<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/_SsyS46z" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>WE&apos;RE IN!</title>
    <description>On WE’RE IN!, you&apos;ll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.</description>
    <language>en</language>
    <pubDate>Thu, 9 Apr 2026 16:56:13 +0000</pubDate>
    <lastBuildDate>Thu, 9 Apr 2026 16:56:25 +0000</lastBuildDate>
    <image>
      <link>https://were-in.simplecast.com</link>
      <title>WE&apos;RE IN!</title>
      <url>https://image.simplecastcdn.com/images/039a6bab-c3f2-4999-87cd-4e21ec9cbe7d/07e19959-b1fe-46b6-9d92-d90e6b118039/3000x3000/we-re-in.jpg?aid=rss_feed</url>
    </image>
    <link>https://were-in.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>On WE’RE IN!, you&apos;ll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.</itunes:summary>
    <itunes:author>Synack</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/039a6bab-c3f2-4999-87cd-4e21ec9cbe7d/07e19959-b1fe-46b6-9d92-d90e6b118039/3000x3000/we-re-in.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/_SsyS46z</itunes:new-feed-url>
    <itunes:keywords>digital security, cyber, cybersecurity, digital, hacker, hacking, information, information security, security, tech, technology</itunes:keywords>
    <itunes:owner>
      <itunes:name>Synack</itunes:name>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Business">
      <itunes:category text="Management"/>
    </itunes:category>
    <item>
      <guid isPermaLink="false">998198b0-edb5-4f1d-8d49-c36b9a3b5987</guid>
      <title>Teri Green: &quot;AI is Artificial, YOU are the Intelligence!&quot;</title>
      <description><![CDATA[<p>In this episode of WE'RE IN, host <strong>Josh Mason</strong> sits down with <strong>Teri Green</strong>, VP of Technology at Elevate and CIO/CISO at Light Technology Solutions.</p>
<p>Teri breaks down her proprietary <strong>TEST Framework (Touch, Execute, Store, Trust)</strong>-a practical toolset for CISOs to evaluate AI risk beyond simple vulnerabilities. They discuss why humans remain the greatest vector in the age of AI, how to teach digital citizenship to the next generation, and why the basics of security still apply even as we move toward a quantum future.</p>
<p><strong>Timestamps:</strong></p>
<p>[00:00] Welcome, meet Teri Green</p>
<p>[00:43] Cybersecurity Origin Story</p>
<p>[01:44] Degrees and Certifications</p>
<p>[02:34] Career Path and Leadership</p>
<p>[03:28] TEST AI Risk Framework</p>
<p>[05:30] AI Trust and Human Factor</p>
<p>[06:53] Teaching AI Ethics to Kids</p>
<p>[08:34] Governance Outpaced by AI</p>
<p>[09:42] Upcoming Talks and Takeaways</p>
<p>[12:37] Learning AI and Plain Language</p>
<p>[16:17] AI Already in Your Org</p>
<p>[18:13] Where to Follow Terry</p>
<p>[18:58] Closing and Thanks</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 Apr 2026 16:56:13 +0000</pubDate>
      <author>Teri Green, Josh Mason</author>
      <link>https://were-in.simplecast.com/episodes/teri-green-ai-is-artificial-you-are-the-intelligence-u3IKSZSe</link>
      <content:encoded><![CDATA[<p>In this episode of WE'RE IN, host <strong>Josh Mason</strong> sits down with <strong>Teri Green</strong>, VP of Technology at Elevate and CIO/CISO at Light Technology Solutions.</p>
<p>Teri breaks down her proprietary <strong>TEST Framework (Touch, Execute, Store, Trust)</strong>-a practical toolset for CISOs to evaluate AI risk beyond simple vulnerabilities. They discuss why humans remain the greatest vector in the age of AI, how to teach digital citizenship to the next generation, and why the basics of security still apply even as we move toward a quantum future.</p>
<p><strong>Timestamps:</strong></p>
<p>[00:00] Welcome, meet Teri Green</p>
<p>[00:43] Cybersecurity Origin Story</p>
<p>[01:44] Degrees and Certifications</p>
<p>[02:34] Career Path and Leadership</p>
<p>[03:28] TEST AI Risk Framework</p>
<p>[05:30] AI Trust and Human Factor</p>
<p>[06:53] Teaching AI Ethics to Kids</p>
<p>[08:34] Governance Outpaced by AI</p>
<p>[09:42] Upcoming Talks and Takeaways</p>
<p>[12:37] Learning AI and Plain Language</p>
<p>[16:17] AI Already in Your Org</p>
<p>[18:13] Where to Follow Terry</p>
<p>[18:58] Closing and Thanks</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18784447" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/e1b41061-4d2f-4699-b115-caca4b14ed8f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=e1b41061-4d2f-4699-b115-caca4b14ed8f&amp;feed=_SsyS46z"/>
      <itunes:title>Teri Green: &quot;AI is Artificial, YOU are the Intelligence!&quot;</itunes:title>
      <itunes:author>Teri Green, Josh Mason</itunes:author>
      <itunes:duration>00:19:34</itunes:duration>
      <itunes:summary>In this episode of WE&apos;RE IN, host Josh Mason sits down with Teri Green, VP of Technology at Elevate and CIO/CISO at Light Technology Solutions.

Teri breaks down her proprietary TEST Framework (Touch, Execute, Store, Trust)-a practical toolset for CISOs to evaluate AI risk beyond simple vulnerabilities. They discuss why humans remain the greatest vector in the age of AI, how to teach digital citizenship to the next generation, and why the basics of security still apply even as we move toward a quantum future.</itunes:summary>
      <itunes:subtitle>In this episode of WE&apos;RE IN, host Josh Mason sits down with Teri Green, VP of Technology at Elevate and CIO/CISO at Light Technology Solutions.

