p>17. Application Penetration Tester</p><p>One of the most exciting roles within the cyber security industry, you will be responsible for the penetration testing (or ethical hacking), of applications; a significantly vulnerable point. The objective is to find security weaknesses before a cyber criminal does.</p><p>Related SANS courses: DEV522 (GWEB Certification)</p><p> </p><p>18. Disaster Recovery/Business Continuity Analyst/Manager</p><p>Level up your skills and earn your place as a disaster recovery manager, where you will be responsible for managing the design, implementation, and communication of organisations continuance and disaster recovery plans. Your processes will ensure the safeguarding of business data, technology, information systems, and databases.</p><p>Related SANS courses: SEC501 (GCED Certification), MGT414 (GISP Certification), MGT514 (GSTRT Certification) and MGT516</p><p> </p><p>19: Technical Director and Deputy CISO</p><p>Would you like to train and develop future leaders in the cyber security department? You will be responsible for deciding on the costs needed to develop senior roles, on executing the security strategy consistently throughout the department and identifying and managing the skills and weaknesses of associates.</p><p>Related SANS courses: SEC501 (GCED Certification), MGT414 (GISP Certification), MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)</p><p> </p><p>20: Intrusion Analyst</p><p>"I've come to realise that network monitoring, intrusion detection, and packet analysis represent some of the very best data sources within our enterprise. These can be used to very rapidly confirm whether or not an incident has occurred, and allow an experienced analyst to determine, often in seconds or minutes, what the extent of a compromise might be. In a very real sense, I have found this to be the most important course that SANS has to offer. Not only will it cause you to think about your network in a very different way as a defender, but it is incredibly relevant for penetration testers who are looking to "fly under the radar." The concepts that you will learn in this course apply to every single role in an information security organisation!"</p><p>David Hoelzer — SANS SEC503 Instructor</p><p>Related SANS courses: SEC503 (GCIA Certification) and SEC401 (GSEC Certification)</p><p> </p><p>21: IoT/Critical Infrastructure Security Director</p><p>A crucial role within today's world where cyber attacks to our critical infrastructure are increasing in risk. In an age where almost every devise or piece of machinery can be connected to the internet, they too are at risk of being hacked. The Internet of Things (IoT) has evolved so quickly that managing its security has become a minefield. When we look broadly into the matter, Critical Infrastructure is at risk to foul play. Power grids, chemical plants, and transportation systems are being attacked by hackers. In a report by Business Insider, ?A new front in cybersecurity', investigations found that companies operating critical infrastructure reported 295 cyber attacks in 2015. While technology is consistently evolving, so too will attacks to this industry.</p><p>The role of security director to IoT and Critical Infrastructure is invaluable - some might say indispensable.</p><p>Related SANS courses: All SANS ICS Courses and Certifications, plus MGT512 (GSLC Certification), MGT514 (GSTRT Certification) and MGT525 (GCPM Certification)</p><p>https://www.sans.org/security-trends/2019/08/29/20-coolest-cyber-security-jobs</p>
]]></content:encoded>
      <enclosure length="11870804" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/538321e9-53bb-4139-bdd2-bc7fac6aaa0e/list-of-careers-in-cyber-security-or-dailycyber-203_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>List of Careers in Cyber Security</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:12:22</itunes:duration>
      <itunes:summary>In today’s DailyCyber Podcast I discuss a list of careers in Cyber Security. </itunes:summary>
      <itunes:subtitle>In today’s DailyCyber Podcast I discuss a list of careers in Cyber Security. </itunes:subtitle>
      <itunes:keywords>dailycyber203, brandonkrieger, listofcybersecuritypositions, cybersecurity, cybersecurityawareness, cybersecuritynews</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">141aad42-42a1-4027-a9e7-cf541f46c052</guid>
      <title>How To Plan A Career in Cyber Security</title>
      <description><![CDATA[<p>In today’s DailyCyber which you can listen to on the go. I discuss how to plan a career in Cyber Security. What questions you need to ask yourself and so much more. </p>
]]></description>
      <pubDate>Wed, 13 Nov 2019 10:38:34 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Kreiger)</author>
      <link>https://www.dailycyber.ca/episodes/how-to-plan-a-career-in-cyber-security-tjG8ZLcp</link>
      <content:encoded><![CDATA[<p>In today’s DailyCyber which you can listen to on the go. I discuss how to plan a career in Cyber Security. What questions you need to ask yourself and so much more. </p>
]]></content:encoded>
      <enclosure length="14691611" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/d86f7596-9ff2-4c07-954d-9bffea9f2001/how-to-plan-a-career-in-cyber-security-or-dailycyber-202_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>How To Plan A Career in Cyber Security</itunes:title>
      <itunes:author>Brandon Kreiger</itunes:author>
      <itunes:duration>00:15:18</itunes:duration>
      <itunes:summary>How To Plan a Career in Cyber Security
</itunes:summary>
      <itunes:subtitle>How To Plan a Career in Cyber Security
</itunes:subtitle>
      <itunes:keywords>#brandonkrieger, #cybersecuritycareer, #cybersecurity, #cybersecuritynews, #cybersecurityawareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">14e933ee-e8f1-4f43-a265-e86bdecb46cd</guid>
      <title>Daily Cyber Introduction with Brandon Krieger</title>
      <description><![CDATA[<p>Welcome to the DailyCyber Podcast  My name is Brandon Krieger and this Podcast is to share with you my journey into and evolving as Cyber Security Professional.</p>
]]></description>
      <pubDate>Tue, 12 Nov 2019 22:28:55 +0000</pubDate>
      <author>info@knssconsulting.com (Brandon Krieger)</author>
      <link>https://www.dailycyber.ca/episodes/daily-cyber-introduction-with-brandon-krieger-TsrYWqK8</link>
      <content:encoded><![CDATA[<p>Welcome to the DailyCyber Podcast  My name is Brandon Krieger and this Podcast is to share with you my journey into and evolving as Cyber Security Professional.</p>
]]></content:encoded>
      <enclosure length="2128896" type="audio/mpeg" url="https://pdcn.co/e/cdn.simplecast.com/audio/1c8257/1c825755-136a-40ca-83b0-4c692b3b7aff/2b53a354-6ea4-4812-9ac8-d7c4e888b0ce/daily-cyber-introduction-with-brandon-krieger_tc.mp3?aid=rss_feed&amp;feed=WoZubQcU"/>
      <itunes:title>Daily Cyber Introduction with Brandon Krieger</itunes:title>
      <itunes:author>Brandon Krieger</itunes:author>
      <itunes:duration>00:02:13</itunes:duration>
      <itunes:summary>Welcome to the DailyCyber Podcast  My name is Brandon Krieger and this Podcast is to share with you my journey into and evolving as Cyber Security Professional.</itunes:summary>
      <itunes:subtitle>Welcome to the DailyCyber Podcast  My name is Brandon Krieger and this Podcast is to share with you my journey into and evolving as Cyber Security Professional.</itunes:subtitle>
      <itunes:keywords>brandonkrieger, dailycyber, cybersecurity, cybersecurityawareness, cybersecuritynews</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>