Teri breaks down her proprietary TEST Framework (Touch, Execute, Store, Trust)-a practical toolset for CISOs to evaluate AI risk beyond simple vulnerabilities. They discuss why humans remain the greatest vector in the age of AI, how to teach digital citizenship to the next generation, and why the basics of security still apply even as we move toward a quantum future.</itunes:subtitle>
      <itunes:keywords>pen testing, cyber, crime, security, tech, vulnerabilities, cyber crime, it, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f76335d6-1030-48c4-898f-711993c17edf</guid>
      <title>From 14-Year-Old Bug Hunter to Level 5 SRT Hero</title>
      <description><![CDATA[<p>In this episode of WE’RE IN, Josh Mason sits down with Sayaan Alam, a Level 5 Synack Red Team (SRT) member who started his hacking journey at 14 years old. Sayaan shares his story of how he became the second-youngest researcher onboarded to the SRT and how he climbed the ranks to become recognized on the Synack Acropolis.</p>
<p><strong>Timestamps:</strong></p>
<p>00:54 Meet Sayaan: Starting Bug Bounties at 14</p>
<p>01:33 Joining the Synack Red Team (SRT)</p>
<p>03:18 SRT Onboarding Process</p>
<p>04:41 Climbing the Tiers: From Level 1 to Level 5</p>
<p>05:42 Why Synack is Different from Other Platforms</p>
<p>06:30 Improving Professional Pentesting Skills</p>
<p>06:58 Finding Patterns in Client Architectures</p>
<p>08:32 The AI Chatbot Vulnerability: SSRF Case Study</p>
<p>10:57 Remediation Advice for AI File Handling</p>
<p>11:58 Trends in AI Chatbot Security & Stored XSS</p>
<p>13:12 Thoughts on Sara: The Synack Autonomous Red Agent</p>
<p>14:29 How to Connect with Sayaan</p>
<p>15:07 Outro and Closing Remarks</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 3 Mar 2026 19:19:58 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/from-14-year-old-bug-hunter-to-level-5-srt-hero-tSi9LGva</link>
      <content:encoded><![CDATA[<p>In this episode of WE’RE IN, Josh Mason sits down with Sayaan Alam, a Level 5 Synack Red Team (SRT) member who started his hacking journey at 14 years old. Sayaan shares his story of how he became the second-youngest researcher onboarded to the SRT and how he climbed the ranks to become recognized on the Synack Acropolis.</p>
<p><strong>Timestamps:</strong></p>
<p>00:54 Meet Sayaan: Starting Bug Bounties at 14</p>
<p>01:33 Joining the Synack Red Team (SRT)</p>
<p>03:18 SRT Onboarding Process</p>
<p>04:41 Climbing the Tiers: From Level 1 to Level 5</p>
<p>05:42 Why Synack is Different from Other Platforms</p>
<p>06:30 Improving Professional Pentesting Skills</p>
<p>06:58 Finding Patterns in Client Architectures</p>
<p>08:32 The AI Chatbot Vulnerability: SSRF Case Study</p>
<p>10:57 Remediation Advice for AI File Handling</p>
<p>11:58 Trends in AI Chatbot Security & Stored XSS</p>
<p>13:12 Thoughts on Sara: The Synack Autonomous Red Agent</p>
<p>14:29 How to Connect with Sayaan</p>
<p>15:07 Outro and Closing Remarks</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="12193211" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/c8dc36fb-2ab4-4154-b147-b5ef82e77ee9/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=c8dc36fb-2ab4-4154-b147-b5ef82e77ee9&amp;feed=_SsyS46z"/>
      <itunes:title>From 14-Year-Old Bug Hunter to Level 5 SRT Hero</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:12:42</itunes:duration>
      <itunes:summary>In this episode of WE’RE IN, Josh Mason sits down with Sayaan Alam, a Level 5 Synack Red Team (SRT) member who started his hacking journey at 14 years old. Sayaan shares his story of how he became the second-youngest researcher onboarded to the SRT and how he climbed the ranks to become recognized on the Synack Acropolis. </itunes:summary>
      <itunes:subtitle>In this episode of WE’RE IN, Josh Mason sits down with Sayaan Alam, a Level 5 Synack Red Team (SRT) member who started his hacking journey at 14 years old. Sayaan shares his story of how he became the second-youngest researcher onboarded to the SRT and how he climbed the ranks to become recognized on the Synack Acropolis. </itunes:subtitle>
      <itunes:keywords>pen testing, cybercrime, cyber, crime, cyber security, ai, security, tech, vulnerabilities, cyber crime, it, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e2adc333-6a34-4f5b-af8c-241ce2b639da</guid>
      <title>How AI is Changing Offensive Security: Webinar</title>
      <description><![CDATA[<p>This conversation explores how AI is transforming the offensive security landscape, focusing on the rise of AI-driven vulnerabilities, the evolution of pen testing, and the integration of human and AI efforts in cybersecurity. The discussion highlights the importance of adapting to new threats and the role of Synack's Autonomous Red Agent in enhancing vulnerability detection and remediation processes.</p><p><strong>Timestamps</strong></p><p>04:51</p><p>Traditional vs. Modern Pen Testing Approaches</p><p>07:55</p><p>The Role of Human Analysts in AI-Driven Security</p><p>10:57</p><p>Introducing Sara Pentest: A New Era in Testing</p><p>13:16</p><p>Executing a Sara Pentest: A Step-by-Step Guide</p><p>20:13</p><p>Real-Time Insights from Sara Pentest</p><p>23:20</p><p>Technical Difficulties and Collaboration</p><p>23:25</p><p>Exploring Pen Test Engagements</p><p>27:00</p><p>Successful Pen Test Outcomes and Future Implications</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 13 Jan 2026 18:54:39 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/how-ai-is-changing-offensive-security-webinar-nF7UieCl</link>
      <content:encoded><![CDATA[<p>This conversation explores how AI is transforming the offensive security landscape, focusing on the rise of AI-driven vulnerabilities, the evolution of pen testing, and the integration of human and AI efforts in cybersecurity. The discussion highlights the importance of adapting to new threats and the role of Synack's Autonomous Red Agent in enhancing vulnerability detection and remediation processes.</p><p><strong>Timestamps</strong></p><p>04:51</p><p>Traditional vs. Modern Pen Testing Approaches</p><p>07:55</p><p>The Role of Human Analysts in AI-Driven Security</p><p>10:57</p><p>Introducing Sara Pentest: A New Era in Testing</p><p>13:16</p><p>Executing a Sara Pentest: A Step-by-Step Guide</p><p>20:13</p><p>Real-Time Insights from Sara Pentest</p><p>23:20</p><p>Technical Difficulties and Collaboration</p><p>23:25</p><p>Exploring Pen Test Engagements</p><p>27:00</p><p>Successful Pen Test Outcomes and Future Implications</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26676335" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/2f580091-33fe-4a52-b23c-933048c05d72/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=2f580091-33fe-4a52-b23c-933048c05d72&amp;feed=_SsyS46z"/>
      <itunes:title>How AI is Changing Offensive Security: Webinar</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:27:47</itunes:duration>
      <itunes:summary>This conversation explores how AI is transforming the offensive security landscape, focusing on the rise of AI-driven vulnerabilities, the evolution of pen testing, and the integration of human and AI efforts in cybersecurity. The discussion highlights the importance of adapting to new threats and the role of Synack&apos;s Autonomous Red Agent in enhancing vulnerability detection and remediation processes.</itunes:summary>
      <itunes:subtitle>This conversation explores how AI is transforming the offensive security landscape, focusing on the rise of AI-driven vulnerabilities, the evolution of pen testing, and the integration of human and AI efforts in cybersecurity. The discussion highlights the importance of adapting to new threats and the role of Synack&apos;s Autonomous Red Agent in enhancing vulnerability detection and remediation processes.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c314c265-b37a-4e15-8f3d-267f8ee5553d</guid>
      <title>Dive Into Pentesting with Bloodtyper</title>
      <description><![CDATA[<p>Synack Red Team member Bloodtyper reveals his journey from the DMZ to discovering critical AI prompt injection vulnerabilities. Learn how he creates bug bounty reports that get accepted, as well as other golden nuggets of advice to learn and grow your penetration testing skills.</p><p><strong>CHAPTERS:</strong></p><p>0:00 Introduction</p><p>01:03 Military Origins & The DMZ</p><p>01:58 Hacker Origin Story</p><p>04:06 Transitioning from Infantry to Tech</p><p>07:22 Joining the Synack Red Team (SRT)</p><p>08:04 Learning with Hack The Box</p><p>09:52 Bug Bounty Reporting Strategy</p><p>12:14 Synack Vuln Ops</p><p>16:03 Advice for New Pentesters</p><p>18:44 AI Prompt Injection Deep Dive</p><p>21:35 Retesting & Patch Verification</p><p>23:25 How to Improve Patching</p><p>26:02 Advice to Learn Cyber Security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 12 Jan 2026 21:23:42 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/dive-into-pentesting-with-bloodtyper-xQzt4JMw</link>
      <content:encoded><![CDATA[<p>Synack Red Team member Bloodtyper reveals his journey from the DMZ to discovering critical AI prompt injection vulnerabilities. Learn how he creates bug bounty reports that get accepted, as well as other golden nuggets of advice to learn and grow your penetration testing skills.</p><p><strong>CHAPTERS:</strong></p><p>0:00 Introduction</p><p>01:03 Military Origins & The DMZ</p><p>01:58 Hacker Origin Story</p><p>04:06 Transitioning from Infantry to Tech</p><p>07:22 Joining the Synack Red Team (SRT)</p><p>08:04 Learning with Hack The Box</p><p>09:52 Bug Bounty Reporting Strategy</p><p>12:14 Synack Vuln Ops</p><p>16:03 Advice for New Pentesters</p><p>18:44 AI Prompt Injection Deep Dive</p><p>21:35 Retesting & Patch Verification</p><p>23:25 How to Improve Patching</p><p>26:02 Advice to Learn Cyber Security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27254374" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/5f1a71ae-d7ad-4ae5-b3ab-d9c72a421e9e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=5f1a71ae-d7ad-4ae5-b3ab-d9c72a421e9e&amp;feed=_SsyS46z"/>
      <itunes:title>Dive Into Pentesting with Bloodtyper</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:28:23</itunes:duration>
      <itunes:summary>Synack Red Team member Bloodtyper reveals his journey from the DMZ to discovering critical AI prompt injection vulnerabilities. Learn how he creates bug bounty reports that get accepted, as well as other golden nuggets of advice to learn and grow your penetration testing skills.</itunes:summary>
      <itunes:subtitle>Synack Red Team member Bloodtyper reveals his journey from the DMZ to discovering critical AI prompt injection vulnerabilities. Learn how he creates bug bounty reports that get accepted, as well as other golden nuggets of advice to learn and grow your penetration testing skills.</itunes:subtitle>
      <itunes:keywords>pen testing, cyberpunk, technology, cyber, cyber security, cybersecurity, ai, hacking, tech, cyber attacks, hacker, cyber crime, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dbd9511c-b284-4a6f-81f1-02df8a828417</guid>
      <title>Responsible Disclosure and Bug Bounty Programs: Webinar</title>
      <description><![CDATA[<p>Adam Logue, Independent Security Researcher and Synack Red Teamer, discusses his experiences with responsible disclosure and bug bounty programs, and provides a fascinating technical deep dive into a vulnerability he found in Microsoft 365 Copilot during a client-facing engagement.</p><p>Timestamps:</p><p>00:49 - Adam's background with responsible disclosure and bug bounty programs</p><p>04:33 - Description of M365 vulnerability</p><p>12:34 - Demo of the vulnerability</p><p>17:53 - How to pentest AI</p><p>20:45 - Getting started in pentesting</p><p>23:07 - Benefits of hacking with Synack</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 4 Dec 2025 19:26:33 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/responsible-disclosure-and-bug-bounty-programs-webinar-i_CPQeqC</link>
      <content:encoded><![CDATA[<p>Adam Logue, Independent Security Researcher and Synack Red Teamer, discusses his experiences with responsible disclosure and bug bounty programs, and provides a fascinating technical deep dive into a vulnerability he found in Microsoft 365 Copilot during a client-facing engagement.</p><p>Timestamps:</p><p>00:49 - Adam's background with responsible disclosure and bug bounty programs</p><p>04:33 - Description of M365 vulnerability</p><p>12:34 - Demo of the vulnerability</p><p>17:53 - How to pentest AI</p><p>20:45 - Getting started in pentesting</p><p>23:07 - Benefits of hacking with Synack</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23650312" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/8180f7bc-a46e-4d93-aafb-8d320d5356d8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=8180f7bc-a46e-4d93-aafb-8d320d5356d8&amp;feed=_SsyS46z"/>
      <itunes:title>Responsible Disclosure and Bug Bounty Programs: Webinar</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:24:38</itunes:duration>
      <itunes:summary>Adam Logue, Independent Security Researcher and Synack Red Teamer, discusses his experiences with responsible disclosure and bug bounty programs, and provides a fascinating technical deep dive into a vulnerability he found in Microsoft 365 Copilot during a client-facing engagement.</itunes:summary>
      <itunes:subtitle>Adam Logue, Independent Security Researcher and Synack Red Teamer, discusses his experiences with responsible disclosure and bug bounty programs, and provides a fascinating technical deep dive into a vulnerability he found in Microsoft 365 Copilot during a client-facing engagement.</itunes:subtitle>
      <itunes:keywords>pen testing, technology, cybercrime, cyber security, webinar, ai, tech, hacker, cyber crime, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bd317a67-0e1c-44e9-86dc-044b62629fcb</guid>
      <title>Cynthia Kaiser is Building Partnerships to Stop Ransomware Threats</title>
      <description><![CDATA[<p>Blake and Cynthia take an in-depth look at the evolving ransomware threat landscape, the interplay between government and private sector in cybersecurity, and the challenges and opportunities presented by new technologies like AI.</p><p><strong>Timestamps: </strong></p><ul><li>00:19 - Halcyon’s Ransomware Research Center</li><li>07:24 - Actors behind ransomware campaigns</li><li>11:22 - Will AI help offense or defense? </li><li>17:29 - Known vulnerabilities</li><li>21:10 - Where do you fall on ransomware payments?</li><li>28:24 - How to stop bad actors</li><li>30:44 - Guest fun fact</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 16 Sep 2025 11:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/cynthia-kaisers-building-partnerships-to-stop-ransomware-threats-XqobCTNI</link>
      <content:encoded><![CDATA[<p>Blake and Cynthia take an in-depth look at the evolving ransomware threat landscape, the interplay between government and private sector in cybersecurity, and the challenges and opportunities presented by new technologies like AI.</p><p><strong>Timestamps: </strong></p><ul><li>00:19 - Halcyon’s Ransomware Research Center</li><li>07:24 - Actors behind ransomware campaigns</li><li>11:22 - Will AI help offense or defense? </li><li>17:29 - Known vulnerabilities</li><li>21:10 - Where do you fall on ransomware payments?</li><li>28:24 - How to stop bad actors</li><li>30:44 - Guest fun fact</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31344921" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/be83c561-0c3a-4d09-b38e-20f72f8c7494/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=be83c561-0c3a-4d09-b38e-20f72f8c7494&amp;feed=_SsyS46z"/>
      <itunes:title>Cynthia Kaiser is Building Partnerships to Stop Ransomware Threats</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:32:39</itunes:duration>
      <itunes:summary>Blake and Cynthia take an in-depth look at the evolving ransomware threat landscape, the interplay between government and private sector in cybersecurity, and the challenges and opportunities presented by new technologies like AI.</itunes:summary>
      <itunes:subtitle>Blake and Cynthia take an in-depth look at the evolving ransomware threat landscape, the interplay between government and private sector in cybersecurity, and the challenges and opportunities presented by new technologies like AI.</itunes:subtitle>
      <itunes:keywords>research, svp, cybercrime, cyber, fbi, ransomware, cybersecurity, ai, halcyon, tech, attack, hacker, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">07c5d869-b905-4648-8148-3519ef4222e4</guid>
      <title>The Offense Catch-Up Game</title>
      <description><![CDATA[<p>Rob and Blake discuss vulnerability and exploit discover in the age of AI and increasingly intelligent cyber threats. </p><p>Rob Lee is the Chief of Research and Head of Faculty at SANS Institute and runs his own consulting business specializing in information security, incident response, threat hunting, and digital forensics. With more than 20 years of experience in digital forensics, vulnerability and exploit discovery, intrusion detection/prevention, and incident response, he is known as “The Godfather of DFIR”. Rob co-authored the book Know Your Enemy, 2nd Edition, and is course co-author of FOR500: Windows Forensic Analysis and FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics.</p><p>Rob graduated from the U.S. Air Force Academy and served as a founding member of the 609th Information Warfare Squadron, the first U.S. military operational unit focused on information operations. Later, he was a member of the Air Force Office of Special Investigations (AFOSI) where he led a team conducting computer crime investigations, incident response, and computer forensics.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 3 Sep 2025 10:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/the-offense-catch-up-game-tZerKe4u</link>
      <content:encoded><![CDATA[<p>Rob and Blake discuss vulnerability and exploit discover in the age of AI and increasingly intelligent cyber threats. </p><p>Rob Lee is the Chief of Research and Head of Faculty at SANS Institute and runs his own consulting business specializing in information security, incident response, threat hunting, and digital forensics. With more than 20 years of experience in digital forensics, vulnerability and exploit discovery, intrusion detection/prevention, and incident response, he is known as “The Godfather of DFIR”. Rob co-authored the book Know Your Enemy, 2nd Edition, and is course co-author of FOR500: Windows Forensic Analysis and FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics.</p><p>Rob graduated from the U.S. Air Force Academy and served as a founding member of the 609th Information Warfare Squadron, the first U.S. military operational unit focused on information operations. Later, he was a member of the Air Force Office of Special Investigations (AFOSI) where he led a team conducting computer crime investigations, incident response, and computer forensics.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30863014" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/f6b825c5-491e-46dd-880d-6c5402df1f38/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=f6b825c5-491e-46dd-880d-6c5402df1f38&amp;feed=_SsyS46z"/>
      <itunes:title>The Offense Catch-Up Game</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:32:08</itunes:duration>
      <itunes:summary>Rob and Blake discuss vulnerability and exploit discover in the age of AI and increasingly intelligent cyber threats. </itunes:summary>
      <itunes:subtitle>Rob and Blake discuss vulnerability and exploit discover in the age of AI and increasingly intelligent cyber threats. </itunes:subtitle>
      <itunes:keywords>cybercrime, sans institute, cyber, information operations, digital forensics, cybersecurity, cyber crime, synack, incident response</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">56554998-bf41-49ac-8b4c-ed716e83bbb6</guid>
      <title>Agentic AI in Cybersecurity</title>
      <description><![CDATA[<p>In this bonus episode, Blake, Sharon Mandell and Mark Kuhr have a discussion about the impact of agentic AI in cybersecurity, focusing on both threats and opportunities. They touch on the rise of AI-enabled cyberattacks and how adversarial and generative AI are being leveraged by attackers, as well as the dual-use nature of AI. How can it can be both a threat and a tool for defenders?</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 19 Aug 2025 07:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/agentic-ai-in-cybersecurity-5VkHfsI_</link>
      <content:encoded><![CDATA[<p>In this bonus episode, Blake, Sharon Mandell and Mark Kuhr have a discussion about the impact of agentic AI in cybersecurity, focusing on both threats and opportunities. They touch on the rise of AI-enabled cyberattacks and how adversarial and generative AI are being leveraged by attackers, as well as the dual-use nature of AI. How can it can be both a threat and a tool for defenders?</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28965933" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/4ec2c489-51be-48df-b08a-5ec2b21744ab/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=4ec2c489-51be-48df-b08a-5ec2b21744ab&amp;feed=_SsyS46z"/>
      <itunes:title>Agentic AI in Cybersecurity</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:30:10</itunes:duration>
      <itunes:summary>Blake, Sharon Mandell and Mark Kuhr have a discussion about the impact of agentic AI in cybersecurity, focusing on both threats and opportunities.</itunes:summary>
      <itunes:subtitle>Blake, Sharon Mandell and Mark Kuhr have a discussion about the impact of agentic AI in cybersecurity, focusing on both threats and opportunities.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">26d6ef2e-c355-4f25-b8cc-365c44471416</guid>
      <title>Cybersecurity as a Bipartisan Cause</title>
      <description><![CDATA[<p>Jim Langevin, former chair of the Congressional Cyber Caucus and Democratic Congressman from Rhode Island, reflects on his belief that cybersecurity remains a bipartisan issue. He emphasizes the importance of collaboration between government and the private sector, and the potential of artificial intelligence in enhancing cybersecurity.</p><p>Timestamps:</p><ul><li>01:05 - About Rep. Langevin</li><li>04:08 - Building a hacker-friendly congress</li><li>09:53 - Cybersecurity as a bipartisan issue</li><li>15:39 - Trying to predict the future</li><li>19:44 - AI and cyber defense</li></ul><p><a href="https://www.linkedin.com/in/blakethompsonheuer/">Find Blake on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/jim-langevin-581080261/">Find Rep Langevin on LinkedIn </a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 5 Aug 2025 12:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/cybersecurity-as-a-bipartisan-cause-Z4IKXt7J</link>
      <content:encoded><![CDATA[<p>Jim Langevin, former chair of the Congressional Cyber Caucus and Democratic Congressman from Rhode Island, reflects on his belief that cybersecurity remains a bipartisan issue. He emphasizes the importance of collaboration between government and the private sector, and the potential of artificial intelligence in enhancing cybersecurity.</p><p>Timestamps:</p><ul><li>01:05 - About Rep. Langevin</li><li>04:08 - Building a hacker-friendly congress</li><li>09:53 - Cybersecurity as a bipartisan issue</li><li>15:39 - Trying to predict the future</li><li>19:44 - AI and cyber defense</li></ul><p><a href="https://www.linkedin.com/in/blakethompsonheuer/">Find Blake on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/jim-langevin-581080261/">Find Rep Langevin on LinkedIn </a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24021858" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/6d56ba44-2e60-4e36-b6f3-875f2c9a67fe/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=6d56ba44-2e60-4e36-b6f3-875f2c9a67fe&amp;feed=_SsyS46z"/>
      <itunes:title>Cybersecurity as a Bipartisan Cause</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:25:01</itunes:duration>
      <itunes:summary>Jim Langevin, former chair of the Congressional Cyber Caucus and Democratic Congressman from Rhode Island, reflects on his belief that cybersecurity remains a bipartisan issue. </itunes:summary>
      <itunes:subtitle>Jim Langevin, former chair of the Congressional Cyber Caucus and Democratic Congressman from Rhode Island, reflects on his belief that cybersecurity remains a bipartisan issue. </itunes:subtitle>
      <itunes:keywords>pen testing, cybercrime, cyber, security, penetration testing, tech, government, hacker, it, synack, red team, congress</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9f7972d4-571e-4703-8e95-cdda310dde42</guid>
      <title>Paul Mote on being right 100% of the time</title>
      <description><![CDATA[<p>Paul Mote, Vice President, Solutions Architects at Synack, discusses if we're ready to embrace AI in a world of ever-evolving threats. Who will AI help more, attackers or defenders?</p><p><strong>TIMESTAMPS:</strong></p><ul><li>00:35 - What is a solutions architect?</li><li>02:56 - Advancing threats</li><li>13:32 - Are we ready to embrace AI? </li><li>20:58 - What’s real, what’s not?</li><li>25:03 - Find Paul Mote on LinkedIn</li></ul><p> </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 22 Jul 2025 12:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/paul-mote-on-being-right-100-of-the-time-AE5QoQBc</link>
      <content:encoded><![CDATA[<p>Paul Mote, Vice President, Solutions Architects at Synack, discusses if we're ready to embrace AI in a world of ever-evolving threats. Who will AI help more, attackers or defenders?</p><p><strong>TIMESTAMPS:</strong></p><ul><li>00:35 - What is a solutions architect?</li><li>02:56 - Advancing threats</li><li>13:32 - Are we ready to embrace AI? </li><li>20:58 - What’s real, what’s not?</li><li>25:03 - Find Paul Mote on LinkedIn</li></ul><p> </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25466325" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/a2c9cd93-977f-4912-85c2-5d286e8e6598/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=a2c9cd93-977f-4912-85c2-5d286e8e6598&amp;feed=_SsyS46z"/>
      <itunes:title>Paul Mote on being right 100% of the time</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:26:31</itunes:duration>
      <itunes:summary>Paul Mote, Vice President, Solutions Architects at Synack, discusses if we&apos;re ready to embrace AI in a world of ever-evolving threats. Who will AI help more, attackers or defenders?</itunes:summary>
      <itunes:subtitle>Paul Mote, Vice President, Solutions Architects at Synack, discusses if we&apos;re ready to embrace AI in a world of ever-evolving threats. Who will AI help more, attackers or defenders?</itunes:subtitle>
      <itunes:keywords>pen testing, technology, cyber, cyber attach, ai, tech, hacker, synack, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f156abe3-6745-4375-9c7a-1642869a695c</guid>
      <title>Bringing Humanity to Cybersecurity with Lea Kissner, CISO of LinkedIn</title>
      <description><![CDATA[<p> Lea Kissner, CISO of LinkedIn, describes the dangers of perverse metrics, the importance of phishing-resistant technologies, and the ongoing challenge of recruiting and retaining top talent in the field. Lea also explains how  they deal with complex privacy issues at scale every day. Lea and Blake also touch on LinkedIn's efforts to balance security with user privacy preferences, and the evolving threat landscape posed by AI.</p><p><a href="https://www.linkedin.com/in/lea-kissner">Find Lea on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/blakethompsonheuer/">Find Blake on LinkedIn</a></p><p><a href="https://open.spotify.com/show/5ZYhabf4XGsNWG1rjxJ6hk">Follow WE'RE IN!</a></p><p> </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 15 Jul 2025 12:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/bringing-humanity-to-cybersecurity-with-lea-kissner-ciso-of-linkedin-do862eG6</link>
      <content:encoded><![CDATA[<p> Lea Kissner, CISO of LinkedIn, describes the dangers of perverse metrics, the importance of phishing-resistant technologies, and the ongoing challenge of recruiting and retaining top talent in the field. Lea also explains how  they deal with complex privacy issues at scale every day. Lea and Blake also touch on LinkedIn's efforts to balance security with user privacy preferences, and the evolving threat landscape posed by AI.</p><p><a href="https://www.linkedin.com/in/lea-kissner">Find Lea on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/blakethompsonheuer/">Find Blake on LinkedIn</a></p><p><a href="https://open.spotify.com/show/5ZYhabf4XGsNWG1rjxJ6hk">Follow WE'RE IN!</a></p><p> </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17977750" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/cb07d352-f41d-49dd-972d-d69ce7caa33e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=cb07d352-f41d-49dd-972d-d69ce7caa33e&amp;feed=_SsyS46z"/>
      <itunes:title>Bringing Humanity to Cybersecurity with Lea Kissner, CISO of LinkedIn</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:18:43</itunes:duration>
      <itunes:summary> Lea Kissner, CISO of LinkedIn, describes the dangers of perverse metrics, the importance of phishing-resistant technologies, and the ongoing challenge of recruiting and retaining top talent in the field. Lea also explains how they deal with complex privacy issues at scale every day. </itunes:summary>
      <itunes:subtitle> Lea Kissner, CISO of LinkedIn, describes the dangers of perverse metrics, the importance of phishing-resistant technologies, and the ongoing challenge of recruiting and retaining top talent in the field. Lea also explains how they deal with complex privacy issues at scale every day. </itunes:subtitle>
      <itunes:keywords>technology, hack, cyber, regulation, ciso, cybersecurity, c suite, security, safety, scale, linkedin, leadership, tech, business, hacker, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d9434052-4923-48fe-8956-f2469c8d203b</guid>
      <title>Mike Witt on NASA’s cybersecurity mission in space</title>
      <description><![CDATA[<p>Mike Witt, NASA's Senior Agency Information Security Officer and Chief Information Security Officer for Cybersecurity and Privacy, has a long history of public service. In addition to serving 10 years in the U.S. Army, Mike was the director of the United States Computer Emergency Readiness Team (US-CERT) at the Department of Homeland Security and a key cybersecurity official at the IRS. Now, he’s leading NASA’s efforts to secure spaceflight centers nationwide and their missions to the final frontier.</p><p>Tune in to the latest episode of WE’RE IN! to hear more about how NASA balances its out-of-this-world mission with real-world concerns about cybersecurity resulting from increased activity from other space agencies and commercial interests alike.</p><p>Listen to learn more about: </p><ul><li>How NASA responded to the Log4j vulnerabilities revealed in 2021</li><li>Why the SAISO position was created </li><li>How NASA’s stellar reputation helps it address the cybersecurity talent shortage</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 12 Dec 2024 23:37:50 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/mike-witt-on-nasas-cybersecurity-mission-in-space-Q7TkwTCX</link>
      <content:encoded><![CDATA[<p>Mike Witt, NASA's Senior Agency Information Security Officer and Chief Information Security Officer for Cybersecurity and Privacy, has a long history of public service. In addition to serving 10 years in the U.S. Army, Mike was the director of the United States Computer Emergency Readiness Team (US-CERT) at the Department of Homeland Security and a key cybersecurity official at the IRS. Now, he’s leading NASA’s efforts to secure spaceflight centers nationwide and their missions to the final frontier.</p><p>Tune in to the latest episode of WE’RE IN! to hear more about how NASA balances its out-of-this-world mission with real-world concerns about cybersecurity resulting from increased activity from other space agencies and commercial interests alike.</p><p>Listen to learn more about: </p><ul><li>How NASA responded to the Log4j vulnerabilities revealed in 2021</li><li>Why the SAISO position was created </li><li>How NASA’s stellar reputation helps it address the cybersecurity talent shortage</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26713983" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/54020f68-906d-4e9e-a508-e3da1c78e376/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=54020f68-906d-4e9e-a508-e3da1c78e376&amp;feed=_SsyS46z"/>
      <itunes:title>Mike Witt on NASA’s cybersecurity mission in space</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:27:49</itunes:duration>
      <itunes:summary>Mike Witt, NASA&apos;s Senior Agency Information Security Officer and Chief Information Security Officer for Cybersecurity and Privacy, has a long history of public service. In addition to serving 10 years in the U.S. Army, Mike was the director of the United States Computer Emergency Readiness Team (US-CERT) at the Department of Homeland Security and a key cybersecurity official at the IRS. Now, he’s leading NASA’s efforts to secure spaceflight centers nationwide and their missions to the final frontier.</itunes:summary>
      <itunes:subtitle>Mike Witt, NASA&apos;s Senior Agency Information Security Officer and Chief Information Security Officer for Cybersecurity and Privacy, has a long history of public service. In addition to serving 10 years in the U.S. Army, Mike was the director of the United States Computer Emergency Readiness Team (US-CERT) at the Department of Homeland Security and a key cybersecurity official at the IRS. Now, he’s leading NASA’s efforts to secure spaceflight centers nationwide and their missions to the final frontier.</itunes:subtitle>
      <itunes:keywords>technology, cyber, spacefights, irs, ai, spaceforce, security, spaces, tech, log4j, nasa</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c3517ae-4c73-46e9-9ce8-beb907805751</guid>
      <title>Lt. Gen. Lori Reynolds on the evolution of cyber warfare</title>
      <description><![CDATA[<p>Lieutenant General Lori Reynolds' (Ret., USMC) career journey from a Naval Academy graduate to a key figure in cybersecurity and information warfare illustrates the progression of military communications and cyber operations. Initially commissioned as a Marine Corps communications officer in 1986, Lori’s career took her from managing traditional radio communications to leading the Marine Corps Cyberspace Command. </p><p>Tune in to hear how she played an important part in integrating cyber operations into the Marine Corps' combined arms approach and later spearheaded efforts to create a comprehensive information warfighting function.</p><p>Listen to learn more about: </p><p>How China's cyber operations have become more sophisticated, quiet and focused on long-term strategic positioning</p><p>Why the threat now extends beyond cyberattacks to include technological exports and influence operations </p><p>How Russia and other state actors are also engaged in hybrid warfare, operating below the threshold of conventional conflict</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 21 Nov 2024 16:21:51 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/lori-reynolds-wmxaDWOn</link>
      <content:encoded><![CDATA[<p>Lieutenant General Lori Reynolds' (Ret., USMC) career journey from a Naval Academy graduate to a key figure in cybersecurity and information warfare illustrates the progression of military communications and cyber operations. Initially commissioned as a Marine Corps communications officer in 1986, Lori’s career took her from managing traditional radio communications to leading the Marine Corps Cyberspace Command. </p><p>Tune in to hear how she played an important part in integrating cyber operations into the Marine Corps' combined arms approach and later spearheaded efforts to create a comprehensive information warfighting function.</p><p>Listen to learn more about: </p><p>How China's cyber operations have become more sophisticated, quiet and focused on long-term strategic positioning</p><p>Why the threat now extends beyond cyberattacks to include technological exports and influence operations </p><p>How Russia and other state actors are also engaged in hybrid warfare, operating below the threshold of conventional conflict</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32297504" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/24d53ab7-670a-4700-a21a-b781eeec0f23/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=24d53ab7-670a-4700-a21a-b781eeec0f23&amp;feed=_SsyS46z"/>
      <itunes:title>Lt. Gen. Lori Reynolds on the evolution of cyber warfare</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:33:38</itunes:duration>
      <itunes:summary>Lieutenant General Lori Reynolds&apos; (Ret., USMC) career journey from a Naval Academy graduate to a key figure in cybersecurity and information warfare illustrates the progression of military communications and cyber operations. Initially commissioned as a Marine Corps communications officer in 1986, Lori’s career took her from managing traditional radio communications to leading the Marine Corps Cyberspace Command. </itunes:summary>
      <itunes:subtitle>Lieutenant General Lori Reynolds&apos; (Ret., USMC) career journey from a Naval Academy graduate to a key figure in cybersecurity and information warfare illustrates the progression of military communications and cyber operations. Initially commissioned as a Marine Corps communications officer in 1986, Lori’s career took her from managing traditional radio communications to leading the Marine Corps Cyberspace Command. </itunes:subtitle>
      <itunes:keywords>pen testing, technology, cyber, future, cybersecurity, ai, security, safety, tech, cyber crime, synack, nasa</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">47c1d11c-1b4d-4ade-9c36-f355b29321d9</guid>
      <title>Melissa Vice on the value of vulnerability disclosure programs</title>
      <description><![CDATA[<p>The Department of Defense Cyber Crime Center (DC3) operates a Vulnerability Disclosure Program (VDP) that handles critical cybersecurity issues reported by the public, including using an actual red phone for urgent matters. In the latest episode of WE’RE IN!, Melissa Vice, director of DC3’s VDP, describes how they respond to cyberthreats and collaborate with other groups within the center, such as the Operation Enablement Directorate and cyber forensics laboratory. </p><p>Tune in to hear how the program, which began in 2016 following a successful bug bounty event, has processed over 53,000 reports, 56% of which were actionable, and resulted in nearly 30,000 remediated vulnerabilities.</p><p>Listen to learn more about:</p><p>Why VDP has been recognized by the government as a reliable and economical cybersecurity strategy </p><p>How Melissa and her team handled the notorious Log4j vulnerability</p><p>How DC3 has explored the use of AI and machine learning to enhance capabilities and scale operations </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 7 Nov 2024 15:07:39 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/melissa-vice-on-the-value-of-vulnerability-disclosure-programs-iOXiVdf6</link>
      <content:encoded><![CDATA[<p>The Department of Defense Cyber Crime Center (DC3) operates a Vulnerability Disclosure Program (VDP) that handles critical cybersecurity issues reported by the public, including using an actual red phone for urgent matters. In the latest episode of WE’RE IN!, Melissa Vice, director of DC3’s VDP, describes how they respond to cyberthreats and collaborate with other groups within the center, such as the Operation Enablement Directorate and cyber forensics laboratory. </p><p>Tune in to hear how the program, which began in 2016 following a successful bug bounty event, has processed over 53,000 reports, 56% of which were actionable, and resulted in nearly 30,000 remediated vulnerabilities.</p><p>Listen to learn more about:</p><p>Why VDP has been recognized by the government as a reliable and economical cybersecurity strategy </p><p>How Melissa and her team handled the notorious Log4j vulnerability</p><p>How DC3 has explored the use of AI and machine learning to enhance capabilities and scale operations </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33881986" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/4ff77c95-22a8-47f8-a5ad-9767244c9fec/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=4ff77c95-22a8-47f8-a5ad-9767244c9fec&amp;feed=_SsyS46z"/>
      <itunes:title>Melissa Vice on the value of vulnerability disclosure programs</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:35:17</itunes:duration>
      <itunes:summary>The Department of Defense Cyber Crime Center (DC3) operates a Vulnerability Disclosure Program (VDP) that handles critical cybersecurity issues reported by the public, including using an actual red phone for urgent matters. In the latest episode of WE’RE IN!, Melissa Vice, director of DC3’s VDP, describes how they respond to cyberthreats and collaborate with other groups within the center, such as the Operation Enablement Directorate and cyber forensics laboratory. </itunes:summary>
      <itunes:subtitle>The Department of Defense Cyber Crime Center (DC3) operates a Vulnerability Disclosure Program (VDP) that handles critical cybersecurity issues reported by the public, including using an actual red phone for urgent matters. In the latest episode of WE’RE IN!, Melissa Vice, director of DC3’s VDP, describes how they respond to cyberthreats and collaborate with other groups within the center, such as the Operation Enablement Directorate and cyber forensics laboratory. </itunes:subtitle>
      <itunes:keywords>pen testing, cybercrime, cyber, vulnerability management, dc3, cybersecurity, ai, tech, department of defense, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9d9f4a77-7b90-4f1a-b106-59a32d4b06f1</guid>
      <title>The AI Episode: Experts Share Security Insights on LLMs and GenAI</title>
      <description><![CDATA[<p>Hear from this season’s guests for their thoughts and predictions on AI and cybersecurity. We took sound bites from a range of WE’RE IN! interviewees, whose opinions on AI vary from thinking it’s overblown to being cautiously curious. Tune into this episode to better understand AI’s seismic effects on the infosec industry.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 23 Oct 2024 12:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/the-ai-episode-experts-share-security-insights-on-llms-and-genai-tuaTYlJ5</link>
      <content:encoded><![CDATA[<p>Hear from this season’s guests for their thoughts and predictions on AI and cybersecurity. We took sound bites from a range of WE’RE IN! interviewees, whose opinions on AI vary from thinking it’s overblown to being cautiously curious. Tune into this episode to better understand AI’s seismic effects on the infosec industry.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14807999" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/d8f0adac-657f-4dd5-8709-67f220210dac/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=d8f0adac-657f-4dd5-8709-67f220210dac&amp;feed=_SsyS46z"/>
      <itunes:title>The AI Episode: Experts Share Security Insights on LLMs and GenAI</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:15:25</itunes:duration>
      <itunes:summary>Hear from this season’s guests for their thoughts and predictions on AI and cybersecurity. We took sound bites from a range of WE’RE IN! interviewees, whose opinions on AI vary from thinking it’s overblown to being cautiously curious. Tune into this episode to better understand AI’s seismic effects on the infosec industry. </itunes:summary>
      <itunes:subtitle>Hear from this season’s guests for their thoughts and predictions on AI and cybersecurity. We took sound bites from a range of WE’RE IN! interviewees, whose opinions on AI vary from thinking it’s overblown to being cautiously curious. Tune into this episode to better understand AI’s seismic effects on the infosec industry. </itunes:subtitle>
      <itunes:keywords>cyber, trending, techs, infosec, cyber security, ait, ech, cyber crime, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1c0308f2-bac5-4064-9416-42bec44929a9</guid>
      <title>Bill Dunnion on the push for transparency in security breaches</title>
      <description><![CDATA[<p>Bill Dunnion, chief information security officer at global telecommunications company Mitel, is well-versed in the critical nature of telecom infrastructure and the devices that support it. He’s also keenly aware of how his role as CISO is under increasing scrutiny from regulators around the world and in Canada, where Mitel is based. </p><p>In this episode of WE’RE IN!, Bill expresses skepticism about AI, preferring the term "machine learning" for most current applications, but he acknowledges its potential benefits, such as improving threat detection.</p><p><strong>Listen to hear more about:</strong> </p><ul><li>How Bill's diverse background in telecom, IT, and security has provided him with a well-rounded perspective to approach his CISO role</li><li>Why the integration of voice, data, and collaboration tools in enterprise communications presents new cybersecurity challenges</li><li>Why security awareness is crucial for both professional and personal life </li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 2 Oct 2024 18:12:26 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/bill-dunnion-on-the-push-for-transparency-in-security-breaches-cPR_HcK8</link>
      <content:encoded><![CDATA[<p>Bill Dunnion, chief information security officer at global telecommunications company Mitel, is well-versed in the critical nature of telecom infrastructure and the devices that support it. He’s also keenly aware of how his role as CISO is under increasing scrutiny from regulators around the world and in Canada, where Mitel is based. </p><p>In this episode of WE’RE IN!, Bill expresses skepticism about AI, preferring the term "machine learning" for most current applications, but he acknowledges its potential benefits, such as improving threat detection.</p><p><strong>Listen to hear more about:</strong> </p><ul><li>How Bill's diverse background in telecom, IT, and security has provided him with a well-rounded perspective to approach his CISO role</li><li>Why the integration of voice, data, and collaboration tools in enterprise communications presents new cybersecurity challenges</li><li>Why security awareness is crucial for both professional and personal life </li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28467743" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/b6df8eda-1cbb-4bd9-8157-dc9cab4374c8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=b6df8eda-1cbb-4bd9-8157-dc9cab4374c8&amp;feed=_SsyS46z"/>
      <itunes:title>Bill Dunnion on the push for transparency in security breaches</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:29:39</itunes:duration>
      <itunes:summary>Bill Dunnion, chief information security officer at global telecommunications company Mitel, is well-versed in the critical nature of telecom infrastructure and the devices that support it. He’s also keenly aware of how his role as CISO is under increasing scrutiny from regulators around the world and in Canada, where Mitel is based. </itunes:summary>
      <itunes:subtitle>Bill Dunnion, chief information security officer at global telecommunications company Mitel, is well-versed in the critical nature of telecom infrastructure and the devices that support it. He’s also keenly aware of how his role as CISO is under increasing scrutiny from regulators around the world and in Canada, where Mitel is based. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f29d9149-adf9-467a-8d7f-2450cb5fcd97</guid>
      <title>Jennifer Villarreal on how she upped her hacking game</title>
      <description><![CDATA[<p>Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON. Jen emphasizes the importance of skill development and preparation for women entering the male-dominated cybersecurity field, and discusses her preferred hacking tools and techniques.</p><p>In this episode of WE’RE IN!, Jennifer gives her take on AI in penetration testing, suggesting it should be used as a tool for initial reconnaissance but not for exploiting vulnerabilities. <br /> </p><p>Listen to hear more about: </p><ul><li>Why all of Jennifer’s smart home devices’ warranties are voided</li><li>How anyone can be a hacker by following the Open Source Intelligence methodology to find vulnerabilities</li><li>The importance of producing high-quality work and going above and beyond to gain trust in the pentesting industry</li></ul><p><br /> </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 19 Sep 2024 00:07:49 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/jennifer-villarreal-on-how-she-upped-her-hacking-game-HeiZhtXZ</link>
      <content:encoded><![CDATA[<p>Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON. Jen emphasizes the importance of skill development and preparation for women entering the male-dominated cybersecurity field, and discusses her preferred hacking tools and techniques.</p><p>In this episode of WE’RE IN!, Jennifer gives her take on AI in penetration testing, suggesting it should be used as a tool for initial reconnaissance but not for exploiting vulnerabilities. <br /> </p><p>Listen to hear more about: </p><ul><li>Why all of Jennifer’s smart home devices’ warranties are voided</li><li>How anyone can be a hacker by following the Open Source Intelligence methodology to find vulnerabilities</li><li>The importance of producing high-quality work and going above and beyond to gain trust in the pentesting industry</li></ul><p><br /> </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29534795" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/6ad7a678-6f5b-4634-81be-74cf97dbc789/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=6ad7a678-6f5b-4634-81be-74cf97dbc789&amp;feed=_SsyS46z"/>
      <itunes:title>Jennifer Villarreal on how she upped her hacking game</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:30:45</itunes:duration>
      <itunes:summary>Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON. Jen emphasizes the importance of skill development and preparation for women entering the male-dominated cybersecurity field, and discusses her preferred hacking tools and techniques.</itunes:summary>
      <itunes:subtitle>Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON. Jen emphasizes the importance of skill development and preparation for women entering the male-dominated cybersecurity field, and discusses her preferred hacking tools and techniques.</itunes:subtitle>
      <itunes:keywords>cyber, cyber security, military, security, tech, vulnerabilities, hacker, cyber crime, synack, tech security, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e3f7e10e-cf76-477c-84de-2d1a182cfafe</guid>
      <title>Sara Mosley on best practices for Zero Trust</title>
      <description><![CDATA[<p>Sara Mosley, technical director for the Bureau of Diplomatic Security's Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She recommends balancing security measures with mission needs to prevent users from circumventing security protocols.</p><p>In this episode of WE’RE IN!, Sara underlines the importance of collaboration between IT and security teams to adequately protect data and address relevant threats in anticipation of the September deadline for federal Zero Trust compliance.</p><p>Listen to hear more about:</p><ul><li>The role of the private sector in adopting Zero Trust frameworks and providing security tools</li><li>Preparing for emerging technologies like quantum computing and their accelerated development due to AI advancements</li><li>Why Sara believes hackers will initially benefit more from AI advancements than defenders</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 21 Aug 2024 15:55:42 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/sara-mosley-on-best-practices-for-zero-trust-494s0q34</link>
      <content:encoded><![CDATA[<p>Sara Mosley, technical director for the Bureau of Diplomatic Security's Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She recommends balancing security measures with mission needs to prevent users from circumventing security protocols.</p><p>In this episode of WE’RE IN!, Sara underlines the importance of collaboration between IT and security teams to adequately protect data and address relevant threats in anticipation of the September deadline for federal Zero Trust compliance.</p><p>Listen to hear more about:</p><ul><li>The role of the private sector in adopting Zero Trust frameworks and providing security tools</li><li>Preparing for emerging technologies like quantum computing and their accelerated development due to AI advancements</li><li>Why Sara believes hackers will initially benefit more from AI advancements than defenders</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28593965" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/b08b50d1-ad34-4521-93f4-3dbd7670a8e7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=b08b50d1-ad34-4521-93f4-3dbd7670a8e7&amp;feed=_SsyS46z"/>
      <itunes:title>Sara Mosley on best practices for Zero Trust</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:29:47</itunes:duration>
      <itunes:summary>Sara Mosley, technical director for the Bureau of Diplomatic Security&apos;s Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She recommends balancing security measures with mission needs to prevent users from circumventing security protocols.</itunes:summary>
      <itunes:subtitle>Sara Mosley, technical director for the Bureau of Diplomatic Security&apos;s Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She recommends balancing security measures with mission needs to prevent users from circumventing security protocols.</itunes:subtitle>
      <itunes:keywords>technology, state department, cyber, zero trust, cybersecurity, tech, hacker, cyber crime, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4869a0a8-187c-4c4c-a092-6efce7f48b05</guid>
      <title>Michael Daniel on untangling cybersecurity’s complexity problem</title>
      <description><![CDATA[<p>Cybersecurity has a complexity problem. A tangled web of technical, psychological, economic and geopolitical factors enable and motivate malicious actors. Michael Daniel, CEO and president of the Cyber Threat Alliance, is helping public and private organizations decode these complex motivations with information sharing, including the Ransomware Task Force. </p><p>In this episode of WE’RE IN!, Michael elaborates on his "immune system" approach for the internet, a strategy where threats are quickly identified and neutralized. But this requires robust – and highly trusted – information sharing between groups. </p><p>Listen to hear more about:</p><ul><li>The threat assessment for the 2024 Paris Olympics, highlighting potential threats from Russia and Azerbaijan</li><li>The need for more resilient software systems that can degrade gracefully rather than catastrophically fail</li><li>Michael’s thoughts on industry diversification and the value of different viewpoints in tackling cybersecurity challenges</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 31 Jul 2024 19:05:39 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/placeholder-title-s9_jNjSs</link>
      <content:encoded><![CDATA[<p>Cybersecurity has a complexity problem. A tangled web of technical, psychological, economic and geopolitical factors enable and motivate malicious actors. Michael Daniel, CEO and president of the Cyber Threat Alliance, is helping public and private organizations decode these complex motivations with information sharing, including the Ransomware Task Force. </p><p>In this episode of WE’RE IN!, Michael elaborates on his "immune system" approach for the internet, a strategy where threats are quickly identified and neutralized. But this requires robust – and highly trusted – information sharing between groups. </p><p>Listen to hear more about:</p><ul><li>The threat assessment for the 2024 Paris Olympics, highlighting potential threats from Russia and Azerbaijan</li><li>The need for more resilient software systems that can degrade gracefully rather than catastrophically fail</li><li>Michael’s thoughts on industry diversification and the value of different viewpoints in tackling cybersecurity challenges</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33819712" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/e6ff6662-e70a-454e-9fbf-3090e661beaa/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=e6ff6662-e70a-454e-9fbf-3090e661beaa&amp;feed=_SsyS46z"/>
      <itunes:title>Michael Daniel on untangling cybersecurity’s complexity problem</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:35:13</itunes:duration>
      <itunes:summary>Cybersecurity has a complexity problem. A tangled web of technical, psychological, economic and geopolitical factors enable and motivate malicious actors. Michael Daniel, CEO and president of the Cyber Threat Alliance, is helping public and private organizations decode these complex motivations with information sharing, including the Ransomware Task Force. </itunes:summary>
      <itunes:subtitle>Cybersecurity has a complexity problem. A tangled web of technical, psychological, economic and geopolitical factors enable and motivate malicious actors. Michael Daniel, CEO and president of the Cyber Threat Alliance, is helping public and private organizations decode these complex motivations with information sharing, including the Ransomware Task Force. </itunes:subtitle>
      <itunes:keywords>technology, cybercrime, cyber, pentesting, cyber security, penetration testing, tech, business, synack, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dc8cc072-8bd0-48d4-969d-e92ecac43254</guid>
      <title>Anand Prakash on cloud security startups and next-gen hacking</title>
      <description><![CDATA[<p><strong>Anand Prakash on cloud security startups and next-gen hacking </strong></p><p>Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by SentinelOne, where he’s now a senior director of product management. </p><p>In the latest episode of WE’RE IN!, Anand touches on India's prominence in global tech – particularly in security research and bug bounty programs – and he shares his personal journey into cybersecurity, which began with a curiosity about hacking at a young age in cyber cafes. </p><p>Listen to hear more about: </p><ul><li>How bug bounty programs have evolved, with companies now more open to ethical hacking due to increased awareness of data breaches</li><li>The viability of government efforts to reduce entire classes of vulnerabilities like SQLi</li><li>If AI is effective in improving red teaming and bug bounty hunting</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 17 Jul 2024 16:35:40 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/anand-prakash-on-cloud-security-startups-and-next-gen-hacking-0SKAyAzv</link>
      <content:encoded><![CDATA[<p><strong>Anand Prakash on cloud security startups and next-gen hacking </strong></p><p>Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by SentinelOne, where he’s now a senior director of product management. </p><p>In the latest episode of WE’RE IN!, Anand touches on India's prominence in global tech – particularly in security research and bug bounty programs – and he shares his personal journey into cybersecurity, which began with a curiosity about hacking at a young age in cyber cafes. </p><p>Listen to hear more about: </p><ul><li>How bug bounty programs have evolved, with companies now more open to ethical hacking due to increased awareness of data breaches</li><li>The viability of government efforts to reduce entire classes of vulnerabilities like SQLi</li><li>If AI is effective in improving red teaming and bug bounty hunting</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27492227" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/6177205a-4fdf-4047-9e7c-817c6d510efa/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=6177205a-4fdf-4047-9e7c-817c6d510efa&amp;feed=_SsyS46z"/>
      <itunes:title>Anand Prakash on cloud security startups and next-gen hacking</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:28:38</itunes:duration>
      <itunes:summary>Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by SentinelOne, where he’s now a senior director of product management. </itunes:summary>
      <itunes:subtitle>Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by SentinelOne, where he’s now a senior director of product management. </itunes:subtitle>
      <itunes:keywords>bug bounty, pen testing, technology, marketing, cyber security, nextgen, ai, safety, pingsafe, tech, project management, cyber safety, hacker, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0935b81e-9135-4995-96e9-5912627fb9fb</guid>
      <title>Ads Dawson on developing the OWASP Top 10 for Large Language Models</title>
      <description><![CDATA[<p>Ads Dawson, release lead and founding member for the Open Web Application Security Project (OWASP) Top 10 for Large Language Model Applications project, has no shortage of opinions on securing generative artificial intelligence (GenAI) and LLMs. With rapid adoption across the tech industry, GenAI and LLMs are dominating the conversation in the infosec community. But Ads says the security approach is similar to other attack vectors like APIs. First, you need to understand the context of AI-related vulnerabilities and how an attacker might approach hacking a particular AI model. </p><p>In the latest episode of WE’RE IN!, Ads talks about including threat modeling from the design phase when integrating GenAI into applications, and how he uses AI in his red teaming and application security work. </p><p><strong>Listen to hear more about: </strong></p><p>The misuse of AI, such as creating deep fakes for financial gain or manipulating powerful systems like the stock market </p><p>The role of governments in securing the AI space and the concept of “safe” AI</p><p>How the infosec community can contribute to OWASP frameworks</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 26 Jun 2024 11:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/ads-dawson-on-developing-the-owasp-top-10-for-large-language-models-mZkPYL96</link>
      <content:encoded><![CDATA[<p>Ads Dawson, release lead and founding member for the Open Web Application Security Project (OWASP) Top 10 for Large Language Model Applications project, has no shortage of opinions on securing generative artificial intelligence (GenAI) and LLMs. With rapid adoption across the tech industry, GenAI and LLMs are dominating the conversation in the infosec community. But Ads says the security approach is similar to other attack vectors like APIs. First, you need to understand the context of AI-related vulnerabilities and how an attacker might approach hacking a particular AI model. </p><p>In the latest episode of WE’RE IN!, Ads talks about including threat modeling from the design phase when integrating GenAI into applications, and how he uses AI in his red teaming and application security work. </p><p><strong>Listen to hear more about: </strong></p><p>The misuse of AI, such as creating deep fakes for financial gain or manipulating powerful systems like the stock market </p><p>The role of governments in securing the AI space and the concept of “safe” AI</p><p>How the infosec community can contribute to OWASP frameworks</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="34709543" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/2590a7d5-29e5-4837-8c8f-572947d93c28/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=2590a7d5-29e5-4837-8c8f-572947d93c28&amp;feed=_SsyS46z"/>
      <itunes:title>Ads Dawson on developing the OWASP Top 10 for Large Language Models</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:36:09</itunes:duration>
      <itunes:summary>Ads Dawson, release lead and founding member for the Open Web Application Security Project (OWASP) Top 10 for Large Language Model Applications project, has no shortage of opinions on securing generative artificial intelligence (GenAI) and LLMs. With rapid adoption across the tech industry, GenAI and LLMs are dominating the conversation in the infosec community. But Ads says the security approach is similar to other attack vectors like APIs. First, you need to understand the context of AI-related vulnerabilities and how an attacker might approach hacking a particular AI model. </itunes:summary>
      <itunes:subtitle>Ads Dawson, release lead and founding member for the Open Web Application Security Project (OWASP) Top 10 for Large Language Model Applications project, has no shortage of opinions on securing generative artificial intelligence (GenAI) and LLMs. With rapid adoption across the tech industry, GenAI and LLMs are dominating the conversation in the infosec community. But Ads says the security approach is similar to other attack vectors like APIs. First, you need to understand the context of AI-related vulnerabilities and how an attacker might approach hacking a particular AI model. </itunes:subtitle>
      <itunes:keywords>pen testing, ads dawson, cyber, infosec, large language learning models, cybersecurity, machine learning, ai, security, safety, owasp, tech, government, synack, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">04cf2f63-ef1c-479c-9c9e-f6877bb30b20</guid>
      <title>Kevin Tambascio on balancing security with availability of services in healthcare</title>
      <description><![CDATA[<p>Integrating security into the product development lifecycle is a tall order for any industry. It’s particularly challenging for healthcare, with its wide range of critical needs from HVAC systems to medical devices. Kevin Tambascio, director of cybersecurity data and application protection at Cleveland Clinic, juggles the need for constant vigilance and staying updated on fast-moving threats to hospitals.</p><p>In the latest episode of WE’RE IN!, Kevin discusses the importance of compliance and risk assessment, noting that while compliance with rules like HIPAA is crucial, it's equally important to pressure test controls against real-world threats. Ransomware targeting hospital data is the primary threat, while phishing and potential abuse of generative AI also pose significant risks. </p><p>Listen to hear more about: </p><ul><li>The benefits of forming an AI task force to enact safe and responsible procedures while enabling clinicians and researchers to explore AI’s potential</li><li>Effectively communicating cyber threats to non-technical staff by relating them to potential impacts on patient safety and business operations</li><li>Application security in healthcare; applications often have access to sensitive patient health information and can be potential entry points for cyber threats</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 5 Jun 2024 23:21:30 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/kevin-tambascio-XRYWVD6V</link>
      <content:encoded><![CDATA[<p>Integrating security into the product development lifecycle is a tall order for any industry. It’s particularly challenging for healthcare, with its wide range of critical needs from HVAC systems to medical devices. Kevin Tambascio, director of cybersecurity data and application protection at Cleveland Clinic, juggles the need for constant vigilance and staying updated on fast-moving threats to hospitals.</p><p>In the latest episode of WE’RE IN!, Kevin discusses the importance of compliance and risk assessment, noting that while compliance with rules like HIPAA is crucial, it's equally important to pressure test controls against real-world threats. Ransomware targeting hospital data is the primary threat, while phishing and potential abuse of generative AI also pose significant risks. </p><p>Listen to hear more about: </p><ul><li>The benefits of forming an AI task force to enact safe and responsible procedures while enabling clinicians and researchers to explore AI’s potential</li><li>Effectively communicating cyber threats to non-technical staff by relating them to potential impacts on patient safety and business operations</li><li>Application security in healthcare; applications often have access to sensitive patient health information and can be potential entry points for cyber threats</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30868921" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/2f053bb9-fa12-4425-9e47-f29f76b31693/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=2f053bb9-fa12-4425-9e47-f29f76b31693&amp;feed=_SsyS46z"/>
      <itunes:title>Kevin Tambascio on balancing security with availability of services in healthcare</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:32:09</itunes:duration>
      <itunes:summary>Integrating security into the product development lifecycle is a tall order for any industry. It’s particularly challenging for healthcare, with its wide range of critical needs from HVAC systems to medical devices. Kevin Tambascio, director of cybersecurity data and application protection at Cleveland Clinic, juggles the need for constant vigilance and staying updated on fast-moving threats to hospitals.</itunes:summary>
      <itunes:subtitle>Integrating security into the product development lifecycle is a tall order for any industry. It’s particularly challenging for healthcare, with its wide range of critical needs from HVAC systems to medical devices. Kevin Tambascio, director of cybersecurity data and application protection at Cleveland Clinic, juggles the need for constant vigilance and staying updated on fast-moving threats to hospitals.</itunes:subtitle>
      <itunes:keywords>pen testing, cleveland clinic, cyber, healthcare, cyber security, tech, hacker, synack, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0caef8a5-7990-4272-81b5-2a4ef45dde18</guid>
      <title>Tennisha Martin on bridging the cyber talent gap through diversity</title>
      <description><![CDATA[<p>Cybersecurity organizations tend to have unrealistic hiring expectations, according to Tennisha Martin, founder and executive director of the training-focused nonprofit BlackGirlsHack. That can make it hard for would-be candidates to stand out and contribute to solving urgent cybersecurity challenges.</p><p>In the latest episode of WE’RE IN!, Tennisha unpacks the important work of The BlackGirlsHack Foundation, which provides training resources and cybersecurity education to underserved communities. That includes giving Black children avenues to complete cybersecurity certifications and snag their first jobs in the industry. </p><p>“Part of the reason why I started BlackGirlsHack was because I was a black girl that was trying to get into cyber security and I was like, hey, I've got a whole bunch of degrees and years of experience and certifications, and if I'm having a hard time, I know that the people who are  fresh out of high school, for example, may be having a hard time as well,” she said.</p><p><strong>Listen to hear more about:</strong></p><ul><li>How recently reported corporate cutbacks in DEI initiatives are impacting the work of organizations like BlackGirlsHack</li><li>How Tennisha came to be nicknamed “mother of hackers”</li><li>Why gamifying cybersecurity can be key to building the next generation of cyber talent</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 15 May 2024 17:54:51 +0000</pubDate>
      <author>Tennisha Martin, Blake Thompson Heuer</author>
      <link>https://were-in.simplecast.com/episodes/mara-winn-on-protecting-americas-critical-infrastructure-from-cyberthreats-rqy1vav0-KmAJaFKt</link>
      <content:encoded><![CDATA[<p>Cybersecurity organizations tend to have unrealistic hiring expectations, according to Tennisha Martin, founder and executive director of the training-focused nonprofit BlackGirlsHack. That can make it hard for would-be candidates to stand out and contribute to solving urgent cybersecurity challenges.</p><p>In the latest episode of WE’RE IN!, Tennisha unpacks the important work of The BlackGirlsHack Foundation, which provides training resources and cybersecurity education to underserved communities. That includes giving Black children avenues to complete cybersecurity certifications and snag their first jobs in the industry. </p><p>“Part of the reason why I started BlackGirlsHack was because I was a black girl that was trying to get into cyber security and I was like, hey, I've got a whole bunch of degrees and years of experience and certifications, and if I'm having a hard time, I know that the people who are  fresh out of high school, for example, may be having a hard time as well,” she said.</p><p><strong>Listen to hear more about:</strong></p><ul><li>How recently reported corporate cutbacks in DEI initiatives are impacting the work of organizations like BlackGirlsHack</li><li>How Tennisha came to be nicknamed “mother of hackers”</li><li>Why gamifying cybersecurity can be key to building the next generation of cyber talent</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29789751" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/05e5722b-691b-4020-9f24-9f6c758560ca/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=05e5722b-691b-4020-9f24-9f6c758560ca&amp;feed=_SsyS46z"/>
      <itunes:title>Tennisha Martin on bridging the cyber talent gap through diversity</itunes:title>
      <itunes:author>Tennisha Martin, Blake Thompson Heuer</itunes:author>
      <itunes:duration>00:31:01</itunes:duration>
      <itunes:summary>Tennisha unpacks the important work of The BlackGirlsHack Foundation, which provides training resources and cybersecurity education to underserved communities. That includes giving Black children avenues to complete cybersecurity certifications and snag their first jobs in the industry. </itunes:summary>
      <itunes:subtitle>Tennisha unpacks the important work of The BlackGirlsHack Foundation, which provides training resources and cybersecurity education to underserved communities. That includes giving Black children avenues to complete cybersecurity certifications and snag their first jobs in the industry. </itunes:subtitle>
      <itunes:keywords>pen testing, cybersecurity education, cyber, cybersecurity certification, cyber security, cybersecurity, leadership, tech, business, hacker, cyber crime, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9b51c705-f3b6-498e-9b97-6fa48cacffb7</guid>
      <title>Mara Winn on protecting America’s critical infrastructure from cyberthreats</title>
      <description><![CDATA[<p>A first-of-its-kind 2016 cyberattack on Ukraine’s power grid was a wake-up call for countries around the world to shore up protection of vulnerable energy resources. Mara Winn, Deputy Director for Preparedness, Policy, and Risk Analysis at the Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESER), is in charge of acting on just that. From securing electric vehicles to safeguarding electric substations, Mara and her team help to ensure the resilience of the energy sector against cyber, physical and climate-based disruptions.</p><p>Mara takes a holistic approach to risk management, considering both physical and cyber threats. In the latest episode of WE’RE IN!, she cautions against focusing too much on the "flashy object of the day" and describes why she imbues diversity in risk management for the best outcomes.</p><p><strong>Listen to hear more about: </strong></p><ul><li>Why early implementation of security measures in product development is necessary for distributed energy resources like solar, wind and battery technologies</li><li>How to educate investors, entrepreneurs and designers about understanding the full risk picture in business decisions</li><li>The role of the National Association of Regulatory Utility Commissioners and the Federal Power Act in defining federal and state responsibilities in the energy system</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 1 May 2024 19:56:44 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/mara-winn-on-protecting-americas-critical-infrastructure-from-cyberthreats-V60NV5_p</link>
      <content:encoded><![CDATA[<p>A first-of-its-kind 2016 cyberattack on Ukraine’s power grid was a wake-up call for countries around the world to shore up protection of vulnerable energy resources. Mara Winn, Deputy Director for Preparedness, Policy, and Risk Analysis at the Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESER), is in charge of acting on just that. From securing electric vehicles to safeguarding electric substations, Mara and her team help to ensure the resilience of the energy sector against cyber, physical and climate-based disruptions.</p><p>Mara takes a holistic approach to risk management, considering both physical and cyber threats. In the latest episode of WE’RE IN!, she cautions against focusing too much on the "flashy object of the day" and describes why she imbues diversity in risk management for the best outcomes.</p><p><strong>Listen to hear more about: </strong></p><ul><li>Why early implementation of security measures in product development is necessary for distributed energy resources like solar, wind and battery technologies</li><li>How to educate investors, entrepreneurs and designers about understanding the full risk picture in business decisions</li><li>The role of the National Association of Regulatory Utility Commissioners and the Federal Power Act in defining federal and state responsibilities in the energy system</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="34544031" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/196dcb4c-4942-4a66-a600-08deca292e3f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=196dcb4c-4942-4a66-a600-08deca292e3f&amp;feed=_SsyS46z"/>
      <itunes:title>Mara Winn on protecting America’s critical infrastructure from cyberthreats</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:35:58</itunes:duration>
      <itunes:summary>Mara takes a holistic approach to risk management, considering both physical and cyber threats. In the latest episode of WE’RE IN!, she cautions against focusing too much on the &quot;flashy object of the day&quot; and describes why she imbues diversity in risk management for the best outcomes.</itunes:summary>
      <itunes:subtitle>Mara takes a holistic approach to risk management, considering both physical and cyber threats. In the latest episode of WE’RE IN!, she cautions against focusing too much on the &quot;flashy object of the day&quot; and describes why she imbues diversity in risk management for the best outcomes.</itunes:subtitle>
      <itunes:keywords>pen testing, cyber, cyber security, leadership, tech, business, hacker, cyber crime, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">69ea8e18-da9b-4298-acd5-1c052330e95f</guid>
      <title>Amy Chang on squaring cyber policy with real-world threats</title>
      <description><![CDATA[<p>Amy Chang, a resident senior fellow for Cybersecurity and Emerging Threats at the R Street Institute, has many tough problems to consider, from election security to adversarial AI attacks to the geopolitical implications of cyberwarfare. In a world rife with hot takes, she pursues a balanced approach to answering these weighty issues—nothing is an assumed outcome. </p><p>In this episode of WE’RE IN!, Amy provides insights into the potential cybersecurity policies of both the Trump and Biden administrations after the next presidential election, and how AI has the potential for more than just super-powered hacking. In a <a href="https://www.rstreet.org/commentary/safeguarding-ai-a-policymakers-primer-on-adversarial-machine-learning-threats/" target="_blank">recently published paper</a>, she and a colleague detailed consequences like inaccurate medical diagnoses or even manipulation of financial markets.</p><p>Listen to hear more about: </p><p>The role of cybersecurity in the innovation race between China and the U.S.</p><p>The effectiveness of “name and shame” tactics more than a decade after the release of Mandiant’s landmark APT 1 report  </p><p>Why bipartisan support for cybersecurity measures may not equate to trust in the election security space </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 17 Apr 2024 20:08:16 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/amy-chang-on-squaring-cyber-policy-with-real-world-threats-BNkIxko_</link>
      <content:encoded><![CDATA[<p>Amy Chang, a resident senior fellow for Cybersecurity and Emerging Threats at the R Street Institute, has many tough problems to consider, from election security to adversarial AI attacks to the geopolitical implications of cyberwarfare. In a world rife with hot takes, she pursues a balanced approach to answering these weighty issues—nothing is an assumed outcome. </p><p>In this episode of WE’RE IN!, Amy provides insights into the potential cybersecurity policies of both the Trump and Biden administrations after the next presidential election, and how AI has the potential for more than just super-powered hacking. In a <a href="https://www.rstreet.org/commentary/safeguarding-ai-a-policymakers-primer-on-adversarial-machine-learning-threats/" target="_blank">recently published paper</a>, she and a colleague detailed consequences like inaccurate medical diagnoses or even manipulation of financial markets.</p><p>Listen to hear more about: </p><p>The role of cybersecurity in the innovation race between China and the U.S.</p><p>The effectiveness of “name and shame” tactics more than a decade after the release of Mandiant’s landmark APT 1 report  </p><p>Why bipartisan support for cybersecurity measures may not equate to trust in the election security space </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32307950" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/3856a2f6-71dc-4a37-8907-733fe512c07d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=3856a2f6-71dc-4a37-8907-733fe512c07d&amp;feed=_SsyS46z"/>
      <itunes:title>Amy Chang on squaring cyber policy with real-world threats</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:33:39</itunes:duration>
      <itunes:summary>Amy Chang, a resident senior fellow for Cybersecurity and Emerging Threats at the R Street Institute, has many tough problems to consider, from election security to adversarial AI attacks to the geopolitical implications of cyberwarfare. In a world rife with hot takes, she pursues a balanced approach to answering these weighty issues—nothing is an assumed outcome. </itunes:summary>
      <itunes:subtitle>Amy Chang, a resident senior fellow for Cybersecurity and Emerging Threats at the R Street Institute, has many tough problems to consider, from election security to adversarial AI attacks to the geopolitical implications of cyberwarfare. In a world rife with hot takes, she pursues a balanced approach to answering these weighty issues—nothing is an assumed outcome. </itunes:subtitle>
      <itunes:keywords>r street, technology, computer, cyber, revops, commerce, cyberthreat, cybersecurity, ai, tech, china, hacker, institute, coding</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4193221c-3a10-4342-bfcb-db699e11923c</guid>
      <title>Mark Kuhr on AI pentesting and the Synack Red Team</title>
      <description><![CDATA[<p>Dr. Mark Kuhr, a former National Security Agency employee, faced a host of challenges when he co-founded Synack with CEO Jay Kaplan in 2013. As CTO for the security testing company, Mark has led Synack through dramatic growth while working to shift the mindset of some cybersecurity practitioners. For instance, the Synack platform, featuring access to security researchers around the globe, initially faced skepticism—a group of essentially strangers pentesting enterprise networks? Not the most convincing argument for CISOs. But through a trust-but-verify approach, Synack’s take on security testing has risen to prominence in the industry. </p><p>In this episode of WE’RE IN!, Mark explains how he recruited a community of global top hackers to join the burgeoning Synack Red Team – and what’s at stake as AI capabilities ramp up for attackers and defenders alike. </p><p>Listen to hear more about:</p><ul><li>Mark’s predictions about the use of AI for offensive operations, including selecting targets and applying exploits</li><li>Synack’s FedRAMP Moderate Authorized status and how other organizations can secure approval to work with sensitive government data</li><li>How the integration of AI in cybersecurity is increasing the pressure on organizations to patch and mitigate vulnerabilities faster</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 27 Mar 2024 20:11:32 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/mark-kuhr-on-ai-pentesting-and-the-synack-red-team-7FmqBZfs</link>
      <content:encoded><![CDATA[<p>Dr. Mark Kuhr, a former National Security Agency employee, faced a host of challenges when he co-founded Synack with CEO Jay Kaplan in 2013. As CTO for the security testing company, Mark has led Synack through dramatic growth while working to shift the mindset of some cybersecurity practitioners. For instance, the Synack platform, featuring access to security researchers around the globe, initially faced skepticism—a group of essentially strangers pentesting enterprise networks? Not the most convincing argument for CISOs. But through a trust-but-verify approach, Synack’s take on security testing has risen to prominence in the industry. </p><p>In this episode of WE’RE IN!, Mark explains how he recruited a community of global top hackers to join the burgeoning Synack Red Team – and what’s at stake as AI capabilities ramp up for attackers and defenders alike. </p><p>Listen to hear more about:</p><ul><li>Mark’s predictions about the use of AI for offensive operations, including selecting targets and applying exploits</li><li>Synack’s FedRAMP Moderate Authorized status and how other organizations can secure approval to work with sensitive government data</li><li>How the integration of AI in cybersecurity is increasing the pressure on organizations to patch and mitigate vulnerabilities faster</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="34857501" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/0f84c6f4-1258-4411-b4c5-faba9abafbc3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=0f84c6f4-1258-4411-b4c5-faba9abafbc3&amp;feed=_SsyS46z"/>
      <itunes:title>Mark Kuhr on AI pentesting and the Synack Red Team</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:36:18</itunes:duration>
      <itunes:summary>In this episode of WE’RE IN!, Mark explains how he recruited a community of global top hackers to join the burgeoning Synack Red Team – and what’s at stake as AI capabilities ramp up for attackers and defenders alike. </itunes:summary>
      <itunes:subtitle>In this episode of WE’RE IN!, Mark explains how he recruited a community of global top hackers to join the burgeoning Synack Red Team – and what’s at stake as AI capabilities ramp up for attackers and defenders alike. </itunes:subtitle>
      <itunes:keywords>metacomputing, metaverse, cybersecurity, ai, security, safety, tech, hacker, synack, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9dcdfcd1-7f92-433c-a5f4-e8e12f624273</guid>
      <title>Anthony Newman on cyberthreats to higher education</title>
      <description><![CDATA[<p>In this episode of WE’RE IN!, Anthony Newman, executive director at Research and Education Networks Information Sharing and Analysis Center (REN-ISAC), highlights the need for protecting research infrastructure in higher education, dealing with credential dumps and monitoring the dark web for potential threats. He also discusses the challenges faced in higher education, such as securing a diverse range of resources, navigating risks posed by a litany of third-party vendors and recovering quickly from breaches. </p><p>Anthony also digs into the impact of AI in the cybersecurity landscape, emphasizing the need for trust and the potential benefits of automation. </p><p><strong>Listen to hear more about:</strong></p><ul><li>How REN-ISAC supports its 700 member institutions within the higher education and research community</li><li>The role of trust and threat intelligence in higher education</li><li>The nature of advanced, persistent threats to research facilities, including China-linked cyberespionage </li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 13 Mar 2024 20:12:41 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/anthony-newman-on-cyberthreats-to-higher-education-p2_7z8us</link>
      <content:encoded><![CDATA[<p>In this episode of WE’RE IN!, Anthony Newman, executive director at Research and Education Networks Information Sharing and Analysis Center (REN-ISAC), highlights the need for protecting research infrastructure in higher education, dealing with credential dumps and monitoring the dark web for potential threats. He also discusses the challenges faced in higher education, such as securing a diverse range of resources, navigating risks posed by a litany of third-party vendors and recovering quickly from breaches. </p><p>Anthony also digs into the impact of AI in the cybersecurity landscape, emphasizing the need for trust and the potential benefits of automation. </p><p><strong>Listen to hear more about:</strong></p><ul><li>How REN-ISAC supports its 700 member institutions within the higher education and research community</li><li>The role of trust and threat intelligence in higher education</li><li>The nature of advanced, persistent threats to research facilities, including China-linked cyberespionage </li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="38502110" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/bba456d6-2dbb-4264-902f-abfb271b73f2/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=bba456d6-2dbb-4264-902f-abfb271b73f2&amp;feed=_SsyS46z"/>
      <itunes:title>Anthony Newman on cyberthreats to higher education</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:40:06</itunes:duration>
      <itunes:summary>In this episode of WE’RE IN!, Anthony Newman, executive director at Research and Education Networks Information Sharing and Analysis Center (REN-ISAC), highlights the need for protecting research infrastructure in higher education, dealing with credential dumps and monitoring the dark web for potential threats. He also discusses the challenges faced in higher education, such as securing a diverse range of resources, navigating risks posed by a litany of third-party vendors and recovering quickly from breaches. </itunes:summary>
      <itunes:subtitle>In this episode of WE’RE IN!, Anthony Newman, executive director at Research and Education Networks Information Sharing and Analysis Center (REN-ISAC), highlights the need for protecting research infrastructure in higher education, dealing with credential dumps and monitoring the dark web for potential threats. He also discusses the challenges faced in higher education, such as securing a diverse range of resources, navigating risks posed by a litany of third-party vendors and recovering quickly from breaches. </itunes:subtitle>
      <itunes:keywords>data, cybers, espionage, ai, security, business, synack, data breach</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b3997d6a-81c8-4a06-9664-0d79dc7217cd</guid>
      <title>Dennis Fisher on the future of cybersecurity journalism</title>
      <description><![CDATA[<p>Dennis Fisher, editor-in-chief at Decipher, reflects on his journalism career covering cybersecurity for more than two decades in the latest episode of the WE’RE IN! cybersecurity podcast. He began in 2000, covering email before transitioning to security. Soon his focus shifted to vulnerability reporting, including blockbuster bugs in Windows and Internet Explorer. This led to Microsoft's trustworthy computing memo and significant changes in the software industry. </p><p>Dennis also discusses the challenges of cybersecurity journalism and the importance of democratizing information.  </p><p>Listen to hear more about:</p><ul><li>The overlap between cybercrime and traditional organized crime and the impact of cryptocurrency</li><li>Dennis’s interest in crime novels and the challenges of incorporating his background into his own books</li><li>The surprising topic Dennis would cover if he wasn’t focused on security</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 28 Feb 2024 22:31:47 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/future-of-cybersecurity-journalism-NHKwz6of</link>
      <content:encoded><![CDATA[<p>Dennis Fisher, editor-in-chief at Decipher, reflects on his journalism career covering cybersecurity for more than two decades in the latest episode of the WE’RE IN! cybersecurity podcast. He began in 2000, covering email before transitioning to security. Soon his focus shifted to vulnerability reporting, including blockbuster bugs in Windows and Internet Explorer. This led to Microsoft's trustworthy computing memo and significant changes in the software industry. </p><p>Dennis also discusses the challenges of cybersecurity journalism and the importance of democratizing information.  </p><p>Listen to hear more about:</p><ul><li>The overlap between cybercrime and traditional organized crime and the impact of cryptocurrency</li><li>Dennis’s interest in crime novels and the challenges of incorporating his background into his own books</li><li>The surprising topic Dennis would cover if he wasn’t focused on security</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30274164" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/9d8dc936-98f4-4e68-9f4c-3ea8ecc98207/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=9d8dc936-98f4-4e68-9f4c-3ea8ecc98207&amp;feed=_SsyS46z"/>
      <itunes:title>Dennis Fisher on the future of cybersecurity journalism</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:31:32</itunes:duration>
      <itunes:summary>Dennis Fisher, editor-in-chief at Decipher, reflects on his journalism career covering cybersecurity for more than two decades in the latest episode of the WE’RE IN! cybersecurity podcast. He began in 2000, covering email before transitioning to security. Soon his focus shifted to vulnerability reporting, including blockbuster bugs in Windows and Internet Explorer. This led to Microsoft&apos;s trustworthy computing memo and significant changes in the software industry. </itunes:summary>
      <itunes:subtitle>Dennis Fisher, editor-in-chief at Decipher, reflects on his journalism career covering cybersecurity for more than two decades in the latest episode of the WE’RE IN! cybersecurity podcast. He began in 2000, covering email before transitioning to security. Soon his focus shifted to vulnerability reporting, including blockbuster bugs in Windows and Internet Explorer. This led to Microsoft&apos;s trustworthy computing memo and significant changes in the software industry. </itunes:subtitle>
      <itunes:keywords>journalism, cyber security, investigative, ops, leadership, tech, business</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ffc6d88b-44cb-458c-9fd4-a8fac1be58d0</guid>
      <title>Jason Loomis on finding the humanity in cybersecurity</title>
      <description><![CDATA[<p>Jason Loomis, Chief Information Security Officer at Freshworks, emphasizes the human side of cybersecurity and the importance of effective leadership. New CISOs should make an effort to understand not just existing security controls, but also the team dynamics at any new organization they’re helping to protect. The human element all too often goes unnoticed, according to Jason. </p><p>In this WE’RE IN! episode, Jason discusses the need for strong communication skills and the ability to engage every employee in cybersecurity practices. </p><p>Listen to hear more about:</p><ul><li>Why basic security controls and understanding context are crucial in cybersecurity</li><li>How to “sit down, be quiet and listen” rather than try to fix everything immediately in a new cybersecurity leadership role </li><li>What AI means for the risk of future cyberattacks</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 14 Feb 2024 21:09:23 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/jason-loomis-zRZ_hH1_</link>
      <content:encoded><![CDATA[<p>Jason Loomis, Chief Information Security Officer at Freshworks, emphasizes the human side of cybersecurity and the importance of effective leadership. New CISOs should make an effort to understand not just existing security controls, but also the team dynamics at any new organization they’re helping to protect. The human element all too often goes unnoticed, according to Jason. </p><p>In this WE’RE IN! episode, Jason discusses the need for strong communication skills and the ability to engage every employee in cybersecurity practices. </p><p>Listen to hear more about:</p><ul><li>Why basic security controls and understanding context are crucial in cybersecurity</li><li>How to “sit down, be quiet and listen” rather than try to fix everything immediately in a new cybersecurity leadership role </li><li>What AI means for the risk of future cyberattacks</li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31087094" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/e23acb2e-bc15-42ea-b113-260dc13c44c2/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=e23acb2e-bc15-42ea-b113-260dc13c44c2&amp;feed=_SsyS46z"/>
      <itunes:title>Jason Loomis on finding the humanity in cybersecurity</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:32:22</itunes:duration>
      <itunes:summary>Jason Loomis, Chief Information Security Officer at Freshworks, emphasizes the human side of cybersecurity and the importance of effective leadership. New CISOs should make an effort to understand not just existing security controls, but also the team dynamics at any new organization they’re helping to protect. The human element all too often goes unnoticed, according to Jason. </itunes:summary>
      <itunes:subtitle>Jason Loomis, Chief Information Security Officer at Freshworks, emphasizes the human side of cybersecurity and the importance of effective leadership. New CISOs should make an effort to understand not just existing security controls, but also the team dynamics at any new organization they’re helping to protect. The human element all too often goes unnoticed, according to Jason. </itunes:subtitle>
      <itunes:keywords>marketing, risk, cybersecurity, ai, security, leadership, business, cyber crime, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">37dd6cd1-3347-4f8f-8041-d09387345d65</guid>
      <title>Sarah Armstrong-Smith on understanding the attacker mindset</title>
      <description><![CDATA[<p><strong>Season 3 Episode 3 </strong></p><p><i>Sarah Armstrong-Smith on understanding the attacker mindset</i></p><p>Sarah Armstrong-Smith, Chief Security Advisor at Microsoft and a cyber security author, discusses her role in improving cyber postures and staying ahead of threats. She explains how Microsoft uses machine learning in their threat intelligence and what's next with the onset of generative AI. She also highlights the importance of understanding the risks and consequences of AI technology, as well as the need for CISOs to embrace new technologies while ensuring accountability. </p><p>In this WE’RE IN! episode, Sarah emphasizes the significance of diversity in the cybersecurity workforce and the need for organizations to foster a culture that encourages diverse perspectives. </p><p><strong>Listen to hear more about:</strong></p><p>Understanding and addressing the unique cyber challenges of different sectors and countries </p><p>Balancing the threat landscape with available resources</p><p>The human aspect of security and understanding the motivations of attackers</p><p><strong>Links: </strong></p><p><a href="https://www.linkedin.com/in/sarah-armstrong-smith/?originalSubdomain=uk">Find Sarah on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/blakethompsonheuer/">Find Blake on LinkedIn</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 31 Jan 2024 14:00:00 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/sarah-armstrong-smith-on-understanding-the-attacker-mindset-9gtqancz</link>
      <content:encoded><![CDATA[<p><strong>Season 3 Episode 3 </strong></p><p><i>Sarah Armstrong-Smith on understanding the attacker mindset</i></p><p>Sarah Armstrong-Smith, Chief Security Advisor at Microsoft and a cyber security author, discusses her role in improving cyber postures and staying ahead of threats. She explains how Microsoft uses machine learning in their threat intelligence and what's next with the onset of generative AI. She also highlights the importance of understanding the risks and consequences of AI technology, as well as the need for CISOs to embrace new technologies while ensuring accountability. </p><p>In this WE’RE IN! episode, Sarah emphasizes the significance of diversity in the cybersecurity workforce and the need for organizations to foster a culture that encourages diverse perspectives. </p><p><strong>Listen to hear more about:</strong></p><p>Understanding and addressing the unique cyber challenges of different sectors and countries </p><p>Balancing the threat landscape with available resources</p><p>The human aspect of security and understanding the motivations of attackers</p><p><strong>Links: </strong></p><p><a href="https://www.linkedin.com/in/sarah-armstrong-smith/?originalSubdomain=uk">Find Sarah on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/blakethompsonheuer/">Find Blake on LinkedIn</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="43795559" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/67c2a3d6-2228-4943-9981-59417158e540/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=67c2a3d6-2228-4943-9981-59417158e540&amp;feed=_SsyS46z"/>
      <itunes:title>Sarah Armstrong-Smith on understanding the attacker mindset</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:45:37</itunes:duration>
      <itunes:summary>Sarah Armstrong-Smith, Chief Security Advisor at Microsoft and a cyber security author, discusses her role in improving cyber postures and staying ahead of threats. She explains how Microsoft uses machine learning in their threat intelligence and what&apos;s next with the onset of generative AI. She also highlights the importance of understanding the risks and consequences of AI technology, as well as the need for CISOs to embrace new technologies while ensuring accountability. </itunes:summary>
      <itunes:subtitle>Sarah Armstrong-Smith, Chief Security Advisor at Microsoft and a cyber security author, discusses her role in improving cyber postures and staying ahead of threats. She explains how Microsoft uses machine learning in their threat intelligence and what&apos;s next with the onset of generative AI. She also highlights the importance of understanding the risks and consequences of AI technology, as well as the need for CISOs to embrace new technologies while ensuring accountability. </itunes:subtitle>
      <itunes:keywords>computer, cyber, cybersecurity, security, leadership, tech, business</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">65ffa6ee-42b0-48c0-baea-45e6215c610f</guid>
      <title>Andreas Wuchner on Cyber Resiliency in Financial Services</title>
      <description><![CDATA[<p>The financial services industry is among the most sought-after targets for cyberattacks. When malicious actors steal data, it’s often just a means to a cash-rich (or bitcoin) end. Andreas Wuchner, advisor to many security startups and a formative contributor to Switzerland's National Financial Services Information Sharing and Analysis Center, has a thought or two on how to build cyber resiliency in critical banking institutions.</p><p>In the latest episode of WE’RE IN!, Andreas challenges some status quo ideas in the industry, like: Is there really a cybersecurity talent gap? And he gets real about how AI can help unleash more capacity and productivity for security teams if paired with rigorous cyber standards.</p><p>----------</p><p><strong>Listen to learn more about:</strong></p><p>* Translating cyber for the C-suite</p><p>* How to achieve cyber resiliency</p><p>* Forming a worthwhile customer advisory board</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 17 Jan 2024 11:00:00 +0000</pubDate>
      <author>Blake Thompson Heuer, Andreas Wuchner</author>
      <link>https://were-in.simplecast.com/episodes/andreas-wuchner-on-cyber-resiliency-in-financial-services-03QWWJZ2</link>
      <content:encoded><![CDATA[<p>The financial services industry is among the most sought-after targets for cyberattacks. When malicious actors steal data, it’s often just a means to a cash-rich (or bitcoin) end. Andreas Wuchner, advisor to many security startups and a formative contributor to Switzerland's National Financial Services Information Sharing and Analysis Center, has a thought or two on how to build cyber resiliency in critical banking institutions.</p><p>In the latest episode of WE’RE IN!, Andreas challenges some status quo ideas in the industry, like: Is there really a cybersecurity talent gap? And he gets real about how AI can help unleash more capacity and productivity for security teams if paired with rigorous cyber standards.</p><p>----------</p><p><strong>Listen to learn more about:</strong></p><p>* Translating cyber for the C-suite</p><p>* How to achieve cyber resiliency</p><p>* Forming a worthwhile customer advisory board</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33523369" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/74c5b3bb-40bb-4cfd-8b52-b76319f94b13/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=74c5b3bb-40bb-4cfd-8b52-b76319f94b13&amp;feed=_SsyS46z"/>
      <itunes:title>Andreas Wuchner on Cyber Resiliency in Financial Services</itunes:title>
      <itunes:author>Blake Thompson Heuer, Andreas Wuchner</itunes:author>
      <itunes:duration>00:34:55</itunes:duration>
      <itunes:summary>The financial services industry is among the most sought-after targets for cyberattacks. When malicious actors steal data, it’s often just a means to a cash-rich (or bitcoin) end. Andreas Wuchner, advisor to many security startups and a formative contributor to Switzerland&apos;s National Financial Services Information Sharing and Analysis Center, has a thought or two on how to build cyber resiliency in critical banking institutions.</itunes:summary>
      <itunes:subtitle>The financial services industry is among the most sought-after targets for cyberattacks. When malicious actors steal data, it’s often just a means to a cash-rich (or bitcoin) end. Andreas Wuchner, advisor to many security startups and a formative contributor to Switzerland&apos;s National Financial Services Information Sharing and Analysis Center, has a thought or two on how to build cyber resiliency in critical banking institutions.</itunes:subtitle>
      <itunes:keywords>cybersecurity, security, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">77cb2314-6de5-4c7c-82c3-63d49d192b01</guid>
      <title>Ryan Kazanciyan on Securing the AI future</title>
      <description><![CDATA[<p>Securing a startup valued in the billions of dollars is no small feat. According to Ryan Kazanciyan, CISO at Wiz, it’s all about process. His previous experience with companies like Mandiant and Meta rounded out his security background. Using his experience from large enterprises, Ryan takes a considered approach to securing a startup.</p><p>The cloud security company has an existing ethos of security first, so Ryan and his team are equipped to tackle old and new security challenges alike, from run-of-the-mill phishing attacks to sophisticated AI-enabled threats.</p><p>----------</p><p><strong>Listen to learn more about:</strong></p><p>* His time consulting on the hacker TV series Mr. Robot</p><p>* Ryan’s thoughts on balancing privacy, security and convenience </p><p>* Lessons from his heavy-hitting cyber career</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 3 Jan 2024 10:00:00 +0000</pubDate>
      <author>Blake Thompson Heuer, Ryan Kazanciyan</author>
      <link>https://were-in.simplecast.com/episodes/ryan-kazanciyan-on-securing-the-ai-future-Mm7hE0sU</link>
      <content:encoded><![CDATA[<p>Securing a startup valued in the billions of dollars is no small feat. According to Ryan Kazanciyan, CISO at Wiz, it’s all about process. His previous experience with companies like Mandiant and Meta rounded out his security background. Using his experience from large enterprises, Ryan takes a considered approach to securing a startup.</p><p>The cloud security company has an existing ethos of security first, so Ryan and his team are equipped to tackle old and new security challenges alike, from run-of-the-mill phishing attacks to sophisticated AI-enabled threats.</p><p>----------</p><p><strong>Listen to learn more about:</strong></p><p>* His time consulting on the hacker TV series Mr. Robot</p><p>* Ryan’s thoughts on balancing privacy, security and convenience </p><p>* Lessons from his heavy-hitting cyber career</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25023763" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/3bf7552d-e410-40d7-a669-710fdb92f95b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=3bf7552d-e410-40d7-a669-710fdb92f95b&amp;feed=_SsyS46z"/>
      <itunes:title>Ryan Kazanciyan on Securing the AI future</itunes:title>
      <itunes:author>Blake Thompson Heuer, Ryan Kazanciyan</itunes:author>
      <itunes:duration>00:26:03</itunes:duration>
      <itunes:summary>Securing a startup valued in the billions of dollars is no small feat. According to Ryan Kazanciyan, CISO at Wiz, it’s all about process. His previous experience with companies like Mandiant and Meta rounded out his security background. Using his experience from large enterprises, Ryan takes a considered approach to securing a startup.</itunes:summary>
      <itunes:subtitle>Securing a startup valued in the billions of dollars is no small feat. According to Ryan Kazanciyan, CISO at Wiz, it’s all about process. His previous experience with companies like Mandiant and Meta rounded out his security background. Using his experience from large enterprises, Ryan takes a considered approach to securing a startup.</itunes:subtitle>
      <itunes:keywords>ciso, cybersecurity, security, wiz, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">91c4cf69-56e8-46c2-957f-c9f40718b04f</guid>
      <title>Season 3 Trailer</title>
      <description><![CDATA[<p>Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 3 of WE'RE IN!</p><p>Hosted by Synack's Head of Communications and longtime cybersecurity journalist Blake Thompson Heuer (Sobczak), WE'RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don't miss the latest season of this breakout podcast, sponsored by Synack!</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 14 Dec 2023 10:00:00 +0000</pubDate>
      <author>Blake Thompson Heuer, Blake Sobczak</author>
      <link>https://were-in.simplecast.com/episodes/season-3-trailer-Z8_ed4eq</link>
      <content:encoded><![CDATA[<p>Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 3 of WE'RE IN!</p><p>Hosted by Synack's Head of Communications and longtime cybersecurity journalist Blake Thompson Heuer (Sobczak), WE'RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don't miss the latest season of this breakout podcast, sponsored by Synack!</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2788696" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/aa1cc284-6f45-4a46-8895-8df5819b4ada/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=aa1cc284-6f45-4a46-8895-8df5819b4ada&amp;feed=_SsyS46z"/>
      <itunes:title>Season 3 Trailer</itunes:title>
      <itunes:author>Blake Thompson Heuer, Blake Sobczak</itunes:author>
      <itunes:duration>00:02:54</itunes:duration>
      <itunes:summary>Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 3 of WE&apos;RE IN! 

Hosted by Synack&apos;s Head of Communications and longtime cybersecurity journalist Blake Thompson Heuer (Sobczak), WE&apos;RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don&apos;t miss the latest season of this breakout podcast, sponsored by Synack! </itunes:summary>
      <itunes:subtitle>Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 3 of WE&apos;RE IN! 

Hosted by Synack&apos;s Head of Communications and longtime cybersecurity journalist Blake Thompson Heuer (Sobczak), WE&apos;RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don&apos;t miss the latest season of this breakout podcast, sponsored by Synack! </itunes:subtitle>
      <itunes:keywords>cybersecurity, synack, we&apos;re in!</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">1083e839-83ff-41f1-9535-4537046db594</guid>
      <title>Lauren Zabierek on “Sharing the Mic” to Foster Cyber Innovation</title>
      <description><![CDATA[<p>The next generation of cybersecurity leaders have a vision for the future of cybersecurity. Facing advanced nation-state threats, the breakneck speed of tech innovation and a deluge of zero days, Lauren Zabierek is moving the dial on workforce diversity to tackle these challenges. Lauren, senior policy advisor for Cybersecurity and Infrastructure Security Agency and co-founder of #ShareTheMicInCyber, is also helping organizations “shift left” by integrating security principles into the innovation process.   </p><p>Don’t miss the latest episode of WE’RE IN! to hear Lauren’s insights into why cybersecurity job descriptions are broken and how talking to everyday people can build the pipeline of cyber talent.</p><p>----------</p><p><strong>Listen to learn more about:</strong> </p><p>* Which cybersecurity story she’d like to see made into a Christopher Nolan movie</p><p>* Why she believes “diversity is national security”</p><p>* How she ended up with <i>Ms.</i> magazine bylines</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 8 Aug 2023 09:00:00 +0000</pubDate>
      <author>Blake Sobczak, Lauren Zabierek</author>
      <link>https://were-in.simplecast.com/episodes/lauren-zabierek-on-sharing-the-mic-to-foster-cyber-innovation-NxQ77MMb</link>
      <content:encoded><![CDATA[<p>The next generation of cybersecurity leaders have a vision for the future of cybersecurity. Facing advanced nation-state threats, the breakneck speed of tech innovation and a deluge of zero days, Lauren Zabierek is moving the dial on workforce diversity to tackle these challenges. Lauren, senior policy advisor for Cybersecurity and Infrastructure Security Agency and co-founder of #ShareTheMicInCyber, is also helping organizations “shift left” by integrating security principles into the innovation process.   </p><p>Don’t miss the latest episode of WE’RE IN! to hear Lauren’s insights into why cybersecurity job descriptions are broken and how talking to everyday people can build the pipeline of cyber talent.</p><p>----------</p><p><strong>Listen to learn more about:</strong> </p><p>* Which cybersecurity story she’d like to see made into a Christopher Nolan movie</p><p>* Why she believes “diversity is national security”</p><p>* How she ended up with <i>Ms.</i> magazine bylines</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29803544" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/7c3eece3-763e-4ec9-8b1d-e543f5bb8727/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=7c3eece3-763e-4ec9-8b1d-e543f5bb8727&amp;feed=_SsyS46z"/>
      <itunes:title>Lauren Zabierek on “Sharing the Mic” to Foster Cyber Innovation</itunes:title>
      <itunes:author>Blake Sobczak, Lauren Zabierek</itunes:author>
      <itunes:duration>00:31:02</itunes:duration>
      <itunes:summary>The next generation of cybersecurity leaders have a vision for the future of cybersecurity. Facing advanced nation-state threats, the breakneck speed of tech innovation and a deluge of zero days, Lauren Zabierek is moving the dial on workforce diversity to tackle these challenges. Lauren, senior policy advisor for Cybersecurity and Infrastructure Security Agency and co-founder of #ShareTheMicInCyber, is also helping organizations “shift left” by integrating security principles into the innovation process.</itunes:summary>
      <itunes:subtitle>The next generation of cybersecurity leaders have a vision for the future of cybersecurity. Facing advanced nation-state threats, the breakneck speed of tech innovation and a deluge of zero days, Lauren Zabierek is moving the dial on workforce diversity to tackle these challenges. Lauren, senior policy advisor for Cybersecurity and Infrastructure Security Agency and co-founder of #ShareTheMicInCyber, is also helping organizations “shift left” by integrating security principles into the innovation process.</itunes:subtitle>
      <itunes:keywords>cyber talent, cybersecurity, sharethemicincyber, security, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5ef8b071-e0f3-42fd-99bb-618276d89a52</guid>
      <title>Jeremiah Roe Unpacks the “Puzzle” of Pentesting</title>
      <description><![CDATA[<p>Pentesting is in Jeremiah Roe’s DNA. He has worked for a traditional pentesting consultancy, conducted clever physical penetration tests over the years (as documented in his episode on the <a href="https://darknetdiaries.com/episode/125/">Darknet Diaries</a> podcast), and he now finds himself at the cutting edge of security testing as field CISO for North America at Synack.</p><p>Jeremiah is a fan of escape rooms and brings his creativity and strategic thinking to some of the cybersecurity industry’s toughest challenges. Don’t miss the latest episode of WE’RE IN! to hear Jeremiah weigh in on topics such as:</p><p>----------</p><p><strong>Listen to learn more about: </strong></p><p>* Budding API security challenges and how to address them</p><p>* Techniques for transitioning from the armed services to a role in cybersecurity</p><p>* How to think like an attacker to conquer high-risk vulnerabilities</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 13 Jul 2023 09:00:00 +0000</pubDate>
      <author>Blake Sobczak, Jeremiah Roe</author>
      <link>https://were-in.simplecast.com/episodes/jeremiah-roe-unpacks-the-puzzle-of-pentesting-Dx6C4SV3</link>
      <content:encoded><![CDATA[<p>Pentesting is in Jeremiah Roe’s DNA. He has worked for a traditional pentesting consultancy, conducted clever physical penetration tests over the years (as documented in his episode on the <a href="https://darknetdiaries.com/episode/125/">Darknet Diaries</a> podcast), and he now finds himself at the cutting edge of security testing as field CISO for North America at Synack.</p><p>Jeremiah is a fan of escape rooms and brings his creativity and strategic thinking to some of the cybersecurity industry’s toughest challenges. Don’t miss the latest episode of WE’RE IN! to hear Jeremiah weigh in on topics such as:</p><p>----------</p><p><strong>Listen to learn more about: </strong></p><p>* Budding API security challenges and how to address them</p><p>* Techniques for transitioning from the armed services to a role in cybersecurity</p><p>* How to think like an attacker to conquer high-risk vulnerabilities</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="38618718" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/d57c9611-e38d-4c45-b8fe-dfc032a280c8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=d57c9611-e38d-4c45-b8fe-dfc032a280c8&amp;feed=_SsyS46z"/>
      <itunes:title>Jeremiah Roe Unpacks the “Puzzle” of Pentesting</itunes:title>
      <itunes:author>Blake Sobczak, Jeremiah Roe</itunes:author>
      <itunes:duration>00:40:13</itunes:duration>
      <itunes:summary>Pentesting is in Jeremiah Roe’s DNA. He has worked for a traditional pentesting consultancy, conducted clever physical penetration tests over the years (as documented in his episode on the Darknet Diaries podcast), and he now finds himself at the cutting edge of security testing as field CISO for North America at Synack.</itunes:summary>
      <itunes:subtitle>Pentesting is in Jeremiah Roe’s DNA. He has worked for a traditional pentesting consultancy, conducted clever physical penetration tests over the years (as documented in his episode on the Darknet Diaries podcast), and he now finds himself at the cutting edge of security testing as field CISO for North America at Synack.</itunes:subtitle>
      <itunes:keywords>pentesting, cybersecurity, security, synack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f52aca0d-1939-46d4-8791-fed1acbb2efd</guid>
      <title>Demystifying OT Cybersecurity with Danielle Jablanski</title>
      <description><![CDATA[<p>The operational technology (OT) computer networks that support life as we know it are increasingly coming under threat. But despite the proliferation of malware aimed at critical infrastructure, Danielle Jablanski isn’t running for the hills. As an OT cybersecurity strategist for Nozomi Networks, Danielle helps critical infrastructure organizations understand and prioritize digital risks, whether they stem from a lack of visibility into industrial environments or a sophisticated cyberattack from a foreign nation-state. </p><p>Don’t miss the latest episode of WE’RE IN! to hear Danielle’s insights into industrial control systems (ICS) risk management, including the recently disclosed COSMICENERGY ICS-focused cyberthreat. </p><p>----------</p><p><strong>Listen to learn more about: </strong></p><p>* What makes the ICS security field “niche but not nebulous”</p><p>* How Danielle’s background in nuclear weapons policy informs her approach to cyber incident planning</p><p>* Why so few critical infrastructure operators know where equipment with known vulnerabilities may exist on their networks</p><p>* Hacking satellites in space</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 29 Jun 2023 09:00:00 +0000</pubDate>
      <author>Blake Sobczak, Danielle Jablanski</author>
      <link>https://were-in.simplecast.com/episodes/demystifying-ot-cybersecurity-with-danielle-jablanski-OMucsQwp</link>
      <content:encoded><![CDATA[<p>The operational technology (OT) computer networks that support life as we know it are increasingly coming under threat. But despite the proliferation of malware aimed at critical infrastructure, Danielle Jablanski isn’t running for the hills. As an OT cybersecurity strategist for Nozomi Networks, Danielle helps critical infrastructure organizations understand and prioritize digital risks, whether they stem from a lack of visibility into industrial environments or a sophisticated cyberattack from a foreign nation-state. </p><p>Don’t miss the latest episode of WE’RE IN! to hear Danielle’s insights into industrial control systems (ICS) risk management, including the recently disclosed COSMICENERGY ICS-focused cyberthreat. </p><p>----------</p><p><strong>Listen to learn more about: </strong></p><p>* What makes the ICS security field “niche but not nebulous”</p><p>* How Danielle’s background in nuclear weapons policy informs her approach to cyber incident planning</p><p>* Why so few critical infrastructure operators know where equipment with known vulnerabilities may exist on their networks</p><p>* Hacking satellites in space</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="39127799" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/f8f8a78b-9ff2-4a04-80e0-7a7c607923c2/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=f8f8a78b-9ff2-4a04-80e0-7a7c607923c2&amp;feed=_SsyS46z"/>
      <itunes:title>Demystifying OT Cybersecurity with Danielle Jablanski</itunes:title>
      <itunes:author>Blake Sobczak, Danielle Jablanski</itunes:author>
      <itunes:duration>00:40:45</itunes:duration>
      <itunes:summary>The operational technology (OT) computer networks that support life as we know it are increasingly coming under threat. But despite the proliferation of malware aimed at critical infrastructure, Danielle Jablanski isn’t running for the hills. As an OT cybersecurity strategist for Nozomi Networks, Danielle helps critical infrastructure organizations understand and prioritize digital risks, whether they stem from a lack of visibility into industrial environments or a sophisticated cyberattack from a foreign nation-state. </itunes:summary>
      <itunes:subtitle>The operational technology (OT) computer networks that support life as we know it are increasingly coming under threat. But despite the proliferation of malware aimed at critical infrastructure, Danielle Jablanski isn’t running for the hills. As an OT cybersecurity strategist for Nozomi Networks, Danielle helps critical infrastructure organizations understand and prioritize digital risks, whether they stem from a lack of visibility into industrial environments or a sophisticated cyberattack from a foreign nation-state. </itunes:subtitle>
      <itunes:keywords>strategy, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">98cda299-2e7d-4b43-b9ff-fd4081d0467b</guid>
      <title>API Security Decoded with Corey Ball, Senior Manager of Penetration Testing, Moss Adams and Chief Hacking Officer, APIsec University</title>
      <description><![CDATA[<p>Application programming interfaces (APIs) are taking over the internet. APIs now make up 83% of internet traffic because they help applications communicate with each other via API calls. And they’re a critical threat vector for companies. Corey Ball, author of “Hacking APIs,” saw the API takeover happening and realized there was a gap in security training and tactics. </p><p>He founded APIsec University, which offers online courses to help level up the infosec community’s API security testing skills. APIs are essentially direct links to a company’s database, a valuable target for a malicious actor, and their flaws can be difficult to detect without proper documentation and thorough analysis. </p><p>Security teams are just getting started tackling API security and Corey outlines how they can get started and which executives, including the board of directors, need to be aware of their API attack surface.  </p><p>----------</p><p><strong>Listen to learn more about: </strong></p><p>* His favorite API vulnerability </p><p>* Why generic security scanners can’t detect API security flaws </p><p>* The future of API security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 25 May 2023 09:00:00 +0000</pubDate>
      <author>Blake Sobczak, Corey Ball</author>
      <link>https://were-in.simplecast.com/episodes/corey-ball-Hg_0v9p4</link>
      <content:encoded><![CDATA[<p>Application programming interfaces (APIs) are taking over the internet. APIs now make up 83% of internet traffic because they help applications communicate with each other via API calls. And they’re a critical threat vector for companies. Corey Ball, author of “Hacking APIs,” saw the API takeover happening and realized there was a gap in security training and tactics. </p><p>He founded APIsec University, which offers online courses to help level up the infosec community’s API security testing skills. APIs are essentially direct links to a company’s database, a valuable target for a malicious actor, and their flaws can be difficult to detect without proper documentation and thorough analysis. </p><p>Security teams are just getting started tackling API security and Corey outlines how they can get started and which executives, including the board of directors, need to be aware of their API attack surface.  </p><p>----------</p><p><strong>Listen to learn more about: </strong></p><p>* His favorite API vulnerability </p><p>* Why generic security scanners can’t detect API security flaws </p><p>* The future of API security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33265913" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/1dccdc73-1d08-4909-83fe-a05df84b42d5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=1dccdc73-1d08-4909-83fe-a05df84b42d5&amp;feed=_SsyS46z"/>
      <itunes:title>API Security Decoded with Corey Ball, Senior Manager of Penetration Testing, Moss Adams and Chief Hacking Officer, APIsec University</itunes:title>
      <itunes:author>Blake Sobczak, Corey Ball</itunes:author>
      <itunes:duration>00:34:39</itunes:duration>
      <itunes:summary>Application programming interfaces (APIs) are taking over the internet. APIs now make up 83% of internet traffic because they help applications communicate with each other via API calls. And they’re a critical threat vector for companies. Corey Ball, author of “Hacking APIs,” saw the API takeover happening and realized there was a gap in security training and tactics. 

He founded APIsec University, which offers online courses to help level up the infosec community’s API security testing skills. APIs are essentially direct links to a company’s database, a valuable target for a malicious actor, and their flaws can be difficult to detect without proper documentation and thorough analysis. 

Security teams are just getting started tackling API security and Corey outlines how they can get started and which executives, including the board of directors, need to be aware of their API attack surface.  </itunes:summary>
      <itunes:subtitle>Application programming interfaces (APIs) are taking over the internet. APIs now make up 83% of internet traffic because they help applications communicate with each other via API calls. And they’re a critical threat vector for companies. Corey Ball, author of “Hacking APIs,” saw the API takeover happening and realized there was a gap in security training and tactics. 

He founded APIsec University, which offers online courses to help level up the infosec community’s API security testing skills. APIs are essentially direct links to a company’s database, a valuable target for a malicious actor, and their flaws can be difficult to detect without proper documentation and thorough analysis. 

Security teams are just getting started tackling API security and Corey outlines how they can get started and which executives, including the board of directors, need to be aware of their API attack surface.  </itunes:subtitle>
      <itunes:keywords>api, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">22fd8d2e-0703-4f9f-bec1-9d49ddd4e275</guid>
      <title>Emma Stewart on the Future of the Electric Grid, Cyber Mutual Assistance and “Crying Wolf” on Energy Threats</title>
      <description><![CDATA[<p>Power and energy security strategist Emma Stewart is always on the lookout for what’s next in the U.S. electric grid, whether that be an influx of renewable energy or cyberattacks by malicious hackers. Her engineering background helps her understand how things work so she can break them to build them again, but stronger. Emma has announced she’s joining Idaho National Laboratory as Chief Power Grid Scientist and Research Strategist in the lab’s National and Homeland Security Directorate, putting her on the forefront of efforts to keep Americans’ electricity networks resilient in the face of cyberthreats. </p><p>Emma previously worked as Chief Scientist for the National Rural Electric Cooperative Association, which represents the nation’s roughly 900 non-profit electric co-ops. Because rural infrastructure can lack the same level of funding or support compared to bigger electric companies, she often had to puzzle over how to fortify distributed resources from nation-state cyberthreats.</p><p>----------</p><p><strong>Listen to this episode to hear more about: </strong></p><p>* How cyber mutual assistance programs can help level the playing field in the fight against adversaries </p><p>* Emma’s cancer survivorship </p><p>* Takeaways from the S4 industrial cybersecurity conference in Miami Beach, where Emma was a speaker</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 11 May 2023 13:30:22 +0000</pubDate>
      <author>Emma Stewart, Blake Sobczak</author>
      <link>https://were-in.simplecast.com/episodes/emma-stewart-IqmCwhfe</link>
      <content:encoded><![CDATA[<p>Power and energy security strategist Emma Stewart is always on the lookout for what’s next in the U.S. electric grid, whether that be an influx of renewable energy or cyberattacks by malicious hackers. Her engineering background helps her understand how things work so she can break them to build them again, but stronger. Emma has announced she’s joining Idaho National Laboratory as Chief Power Grid Scientist and Research Strategist in the lab’s National and Homeland Security Directorate, putting her on the forefront of efforts to keep Americans’ electricity networks resilient in the face of cyberthreats. </p><p>Emma previously worked as Chief Scientist for the National Rural Electric Cooperative Association, which represents the nation’s roughly 900 non-profit electric co-ops. Because rural infrastructure can lack the same level of funding or support compared to bigger electric companies, she often had to puzzle over how to fortify distributed resources from nation-state cyberthreats.</p><p>----------</p><p><strong>Listen to this episode to hear more about: </strong></p><p>* How cyber mutual assistance programs can help level the playing field in the fight against adversaries </p><p>* Emma’s cancer survivorship </p><p>* Takeaways from the S4 industrial cybersecurity conference in Miami Beach, where Emma was a speaker</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33410111" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/7920e785-77d2-4c7a-8637-9679b245ecd7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=7920e785-77d2-4c7a-8637-9679b245ecd7&amp;feed=_SsyS46z"/>
      <itunes:title>Emma Stewart on the Future of the Electric Grid, Cyber Mutual Assistance and “Crying Wolf” on Energy Threats</itunes:title>
      <itunes:author>Emma Stewart, Blake Sobczak</itunes:author>
      <itunes:duration>00:34:48</itunes:duration>
      <itunes:summary>Power and energy security strategist Emma Stewart is always on the lookout for what’s next in the U.S. electric grid, whether that be an influx of renewable energy or cyberattacks by malicious hackers. Her engineering background helps her understand how things work so she can break them to build them again, but stronger. Emma has announced she’s joining Idaho National Laboratory as Chief Power Grid Scientist and Research Strategist in the lab’s National and Homeland Security Directorate, putting her on the forefront of efforts to keep Americans’ electricity networks resilient in the face of cyberthreats. 

Emma previously worked as Chief Scientist for the National Rural Electric Cooperative Association, which represents the nation’s roughly 900 non-profit electric co-ops. Because rural infrastructure can lack the same level of funding or support compared to bigger electric companies, she often had to puzzle over how to fortify distributed resources from nation-state cyberthreats.</itunes:summary>
      <itunes:subtitle>Power and energy security strategist Emma Stewart is always on the lookout for what’s next in the U.S. electric grid, whether that be an influx of renewable energy or cyberattacks by malicious hackers. Her engineering background helps her understand how things work so she can break them to build them again, but stronger. Emma has announced she’s joining Idaho National Laboratory as Chief Power Grid Scientist and Research Strategist in the lab’s National and Homeland Security Directorate, putting her on the forefront of efforts to keep Americans’ electricity networks resilient in the face of cyberthreats. 

Emma previously worked as Chief Scientist for the National Rural Electric Cooperative Association, which represents the nation’s roughly 900 non-profit electric co-ops. Because rural infrastructure can lack the same level of funding or support compared to bigger electric companies, she often had to puzzle over how to fortify distributed resources from nation-state cyberthreats.</itunes:subtitle>
      <itunes:keywords>infrastructure, cyber attack, ransomware, cyberthreat, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4374b91d-1057-4915-8d44-e4c52cfe81ee</guid>
      <title>Kelly Moan on Zero-Trust Strategies, Safeguarding NYC and the Need for Representation in Cybersecurity</title>
      <description><![CDATA[<p>As Chief Information Security Officer for NYC, Kelly Moan is on the front lines protecting New Yorkers from the latest cyberthreats. She juggles everything from implementing zero-trust security models to helping state agencies fend off sophisticated hacking attempts. </p><p>Don’t miss the latest episode of WE’RE IN! in which Kelly opens up about her professional history and shares tips for anyone interested in supporting their own communities through pursuing a career in cybersecurity. Her office has worked to foster the next generation of cyber talent through efforts like the New York City Cyber Academy program. </p><p>“The really amazing thing about the profession in general is you don't need a degree,” Kelly says. “If you have access to the internet and you have access to a technology product like a mobile phone, a laptop– there's so much out there and open source that, if you really want to, you can start learning.”</p><p>-------</p><p><strong>Tune in to hear more about: </strong></p><p>* Why cloud security is such a top-of-mind concern for CISOs </p><p>* New York’s first-of-its-kind Joint Security Operations Center</p><p>* Kelly’s approach to ensuring “diversity of experience” in the infosec field</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 25 Apr 2023 09:00:00 +0000</pubDate>
      <author>Blake Sobczak, Kelly Moan</author>
      <link>https://were-in.simplecast.com/episodes/kelly-moan-LGw_CD_E</link>
      <content:encoded><![CDATA[<p>As Chief Information Security Officer for NYC, Kelly Moan is on the front lines protecting New Yorkers from the latest cyberthreats. She juggles everything from implementing zero-trust security models to helping state agencies fend off sophisticated hacking attempts. </p><p>Don’t miss the latest episode of WE’RE IN! in which Kelly opens up about her professional history and shares tips for anyone interested in supporting their own communities through pursuing a career in cybersecurity. Her office has worked to foster the next generation of cyber talent through efforts like the New York City Cyber Academy program. </p><p>“The really amazing thing about the profession in general is you don't need a degree,” Kelly says. “If you have access to the internet and you have access to a technology product like a mobile phone, a laptop– there's so much out there and open source that, if you really want to, you can start learning.”</p><p>-------</p><p><strong>Tune in to hear more about: </strong></p><p>* Why cloud security is such a top-of-mind concern for CISOs </p><p>* New York’s first-of-its-kind Joint Security Operations Center</p><p>* Kelly’s approach to ensuring “diversity of experience” in the infosec field</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33426830" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/76dd0659-2090-46a5-891d-894585c219a4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=76dd0659-2090-46a5-891d-894585c219a4&amp;feed=_SsyS46z"/>
      <itunes:title>Kelly Moan on Zero-Trust Strategies, Safeguarding NYC and the Need for Representation in Cybersecurity</itunes:title>
      <itunes:author>Blake Sobczak, Kelly Moan</itunes:author>
      <itunes:duration>00:34:49</itunes:duration>
      <itunes:summary>As Chief Information Security Officer for NYC, Kelly Moan is on the front lines protecting New Yorkers from the latest cyberthreats. She juggles everything from implementing zero-trust security models to helping state agencies fend off sophisticated hacking attempts. 

Don’t miss the latest episode of WE’RE IN! in which Kelly opens up about her professional history and shares tips for anyone interested in supporting their own communities through pursuing a career in cybersecurity. Her office has worked to foster the next generation of cyber talent through efforts like the New York City Cyber Academy program. 

“The really amazing thing about the profession in general is you don&apos;t need a degree,” Kelly says. “If you have access to the internet and you have access to a technology product like a mobile phone, a laptop– there&apos;s so much out there and open source that, if you really want to, you can start learning.”</itunes:summary>
      <itunes:subtitle>As Chief Information Security Officer for NYC, Kelly Moan is on the front lines protecting New Yorkers from the latest cyberthreats. She juggles everything from implementing zero-trust security models to helping state agencies fend off sophisticated hacking attempts. 

Don’t miss the latest episode of WE’RE IN! in which Kelly opens up about her professional history and shares tips for anyone interested in supporting their own communities through pursuing a career in cybersecurity. Her office has worked to foster the next generation of cyber talent through efforts like the New York City Cyber Academy program. 

“The really amazing thing about the profession in general is you don&apos;t need a degree,” Kelly says. “If you have access to the internet and you have access to a technology product like a mobile phone, a laptop– there&apos;s so much out there and open source that, if you really want to, you can start learning.”</itunes:subtitle>
      <itunes:keywords>zero trust, cloud, nyc, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">78a93642-4023-443d-8a2a-c8c1f0aa9666</guid>
      <title>Space Rogue on L0pht Heavy Industries, 90s Infosec Lessons and “Gray Hat” Hacking</title>
      <description><![CDATA[<p>Hacker Cris Thomas – better known by his old bulletin board system handle Space Rogue – has witnessed the infosec community grow from a hodgepodge network of hacking collectives to a multibillion dollar industry. </p><p>Space Rogue was a member of the L0pht Heavy Industries hacker group that made its name poking holes in premier products from burgeoning tech giants like Microsoft and Oracle. Now Global Lead of Policy and Special Initiatives at IBM, he is also author of a new memoir recounting his experiences from the “magical hacker scene” of the 1990s, <i>Space Rogue: How the Hackers Known As L0pht Changed the World</i>. </p><p>In the latest episode of WE’RE IN!, Space Rogue shares his side of the story from L0pht’s influential May 1998 testimony before Congress, in which the hackers warned of glaring security vulnerabilities that remain relevant to this day. </p><p>--------</p><p><strong>Tune in to hear more from Space Rogue on: </strong></p><p>* Tales from early meetings of the famous hacker quarterly 2600 </p><p>* The value of college versus certifications for anyone seeking to launch an infosec career</p><p>* The fragility of the modern internet</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 20 Apr 2023 09:00:00 +0000</pubDate>
      <author>Blake Sobczak, Space Rogue</author>
      <link>https://were-in.simplecast.com/episodes/space-rogue-nIPKaaww</link>
      <content:encoded><![CDATA[<p>Hacker Cris Thomas – better known by his old bulletin board system handle Space Rogue – has witnessed the infosec community grow from a hodgepodge network of hacking collectives to a multibillion dollar industry. </p><p>Space Rogue was a member of the L0pht Heavy Industries hacker group that made its name poking holes in premier products from burgeoning tech giants like Microsoft and Oracle. Now Global Lead of Policy and Special Initiatives at IBM, he is also author of a new memoir recounting his experiences from the “magical hacker scene” of the 1990s, <i>Space Rogue: How the Hackers Known As L0pht Changed the World</i>. </p><p>In the latest episode of WE’RE IN!, Space Rogue shares his side of the story from L0pht’s influential May 1998 testimony before Congress, in which the hackers warned of glaring security vulnerabilities that remain relevant to this day. </p><p>--------</p><p><strong>Tune in to hear more from Space Rogue on: </strong></p><p>* Tales from early meetings of the famous hacker quarterly 2600 </p><p>* The value of college versus certifications for anyone seeking to launch an infosec career</p><p>* The fragility of the modern internet</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="36720765" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/6def9b3e-3bd3-4466-85d5-eb1f7ceef75f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=6def9b3e-3bd3-4466-85d5-eb1f7ceef75f&amp;feed=_SsyS46z"/>
      <itunes:title>Space Rogue on L0pht Heavy Industries, 90s Infosec Lessons and “Gray Hat” Hacking</itunes:title>
      <itunes:author>Blake Sobczak, Space Rogue</itunes:author>
      <itunes:duration>00:38:15</itunes:duration>
      <itunes:summary>Hacker Cris Thomas – better known by his old bulletin board system handle Space Rogue – has witnessed the infosec community grow from a hodgepodge network of hacking collectives to a multibillion dollar industry. 

Space Rogue was a member of the L0pht Heavy Industries hacker group that made its name poking holes in premier products from burgeoning tech giants like Microsoft and Oracle. Now Global Lead of Policy and Special Initiatives at IBM, he is also author of a new memoir recounting his experiences from the “magical hacker scene” of the 1990s, Space Rogue: How the Hackers Known As L0pht Changed the World. 

In the latest episode of WE’RE IN!, Space Rogue shares his side of the story from L0pht’s influential May 1998 testimony before Congress, in which the hackers warned of glaring security vulnerabilities that remain relevant to this day. </itunes:summary>
      <itunes:subtitle>Hacker Cris Thomas – better known by his old bulletin board system handle Space Rogue – has witnessed the infosec community grow from a hodgepodge network of hacking collectives to a multibillion dollar industry. 

Space Rogue was a member of the L0pht Heavy Industries hacker group that made its name poking holes in premier products from burgeoning tech giants like Microsoft and Oracle. Now Global Lead of Policy and Special Initiatives at IBM, he is also author of a new memoir recounting his experiences from the “magical hacker scene” of the 1990s, Space Rogue: How the Hackers Known As L0pht Changed the World. 

In the latest episode of WE’RE IN!, Space Rogue shares his side of the story from L0pht’s influential May 1998 testimony before Congress, in which the hackers warned of glaring security vulnerabilities that remain relevant to this day. </itunes:subtitle>
      <itunes:keywords>l0pht, infosec, hacking, congress</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce4f9a11-e1f2-4ebf-9990-4b6fe139d1cb</guid>
      <title>Morgan Adamski on Cybersecurity Collaboration, Nation-State Threats and Transparency at NSA</title>
      <description><![CDATA[<p>Morgan Adamski wants to talk to you about cyberthreats. As chief of the National Security Agency’s Cybersecurity Collaboration Center, she’s responsible for bringing highly sensitive threat information out from behind the walls of Fort Meade and onto the desks of defense industry leaders who can use it. </p><p>In the latest episode of WE’RE IN!, Morgan shares how she helped build the CCC into a vital public-private conduit for cyber intelligence, rewriting existing NSA operating models along the way.</p><p>“We knew that it was important to be able to have this type of direct engagement, because we knew the only way to really counter a nation-state actor is to get ahead of it,” Adamski said of the CCC’s “fast and furious” history. </p><p>--------</p><p><strong>Tune in to hear Adamski’s thoughts on: </strong></p><p>* Strategies for getting more women involved in the cybersecurity field </p><p>* The Biden administration’s new National Cybersecurity Strategy</p><p>* The importance of being part of something bigger than yourself </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 6 Apr 2023 09:00:00 +0000</pubDate>
      <author>Morgan Adamski, Blake Sobczak</author>
      <link>https://were-in.simplecast.com/episodes/morgan-adamski-rsf8UmXC</link>
      <content:encoded><![CDATA[<p>Morgan Adamski wants to talk to you about cyberthreats. As chief of the National Security Agency’s Cybersecurity Collaboration Center, she’s responsible for bringing highly sensitive threat information out from behind the walls of Fort Meade and onto the desks of defense industry leaders who can use it. </p><p>In the latest episode of WE’RE IN!, Morgan shares how she helped build the CCC into a vital public-private conduit for cyber intelligence, rewriting existing NSA operating models along the way.</p><p>“We knew that it was important to be able to have this type of direct engagement, because we knew the only way to really counter a nation-state actor is to get ahead of it,” Adamski said of the CCC’s “fast and furious” history. </p><p>--------</p><p><strong>Tune in to hear Adamski’s thoughts on: </strong></p><p>* Strategies for getting more women involved in the cybersecurity field </p><p>* The Biden administration’s new National Cybersecurity Strategy</p><p>* The importance of being part of something bigger than yourself </p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32211406" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/905427b0-d8c3-4ac8-89c1-160ecb48cd02/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=905427b0-d8c3-4ac8-89c1-160ecb48cd02&amp;feed=_SsyS46z"/>
      <itunes:title>Morgan Adamski on Cybersecurity Collaboration, Nation-State Threats and Transparency at NSA</itunes:title>
      <itunes:author>Morgan Adamski, Blake Sobczak</itunes:author>
      <itunes:duration>00:33:33</itunes:duration>
      <itunes:summary>Morgan Adamski wants to talk to you about cyberthreats. As chief of the National Security Agency’s Cybersecurity Collaboration Center, she’s responsible for bringing highly sensitive threat information out from behind the walls of Fort Meade and onto the desks of defense industry leaders who can use it. 

In the latest episode of WE’RE IN!, Morgan shares how she helped build the CCC into a vital public-private conduit for cyber intelligence, rewriting existing NSA operating models along the way.

“We knew that it was important to be able to have this type of direct engagement, because we knew the only way to really counter a nation-state actor is to get ahead of it,” Adamski said of the CCC’s “fast and furious” history. </itunes:summary>
      <itunes:subtitle>Morgan Adamski wants to talk to you about cyberthreats. As chief of the National Security Agency’s Cybersecurity Collaboration Center, she’s responsible for bringing highly sensitive threat information out from behind the walls of Fort Meade and onto the desks of defense industry leaders who can use it. 

In the latest episode of WE’RE IN!, Morgan shares how she helped build the CCC into a vital public-private conduit for cyber intelligence, rewriting existing NSA operating models along the way.

“We knew that it was important to be able to have this type of direct engagement, because we knew the only way to really counter a nation-state actor is to get ahead of it,” Adamski said of the CCC’s “fast and furious” history. </itunes:subtitle>
      <itunes:keywords>cyberthreat, nsa, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4a815e81-8f97-4ce3-9f82-90f0ea2f3d12</guid>
      <title>Nicole Perlroth on Spyware, “Mutually Assured Digital Destruction” and Educating Boardrooms</title>
      <description><![CDATA[<p>In Nicole Perlroth’s blockbuster 2021 book, “This Is How They Tell Me the World Ends,” the former New York Times journalist conveys cybersecurity experts’ mounting anxiety about increasingly dangerous digital threats. From spyware to ransomware, the black market for cyber tools that skirt the law is lucrative and often poorly understood. </p><p>Nicole points to catastrophic cyberattacks like NotPetya, a 2017 ransomware look-alike that attempted to obliterate Ukraine’s critical infrastructure before causing billions of dollars in damages worldwide. But even with geopolitical tensions now at a fever pitch, Nicole, now a cybersecurity advisor and investor, explains why “mutually assured digital destruction” has so far helped stave off major attacks on U.S. critical infrastructure. </p><p>---------</p><p><strong>Also covered in the podcast: </strong></p><p>* The importance of educating board members about cybersecurity </p><p>* What constitutes a cyber weapon</p><p>* Why Nicole is optimistic about the future of ransomware</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 23 Feb 2023 10:00:00 +0000</pubDate>
      <author>Blake Sobczak, Nicole Perlroth</author>
      <link>https://were-in.simplecast.com/episodes/nicole-perlroth-ATcWLLIB</link>
      <content:encoded><![CDATA[<p>In Nicole Perlroth’s blockbuster 2021 book, “This Is How They Tell Me the World Ends,” the former New York Times journalist conveys cybersecurity experts’ mounting anxiety about increasingly dangerous digital threats. From spyware to ransomware, the black market for cyber tools that skirt the law is lucrative and often poorly understood. </p><p>Nicole points to catastrophic cyberattacks like NotPetya, a 2017 ransomware look-alike that attempted to obliterate Ukraine’s critical infrastructure before causing billions of dollars in damages worldwide. But even with geopolitical tensions now at a fever pitch, Nicole, now a cybersecurity advisor and investor, explains why “mutually assured digital destruction” has so far helped stave off major attacks on U.S. critical infrastructure. </p><p>---------</p><p><strong>Also covered in the podcast: </strong></p><p>* The importance of educating board members about cybersecurity </p><p>* What constitutes a cyber weapon</p><p>* Why Nicole is optimistic about the future of ransomware</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="38461931" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/54c82379-94ba-44c6-9172-0afa12a72509/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=54c82379-94ba-44c6-9172-0afa12a72509&amp;feed=_SsyS46z"/>
      <itunes:title>Nicole Perlroth on Spyware, “Mutually Assured Digital Destruction” and Educating Boardrooms</itunes:title>
      <itunes:author>Blake Sobczak, Nicole Perlroth</itunes:author>
      <itunes:duration>00:40:03</itunes:duration>
      <itunes:summary>In Nicole Perlroth’s blockbuster 2021 book, “This Is How They Tell Me the World Ends,” the former New York Times journalist conveys cybersecurity experts’ mounting anxiety about increasingly dangerous digital threats. From spyware to ransomware, the black market for cyber tools that skirt the law is lucrative and often poorly understood. 

Nicole points to catastrophic cyberattacks like NotPetya, a 2017 ransomware look-alike that attempted to obliterate Ukraine’s critical infrastructure before causing billions of dollars in damages worldwide. But even with geopolitical tensions now at a fever pitch, Nicole, now a cybersecurity advisor and investor, explains why “mutually assured digital destruction” has so far helped stave off major attacks on U.S. critical infrastructure. </itunes:summary>
      <itunes:subtitle>In Nicole Perlroth’s blockbuster 2021 book, “This Is How They Tell Me the World Ends,” the former New York Times journalist conveys cybersecurity experts’ mounting anxiety about increasingly dangerous digital threats. From spyware to ransomware, the black market for cyber tools that skirt the law is lucrative and often poorly understood. 

Nicole points to catastrophic cyberattacks like NotPetya, a 2017 ransomware look-alike that attempted to obliterate Ukraine’s critical infrastructure before causing billions of dollars in damages worldwide. But even with geopolitical tensions now at a fever pitch, Nicole, now a cybersecurity advisor and investor, explains why “mutually assured digital destruction” has so far helped stave off major attacks on U.S. critical infrastructure. </itunes:subtitle>
      <itunes:keywords>ransomware, cyber warfare, cybersecurity, cyberattack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7f0c15ce-748b-4d2f-abdf-c341d9eee335</guid>
      <title>Hudney Piquant on Pentesting, Staying Ahead of Adversaries and a Cyber “Sixth Sense”</title>
      <description><![CDATA[<p>Hudney Piquant kicked off his cybersecurity career working for a startup out of a garage in Michigan. He has since uncovered critical vulnerabilities as a Synack Red Team member, joined Synack full time as a solutions architect and been honored with a Most Inspiring Up And Comer award by CyberScoop last fall. </p><p>Tune into the latest episode of WE’RE IN! to hear Hudney share his insights into getting started with the Synack Red Team, the importance of mentorship in the cybersecurity community and his “sixth sense” that helps him to find creative workarounds for tough security challenges. </p><p>---------</p><p><strong>More topics covered in the podcast:</strong></p><p>* Why we haven’t seen the last of the blockbuster Log4j vulnerability </p><p>* The importance of applying an adversary’s perspective on your networks</p><p>* How to build trust among professionals skeptical of ethical hackers</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 2 Feb 2023 10:00:00 +0000</pubDate>
      <author>Hudney Piquant, Blake Sobczak, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/hudney-piquant-MGbQ_Rj2</link>
      <content:encoded><![CDATA[<p>Hudney Piquant kicked off his cybersecurity career working for a startup out of a garage in Michigan. He has since uncovered critical vulnerabilities as a Synack Red Team member, joined Synack full time as a solutions architect and been honored with a Most Inspiring Up And Comer award by CyberScoop last fall. </p><p>Tune into the latest episode of WE’RE IN! to hear Hudney share his insights into getting started with the Synack Red Team, the importance of mentorship in the cybersecurity community and his “sixth sense” that helps him to find creative workarounds for tough security challenges. </p><p>---------</p><p><strong>More topics covered in the podcast:</strong></p><p>* Why we haven’t seen the last of the blockbuster Log4j vulnerability </p><p>* The importance of applying an adversary’s perspective on your networks</p><p>* How to build trust among professionals skeptical of ethical hackers</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="39857914" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/c5531261-618f-4cda-978d-9aec797b131f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=c5531261-618f-4cda-978d-9aec797b131f&amp;feed=_SsyS46z"/>
      <itunes:title>Hudney Piquant on Pentesting, Staying Ahead of Adversaries and a Cyber “Sixth Sense”</itunes:title>
      <itunes:author>Hudney Piquant, Blake Sobczak, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:41:31</itunes:duration>
      <itunes:summary>Hudney Piquant kicked off his cybersecurity career working for a startup out of a garage in Michigan. He has since uncovered critical vulnerabilities as a Synack Red Team member, joined Synack full time as a solutions architect and been honored with a Most Inspiring Up And Comer award by CyberScoop last fall. 

Tune into the latest episode of WE’RE IN! to hear Hudney share his insights into getting started with the Synack Red Team, the importance of mentorship in the cybersecurity community and his “sixth sense” that helps him to find creative workarounds for tough security challenges. </itunes:summary>
      <itunes:subtitle>Hudney Piquant kicked off his cybersecurity career working for a startup out of a garage in Michigan. He has since uncovered critical vulnerabilities as a Synack Red Team member, joined Synack full time as a solutions architect and been honored with a Most Inspiring Up And Comer award by CyberScoop last fall. 

Tune into the latest episode of WE’RE IN! to hear Hudney share his insights into getting started with the Synack Red Team, the importance of mentorship in the cybersecurity community and his “sixth sense” that helps him to find creative workarounds for tough security challenges. </itunes:subtitle>
      <itunes:keywords>cybersecurity, hacking, mentorship</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">60dea64b-adfa-4a85-b27b-092fd168b4f2</guid>
      <title>Selena Larson on Cyber Intelligence, &quot;Evil&quot; Threat Actors and TOAD Attacks</title>
      <description><![CDATA[<p>In the latest episode of WE’RE IN!, Selena Larson shares insights into malicious hackers and scammers she’s tracking as senior threat intelligence analyst for Proofpoint. Business email compromise, ransomware, sextortion, multi-factor authentication bypass techniques – dealing with the onslaught of modern cyberthreats “is very much like playing whack-a-mole,” she said. By unpacking attackers’ motivations and psychological profiles, defenders can train themselves and their teams to avoid falling into common traps. </p><p>-------</p><p>More reasons you should listen: </p><p>* Hear Selena discuss what makes threat intelligence actionable, versus extra noise for a SOC</p><p>* Find out about an alarming cyber espionage campaign that recently targeted journalists</p><p>* Learn why Selena despises evil TOADs – “telephone-oriented attack delivery” attacks</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 19 Jan 2023 10:00:00 +0000</pubDate>
      <author>Selena Larson, Blake Sobczak, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/selena-larson-vY7iqDEJ</link>
      <content:encoded><![CDATA[<p>In the latest episode of WE’RE IN!, Selena Larson shares insights into malicious hackers and scammers she’s tracking as senior threat intelligence analyst for Proofpoint. Business email compromise, ransomware, sextortion, multi-factor authentication bypass techniques – dealing with the onslaught of modern cyberthreats “is very much like playing whack-a-mole,” she said. By unpacking attackers’ motivations and psychological profiles, defenders can train themselves and their teams to avoid falling into common traps. </p><p>-------</p><p>More reasons you should listen: </p><p>* Hear Selena discuss what makes threat intelligence actionable, versus extra noise for a SOC</p><p>* Find out about an alarming cyber espionage campaign that recently targeted journalists</p><p>* Learn why Selena despises evil TOADs – “telephone-oriented attack delivery” attacks</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="39753306" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/bf10078f-f89c-4691-b9b3-da93a0bc7892/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=bf10078f-f89c-4691-b9b3-da93a0bc7892&amp;feed=_SsyS46z"/>
      <itunes:title>Selena Larson on Cyber Intelligence, &quot;Evil&quot; Threat Actors and TOAD Attacks</itunes:title>
      <itunes:author>Selena Larson, Blake Sobczak, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:41:24</itunes:duration>
      <itunes:summary>In the latest episode of WE’RE IN!, Selena Larson shares insights into malicious hackers and scammers she’s tracking as senior threat intelligence analyst for Proofpoint. Business email compromise, ransomware, sextortion, multi-factor authentication bypass techniques – dealing with the onslaught of modern cyberthreats “is very much like playing whack-a-mole,” she said. By unpacking attackers’ motivations and psychological profiles, defenders can train themselves and their teams to avoid falling into common traps. </itunes:summary>
      <itunes:subtitle>In the latest episode of WE’RE IN!, Selena Larson shares insights into malicious hackers and scammers she’s tracking as senior threat intelligence analyst for Proofpoint. Business email compromise, ransomware, sextortion, multi-factor authentication bypass techniques – dealing with the onslaught of modern cyberthreats “is very much like playing whack-a-mole,” she said. By unpacking attackers’ motivations and psychological profiles, defenders can train themselves and their teams to avoid falling into common traps. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce26eb78-8487-47b9-80fa-25d2e11e979c</guid>
      <title>Craig Newmark on Cyber Philanthropy, Internet Pioneers and a “Cyber Civil Defense”</title>
      <description><![CDATA[<p>Philanthropist Craig Newmark is most famous for founding the classifieds site Craigslist nearly 30 years ago. But he’s recently earned praise in the cybersecurity community for pledging $50 million in early 2022 to support a cyber civil defense initiative through his namesake philanthropy. </p><p>On the latest episode of WE’RE IN!, hear Craig describe what he means by cyber civil defense and listen to his candid thoughts on everything from quantum computing to the dangers of state-sponsored disinformation campaigns. He also shares insights into the philanthropic strategy driving many of his contributions to the field of cybersecurity and continuing education.</p><p>----------</p><p><strong>Tune in to hear more about: </strong></p><p>* Challenges in fostering collaboration across the cybersecurity community, from the White House to organizations like the Aspen Institute’s Cybersecurity Group</p><p>* How a “cybersecurity nutrition label” could empower consumers </p><p>* Craig’s participation in the Whole Earth 'Lectronic Link, one of the oldest virtual communities</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 5 Jan 2023 10:00:00 +0000</pubDate>
      <author>Craig Newmark, Bella DeShantz-Cook, Blake Sobczak</author>
      <link>https://were-in.simplecast.com/episodes/craig-newmark-FHVNuTkE</link>
      <content:encoded><![CDATA[<p>Philanthropist Craig Newmark is most famous for founding the classifieds site Craigslist nearly 30 years ago. But he’s recently earned praise in the cybersecurity community for pledging $50 million in early 2022 to support a cyber civil defense initiative through his namesake philanthropy. </p><p>On the latest episode of WE’RE IN!, hear Craig describe what he means by cyber civil defense and listen to his candid thoughts on everything from quantum computing to the dangers of state-sponsored disinformation campaigns. He also shares insights into the philanthropic strategy driving many of his contributions to the field of cybersecurity and continuing education.</p><p>----------</p><p><strong>Tune in to hear more about: </strong></p><p>* Challenges in fostering collaboration across the cybersecurity community, from the White House to organizations like the Aspen Institute’s Cybersecurity Group</p><p>* How a “cybersecurity nutrition label” could empower consumers </p><p>* Craig’s participation in the Whole Earth 'Lectronic Link, one of the oldest virtual communities</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33037538" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/2ba4a658-52dd-488f-a81e-d60d92849dcb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=2ba4a658-52dd-488f-a81e-d60d92849dcb&amp;feed=_SsyS46z"/>
      <itunes:title>Craig Newmark on Cyber Philanthropy, Internet Pioneers and a “Cyber Civil Defense”</itunes:title>
      <itunes:author>Craig Newmark, Bella DeShantz-Cook, Blake Sobczak</itunes:author>
      <itunes:duration>00:34:24</itunes:duration>
      <itunes:summary>Philanthropist Craig Newmark is most famous for founding the classifieds site Craigslist nearly 30 years ago. But he’s recently earned praise in the cybersecurity community for pledging $50 million in early 2022 to support a cyber civil defense initiative through his namesake philanthropy. 

On the latest episode of WE’RE IN!, hear Craig describe what he means by cyber civil defense and listen to his candid thoughts on everything from quantum computing to the dangers of state-sponsored disinformation campaigns. He also shares insights into the philanthropic strategy driving many of his contributions to the field of cybersecurity and continuing education.</itunes:summary>
      <itunes:subtitle>Philanthropist Craig Newmark is most famous for founding the classifieds site Craigslist nearly 30 years ago. But he’s recently earned praise in the cybersecurity community for pledging $50 million in early 2022 to support a cyber civil defense initiative through his namesake philanthropy. 

On the latest episode of WE’RE IN!, hear Craig describe what he means by cyber civil defense and listen to his candid thoughts on everything from quantum computing to the dangers of state-sponsored disinformation campaigns. He also shares insights into the philanthropic strategy driving many of his contributions to the field of cybersecurity and continuing education.</itunes:subtitle>
      <itunes:keywords>cyber warfare, cybersecurity, civil defense, government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aee8b055-70b3-4a40-9789-1a2e737fa154</guid>
      <title>Andy Greenberg on “Tracers in the Dark,” Bitcoin What-ifs and IRS Heroes</title>
      <description><![CDATA[<p>Journalist Andy Greenberg is no stranger to the murky world of cryptocurrency. The senior writer for WIRED and longtime cybersecurity journalist was one of the last reporters to interact with pseudonymous Bitcoin founder Satoshi Nakamoto before they evidently ceased communications. </p><p>In his new book, <a href="https://www.penguinrandomhouse.com/books/690603/tracers-in-the-dark-by-andy-greenberg/" target="_blank">“Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency,”</a> Andy follows the gripping story of IRS special agent Tigran Gambaryan as he follows the money to zero in on some of the most mysterious and monstrous criminals in the cyber underground. </p><p>-------</p><p>Don’t miss the inaugural episode of WE’RE IN! Season 2 to hear more from Andy on: </p><p>* How Tigran joined forces with expert investigators and cryptographers to jettison misconceptions about the anonymity of major cryptocurrencies, exposing alleged criminal masterminds in the process</p><p>* The genesis of successful crypto tracing and analysis firms like Chainalysis</p><p>* The twisted motivations of those who founded infamous dark web emporiums like AlphaBay and Silk Road</p><p>-------</p><p>Links: </p><p>* <a href="https://andygreenberg.net/" target="_blank">https://andygreenberg.net/</a></p><p>* <a href="https://www.wired.com/" target="_blank">https://www.wired.com/</a></p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 15 Dec 2022 10:00:00 +0000</pubDate>
      <author>Andy Greenberg, Blake Sobczak, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/andy-greenberg-NnFujHNh</link>
      <content:encoded><![CDATA[<p>Journalist Andy Greenberg is no stranger to the murky world of cryptocurrency. The senior writer for WIRED and longtime cybersecurity journalist was one of the last reporters to interact with pseudonymous Bitcoin founder Satoshi Nakamoto before they evidently ceased communications. </p><p>In his new book, <a href="https://www.penguinrandomhouse.com/books/690603/tracers-in-the-dark-by-andy-greenberg/" target="_blank">“Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency,”</a> Andy follows the gripping story of IRS special agent Tigran Gambaryan as he follows the money to zero in on some of the most mysterious and monstrous criminals in the cyber underground. </p><p>-------</p><p>Don’t miss the inaugural episode of WE’RE IN! Season 2 to hear more from Andy on: </p><p>* How Tigran joined forces with expert investigators and cryptographers to jettison misconceptions about the anonymity of major cryptocurrencies, exposing alleged criminal masterminds in the process</p><p>* The genesis of successful crypto tracing and analysis firms like Chainalysis</p><p>* The twisted motivations of those who founded infamous dark web emporiums like AlphaBay and Silk Road</p><p>-------</p><p>Links: </p><p>* <a href="https://andygreenberg.net/" target="_blank">https://andygreenberg.net/</a></p><p>* <a href="https://www.wired.com/" target="_blank">https://www.wired.com/</a></p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="35593495" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/00b8084e-60da-47bd-8efe-8656eca2fa21/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=00b8084e-60da-47bd-8efe-8656eca2fa21&amp;feed=_SsyS46z"/>
      <itunes:title>Andy Greenberg on “Tracers in the Dark,” Bitcoin What-ifs and IRS Heroes</itunes:title>
      <itunes:author>Andy Greenberg, Blake Sobczak, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:37:04</itunes:duration>
      <itunes:summary>Journalist Andy Greenberg is no stranger to the murky world of cryptocurrency. The senior writer for WIRED and longtime cybersecurity journalist was one of the last reporters to interact with pseudonymous Bitcoin founder Satoshi Nakamoto before they evidently ceased communications. 

In his new book, “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency,” Andy follows the gripping story of IRS special agent Tigran Gambaryan as he follows the money to zero in on some of the most mysterious and monstrous criminals in the cyber underground. </itunes:summary>
      <itunes:subtitle>Journalist Andy Greenberg is no stranger to the murky world of cryptocurrency. The senior writer for WIRED and longtime cybersecurity journalist was one of the last reporters to interact with pseudonymous Bitcoin founder Satoshi Nakamoto before they evidently ceased communications. 

In his new book, “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency,” Andy follows the gripping story of IRS special agent Tigran Gambaryan as he follows the money to zero in on some of the most mysterious and monstrous criminals in the cyber underground. </itunes:subtitle>
      <itunes:keywords>bitcoin, cybersecurity, crypto, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0aca98be-a0c3-4dd2-ba6a-6f07d1e0c494</guid>
      <title>Season 2 Trailer</title>
      <description><![CDATA[<p><strong>Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 2 of WE'RE IN! </strong></p><p><strong>Co-hosted by Synack security operations engineer Bella DeShantz-Cook and longtime cybersecurity journalist Blake Sobczak, WE'RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don't miss the latest season of this breakout podcast, sponsored by Synack! </strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 8 Dec 2022 18:07:00 +0000</pubDate>
      <author>Bella DeShantz-Cook, Blake Sobczak</author>
      <link>https://were-in.simplecast.com/episodes/season-2-trailer-np3KQHNg</link>
      <content:encoded><![CDATA[<p><strong>Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 2 of WE'RE IN! </strong></p><p><strong>Co-hosted by Synack security operations engineer Bella DeShantz-Cook and longtime cybersecurity journalist Blake Sobczak, WE'RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don't miss the latest season of this breakout podcast, sponsored by Synack! </strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2501440" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/30768c40-699a-4366-921b-e935e55a6e9d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=30768c40-699a-4366-921b-e935e55a6e9d&amp;feed=_SsyS46z"/>
      <itunes:title>Season 2 Trailer</itunes:title>
      <itunes:author>Bella DeShantz-Cook, Blake Sobczak</itunes:author>
      <itunes:duration>00:02:36</itunes:duration>
      <itunes:summary>Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 2 of WE&apos;RE IN! 

Co-hosted by Synack security operations engineer Bella DeShantz-Cook and longtime cybersecurity journalist Blake Sobczak, WE&apos;RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don&apos;t miss the latest season of this breakout podcast, sponsored by Synack! </itunes:summary>
      <itunes:subtitle>Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 2 of WE&apos;RE IN! 

Co-hosted by Synack security operations engineer Bella DeShantz-Cook and longtime cybersecurity journalist Blake Sobczak, WE&apos;RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don&apos;t miss the latest season of this breakout podcast, sponsored by Synack! </itunes:subtitle>
      <itunes:keywords>cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">d1458025-851d-44e4-9193-6e654e7dffdc</guid>
      <title>Tanya Janca on Cyber Mentorship, “Shifting Left” and Punk Rock</title>
      <description><![CDATA[<p>Application security maven Tanya Janca – AKA SheHacksPurple – is an accomplished author, pentester and onetime music festival organizer. But she’s perhaps best known as the founder of We Hack Purple, a community of security professionals dedicated to sharing useful cyber information including coding trainings and coursework. (Dynamic application security testing Bright Security acquired We Hack Purple earlier this year, bringing its own approach to the “shift left” dilemma of moving cybersecurity earlier in the software development cycle.)</p><p>Tanya has spent much of her career in cybersecurity and IT empowering others to strengthen their own skills. With We Hack Purple, she built a community from the ground up, and she’s organized plenty of security talks and capture-the-flag tournaments along the way. Computer science can be a nebulous, wide-ranging field – Tanya has further helped people zero in on <i>what</i> they should focus on learning in the wide world of cybersecurity. </p><p>-------</p><p><strong>Tune into the episode to hear more on: </strong><br /><br />* The story behind Tanya’s bestselling book, “Alice and Bob Learn Application Security” </p><p>* The qualities that make a good pentester: “You have to be very determined and detail oriented,” as Tanya put it</p><p>*  #cybermentoringmonday and the value of professional mentorship </p><p>-------</p><p><strong>Links: </strong></p><p><a href="https://wehackpurple.com/" target="_blank">* https://wehackpurple.com/</a></p><p>* <a href="https://brightsec.com/" target="_blank">https://brightsec.com/</a></p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 23 Nov 2022 10:00:00 +0000</pubDate>
      <author>Jeremiah Roe, Tanya Janca, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/tanya-janca-ONl8_5qq</link>
      <content:encoded><![CDATA[<p>Application security maven Tanya Janca – AKA SheHacksPurple – is an accomplished author, pentester and onetime music festival organizer. But she’s perhaps best known as the founder of We Hack Purple, a community of security professionals dedicated to sharing useful cyber information including coding trainings and coursework. (Dynamic application security testing Bright Security acquired We Hack Purple earlier this year, bringing its own approach to the “shift left” dilemma of moving cybersecurity earlier in the software development cycle.)</p><p>Tanya has spent much of her career in cybersecurity and IT empowering others to strengthen their own skills. With We Hack Purple, she built a community from the ground up, and she’s organized plenty of security talks and capture-the-flag tournaments along the way. Computer science can be a nebulous, wide-ranging field – Tanya has further helped people zero in on <i>what</i> they should focus on learning in the wide world of cybersecurity. </p><p>-------</p><p><strong>Tune into the episode to hear more on: </strong><br /><br />* The story behind Tanya’s bestselling book, “Alice and Bob Learn Application Security” </p><p>* The qualities that make a good pentester: “You have to be very determined and detail oriented,” as Tanya put it</p><p>*  #cybermentoringmonday and the value of professional mentorship </p><p>-------</p><p><strong>Links: </strong></p><p><a href="https://wehackpurple.com/" target="_blank">* https://wehackpurple.com/</a></p><p>* <a href="https://brightsec.com/" target="_blank">https://brightsec.com/</a></p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="36908794" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/f9e5c052-9144-483c-ac07-5eb17c7e5b26/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=f9e5c052-9144-483c-ac07-5eb17c7e5b26&amp;feed=_SsyS46z"/>
      <itunes:title>Tanya Janca on Cyber Mentorship, “Shifting Left” and Punk Rock</itunes:title>
      <itunes:author>Jeremiah Roe, Tanya Janca, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:38:26</itunes:duration>
      <itunes:summary>Application security maven Tanya Janca – AKA SheHacksPurple – is an accomplished author, pentester and onetime music festival organizer. But she’s perhaps best known as the founder of We Hack Purple, a community of security professionals dedicated to sharing useful cyber information including coding trainings and coursework. (Dynamic application security testing Bright Security acquired We Hack Purple earlier this year, bringing its own approach to the “shift left” dilemma of moving cybersecurity earlier in the software development cycle.)

Tanya has spent much of her career in cybersecurity and IT empowering others to strengthen their own skills. With We Hack Purple, she built a community from the ground up, and she’s organized plenty of security talks and capture-the-flag tournaments along the way. Computer science can be a nebulous, wide-ranging field – Tanya has further helped people zero in on what they should focus on learning in the wide world of cybersecurity. </itunes:summary>
      <itunes:subtitle>Application security maven Tanya Janca – AKA SheHacksPurple – is an accomplished author, pentester and onetime music festival organizer. But she’s perhaps best known as the founder of We Hack Purple, a community of security professionals dedicated to sharing useful cyber information including coding trainings and coursework. (Dynamic application security testing Bright Security acquired We Hack Purple earlier this year, bringing its own approach to the “shift left” dilemma of moving cybersecurity earlier in the software development cycle.)

Tanya has spent much of her career in cybersecurity and IT empowering others to strengthen their own skills. With We Hack Purple, she built a community from the ground up, and she’s organized plenty of security talks and capture-the-flag tournaments along the way. Computer science can be a nebulous, wide-ranging field – Tanya has further helped people zero in on what they should focus on learning in the wide world of cybersecurity. </itunes:subtitle>
      <itunes:keywords>pentesting, cybersecurity, hacking, mentorship</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7003274a-44b3-4e4b-873d-6e816a31680d</guid>
      <title>Melanie Teplinsky on the Value of Cybersecurity Policy, a Zero Trust Model for Small Businesses and her Start at the NSA</title>
      <description><![CDATA[<p>Melanie Teplinsky fell in love with cryptography at an early age, which led her to landing her first job at the National Security Agency at 16. From there, she found her niche in cybersecurity at the intersection of technology and the law. </p><p>As a senior fellow at American University in the Law Tech, Law, and Security Program, Melanie helps craft cybersecurity policies that scale and attempt to solve big, societal problems. First, she has to understand how cybersecurity technology and models, such as zero trust, are implemented at companies and organizations of all sizes. Then, she applies those principles to existing laws and government mandates to understand the pitfalls and gaps. </p><p>Between her early start in cyber and national policy-making, Melanie has a unique perspective to share with the infosec community.</p><p> </p><p><strong>Listen to the episode to hear more about: </strong></p><p>* How cybersecurity policy can transform small- and medium-size businesses’ approach to zero trust </p><p>* Why protecting innovation efforts at universities and small companies is paramount for the cybersecurity industry</p><p>* The positive outcomes from collaboration between the public and private sectors </p><p> </p><p><strong>Links: </strong></p><p>* <a href="https://www.wcl.american.edu/impact/initiatives-programs/techlaw/our-team/melanie-teplinsky/" target="_blank">https://www.wcl.american.edu/impact/initiatives-programs/techlaw/our-team/melanie-teplinsky/</a></p><p>* <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/cybersecurity-for-innovative-small-and-medium-enterprises-and-academia/" target="_blank">https://www.atlanticcouncil.org/in-depth-research-reports/report/cybersecurity-for-innovative-small-and-medium-enterprises-and-academia/</a></p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 17 Nov 2022 18:37:01 +0000</pubDate>
      <author>Melanie Teplinsky, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/melanie-teplinsky-0aq_Ycv_</link>
      <content:encoded><![CDATA[<p>Melanie Teplinsky fell in love with cryptography at an early age, which led her to landing her first job at the National Security Agency at 16. From there, she found her niche in cybersecurity at the intersection of technology and the law. </p><p>As a senior fellow at American University in the Law Tech, Law, and Security Program, Melanie helps craft cybersecurity policies that scale and attempt to solve big, societal problems. First, she has to understand how cybersecurity technology and models, such as zero trust, are implemented at companies and organizations of all sizes. Then, she applies those principles to existing laws and government mandates to understand the pitfalls and gaps. </p><p>Between her early start in cyber and national policy-making, Melanie has a unique perspective to share with the infosec community.</p><p> </p><p><strong>Listen to the episode to hear more about: </strong></p><p>* How cybersecurity policy can transform small- and medium-size businesses’ approach to zero trust </p><p>* Why protecting innovation efforts at universities and small companies is paramount for the cybersecurity industry</p><p>* The positive outcomes from collaboration between the public and private sectors </p><p> </p><p><strong>Links: </strong></p><p>* <a href="https://www.wcl.american.edu/impact/initiatives-programs/techlaw/our-team/melanie-teplinsky/" target="_blank">https://www.wcl.american.edu/impact/initiatives-programs/techlaw/our-team/melanie-teplinsky/</a></p><p>* <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/cybersecurity-for-innovative-small-and-medium-enterprises-and-academia/" target="_blank">https://www.atlanticcouncil.org/in-depth-research-reports/report/cybersecurity-for-innovative-small-and-medium-enterprises-and-academia/</a></p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="41618358" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/2f55b4ee-a6cc-41c2-ba41-6794a0c246e3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=2f55b4ee-a6cc-41c2-ba41-6794a0c246e3&amp;feed=_SsyS46z"/>
      <itunes:title>Melanie Teplinsky on the Value of Cybersecurity Policy, a Zero Trust Model for Small Businesses and her Start at the NSA</itunes:title>
      <itunes:author>Melanie Teplinsky, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:43:21</itunes:duration>
      <itunes:summary>Melanie Teplinsky fell in love with cryptography at an early age, which led her to landing her first job at the National Security Agency at 16. From there, she found her niche in cybersecurity at the intersection of technology and the law. 

As a senior fellow at American University in the Law Tech, Law, and Security Program, Melanie helps craft cybersecurity policies that scale and attempt to solve big, societal problems. First, she has to understand how cybersecurity technology and models, such as zero trust, are implemented at companies and organizations of all sizes. Then, she applies those principles to existing laws and government mandates to understand the pitfalls and gaps. 

Between her early start in cyber and national policy-making, Melanie has a unique perspective to share with the infosec community.</itunes:summary>
      <itunes:subtitle>Melanie Teplinsky fell in love with cryptography at an early age, which led her to landing her first job at the National Security Agency at 16. From there, she found her niche in cybersecurity at the intersection of technology and the law. 

As a senior fellow at American University in the Law Tech, Law, and Security Program, Melanie helps craft cybersecurity policies that scale and attempt to solve big, societal problems. First, she has to understand how cybersecurity technology and models, such as zero trust, are implemented at companies and organizations of all sizes. Then, she applies those principles to existing laws and government mandates to understand the pitfalls and gaps. 

Between her early start in cyber and national policy-making, Melanie has a unique perspective to share with the infosec community.</itunes:subtitle>
      <itunes:keywords>zero trust, nsa, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e7731af-c99e-4d6f-af5b-84e0d151cb95</guid>
      <title>Zinet Kemal on Starting Over, Infosec for Kids and the Importance of Mentorship</title>
      <description><![CDATA[<p><br />Zinet Kemal is an infosec powerhouse. After emigrating from Ethiopia to Minnesota with her husband, she started her life over. She left behind her community and career as a lawyer and dived into the world of information security. </p><p>She has since become a children’s book author and works as a cloud security engineer for Best Buy, while raising her four kids and completing her master’s degree in cybersecurity from Georgia Tech University. </p><p>In the latest episode of WE’RE IN!, Zinet shares how she published two children’s books during the pandemic, “Proud in Her Hijab” and “Oh, No ... Hacked Again!: A Story About Online Safety,” and about her work with Black Girls in Cyber. </p><p> </p><p><strong>Listen to the episode to hear more about: </strong></p><p>* How you can teach kids (and grandparents) about cybersecurity </p><p>*Zinet’s journey from immigrant to best selling author </p><p>*The power of diversity in cybersecurity </p><p> </p><p><strong>Links: </strong></p><p>*<a href="https://zinetkemal.com/" target="_blank">https://zinetkemal.com/</a></p><p>*<a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>*<a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 3 Nov 2022 09:00:00 +0000</pubDate>
      <author>Zinet Kemal, Bella DeShantz-Cook, Jeremiah Roe</author>
      <link>https://were-in.simplecast.com/episodes/zinet-kemal-3Xd3v9r4</link>
      <content:encoded><![CDATA[<p><br />Zinet Kemal is an infosec powerhouse. After emigrating from Ethiopia to Minnesota with her husband, she started her life over. She left behind her community and career as a lawyer and dived into the world of information security. </p><p>She has since become a children’s book author and works as a cloud security engineer for Best Buy, while raising her four kids and completing her master’s degree in cybersecurity from Georgia Tech University. </p><p>In the latest episode of WE’RE IN!, Zinet shares how she published two children’s books during the pandemic, “Proud in Her Hijab” and “Oh, No ... Hacked Again!: A Story About Online Safety,” and about her work with Black Girls in Cyber. </p><p> </p><p><strong>Listen to the episode to hear more about: </strong></p><p>* How you can teach kids (and grandparents) about cybersecurity </p><p>*Zinet’s journey from immigrant to best selling author </p><p>*The power of diversity in cybersecurity </p><p> </p><p><strong>Links: </strong></p><p>*<a href="https://zinetkemal.com/" target="_blank">https://zinetkemal.com/</a></p><p>*<a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>*<a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="39367230" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/4b2b030e-b04b-4ece-b999-46573405c11f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=4b2b030e-b04b-4ece-b999-46573405c11f&amp;feed=_SsyS46z"/>
      <itunes:title>Zinet Kemal on Starting Over, Infosec for Kids and the Importance of Mentorship</itunes:title>
      <itunes:author>Zinet Kemal, Bella DeShantz-Cook, Jeremiah Roe</itunes:author>
      <itunes:duration>00:41:00</itunes:duration>
      <itunes:summary>Zinet Kemal is an infosec powerhouse. After emigrating from Ethiopia to Minnesota with her husband, she started her life over. She left behind her community and career as a lawyer and dived into the world of information security. 

She has since become a children’s book author and works as a cloud security engineer for Best Buy, while raising her four kids and completing her master’s degree in cybersecurity from Georgia Tech University. 

In the latest episode of WE’RE IN!, Zinet shares how she published two children’s books during the pandemic, “Proud in Her Hijab” and “Oh, No ... Hacked Again!: A Story About Online Safety,” and about her work with Black Girls in Cyber. </itunes:summary>
      <itunes:subtitle>Zinet Kemal is an infosec powerhouse. After emigrating from Ethiopia to Minnesota with her husband, she started her life over. She left behind her community and career as a lawyer and dived into the world of information security. 

She has since become a children’s book author and works as a cloud security engineer for Best Buy, while raising her four kids and completing her master’s degree in cybersecurity from Georgia Tech University. 

In the latest episode of WE’RE IN!, Zinet shares how she published two children’s books during the pandemic, “Proud in Her Hijab” and “Oh, No ... Hacked Again!: A Story About Online Safety,” and about her work with Black Girls in Cyber. </itunes:subtitle>
      <itunes:keywords>infosec, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cdd05b27-5598-4e97-b69d-b66dcec9e12c</guid>
      <title>Sean Zadig on the “Paranoids,” Ethical Hacking and Crafting a Security Culture</title>
      <description><![CDATA[<p>Sean Zadig has plenty to be paranoid about. The internet is a frightening place, and Yahoo’s Paranoids–the name for the company’s infosec team–have their work cut out for them protecting Yahoo’s more than one billion global users.</p><p>As vice president, chief information security officer and “Chief Paranoid” for Yahoo, Sean is charged with keeping sensitive company data safe from an onslaught of cyberthreats, working collaboratively across all Yahoo’s media and technology brands.</p><p>In the latest WE’RE IN! episode, Sean speaks to the need for balance in security messaging and shares how he addresses risks like Log4j. </p><p>It takes patience and finesse to build a strong culture of security in any organization, let alone a global tech and media company with thousands of employees. </p><p>“It's important to not shame people, so you don't want to say, ‘how could you miss this?’ Or, ‘what happened? Why, why did you commit that code?’” Sean says. “Instead, we use it as a learning experience.” </p><p> </p><p>Tune in to discover how Sean keeps Yahoo on the right track and hear more about:</p><p>* Yahoo’s approach to bug bounties and pentesting</p><p>* His unlikely path to security leadership– “It was never my career aspiration to become a CISO”</p><p>* Sean’s focus on examining what motivates the attackers targeting Yahoo every day</p><p> </p><p><strong>Links: </strong></p><p>* <a href="https://www.yahooinc.com/technology/paranoids-blog/" target="_blank">https://www.yahooinc.com/technology/paranoids-blog/</a></p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 30 Sep 2022 09:00:00 +0000</pubDate>
      <author>Jeremiah Roe, Sean Zadig, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/sean-zadig-on-the-paranoids-ethical-hacking-and-crafting-a-security-culture-hgbCAwsn</link>
      <content:encoded><![CDATA[<p>Sean Zadig has plenty to be paranoid about. The internet is a frightening place, and Yahoo’s Paranoids–the name for the company’s infosec team–have their work cut out for them protecting Yahoo’s more than one billion global users.</p><p>As vice president, chief information security officer and “Chief Paranoid” for Yahoo, Sean is charged with keeping sensitive company data safe from an onslaught of cyberthreats, working collaboratively across all Yahoo’s media and technology brands.</p><p>In the latest WE’RE IN! episode, Sean speaks to the need for balance in security messaging and shares how he addresses risks like Log4j. </p><p>It takes patience and finesse to build a strong culture of security in any organization, let alone a global tech and media company with thousands of employees. </p><p>“It's important to not shame people, so you don't want to say, ‘how could you miss this?’ Or, ‘what happened? Why, why did you commit that code?’” Sean says. “Instead, we use it as a learning experience.” </p><p> </p><p>Tune in to discover how Sean keeps Yahoo on the right track and hear more about:</p><p>* Yahoo’s approach to bug bounties and pentesting</p><p>* His unlikely path to security leadership– “It was never my career aspiration to become a CISO”</p><p>* Sean’s focus on examining what motivates the attackers targeting Yahoo every day</p><p> </p><p><strong>Links: </strong></p><p>* <a href="https://www.yahooinc.com/technology/paranoids-blog/" target="_blank">https://www.yahooinc.com/technology/paranoids-blog/</a></p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://readme.security/" target="_blank">https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="39348875" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/1104ffd0-dde6-4ce3-9726-53905ea72035/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=1104ffd0-dde6-4ce3-9726-53905ea72035&amp;feed=_SsyS46z"/>
      <itunes:title>Sean Zadig on the “Paranoids,” Ethical Hacking and Crafting a Security Culture</itunes:title>
      <itunes:author>Jeremiah Roe, Sean Zadig, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:40:59</itunes:duration>
      <itunes:summary>Sean Zadig has plenty to be paranoid about. The internet is a frightening place, and Yahoo’s Paranoids–the name for the company’s infosec team–have their work cut out for them protecting Yahoo’s more than one billion global users.

As vice president, chief information security officer and “Chief Paranoid” for Yahoo, Sean is charged with keeping sensitive company data safe from an onslaught of cyberthreats, working collaboratively across all Yahoo’s media and technology brands.

In the latest WE’RE IN! episode, Sean speaks to the need for balance in security messaging and shares how he addresses risks like Log4j. 

It takes patience and finesse to build a strong culture of security in any organization, let alone a global tech and media company with thousands of employees. 

“It&apos;s important to not shame people, so you don&apos;t want to say, ‘how could you miss this?’ Or, ‘what happened? Why, why did you commit that code?’” Sean says. “Instead, we use it as a learning experience.” </itunes:summary>
      <itunes:subtitle>Sean Zadig has plenty to be paranoid about. The internet is a frightening place, and Yahoo’s Paranoids–the name for the company’s infosec team–have their work cut out for them protecting Yahoo’s more than one billion global users.

As vice president, chief information security officer and “Chief Paranoid” for Yahoo, Sean is charged with keeping sensitive company data safe from an onslaught of cyberthreats, working collaboratively across all Yahoo’s media and technology brands.

In the latest WE’RE IN! episode, Sean speaks to the need for balance in security messaging and shares how he addresses risks like Log4j. 

It takes patience and finesse to build a strong culture of security in any organization, let alone a global tech and media company with thousands of employees. 

“It&apos;s important to not shame people, so you don&apos;t want to say, ‘how could you miss this?’ Or, ‘what happened? Why, why did you commit that code?’” Sean says. “Instead, we use it as a learning experience.” </itunes:subtitle>
      <itunes:keywords>ethical hacking, pentesting, security, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">13a3c583-4dea-4b95-89f8-45404ea05ec4</guid>
      <title>Jack Rhysider on Podcasting, Plot Twists and Infosec Burnout</title>
      <description><![CDATA[<p>Four years ago, Jack Rhysider quit his job as a security engineer to move full time into the storytelling business. His podcast, Darknet Diaries, now boasts tens of millions of total downloads and has explored cybersecurity topics from Stuxnet to the collapse of cryptocurrency exchange Mt. Gox.</p><p>Building Darknet Diaries into a successful show was no cakewalk. In the latest episode of WE’RE IN!, Jack shares his experience putting on a great podcast, from ideation and guest selection all the way to monetization and fielding calls from Hollywood producers.</p><p>“Don’t think about how big of an audience you have,” he said. “You need to find the right person in your head, of who would love this show, and just deliver it to them in a great way.”</p><p>---------</p><p>Even if you’re not a podcast creator, there are plenty of reasons to listen:</p><p>* Glean Jack’s insights into the creative process, including the importance of self-reflection and listening with “fresh ears”</p><p>* Hear how he navigates constant deadline pressure while avoiding burnout</p><p>* Learn the secrets behind the most suspenseful moments in any great story</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 19 Aug 2022 09:00:00 +0000</pubDate>
      <author>Jack Rhysider, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/jack-rhysider-on-podcasting-plot-twists-and-infosec-burnout-HMQi6sJm</link>
      <content:encoded><![CDATA[<p>Four years ago, Jack Rhysider quit his job as a security engineer to move full time into the storytelling business. His podcast, Darknet Diaries, now boasts tens of millions of total downloads and has explored cybersecurity topics from Stuxnet to the collapse of cryptocurrency exchange Mt. Gox.</p><p>Building Darknet Diaries into a successful show was no cakewalk. In the latest episode of WE’RE IN!, Jack shares his experience putting on a great podcast, from ideation and guest selection all the way to monetization and fielding calls from Hollywood producers.</p><p>“Don’t think about how big of an audience you have,” he said. “You need to find the right person in your head, of who would love this show, and just deliver it to them in a great way.”</p><p>---------</p><p>Even if you’re not a podcast creator, there are plenty of reasons to listen:</p><p>* Glean Jack’s insights into the creative process, including the importance of self-reflection and listening with “fresh ears”</p><p>* Hear how he navigates constant deadline pressure while avoiding burnout</p><p>* Learn the secrets behind the most suspenseful moments in any great story</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="49366068" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/0f6a1ffe-606a-4609-acb6-eb9b1a2f3546/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=0f6a1ffe-606a-4609-acb6-eb9b1a2f3546&amp;feed=_SsyS46z"/>
      <itunes:title>Jack Rhysider on Podcasting, Plot Twists and Infosec Burnout</itunes:title>
      <itunes:author>Jack Rhysider, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:51:25</itunes:duration>
      <itunes:summary>Four years ago, Jack Rhysider quit his job as a security engineer to move full time into the storytelling business. His podcast, Darknet Diaries, now boasts tens of millions of total downloads and has explored cybersecurity topics from Stuxnet to the collapse of cryptocurrency exchange Mt. Gox.

 Building Darknet Diaries into a successful show was no cakewalk. In the latest episode of WE’RE IN!, Jack shares his experience putting on a great podcast, from ideation and guest selection all the way to monetization and fielding calls from Hollywood producers.

“Don’t think about how big of an audience you have,” he said. “You need to find the right person in your head, of who would love this show, and just deliver it to them in a great way.”</itunes:summary>
      <itunes:subtitle>Four years ago, Jack Rhysider quit his job as a security engineer to move full time into the storytelling business. His podcast, Darknet Diaries, now boasts tens of millions of total downloads and has explored cybersecurity topics from Stuxnet to the collapse of cryptocurrency exchange Mt. Gox.

 Building Darknet Diaries into a successful show was no cakewalk. In the latest episode of WE’RE IN!, Jack shares his experience putting on a great podcast, from ideation and guest selection all the way to monetization and fielding calls from Hollywood producers.

“Don’t think about how big of an audience you have,” he said. “You need to find the right person in your head, of who would love this show, and just deliver it to them in a great way.”</itunes:subtitle>
      <itunes:keywords>burnout, darknet diaries, cybersecurity, podcast, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">19167551-f858-48d2-b6a9-927e5f428547</guid>
      <title>Tracy Maleeff on Diversifying the Cyber Workforce, OSINT Skills and “Librarian Face”</title>
      <description><![CDATA[<p>Tracy Maleeff led a successful career transition into the tech and cybersecurity world nearly seven years ago. Now a security researcher with the Krebs Stamos Group, the former librarian still uses her hard-won open source intelligence skills to sort through a deluge of cybersecurity information for clients and for subscribers of her free InfoSecSherpa news roundups.</p><p>In the latest WE’RE IN! episode, she speaks to the importance of having diverse perspectives at the table when it comes to cybersecurity and warns of a disconnect between tech hiring managers and HR departments.</p><p>“Companies keep hunting for unicorns when they really just need to pay attention to the squirrels at the base of the tree,” Maleeff said.</p><p>---------</p><p><strong>Here are a few more reasons to listen:</strong></p><p>* Discover Tracy’s tips for breaking into the cybersecurity industry from other professions: She once helped a mechanic launch a career in pentesting</p><p>* Learn how she’s used Twitter to advance her own cybersecurity career</p><p>* Hear about out her favorite episode of Keeping up with the Kardashians – and yes, there is an infosec connection!</p><p>---------</p><p><strong>Links:</strong></p><p><a href="https://infosecsherpa.medium.com/" target="_blank">* https://infosecsherpa.medium.com/</a></p><p><a href="https://www.ks.group/" target="_blank">* https://www.ks.group/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><p><a href="https://readme.security/" target="_blank">* https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 29 Jul 2022 09:00:00 +0000</pubDate>
      <author>Jeremiah Roe, Bella DeShantz-Cook, Tracy Maleeff</author>
      <link>https://were-in.simplecast.com/episodes/tracy-maleeff-on-diversifying-the-cyber-workforce-osint-skills-and-librarian-face-F8bk03Ea</link>
      <content:encoded><![CDATA[<p>Tracy Maleeff led a successful career transition into the tech and cybersecurity world nearly seven years ago. Now a security researcher with the Krebs Stamos Group, the former librarian still uses her hard-won open source intelligence skills to sort through a deluge of cybersecurity information for clients and for subscribers of her free InfoSecSherpa news roundups.</p><p>In the latest WE’RE IN! episode, she speaks to the importance of having diverse perspectives at the table when it comes to cybersecurity and warns of a disconnect between tech hiring managers and HR departments.</p><p>“Companies keep hunting for unicorns when they really just need to pay attention to the squirrels at the base of the tree,” Maleeff said.</p><p>---------</p><p><strong>Here are a few more reasons to listen:</strong></p><p>* Discover Tracy’s tips for breaking into the cybersecurity industry from other professions: She once helped a mechanic launch a career in pentesting</p><p>* Learn how she’s used Twitter to advance her own cybersecurity career</p><p>* Hear about out her favorite episode of Keeping up with the Kardashians – and yes, there is an infosec connection!</p><p>---------</p><p><strong>Links:</strong></p><p><a href="https://infosecsherpa.medium.com/" target="_blank">* https://infosecsherpa.medium.com/</a></p><p><a href="https://www.ks.group/" target="_blank">* https://www.ks.group/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><p><a href="https://readme.security/" target="_blank">* https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="43381310" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/12e9c13a-5aa9-4edc-a368-376382ba569d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=12e9c13a-5aa9-4edc-a368-376382ba569d&amp;feed=_SsyS46z"/>
      <itunes:title>Tracy Maleeff on Diversifying the Cyber Workforce, OSINT Skills and “Librarian Face”</itunes:title>
      <itunes:author>Jeremiah Roe, Bella DeShantz-Cook, Tracy Maleeff</itunes:author>
      <itunes:duration>00:45:11</itunes:duration>
      <itunes:summary>Tracy Maleeff led a successful career transition into the tech and cybersecurity world nearly seven years ago. Now a security researcher with the Krebs Stamos Group, the former librarian still uses her hard-won open source intelligence skills to sort through a deluge of cybersecurity information for clients and for subscribers of her free InfoSecSherpa news roundups.

In the latest WE’RE IN! episode, she speaks to the importance of having diverse perspectives at the table when it comes to cybersecurity and warns of a disconnect between tech hiring managers and HR departments.</itunes:summary>
      <itunes:subtitle>Tracy Maleeff led a successful career transition into the tech and cybersecurity world nearly seven years ago. Now a security researcher with the Krebs Stamos Group, the former librarian still uses her hard-won open source intelligence skills to sort through a deluge of cybersecurity information for clients and for subscribers of her free InfoSecSherpa news roundups.

In the latest WE’RE IN! episode, she speaks to the importance of having diverse perspectives at the table when it comes to cybersecurity and warns of a disconnect between tech hiring managers and HR departments.</itunes:subtitle>
      <itunes:keywords>job market, pentesting, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cf29bca3-57fd-4789-b8ef-4620b0e9a213</guid>
      <title>Beau Woods on Medical Device Security, Hacker Culture and Cyber Psychology</title>
      <description><![CDATA[<p>Beau Woods knows firsthand how every moment counts when it comes to medical cybersecurity. He launched his career in a hospital, where it wasn’t always possible for doctors to punch in complex passwords or spare a second thought for cybersecurity. Beau went on to found I Am the Cavalry, a group of cyber ambassadors dedicated to improving the security of devices ranging from pacemakers to connected door locks.</p><p>In his current role as senior advisor for the Cybersecurity and Infrastructure Security Agency, Beau helps fill gaps in U.S. cyber defenses by boosting organizations that may not have the resources or knowledge needed to secure critical connected equipment like insulin pumps.</p><p>“If you can get ahead of things and help them to build better procurement processes, help them to identify more securable technologies that have better business models, that will have  greater longevity, then you can stop the flow of inbound, insecurable devices and – over the next decade or two – eventually that cyber hygiene tide line can rise,” he said in this episode of WE’RE IN!</p><p>----------</p><p><strong>Here are a few more reasons to tune in:</strong></p><p>* Learn Beau’s tips for making cybersecurity issues more engaging, from gamification to building empathy</p><p>* Hear about his unconventional career path from psychology to security</p><p>* Build awareness on the state of healthcare cybersecurity and CISA’s role in government</p><p>----------</p><p><strong>Links:</strong></p><p><a href="https://www.cisa.gov/" target="_blank">* https://www.cisa.gov/</a><br /><a href="https://iamthecavalry.org/" target="_blank">* https://iamthecavalry.org/</a><br /><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a><br /><a href="https://readme.security/" target="_blank">* https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 21 Jul 2022 20:19:12 +0000</pubDate>
      <author>Beau Woods, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/beau-woods-on-medical-device-security-hacker-culture-and-cyber-psychology-LPVpPM5d</link>
      <content:encoded><![CDATA[<p>Beau Woods knows firsthand how every moment counts when it comes to medical cybersecurity. He launched his career in a hospital, where it wasn’t always possible for doctors to punch in complex passwords or spare a second thought for cybersecurity. Beau went on to found I Am the Cavalry, a group of cyber ambassadors dedicated to improving the security of devices ranging from pacemakers to connected door locks.</p><p>In his current role as senior advisor for the Cybersecurity and Infrastructure Security Agency, Beau helps fill gaps in U.S. cyber defenses by boosting organizations that may not have the resources or knowledge needed to secure critical connected equipment like insulin pumps.</p><p>“If you can get ahead of things and help them to build better procurement processes, help them to identify more securable technologies that have better business models, that will have  greater longevity, then you can stop the flow of inbound, insecurable devices and – over the next decade or two – eventually that cyber hygiene tide line can rise,” he said in this episode of WE’RE IN!</p><p>----------</p><p><strong>Here are a few more reasons to tune in:</strong></p><p>* Learn Beau’s tips for making cybersecurity issues more engaging, from gamification to building empathy</p><p>* Hear about his unconventional career path from psychology to security</p><p>* Build awareness on the state of healthcare cybersecurity and CISA’s role in government</p><p>----------</p><p><strong>Links:</strong></p><p><a href="https://www.cisa.gov/" target="_blank">* https://www.cisa.gov/</a><br /><a href="https://iamthecavalry.org/" target="_blank">* https://iamthecavalry.org/</a><br /><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a><br /><a href="https://readme.security/" target="_blank">* https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="39302446" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/29f6411f-9abe-4784-911d-074b5b38339f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=29f6411f-9abe-4784-911d-074b5b38339f&amp;feed=_SsyS46z"/>
      <itunes:title>Beau Woods on Medical Device Security, Hacker Culture and Cyber Psychology</itunes:title>
      <itunes:author>Beau Woods, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:40:56</itunes:duration>
      <itunes:summary>Beau Woods knows firsthand how every moment counts when it comes to medical cybersecurity. He launched his career in a hospital, where it wasn’t always possible for doctors to punch in complex passwords or spare a second thought for cybersecurity. Beau went on to found I Am the Cavalry, a group of cyber ambassadors dedicated to improving the security of devices ranging from pacemakers to connected door locks.

In his current role as senior advisor for the Cybersecurity and Infrastructure Security Agency, Beau helps fill gaps in U.S. cyber defenses by boosting organizations that may not have the resources or knowledge needed to secure critical connected equipment like insulin pumps.

“If you can get ahead of things and help them to build better procurement processes, help them to identify more securable technologies that have better business models, that will have  greater longevity, then you can stop the flow of inbound, insecurable devices and – over the next decade or two – eventually that cyber hygiene tide line can rise,” he said in this episode of WE’RE IN!</itunes:summary>
      <itunes:subtitle>Beau Woods knows firsthand how every moment counts when it comes to medical cybersecurity. He launched his career in a hospital, where it wasn’t always possible for doctors to punch in complex passwords or spare a second thought for cybersecurity. Beau went on to found I Am the Cavalry, a group of cyber ambassadors dedicated to improving the security of devices ranging from pacemakers to connected door locks.

In his current role as senior advisor for the Cybersecurity and Infrastructure Security Agency, Beau helps fill gaps in U.S. cyber defenses by boosting organizations that may not have the resources or knowledge needed to secure critical connected equipment like insulin pumps.

“If you can get ahead of things and help them to build better procurement processes, help them to identify more securable technologies that have better business models, that will have  greater longevity, then you can stop the flow of inbound, insecurable devices and – over the next decade or two – eventually that cyber hygiene tide line can rise,” he said in this episode of WE’RE IN!</itunes:subtitle>
      <itunes:keywords>cybersecurity, security, hacking, hacker</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">499e088c-d66c-4104-8df0-3c3cf99444b5</guid>
      <title>Robert M. Lee on Hacking Industrial Systems, Pay Transparency and Oysters</title>
      <description><![CDATA[<p>Dragos CEO and founder Robert M. Lee has been talking about cybersecurity risks to critical infrastructure long before threats to utility operators and water plants were making headlines. In this episode of WE'RE IN!, he discusses the ongoing dangers to the grid from nation-state hackers and ransomware gangs, but also the progress the U.S. is making to better secure its most vulnerable assets. And there's also a great conversation about pay transparency that anyone working in infosec will want to hear. </p><p> </p><p><strong>A few more reasons to listen:</strong></p><p>*It's a candid and sobering interview with one of the world's leading experts on industrial cybersecurity.</p><p>*You might be surprised how Dragos approaches pay transparency, hiring and job interviews. </p><p>*Better understand how critical infrastructure operators should approach cybersecurity differently from enterprise technology. </p><p> </p><p><strong>Key quotes:</strong></p><p>* "If you are an oil and gas pipeline or a manufacturing company, and you haven't had ransomware scenarios at a board level with an understanding of what you're doing specifically in OT, your liability and your lawsuit is going to be bad."<br /><br />* "One hundred percent of our engineers are in the United States. We don't outsource anything where they're related to our product, because if we're deploying software into nuclear power plants and similar, I'd like control of the supply chain."<br /><br />* "We've been talking about cyber at a presidential, international leader, board level for a long time. But they never knew they needed to differentiate between IT and OT. And now they're realizing all the resources have been spent on the non-revenue generating side of the business and they're going, "Holy crap! What's our OT cybersecurity strategy?"</p><p> </p><p><strong>Links:</strong></p><p>* <a href="https://www.dragos.com/" target="_blank">https://www.dragos.com/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><p><a href="https://readme.security/" target="_blank">* https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 3 Jun 2022 09:00:00 +0000</pubDate>
      <author>Rob Lee, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/robert-m-lee-on-hacking-industrial-systems-pay-transparency-and-oysters-uGABziKz</link>
      <content:encoded><![CDATA[<p>Dragos CEO and founder Robert M. Lee has been talking about cybersecurity risks to critical infrastructure long before threats to utility operators and water plants were making headlines. In this episode of WE'RE IN!, he discusses the ongoing dangers to the grid from nation-state hackers and ransomware gangs, but also the progress the U.S. is making to better secure its most vulnerable assets. And there's also a great conversation about pay transparency that anyone working in infosec will want to hear. </p><p> </p><p><strong>A few more reasons to listen:</strong></p><p>*It's a candid and sobering interview with one of the world's leading experts on industrial cybersecurity.</p><p>*You might be surprised how Dragos approaches pay transparency, hiring and job interviews. </p><p>*Better understand how critical infrastructure operators should approach cybersecurity differently from enterprise technology. </p><p> </p><p><strong>Key quotes:</strong></p><p>* "If you are an oil and gas pipeline or a manufacturing company, and you haven't had ransomware scenarios at a board level with an understanding of what you're doing specifically in OT, your liability and your lawsuit is going to be bad."<br /><br />* "One hundred percent of our engineers are in the United States. We don't outsource anything where they're related to our product, because if we're deploying software into nuclear power plants and similar, I'd like control of the supply chain."<br /><br />* "We've been talking about cyber at a presidential, international leader, board level for a long time. But they never knew they needed to differentiate between IT and OT. And now they're realizing all the resources have been spent on the non-revenue generating side of the business and they're going, "Holy crap! What's our OT cybersecurity strategy?"</p><p> </p><p><strong>Links:</strong></p><p>* <a href="https://www.dragos.com/" target="_blank">https://www.dragos.com/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><p><a href="https://readme.security/" target="_blank">* https://readme.security/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="59865620" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/6f546d46-6df5-415f-a3c3-31338bc9465b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=6f546d46-6df5-415f-a3c3-31338bc9465b&amp;feed=_SsyS46z"/>
      <itunes:title>Robert M. Lee on Hacking Industrial Systems, Pay Transparency and Oysters</itunes:title>
      <itunes:author>Rob Lee, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>01:02:21</itunes:duration>
      <itunes:summary>Dragos CEO and founder Robert M. Lee has been talking about cybersecurity risks to critical infrastructure long before threats to utility operators and water plants were making headlines. In this episode of WE&apos;RE IN!, he discusses the ongoing dangers to the grid from nation-state hackers and ransomware gangs, but also the progress the U.S. is making to better secure its most vulnerable assets. And there&apos;s also a great conversation about pay transparency that anyone working in infosec will want to hear. </itunes:summary>
      <itunes:subtitle>Dragos CEO and founder Robert M. Lee has been talking about cybersecurity risks to critical infrastructure long before threats to utility operators and water plants were making headlines. In this episode of WE&apos;RE IN!, he discusses the ongoing dangers to the grid from nation-state hackers and ransomware gangs, but also the progress the U.S. is making to better secure its most vulnerable assets. And there&apos;s also a great conversation about pay transparency that anyone working in infosec will want to hear. </itunes:subtitle>
      <itunes:keywords>ransomware, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5b5447a9-5ed0-41bb-b484-f5ebbadfe67a</guid>
      <title>Jim Manico on Secure Coding, OWASP and Being a Decent Human</title>
      <description><![CDATA[<p>Jim Manico is full of opinions. The founder of Manicode Security has advice on how to use the OWASP Top 10, on secure coding and especially on the OWASP Application Security Verification Standard (ASVS). He has advice for people starting out in security and all around thoughts on what it means to be a decent person. Jim is definitely one of those! He's also an educator, author, investor and entrepreneur. There are so many reasons to listen to this episode. Here are just a few: </p><p>* Hear from one of the leading educators focused on helping developers code securely. </p><p>* Learn more about all the important projects and initiatives happening at OWASP.</p><p>* Get Jim's perspective on how organizations can best implement DevSecOps. </p><p> </p><p><strong>Key quotes: </strong></p><p>* "Honestly, you shouldn't be basing a security program on the OWASP Top 10. The Top 10 is meant for one purpose only: awareness. This is not just my opinion. This is actually codified in the introduction of the Top 10."</p><p>* "Being a decent human being, being a community supporter, trying to help people out, giving free talks: you can call it being a decent person, but it's also a good life and business strategy."</p><p>* "Learn how to f-ing code. And you don't have to be an expert at it. You don't have to be a software engineer, but if you're an IT professional and you don't even understand the basics of coding, it's going to limit your capability because the best pentesters I know write scripts."</p><p> </p><p><strong>Related links:</strong></p><p><a href="https://manicode.com/" target="_blank">* https://manicode.com/</a></p><p><a href="https://owasp.org/www-project-top-ten/" target="_blank">* https://owasp.org/www-project-top-ten/</a></p><p><a href="https://owasp.org/www-project-application-security-verification-standard/" target="_blank">* https://owasp.org/www-project-application-security-verification-standard/</a><br /><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 3 May 2022 23:13:01 +0000</pubDate>
      <author>Jim Manico, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/jim-manico-on-secure-coding-owasp-and-being-a-decent-human-aL4J7odl</link>
      <content:encoded><![CDATA[<p>Jim Manico is full of opinions. The founder of Manicode Security has advice on how to use the OWASP Top 10, on secure coding and especially on the OWASP Application Security Verification Standard (ASVS). He has advice for people starting out in security and all around thoughts on what it means to be a decent person. Jim is definitely one of those! He's also an educator, author, investor and entrepreneur. There are so many reasons to listen to this episode. Here are just a few: </p><p>* Hear from one of the leading educators focused on helping developers code securely. </p><p>* Learn more about all the important projects and initiatives happening at OWASP.</p><p>* Get Jim's perspective on how organizations can best implement DevSecOps. </p><p> </p><p><strong>Key quotes: </strong></p><p>* "Honestly, you shouldn't be basing a security program on the OWASP Top 10. The Top 10 is meant for one purpose only: awareness. This is not just my opinion. This is actually codified in the introduction of the Top 10."</p><p>* "Being a decent human being, being a community supporter, trying to help people out, giving free talks: you can call it being a decent person, but it's also a good life and business strategy."</p><p>* "Learn how to f-ing code. And you don't have to be an expert at it. You don't have to be a software engineer, but if you're an IT professional and you don't even understand the basics of coding, it's going to limit your capability because the best pentesters I know write scripts."</p><p> </p><p><strong>Related links:</strong></p><p><a href="https://manicode.com/" target="_blank">* https://manicode.com/</a></p><p><a href="https://owasp.org/www-project-top-ten/" target="_blank">* https://owasp.org/www-project-top-ten/</a></p><p><a href="https://owasp.org/www-project-application-security-verification-standard/" target="_blank">* https://owasp.org/www-project-application-security-verification-standard/</a><br /><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="47442037" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/9d36d466-1a36-466b-a89c-3d422897cf57/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=9d36d466-1a36-466b-a89c-3d422897cf57&amp;feed=_SsyS46z"/>
      <itunes:title>Jim Manico on Secure Coding, OWASP and Being a Decent Human</itunes:title>
      <itunes:author>Jim Manico, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:49:25</itunes:duration>
      <itunes:summary>Jim Manico is full of opinions. The founder of Manicode Security has advice on how to use the OWASP Top 10, on secure coding and especially on the OWASP Application Security Verification Standard (ASVS). He has advice for people starting out in security and all around thoughts on what it means to be a decent person. Jim is definitely one of those! He&apos;s also an educator, author, investor and entrepreneur. There are so many reasons to listen to this episode. Here are just a few: 

* Hear from one of the leading educators focused on helping developers code securely. 
* Learn more about all the important projects and initiatives happening at OWASP.
* Get Jim&apos;s perspective on how organizations can best implement DevSecOps. </itunes:summary>
      <itunes:subtitle>Jim Manico is full of opinions. The founder of Manicode Security has advice on how to use the OWASP Top 10, on secure coding and especially on the OWASP Application Security Verification Standard (ASVS). He has advice for people starting out in security and all around thoughts on what it means to be a decent person. Jim is definitely one of those! He&apos;s also an educator, author, investor and entrepreneur. There are so many reasons to listen to this episode. Here are just a few: 

* Hear from one of the leading educators focused on helping developers code securely. 
* Learn more about all the important projects and initiatives happening at OWASP.
* Get Jim&apos;s perspective on how organizations can best implement DevSecOps. </itunes:subtitle>
      <itunes:keywords>pen testing, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">95d3072a-b767-4363-857e-3204c7ba55e2</guid>
      <title>Alex Holden on Russia&apos;s Cyber Arsenal, Conti Leaks and Infiltrating Ransomware Gangs</title>
      <description><![CDATA[<p>Alex Holden has a knack for tracking Russian cyber criminals. The Ukrainian-born cybersecurity expert understands what it takes to infiltrate ransomware outfits, learn their secrets and help organizations protect themselves against their tactics. Beyond that, his firm is responsible for detecting some of the biggest breaches in recent history. In this episode, Alex talks about his approach to tracking the world's most notorious criminal hackers, the current cyber threat in Eastern Europe and his own journey from Kyiv to the American midwest. </p><p><strong>Why should listen:</strong></p><p>* Get the inside story of how the Conti ransomware gang and other Eastern European cybercrime syndicates operate.</p><p>* Hear about how the current Ukrainian War could shift the cyber threat landscape.</p><p>* Discover how one of the leading threat intelligence researchers uncovered some of the biggest data breaches in history.</p><p><strong>Key quotes:</strong></p><p>* "Russia knows how to wage cyber warfare. And they continuously keep showing us that they can ... So I think Russia is in [a] very powerful position to flex their cyber muscle to do damage."</p><p>* "We are watching a huge change in the cybersecurity threat landscape in Eastern Europe. Ukrainian cybercrime is not dead. They're still doing certain things in the western part of Ukraine. Some of them are moving into Eastern Europe ... The same is happening in Russia. Cyber criminals are afraid that the recent crackdown of the Russian government against them will continue." </p><p>* "If you are at all interested in threat intelligence or in cybersecurity, I would recommend sitting down and reading [the Conti leaks] because you're going to see how the real criminals work, how they think, how they evolve and how the everyday gang works."</p><p><strong>Links:</strong></p><p><a href="https://holdsecurity.com/" target="_blank">* https://holdsecurity.com/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 21 Apr 2022 20:55:36 +0000</pubDate>
      <author>Alex Holden, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/alex-holden-on-russias-cyber-arsenal-conti-leaks-and-infiltrating-ransomware-gangs-i4noy7U5</link>
      <content:encoded><![CDATA[<p>Alex Holden has a knack for tracking Russian cyber criminals. The Ukrainian-born cybersecurity expert understands what it takes to infiltrate ransomware outfits, learn their secrets and help organizations protect themselves against their tactics. Beyond that, his firm is responsible for detecting some of the biggest breaches in recent history. In this episode, Alex talks about his approach to tracking the world's most notorious criminal hackers, the current cyber threat in Eastern Europe and his own journey from Kyiv to the American midwest. </p><p><strong>Why should listen:</strong></p><p>* Get the inside story of how the Conti ransomware gang and other Eastern European cybercrime syndicates operate.</p><p>* Hear about how the current Ukrainian War could shift the cyber threat landscape.</p><p>* Discover how one of the leading threat intelligence researchers uncovered some of the biggest data breaches in history.</p><p><strong>Key quotes:</strong></p><p>* "Russia knows how to wage cyber warfare. And they continuously keep showing us that they can ... So I think Russia is in [a] very powerful position to flex their cyber muscle to do damage."</p><p>* "We are watching a huge change in the cybersecurity threat landscape in Eastern Europe. Ukrainian cybercrime is not dead. They're still doing certain things in the western part of Ukraine. Some of them are moving into Eastern Europe ... The same is happening in Russia. Cyber criminals are afraid that the recent crackdown of the Russian government against them will continue." </p><p>* "If you are at all interested in threat intelligence or in cybersecurity, I would recommend sitting down and reading [the Conti leaks] because you're going to see how the real criminals work, how they think, how they evolve and how the everyday gang works."</p><p><strong>Links:</strong></p><p><a href="https://holdsecurity.com/" target="_blank">* https://holdsecurity.com/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="45041862" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/addbcc66-95c9-40d6-b80b-c9075f5ecc44/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=addbcc66-95c9-40d6-b80b-c9075f5ecc44&amp;feed=_SsyS46z"/>
      <itunes:title>Alex Holden on Russia&apos;s Cyber Arsenal, Conti Leaks and Infiltrating Ransomware Gangs</itunes:title>
      <itunes:author>Alex Holden, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:46:55</itunes:duration>
      <itunes:summary>Alex Holden has a knack for tracking Russian cyber criminals. The Ukrainian-born cybersecurity expert understands what it takes to infiltrate ransomware outfits, learn their secrets and help organizations protect themselves against their tactics. Beyond that, his firm is responsible for detecting some of the biggest breaches in recent history. In this episode, Alex talks about his approach to tracking the world&apos;s most notorious criminal hackers, the current cyber threat in Eastern Europe and his own journey from Kyiv to the American midwest. </itunes:summary>
      <itunes:subtitle>Alex Holden has a knack for tracking Russian cyber criminals. The Ukrainian-born cybersecurity expert understands what it takes to infiltrate ransomware outfits, learn their secrets and help organizations protect themselves against their tactics. Beyond that, his firm is responsible for detecting some of the biggest breaches in recent history. In this episode, Alex talks about his approach to tracking the world&apos;s most notorious criminal hackers, the current cyber threat in Eastern Europe and his own journey from Kyiv to the American midwest. </itunes:subtitle>
      <itunes:keywords>cyber warfare, cybersecurity, hacking, ukraine, russia</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3f42d142-696b-4b77-bb8e-a13f45e5edc9</guid>
      <title>Hacking for Ukraine, Supply Chain Risk and Cyber Moonshots</title>
      <description><![CDATA[<p>There's a flood of cybersecurity news as a result of the Ukraine War as well as Washington's recent efforts to compel organizations to report cyberattacks to federal officials. In this episode, Trey Herr and Emma Schroeder of the Atlantic Council’s Cyber Statecraft Initiative break it all down. They explore the consequences of an escalating digital battlefield in Europe, whether a hack could bring NATO into the war and strategies for creating more consensus within the tangled and complicated realm of cyber policy. </p><p> </p><p><strong>Why you should listen:</strong></p><p>* Understand what's at stake as cyber warriors do battle on both sides of the the Ukraine War. </p><p>* Lean about some potential consequences of a destructive hack in Europe and whether that could even draw NATO into the war.</p><p>* Hear what Washington is doing to obtain better insights and actionable intelligence that could improve cybersecurity defenses.  </p><p> </p><p><strong>Key quotes:</strong></p><p>* "Cybersecurity generally is not a good state of affairs. So I think we are going to see some regulatory changes that make it much harder for certain classes of companies to operate because they've grown up around this inefficient system."<br />* "The physical military invasion [into Ukraine] has not necessitated sophisticated cyber support from the Russians. What's been more important in the information space is misinformation [and] disinformation."<br />*  "You've got a lot of [outside hackers] tripping over systems to try to find some kind of way in to do something. And the challenge is that's not really strategic. You don't have any of these groups plugged into the target selection and intelligence collection processes that Western agencies have."</p><p><br /><strong>Links:</strong></p><p><a href="https://www.atlanticcouncil.org/" target="_blank">* https://www.atlanticcouncil.org/</a></p><p><a href="https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/cyber-statecraft-initiative/" target="_blank">* https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/cyber-statecraft-initiative/</a></p><p><a href="https://www.atlanticcouncil.org/thecybermoonshot/" target="_blank">* https://www.atlanticcouncil.org/thecybermoonshot/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 1 Apr 2022 09:00:00 +0000</pubDate>
      <author>Trey Herr, Emma Schroeder, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/hacking-for-ukraine-supply-chain-risk-and-cyber-moonshots-HvSHglH2</link>
      <content:encoded><![CDATA[<p>There's a flood of cybersecurity news as a result of the Ukraine War as well as Washington's recent efforts to compel organizations to report cyberattacks to federal officials. In this episode, Trey Herr and Emma Schroeder of the Atlantic Council’s Cyber Statecraft Initiative break it all down. They explore the consequences of an escalating digital battlefield in Europe, whether a hack could bring NATO into the war and strategies for creating more consensus within the tangled and complicated realm of cyber policy. </p><p> </p><p><strong>Why you should listen:</strong></p><p>* Understand what's at stake as cyber warriors do battle on both sides of the the Ukraine War. </p><p>* Lean about some potential consequences of a destructive hack in Europe and whether that could even draw NATO into the war.</p><p>* Hear what Washington is doing to obtain better insights and actionable intelligence that could improve cybersecurity defenses.  </p><p> </p><p><strong>Key quotes:</strong></p><p>* "Cybersecurity generally is not a good state of affairs. So I think we are going to see some regulatory changes that make it much harder for certain classes of companies to operate because they've grown up around this inefficient system."<br />* "The physical military invasion [into Ukraine] has not necessitated sophisticated cyber support from the Russians. What's been more important in the information space is misinformation [and] disinformation."<br />*  "You've got a lot of [outside hackers] tripping over systems to try to find some kind of way in to do something. And the challenge is that's not really strategic. You don't have any of these groups plugged into the target selection and intelligence collection processes that Western agencies have."</p><p><br /><strong>Links:</strong></p><p><a href="https://www.atlanticcouncil.org/" target="_blank">* https://www.atlanticcouncil.org/</a></p><p><a href="https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/cyber-statecraft-initiative/" target="_blank">* https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/cyber-statecraft-initiative/</a></p><p><a href="https://www.atlanticcouncil.org/thecybermoonshot/" target="_blank">* https://www.atlanticcouncil.org/thecybermoonshot/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="47020734" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/44556a53-2f98-47e1-9711-94fdf98f8b2f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=44556a53-2f98-47e1-9711-94fdf98f8b2f&amp;feed=_SsyS46z"/>
      <itunes:title>Hacking for Ukraine, Supply Chain Risk and Cyber Moonshots</itunes:title>
      <itunes:author>Trey Herr, Emma Schroeder, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:48:58</itunes:duration>
      <itunes:summary>There&apos;s a flood of cybersecurity news as a result of the Ukraine War as well as Washington&apos;s recent efforts to compel organizations to report cyberattacks to federal officials. In this episode, Trey Herr and Emma Schroeder of the Atlantic Council’s Cyber Statecraft Initiative break it all down. They explore the consequences of an escalating digital battlefield in Europe, whether a hack could bring NATO into the war and strategies for creating more consensus within the tangled and complicated realm of cyber policy. </itunes:summary>
      <itunes:subtitle>There&apos;s a flood of cybersecurity news as a result of the Ukraine War as well as Washington&apos;s recent efforts to compel organizations to report cyberattacks to federal officials. In this episode, Trey Herr and Emma Schroeder of the Atlantic Council’s Cyber Statecraft Initiative break it all down. They explore the consequences of an escalating digital battlefield in Europe, whether a hack could bring NATO into the war and strategies for creating more consensus within the tangled and complicated realm of cyber policy. </itunes:subtitle>
      <itunes:keywords>supply chain, hacking, ukraine</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">52f19f96-5d62-41a1-ba8a-4659d979ca8f</guid>
      <title>Gabriella Coleman on Anonymous, Hacker History and the Evolution of Infosec</title>
      <description><![CDATA[<p>Gabriella Coleman, a Harvard University anthropology professor, describes how she immersed  herself in hacker culture and eventually became embedded in the shadowy and mercurial world of Anonymous, the hacktivist collective she chronicled in her 2015 book, "Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous." This is such a fascinating episode that explores the often misunderstood history of hacking and how many in this community went from outside agitators to mainstream security researchers.</p><p>-------</p><p><strong>Why you should listen:</strong></p><p>* Get a better understanding of the history of Anonymous and the role it played in shaping online protests and whistleblowing.</p><p>* Hear about some of the earliest hacking communities such as the free software hackers and efforts to archive their early writings and magazines.</p><p>* Get an anthropological perspective on how hackers have evolved from the fringes of the tech world to among the most influential voices in cybersecurity.</p><p>-------</p><p><strong>Key quotes: </strong></p><p>* "There's now a new narrative that there was a single founder of Anonymous, the trolls and the early hacktivists. And that's just wrong in terms of historical record."</p><p>* "I'm not surprised that hackers were at the forefront of establishing the protocols for the security industry."</p><p>* "The moment you cower, the moment you're not willing to speak up, that's the minute that I think ... the hacker spirit is dead and can't be effective in initiating change."</p><p>-------</p><p><strong>Links:</strong><br /><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a><br /><a href="https://gabriellacoleman.org/" target="_blank">* https://gabriellacoleman.org/</a><br /><a href="https://datasociety.net/library/wearing-many-hats-the-rise-of-the-professional-security-hacker/" target="_blank">* https://datasociety.net/library/wearing-many-hats-the-rise-of-the-professional-security-hacker/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 8 Mar 2022 18:54:24 +0000</pubDate>
      <author>Gabriella Coleman, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/gabriella-coleman-on-anonymous-hacker-history-and-the-evolution-of-infosec-t7Kr3zax</link>
      <content:encoded><![CDATA[<p>Gabriella Coleman, a Harvard University anthropology professor, describes how she immersed  herself in hacker culture and eventually became embedded in the shadowy and mercurial world of Anonymous, the hacktivist collective she chronicled in her 2015 book, "Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous." This is such a fascinating episode that explores the often misunderstood history of hacking and how many in this community went from outside agitators to mainstream security researchers.</p><p>-------</p><p><strong>Why you should listen:</strong></p><p>* Get a better understanding of the history of Anonymous and the role it played in shaping online protests and whistleblowing.</p><p>* Hear about some of the earliest hacking communities such as the free software hackers and efforts to archive their early writings and magazines.</p><p>* Get an anthropological perspective on how hackers have evolved from the fringes of the tech world to among the most influential voices in cybersecurity.</p><p>-------</p><p><strong>Key quotes: </strong></p><p>* "There's now a new narrative that there was a single founder of Anonymous, the trolls and the early hacktivists. And that's just wrong in terms of historical record."</p><p>* "I'm not surprised that hackers were at the forefront of establishing the protocols for the security industry."</p><p>* "The moment you cower, the moment you're not willing to speak up, that's the minute that I think ... the hacker spirit is dead and can't be effective in initiating change."</p><p>-------</p><p><strong>Links:</strong><br /><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a><br /><a href="https://gabriellacoleman.org/" target="_blank">* https://gabriellacoleman.org/</a><br /><a href="https://datasociety.net/library/wearing-many-hats-the-rise-of-the-professional-security-hacker/" target="_blank">* https://datasociety.net/library/wearing-many-hats-the-rise-of-the-professional-security-hacker/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="49476409" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/157e0b08-6c43-4478-af29-bc23c001aed3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=157e0b08-6c43-4478-af29-bc23c001aed3&amp;feed=_SsyS46z"/>
      <itunes:title>Gabriella Coleman on Anonymous, Hacker History and the Evolution of Infosec</itunes:title>
      <itunes:author>Gabriella Coleman, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:51:32</itunes:duration>
      <itunes:summary>Gabriella Coleman, a Harvard University anthropology professor, describes how she immersed  herself in hacker culture and eventually became embedded in the shadowy and mercurial world of Anonymous, the hacktivist collective she chronicled in her 2015 book, &quot;Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous.&quot; This is such a fascinating episode that explores the often misunderstood history of hacking and how many in this community went from outside agitators to mainstream security researchers.</itunes:summary>
      <itunes:subtitle>Gabriella Coleman, a Harvard University anthropology professor, describes how she immersed  herself in hacker culture and eventually became embedded in the shadowy and mercurial world of Anonymous, the hacktivist collective she chronicled in her 2015 book, &quot;Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous.&quot; This is such a fascinating episode that explores the often misunderstood history of hacking and how many in this community went from outside agitators to mainstream security researchers.</itunes:subtitle>
      <itunes:keywords>anonymous, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7d3532cf-dae8-4eab-ba87-ad0a7dfb13fc</guid>
      <title>Micah Hoffman Breaks Down OSINT, the Dark Web and Beer Apps</title>
      <description><![CDATA[<p>In this episode, Micah Hoffman talks about his career in Open Source Intelligence (OSINT) and the value it has for investigations, cybersecurity and understanding how information is weaponized. He also gets into strategies for safeguarding personal privacy in the face of increasing digital surveillance. This episode will have you thinking twice about what you post on social media!</p><p><br /><strong>Why you should listen:</strong><br />* Hear from one of the leading Open Source Intelligence researchers working today.<br />* Learn about the value of OSINT for offensive and defensive cybersecurity.<br />* Get a better understanding of all the privacy risks from fitness trackers, apps, shopping online and social media.  <br /><br /><strong>Key quotes:</strong></p><p>* "OSINT is a reconnaissance skill. It's all about that preparation work that needs to be done before you do anything in cyber, whether it's attacking or defending."  </p><p>* "Once things are on the internet -- or once things are even collected, not necessarily on the internet -- you've lost control of it."<br />* "The reality is that we give up our privacy every single time we use an app, every single time we choose to purchase something."</p><p><strong>Links:</strong></p><p><a href="https://www.spotlight-infosec.com/" target="_blank">* https://www.spotlight-infosec.com/</a></p><p><a href="https://osintcurio.us/" target="_blank">* https://osintcurio.us/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 8 Feb 2022 00:35:07 +0000</pubDate>
      <author>Micah Hoffman, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/micah-hoffman-breaks-down-osint-the-dark-web-and-beer-apps-ZdhGQjH3</link>
      <content:encoded><![CDATA[<p>In this episode, Micah Hoffman talks about his career in Open Source Intelligence (OSINT) and the value it has for investigations, cybersecurity and understanding how information is weaponized. He also gets into strategies for safeguarding personal privacy in the face of increasing digital surveillance. This episode will have you thinking twice about what you post on social media!</p><p><br /><strong>Why you should listen:</strong><br />* Hear from one of the leading Open Source Intelligence researchers working today.<br />* Learn about the value of OSINT for offensive and defensive cybersecurity.<br />* Get a better understanding of all the privacy risks from fitness trackers, apps, shopping online and social media.  <br /><br /><strong>Key quotes:</strong></p><p>* "OSINT is a reconnaissance skill. It's all about that preparation work that needs to be done before you do anything in cyber, whether it's attacking or defending."  </p><p>* "Once things are on the internet -- or once things are even collected, not necessarily on the internet -- you've lost control of it."<br />* "The reality is that we give up our privacy every single time we use an app, every single time we choose to purchase something."</p><p><strong>Links:</strong></p><p><a href="https://www.spotlight-infosec.com/" target="_blank">* https://www.spotlight-infosec.com/</a></p><p><a href="https://osintcurio.us/" target="_blank">* https://osintcurio.us/</a></p><p><a href="https://www.synack.com/" target="_blank">* https://www.synack.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="53888804" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/12d3e784-a0ce-4827-9993-6f6c3a120e77/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=12d3e784-a0ce-4827-9993-6f6c3a120e77&amp;feed=_SsyS46z"/>
      <itunes:title>Micah Hoffman Breaks Down OSINT, the Dark Web and Beer Apps</itunes:title>
      <itunes:author>Micah Hoffman, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:56:08</itunes:duration>
      <itunes:summary>In this episode, Micah Hoffman talks about his career in Open Source Intelligence (OSINT) and the value it has for investigations, cybersecurity and understanding how information is weaponized. He also gets into strategies for safeguarding personal privacy in the face of increasing digital surveillance. This episode will have you thinking twice about what you post on social media!</itunes:summary>
      <itunes:subtitle>In this episode, Micah Hoffman talks about his career in Open Source Intelligence (OSINT) and the value it has for investigations, cybersecurity and understanding how information is weaponized. He also gets into strategies for safeguarding personal privacy in the face of increasing digital surveillance. This episode will have you thinking twice about what you post on social media!</itunes:subtitle>
      <itunes:keywords>digital surveillance, cybersecurity, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0b59a413-a484-4105-84c0-46c9f332c725</guid>
      <title>Nicolas Chaillan takes on the Pentagon, China and TikTok</title>
      <description><![CDATA[<p>Nicolas Chaillan, former Air Force Chief Software Officer, resigned from the DoD over frustrations with what he called a lack of innovation, collaboration and agility. He gets into those issues and talks about how the U.S. can invest more in technology to compete with China in artificial intelligence and cybersecurity.  </p><p>---------</p><p><strong>Why you should listen:</strong></p><p>* Nicolas offers a candid and controversial view of the military's approach to the growing technological threat from China.</p><p>* He outlines his view for a Pentagon that is more agile, collaborative and competitive. </p><p>* Hear from a former DoD insider about some of the institutional barriers that can hinder innovation and software advancements.  </p><p>---------</p><p><strong>Key quotes:</strong></p><p>* "In 10, 15, 20 years from now, America as we know it and the value we have and the freedom we enjoy will be at risk of going away if China dominates in AI like they are doing now."</p><p>* "TikTok is effectively an intelligence weapon of China on US citizens right now."</p><p>* "We don't see a lot of training and implementation of Agile at all in the DoD, which really leads to the inability to move at the pace of relevance and tremendous waste of taxpayer money."</p><p>---------</p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://www.linkedin.com/in/nicolaschaillan/" target="_blank">https://www.linkedin.com/in/nicolaschaillan/</a></p><p>* <a href="https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/" target="_blank">https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/</a></p><p>* <a href="https://ama.preventbreach.com/register" target="_blank">https://ama.preventbreach.com/register</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 19 Jan 2022 10:00:00 +0000</pubDate>
      <author>Nicolas Chaillan, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/nicolas-chaillan-takes-on-the-pentagon-china-and-tiktok-2FO0XZ5o</link>
      <content:encoded><![CDATA[<p>Nicolas Chaillan, former Air Force Chief Software Officer, resigned from the DoD over frustrations with what he called a lack of innovation, collaboration and agility. He gets into those issues and talks about how the U.S. can invest more in technology to compete with China in artificial intelligence and cybersecurity.  </p><p>---------</p><p><strong>Why you should listen:</strong></p><p>* Nicolas offers a candid and controversial view of the military's approach to the growing technological threat from China.</p><p>* He outlines his view for a Pentagon that is more agile, collaborative and competitive. </p><p>* Hear from a former DoD insider about some of the institutional barriers that can hinder innovation and software advancements.  </p><p>---------</p><p><strong>Key quotes:</strong></p><p>* "In 10, 15, 20 years from now, America as we know it and the value we have and the freedom we enjoy will be at risk of going away if China dominates in AI like they are doing now."</p><p>* "TikTok is effectively an intelligence weapon of China on US citizens right now."</p><p>* "We don't see a lot of training and implementation of Agile at all in the DoD, which really leads to the inability to move at the pace of relevance and tremendous waste of taxpayer money."</p><p>---------</p><p>* <a href="https://www.synack.com/" target="_blank">https://www.synack.com/</a></p><p>* <a href="https://www.linkedin.com/in/nicolaschaillan/" target="_blank">https://www.linkedin.com/in/nicolaschaillan/</a></p><p>* <a href="https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/" target="_blank">https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/</a></p><p>* <a href="https://ama.preventbreach.com/register" target="_blank">https://ama.preventbreach.com/register</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="41013153" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/be4092a1-6a24-4853-9d67-2edc64d23ba0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=be4092a1-6a24-4853-9d67-2edc64d23ba0&amp;feed=_SsyS46z"/>
      <itunes:title>Nicolas Chaillan takes on the Pentagon, China and TikTok</itunes:title>
      <itunes:author>Nicolas Chaillan, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:42:43</itunes:duration>
      <itunes:summary>Nicolas Chaillan, former Air Force Chief Software Officer, resigned from the DoD over frustrations with what he called a lack of innovation, collaboration and agility. He gets into those issues and talks about how the U.S. can invest more in technology to compete with China in artificial intelligence and cybersecurity.  </itunes:summary>
      <itunes:subtitle>Nicolas Chaillan, former Air Force Chief Software Officer, resigned from the DoD over frustrations with what he called a lack of innovation, collaboration and agility. He gets into those issues and talks about how the U.S. can invest more in technology to compete with China in artificial intelligence and cybersecurity.  </itunes:subtitle>
      <itunes:keywords>pentagon, cybersecurity, hacking, china</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">31a4a8a1-565b-42dc-82f6-80bfdfebec95</guid>
      <title>Phillip Wylie on Bear Wrestling, Pentesting and Understanding the Adversary</title>
      <description><![CDATA[<p>In this episode, Phillip Wylie talks about his journey from pro wrestling to pentesting and what motivated him to start teaching, mentoring and giving back to the infosec community. It's an inspirational story for veterans in the field and newbies alike. Phillip not only talks about his work helping others get started in ethical hacking, but the value of truly understanding the mind of the adversary. </p><p>-------</p><p><strong>Why you should listen:</strong></p><p>* Phllip's story is both educational and inspirational -- worthwhile for anyone interested or involved in cybersecurity. </p><p>* Learn something from one of the most prolific cybersecurity speakers and educators. </p><p>* Get a better understanding of ethical hacking and the value of offensive security testing.</p><p>-------</p><p><strong>Key quotes:</strong></p><p>* "Once you learn how to pentest, your whole world changes."</p><p>* "For people that have been in the industry for a while, listen to the new folks. I learned a lot from my students."</p><p>* "If you can help people succeed, that's even more rewarding than personal success."</p><p>-------</p><p><strong>Links:</strong></p><p>* <a href="http://www.synack.com/" target="_blank">www.synack.com</a></p><p>* <a href="https://twitter.com/PhillipWylie" target="_blank">https://twitter.com/PhillipWylie</a></p><p>* <a href="https://www.youtube.com/c/ThePwnSchoolProject" target="_blank">https://www.youtube.com/c/ThePwnSchoolProject</a></p><p>* <a href="https://www.itspmagazine.com/the-hacker-factory-podcast" target="_blank">https://www.itspmagazine.com/the-hacker-factory-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 23 Dec 2021 17:04:13 +0000</pubDate>
      <author>Jeremiah Roe, Phillip Wylie, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/phillip-wylie-on-bear-wrestling-pentesting-and-understanding-the-adversary-BcMZjYta</link>
      <content:encoded><![CDATA[<p>In this episode, Phillip Wylie talks about his journey from pro wrestling to pentesting and what motivated him to start teaching, mentoring and giving back to the infosec community. It's an inspirational story for veterans in the field and newbies alike. Phillip not only talks about his work helping others get started in ethical hacking, but the value of truly understanding the mind of the adversary. </p><p>-------</p><p><strong>Why you should listen:</strong></p><p>* Phllip's story is both educational and inspirational -- worthwhile for anyone interested or involved in cybersecurity. </p><p>* Learn something from one of the most prolific cybersecurity speakers and educators. </p><p>* Get a better understanding of ethical hacking and the value of offensive security testing.</p><p>-------</p><p><strong>Key quotes:</strong></p><p>* "Once you learn how to pentest, your whole world changes."</p><p>* "For people that have been in the industry for a while, listen to the new folks. I learned a lot from my students."</p><p>* "If you can help people succeed, that's even more rewarding than personal success."</p><p>-------</p><p><strong>Links:</strong></p><p>* <a href="http://www.synack.com/" target="_blank">www.synack.com</a></p><p>* <a href="https://twitter.com/PhillipWylie" target="_blank">https://twitter.com/PhillipWylie</a></p><p>* <a href="https://www.youtube.com/c/ThePwnSchoolProject" target="_blank">https://www.youtube.com/c/ThePwnSchoolProject</a></p><p>* <a href="https://www.itspmagazine.com/the-hacker-factory-podcast" target="_blank">https://www.itspmagazine.com/the-hacker-factory-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="39183328" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/aa73dc68-861c-4a4d-ac4a-75c4a95626b9/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=aa73dc68-861c-4a4d-ac4a-75c4a95626b9&amp;feed=_SsyS46z"/>
      <itunes:title>Phillip Wylie on Bear Wrestling, Pentesting and Understanding the Adversary</itunes:title>
      <itunes:author>Jeremiah Roe, Phillip Wylie, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:40:48</itunes:duration>
      <itunes:summary>In this episode, Phillip Wylie talks about his journey from pro wrestling to pentesting and what motivated him to start teaching, mentoring and giving back to the infosec community. It&apos;s an inspirational story for veterans in the field and newbies alike. Phillip not only talks about his work helping others get started in ethical hacking, but the value of truly understanding the mind of the adversary. </itunes:summary>
      <itunes:subtitle>In this episode, Phillip Wylie talks about his journey from pro wrestling to pentesting and what motivated him to start teaching, mentoring and giving back to the infosec community. It&apos;s an inspirational story for veterans in the field and newbies alike. Phillip not only talks about his work helping others get started in ethical hacking, but the value of truly understanding the mind of the adversary. </itunes:subtitle>
      <itunes:keywords>pentesting, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c11b1873-39ae-4e5f-a07d-ee690f3b5674</guid>
      <title>Kim Zetter on Election Security, Stuxnet and Substack</title>
      <description><![CDATA[<p>Kim Zetter is a former staff writer at WIRED and author of the seminal cybersecurity book “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.” Her work has appeared in The New York Times, POLITICO, The Washington Post and regularly in her Substack newsletter, “Zero Day.” In this episode, Kim talks about her approach to reporting, what sparked her Stuxnet investigation and how the discovery of that malware fundamentally altered our global cybersecurity conversation.<br /><br /><strong>Why you should listen:</strong></p><p>* Hear from one of the most influential and knowledgeable journalists writing about cybersecurity today.<br />* Get her take on some of the biggest security stories of 2021 such as Colonial Pipeline and the Pegasus Project.<br />* Learn more about the key policy debates around election security and critical infrastructure protections.<br /><br /><strong>Key Quotes:</strong><br />* “Stuxnet really helped shine a light on industrial control systems as a target.”<br />* “We focus too much on the stuff that makes the headlines and completely ignore the innocuous things that you’re downloading onto your phone .... Those things are spying on you, as well.”<br />* “The Obama administration was the first administration to [make] cyber a priority, but they didn't really put critical infrastructure as a priority in the sense of using the government's weight to force security on critical infrastructure. We're actually only seeing that in this last year … in the wake of Colonial Pipeline.”<br />* “When we saw Russia trying to interfere in 2016, that woke up DHS that someone, somewhere needed to have some kind of influence over election officials.”</p><p><strong>Links:</strong></p><p>* <a href="http://www.synack.com/" target="_blank">www.synack.com</a></p><p>* <a href="https://zetter.substack.com/" target="_blank">https://zetter.substack.com/</a><br />* <a href="https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html" target="_blank">https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 10 Dec 2021 10:00:00 +0000</pubDate>
      <author>Bella DeShantz-Cook, Jeremiah Roe, Kim Zetter</author>
      <link>https://were-in.simplecast.com/episodes/kim-zetter-on-election-security-stuxnet-and-substack-ckOugqYE</link>
      <content:encoded><![CDATA[<p>Kim Zetter is a former staff writer at WIRED and author of the seminal cybersecurity book “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.” Her work has appeared in The New York Times, POLITICO, The Washington Post and regularly in her Substack newsletter, “Zero Day.” In this episode, Kim talks about her approach to reporting, what sparked her Stuxnet investigation and how the discovery of that malware fundamentally altered our global cybersecurity conversation.<br /><br /><strong>Why you should listen:</strong></p><p>* Hear from one of the most influential and knowledgeable journalists writing about cybersecurity today.<br />* Get her take on some of the biggest security stories of 2021 such as Colonial Pipeline and the Pegasus Project.<br />* Learn more about the key policy debates around election security and critical infrastructure protections.<br /><br /><strong>Key Quotes:</strong><br />* “Stuxnet really helped shine a light on industrial control systems as a target.”<br />* “We focus too much on the stuff that makes the headlines and completely ignore the innocuous things that you’re downloading onto your phone .... Those things are spying on you, as well.”<br />* “The Obama administration was the first administration to [make] cyber a priority, but they didn't really put critical infrastructure as a priority in the sense of using the government's weight to force security on critical infrastructure. We're actually only seeing that in this last year … in the wake of Colonial Pipeline.”<br />* “When we saw Russia trying to interfere in 2016, that woke up DHS that someone, somewhere needed to have some kind of influence over election officials.”</p><p><strong>Links:</strong></p><p>* <a href="http://www.synack.com/" target="_blank">www.synack.com</a></p><p>* <a href="https://zetter.substack.com/" target="_blank">https://zetter.substack.com/</a><br />* <a href="https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html" target="_blank">https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33613604" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/500dcfeb-b9f5-4c96-b290-033c7b487c36/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=500dcfeb-b9f5-4c96-b290-033c7b487c36&amp;feed=_SsyS46z"/>
      <itunes:title>Kim Zetter on Election Security, Stuxnet and Substack</itunes:title>
      <itunes:author>Bella DeShantz-Cook, Jeremiah Roe, Kim Zetter</itunes:author>
      <itunes:duration>00:35:00</itunes:duration>
      <itunes:summary>Kim Zetter is a former staff writer at WIRED and author of the seminal cybersecurity book “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.” Her work has appeared in The New York Times, POLITICO, The Washington Post and regularly in her Substack newsletter, “Zero Day.” In this episode, Kim talks about her approach to reporting, what sparked her Stuxnet investigation and how the discovery of that malware fundamentally altered our global cybersecurity conversation.</itunes:summary>
      <itunes:subtitle>Kim Zetter is a former staff writer at WIRED and author of the seminal cybersecurity book “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.” Her work has appeared in The New York Times, POLITICO, The Washington Post and regularly in her Substack newsletter, “Zero Day.” In this episode, Kim talks about her approach to reporting, what sparked her Stuxnet investigation and how the discovery of that malware fundamentally altered our global cybersecurity conversation.</itunes:subtitle>
      <itunes:keywords>journalism, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fee8d460-8739-4b09-881f-160e32012bb2</guid>
      <title>Defense Digital Service Acting Director Katie Olson on drones, DEF CON and Hacking the Pentagon</title>
      <description><![CDATA[<p>Defense Digital Service Acting Director Katie Olson heads up a team of about 80 technologists working on some of the toughest challenges facing the U.S. Department of Defense. Since Katie started leading the team, often called the Pentagon’s “SWAT team of nerds," it has increasingly focused on the threat from drones, cybersecurity risks in space and the consequences of climate change. In this episode, Katie talks about this cutting-edge work, how DDS helped the Pentagon reduce the impact of COVID-19 and what big issues her team will tackle next. </p><p>-------</p><p><strong>Why you should listen:</strong></p><p>* Learn about some of the most cutting-edge work going on inside the Pentagon.</p><p>* Better understand emerging threats such as drones and risks associated with climate change.</p><p>* Hear how DDS helped the military rapidly deploy technology to reduce the spread of COVID-19.</p><p>-------<br /><strong>Key Quotes:</strong></p><p>* "What I've seen shifting in my time here is making security researchers the good guys."</p><p>* “Facilitated by the pandemic, we are seeing just increased awareness and attention to cybersecurity.”</p><p>* “It would be better for us to check our defenses first before we have some kind of major breach.”</p><p>*  “For those white hat hackers who want to contribute to national security, [there’s] a huge opportunity.”<br />-------</p><p><strong>Related Links:</strong></p><p><a href="http://www.synack.com/" target="_blank">www.synack.com</a></p><p><a href="https://www.dds.mil/" target="_blank">https://www.dds.mil/</a></p><p><a href="https://www.synack.com/blog/3-years-of-hack-the-pentagon/" target="_blank">https://www.synack.com/blog/3-years-of-hack-the-pentagon/</a></p><p><a href="https://www.usds.gov/projects/hack-the-pentagon" target="_blank">https://www.usds.gov/projects/hack-the-pentagon</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 19 Nov 2021 21:16:01 +0000</pubDate>
      <author>Katie Olson, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/defense-digital-service-acting-director-katie-olson-on-drones-def-con-and-hacking-the-pentagon-sDv3MV3Q</link>
      <content:encoded><![CDATA[<p>Defense Digital Service Acting Director Katie Olson heads up a team of about 80 technologists working on some of the toughest challenges facing the U.S. Department of Defense. Since Katie started leading the team, often called the Pentagon’s “SWAT team of nerds," it has increasingly focused on the threat from drones, cybersecurity risks in space and the consequences of climate change. In this episode, Katie talks about this cutting-edge work, how DDS helped the Pentagon reduce the impact of COVID-19 and what big issues her team will tackle next. </p><p>-------</p><p><strong>Why you should listen:</strong></p><p>* Learn about some of the most cutting-edge work going on inside the Pentagon.</p><p>* Better understand emerging threats such as drones and risks associated with climate change.</p><p>* Hear how DDS helped the military rapidly deploy technology to reduce the spread of COVID-19.</p><p>-------<br /><strong>Key Quotes:</strong></p><p>* "What I've seen shifting in my time here is making security researchers the good guys."</p><p>* “Facilitated by the pandemic, we are seeing just increased awareness and attention to cybersecurity.”</p><p>* “It would be better for us to check our defenses first before we have some kind of major breach.”</p><p>*  “For those white hat hackers who want to contribute to national security, [there’s] a huge opportunity.”<br />-------</p><p><strong>Related Links:</strong></p><p><a href="http://www.synack.com/" target="_blank">www.synack.com</a></p><p><a href="https://www.dds.mil/" target="_blank">https://www.dds.mil/</a></p><p><a href="https://www.synack.com/blog/3-years-of-hack-the-pentagon/" target="_blank">https://www.synack.com/blog/3-years-of-hack-the-pentagon/</a></p><p><a href="https://www.usds.gov/projects/hack-the-pentagon" target="_blank">https://www.usds.gov/projects/hack-the-pentagon</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="35396618" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/8c6a08bd-e0f0-482b-9021-fe8fa268503b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=8c6a08bd-e0f0-482b-9021-fe8fa268503b&amp;feed=_SsyS46z"/>
      <itunes:title>Defense Digital Service Acting Director Katie Olson on drones, DEF CON and Hacking the Pentagon</itunes:title>
      <itunes:author>Katie Olson, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:36:52</itunes:duration>
      <itunes:summary>Defense Digital Service Acting Director Katie Olson heads up a team of about 80 technologists working on some of the toughest challenges facing the U.S. Department of Defense. Since Katie started leading the team, often called the Pentagon’s “SWAT team of nerds,&quot; it has increasingly focused on the threat from drones, cybersecurity risks in space and the consequences of climate change. In this episode, Katie talks about this cutting-edge work, how DDS helped the Pentagon reduce the impact of COVID-19 and what big issues her team will tackle next. </itunes:summary>
      <itunes:subtitle>Defense Digital Service Acting Director Katie Olson heads up a team of about 80 technologists working on some of the toughest challenges facing the U.S. Department of Defense. Since Katie started leading the team, often called the Pentagon’s “SWAT team of nerds,&quot; it has increasingly focused on the threat from drones, cybersecurity risks in space and the consequences of climate change. In this episode, Katie talks about this cutting-edge work, how DDS helped the Pentagon reduce the impact of COVID-19 and what big issues her team will tackle next. </itunes:subtitle>
      <itunes:keywords>pentagon, dds, drones, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4084eb55-b923-4da1-ac80-7d9e0a0e0bea</guid>
      <title>CryptoHarlem Founder Matt Mitchell on Hacking for Humanity</title>
      <description><![CDATA[<p>Earlier this year, the Electronic Frontier Foundation named Matt Mitchell, founder of CryptoHarlem, one of its 2021 Pioneer Award winners for his groundbreaking work to protect Black communities from surveillance. In this episode, Matt talks about what led him to apply his hacking skills to social justice causes and how that led to his role today as a Technology Fellow for the BUILD program at the Ford Foundation. Matt also discusses what Twitch can do to safeguard creators and the steps anyone can take to better protect themselves online. </p><p>--------</p><p><strong>Why you should listen:</strong></p><p>* Hear from a hacker working on the frontlines of today’s most important racial justice issues.</p><p>* Better understand the state of digital surveillance in Black communities.</p><p>* Hear about what steps platforms such as Twitch can take to better protect creators.</p><p>* Learn the three things everyone online should do to better protect themselves on the internet.</p><p>* Discover where “Mr. Robot” placed an elusive CryptoHarlem Easter egg.</p><p>--------</p><p><strong>Key Quotes:</strong></p><p>* “It's really about taking the skill that we have and applying it toward something bigger than yourself.”</p><p>* “Under the lens of a surveyor, who’s always looking for wrongs, you’ll find what you’re looking for all the time.”</p><p>* “We sometimes confuse public safety with surveillance.”</p><p>* “I'm pretty realistic. If you look at the number of cyberattacks that came from sticky notes on personal computers, it’s zero. But don’t put a sticky note on the nuclear codes.” </p><p>--------</p><p><strong>Related Links:</strong></p><p>* <a href="Synack.com">Synack.com</a></p><p>* <a href="https://www.cryptoharlem.com/" target="_blank">https://www.cryptoharlem.com/</a></p><p>* <a href="https://www.fordfoundation.org/" target="_blank">https://www.fordfoundation.org/</a></p><p>* <a href="https://calyxinstitute.org/" target="_blank">https://calyxinstitute.org/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 12 Nov 2021 10:00:00 +0000</pubDate>
      <author>Matt Mitchell, Jeremiah Roe, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/cryptoharlem-founder-matt-mitchell-on-hacking-for-humanity-qT59Pr4y</link>
      <content:encoded><![CDATA[<p>Earlier this year, the Electronic Frontier Foundation named Matt Mitchell, founder of CryptoHarlem, one of its 2021 Pioneer Award winners for his groundbreaking work to protect Black communities from surveillance. In this episode, Matt talks about what led him to apply his hacking skills to social justice causes and how that led to his role today as a Technology Fellow for the BUILD program at the Ford Foundation. Matt also discusses what Twitch can do to safeguard creators and the steps anyone can take to better protect themselves online. </p><p>--------</p><p><strong>Why you should listen:</strong></p><p>* Hear from a hacker working on the frontlines of today’s most important racial justice issues.</p><p>* Better understand the state of digital surveillance in Black communities.</p><p>* Hear about what steps platforms such as Twitch can take to better protect creators.</p><p>* Learn the three things everyone online should do to better protect themselves on the internet.</p><p>* Discover where “Mr. Robot” placed an elusive CryptoHarlem Easter egg.</p><p>--------</p><p><strong>Key Quotes:</strong></p><p>* “It's really about taking the skill that we have and applying it toward something bigger than yourself.”</p><p>* “Under the lens of a surveyor, who’s always looking for wrongs, you’ll find what you’re looking for all the time.”</p><p>* “We sometimes confuse public safety with surveillance.”</p><p>* “I'm pretty realistic. If you look at the number of cyberattacks that came from sticky notes on personal computers, it’s zero. But don’t put a sticky note on the nuclear codes.” </p><p>--------</p><p><strong>Related Links:</strong></p><p>* <a href="Synack.com">Synack.com</a></p><p>* <a href="https://www.cryptoharlem.com/" target="_blank">https://www.cryptoharlem.com/</a></p><p>* <a href="https://www.fordfoundation.org/" target="_blank">https://www.fordfoundation.org/</a></p><p>* <a href="https://calyxinstitute.org/" target="_blank">https://calyxinstitute.org/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="48566512" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/002a2d9c-b67f-4148-bea1-ac63c358d58e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=002a2d9c-b67f-4148-bea1-ac63c358d58e&amp;feed=_SsyS46z"/>
      <itunes:title>CryptoHarlem Founder Matt Mitchell on Hacking for Humanity</itunes:title>
      <itunes:author>Matt Mitchell, Jeremiah Roe, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:50:35</itunes:duration>
      <itunes:summary>Earlier this year, the Electronic Frontier Foundation named Matt Mitchell, founder of CryptoHarlem, one of its 2021 Pioneer Award winners for his groundbreaking work to protect Black communities from surveillance. In this episode, Matt talks about what led him to apply his hacking skills to social justice causes and how that led to his role today as a Technology Fellow for the BUILD program at the Ford Foundation. Matt also discusses what Twitch can do to safeguard creators and the steps anyone can take to better protect themselves online. </itunes:summary>
      <itunes:subtitle>Earlier this year, the Electronic Frontier Foundation named Matt Mitchell, founder of CryptoHarlem, one of its 2021 Pioneer Award winners for his groundbreaking work to protect Black communities from surveillance. In this episode, Matt talks about what led him to apply his hacking skills to social justice causes and how that led to his role today as a Technology Fellow for the BUILD program at the Ford Foundation. Matt also discusses what Twitch can do to safeguard creators and the steps anyone can take to better protect themselves online. </itunes:subtitle>
      <itunes:keywords>cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7ed6e085-ed97-45c5-8e60-ac4fc1f85cff</guid>
      <title>Lifelong Hacker Alyssa Miller Breaks Down Cybersecurity Barriers</title>
      <description><![CDATA[<p>Alyssa Miller, Business Information Security Officer at S&P Global Ratings and author of the forthcoming book, “Cyber Defenders' Career Guide, is one of the most provocative, unfiltered and interesting voices in the cybersecurity community. She’s essential reading on infosec Twitter and a regular draw at conferences around the world. In this episode, she dives into all sorts of issues in the cybersecurity community, from incoherent job postings to a lack of diversity—she covers it all. Tune in to find out how you can best address these problems and also learn how to reach out of your comfort zone and forge your own path to success. </p><p>--------</p><p><strong>Why you should listen:</strong></p><p>* Figure out why most cybersecurity job postings “suck” and how the industry can help fix the issue.</p><p>* Learn how to address key issues that come up during a cybersecurity job hunt.</p><p>* Identify how to maximize opportunities for personal growth and realize your potential in the infosec community.</p><p>* Understand how to be a better ally to underrepresented groups in the cybersecurity community.</p><p>* Hear about the value of diversity and inclusion in cybersecurity. </p><p>--------</p><p><strong>Key Quotes:</strong></p><p>* “Read the narrative at the beginning of the job description. If that sounds like something you can do and something you can learn and grow in, apply. The very worst thing they can do is tell you no."</p><p>* "The difference between you experiencing success or not is in how you respond to opportunities. Do you take those moments and go after them or do you let them go by the wayside."</p><p>* “If we want to be better at cybersecurity, having diversity matters.”</p><p>* "You don't get diversity of thought by having 20 heterosexual white males sitting in a room talking about how to build cybersecurity defenses."</p><p>--------</p><p><strong>Related Links:</strong></p><p>* <a href="http://synack.com">Synack.com</a></p><p>* <a href="https://www.synack.com/lp/cloud-security-solutions/">https://www.synack.com/lp/cloud-security-solutions/</a></p><p>*<a href="https://twitter.com/AlyssaM_InfoSec?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">https://twitter.com/AlyssaM_InfoSec?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor</a></p><p>* <a href="https://alyssasec.com/">https://alyssasec.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 15 Oct 2021 09:00:00 +0000</pubDate>
      <author>Alyssa Miller, Jeremiah Roe, Bella Deshantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/lifelong-hacker-alyssa-miller-breaks-down-cybersecurity-barriers-0KTL56Sr</link>
      <content:encoded><![CDATA[<p>Alyssa Miller, Business Information Security Officer at S&P Global Ratings and author of the forthcoming book, “Cyber Defenders' Career Guide, is one of the most provocative, unfiltered and interesting voices in the cybersecurity community. She’s essential reading on infosec Twitter and a regular draw at conferences around the world. In this episode, she dives into all sorts of issues in the cybersecurity community, from incoherent job postings to a lack of diversity—she covers it all. Tune in to find out how you can best address these problems and also learn how to reach out of your comfort zone and forge your own path to success. </p><p>--------</p><p><strong>Why you should listen:</strong></p><p>* Figure out why most cybersecurity job postings “suck” and how the industry can help fix the issue.</p><p>* Learn how to address key issues that come up during a cybersecurity job hunt.</p><p>* Identify how to maximize opportunities for personal growth and realize your potential in the infosec community.</p><p>* Understand how to be a better ally to underrepresented groups in the cybersecurity community.</p><p>* Hear about the value of diversity and inclusion in cybersecurity. </p><p>--------</p><p><strong>Key Quotes:</strong></p><p>* “Read the narrative at the beginning of the job description. If that sounds like something you can do and something you can learn and grow in, apply. The very worst thing they can do is tell you no."</p><p>* "The difference between you experiencing success or not is in how you respond to opportunities. Do you take those moments and go after them or do you let them go by the wayside."</p><p>* “If we want to be better at cybersecurity, having diversity matters.”</p><p>* "You don't get diversity of thought by having 20 heterosexual white males sitting in a room talking about how to build cybersecurity defenses."</p><p>--------</p><p><strong>Related Links:</strong></p><p>* <a href="http://synack.com">Synack.com</a></p><p>* <a href="https://www.synack.com/lp/cloud-security-solutions/">https://www.synack.com/lp/cloud-security-solutions/</a></p><p>*<a href="https://twitter.com/AlyssaM_InfoSec?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">https://twitter.com/AlyssaM_InfoSec?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor</a></p><p>* <a href="https://alyssasec.com/">https://alyssasec.com/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="38397147" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/8101b4ec-a070-4dad-ba78-fcc519e66900/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=8101b4ec-a070-4dad-ba78-fcc519e66900&amp;feed=_SsyS46z"/>
      <itunes:title>Lifelong Hacker Alyssa Miller Breaks Down Cybersecurity Barriers</itunes:title>
      <itunes:author>Alyssa Miller, Jeremiah Roe, Bella Deshantz-Cook</itunes:author>
      <itunes:duration>00:39:59</itunes:duration>
      <itunes:summary>Alyssa Miller, Business Information Security Officer at S&amp;P Global Ratings and author of the forthcoming book, “Cyber Defenders&apos; Career Guide, is one of the most provocative, unfiltered and interesting voices in the cybersecurity community. She’s essential reading on infosec Twitter and a regular draw at conferences around the world. In this episode, she dives into all sorts of issues in the cybersecurity community, from incoherent job postings to a lack of diversity—she covers it all. Tune in to find out how you can best address these problems and also learn how to reach out of your comfort zone and forge your own path to success. </itunes:summary>
      <itunes:subtitle>Alyssa Miller, Business Information Security Officer at S&amp;P Global Ratings and author of the forthcoming book, “Cyber Defenders&apos; Career Guide, is one of the most provocative, unfiltered and interesting voices in the cybersecurity community. She’s essential reading on infosec Twitter and a regular draw at conferences around the world. In this episode, she dives into all sorts of issues in the cybersecurity community, from incoherent job postings to a lack of diversity—she covers it all. Tune in to find out how you can best address these problems and also learn how to reach out of your comfort zone and forge your own path to success. </itunes:subtitle>
      <itunes:keywords>diversity, cyberescurity, job hunt, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1279176c-180c-48a6-9e7f-f4684c9fc4f0</guid>
      <title>Google Cloud Evangelist Stephanie Wong on “Blameless” Security Culture</title>
      <description><![CDATA[<p>In this episode, Stephanie Wong, head of Google Cloud Developer Engagement, explores Google’s security culture, why it conducts “blameless” postmortems after security testing and how it’s working to dispel lingering misconceptions about the cloud. She also talks about her journey in Silicon Valley and how her experiences winning pageants such as Miss Asian North America 2020 helped her become one of today’s most visible technology content gurus.</p><p> </p><p><strong>Why you should listen:</strong></p><p>* Learn how to build an effective cybersecurity culture within your organization.</p><p>* Get the inside scoop on the security precautions that Google takes with its physical data center.</p><p>* Hear about what Google is doing to overcome misperceptions about cloud security.</p><p>* Figure out how to conduct security postmortems the Google way. </p><p>* If you don't know about the "pancake principle," you'll find out why it matters, and how it can work for you.</p><p> </p><p><strong>Key Quotes:</strong></p><p>* "It's become really clear that remote work will be a very defining characteristic of the new normal and modernizing security is going to be imperative."</p><p>* "Our teams are really horrified by network-based security because network-based security is hackable, even with two factor authentication."</p><p>* “It's all about empowering [users] so that they can be the ones to flag suspicious activity, websites, and phishing in emails."</p><p>* "Being in Silicon valley, we're often in a bubble where we assume that a lot of people already understand the value of [the cloud] and how it can actually increase your security posture overall."</p><p>* "It's all about blameless postmortems and a blameless culture. No pointing fingers. If something goes wrong, it's all about how can we improve it."</p><p> </p><p>Related Links:</p><p><a href="Synack.com">* Synack.com</a></p><p><a href="https://www.synack.com/lp/cloud-security-solutions/" target="_blank">* https://www.synack.com/lp/cloud-security-solutions/</a></p><p><a href="https://twitter.com/stephr_wong" target="_blank">* https://twitter.com/stephr_wong</a></p><p><a href="https://bit.ly/2Vkckh5" target="_blank"><i> </i>* https://bit.ly/2Vkckh5</a> (Stephanie’s Youtube Page) </p><p><a href="https://www.stephrwong.com/about" target="_blank">* https://www.stephrwong.com/about</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 29 Sep 2021 09:00:00 +0000</pubDate>
      <author>Stephanie Wong, Bella DeShantz-Cook, Jeremiah Roe</author>
      <link>https://were-in.simplecast.com/episodes/oogle-cloud-evangelist-stephanie-wong-on-blameless-security-culture-dPUoDdLB</link>
      <content:encoded><![CDATA[<p>In this episode, Stephanie Wong, head of Google Cloud Developer Engagement, explores Google’s security culture, why it conducts “blameless” postmortems after security testing and how it’s working to dispel lingering misconceptions about the cloud. She also talks about her journey in Silicon Valley and how her experiences winning pageants such as Miss Asian North America 2020 helped her become one of today’s most visible technology content gurus.</p><p> </p><p><strong>Why you should listen:</strong></p><p>* Learn how to build an effective cybersecurity culture within your organization.</p><p>* Get the inside scoop on the security precautions that Google takes with its physical data center.</p><p>* Hear about what Google is doing to overcome misperceptions about cloud security.</p><p>* Figure out how to conduct security postmortems the Google way. </p><p>* If you don't know about the "pancake principle," you'll find out why it matters, and how it can work for you.</p><p> </p><p><strong>Key Quotes:</strong></p><p>* "It's become really clear that remote work will be a very defining characteristic of the new normal and modernizing security is going to be imperative."</p><p>* "Our teams are really horrified by network-based security because network-based security is hackable, even with two factor authentication."</p><p>* “It's all about empowering [users] so that they can be the ones to flag suspicious activity, websites, and phishing in emails."</p><p>* "Being in Silicon valley, we're often in a bubble where we assume that a lot of people already understand the value of [the cloud] and how it can actually increase your security posture overall."</p><p>* "It's all about blameless postmortems and a blameless culture. No pointing fingers. If something goes wrong, it's all about how can we improve it."</p><p> </p><p>Related Links:</p><p><a href="Synack.com">* Synack.com</a></p><p><a href="https://www.synack.com/lp/cloud-security-solutions/" target="_blank">* https://www.synack.com/lp/cloud-security-solutions/</a></p><p><a href="https://twitter.com/stephr_wong" target="_blank">* https://twitter.com/stephr_wong</a></p><p><a href="https://bit.ly/2Vkckh5" target="_blank"><i> </i>* https://bit.ly/2Vkckh5</a> (Stephanie’s Youtube Page) </p><p><a href="https://www.stephrwong.com/about" target="_blank">* https://www.stephrwong.com/about</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="41341669" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/af9559d1-1289-4aaa-be47-40c231e1217a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=af9559d1-1289-4aaa-be47-40c231e1217a&amp;feed=_SsyS46z"/>
      <itunes:title>Google Cloud Evangelist Stephanie Wong on “Blameless” Security Culture</itunes:title>
      <itunes:author>Stephanie Wong, Bella DeShantz-Cook, Jeremiah Roe</itunes:author>
      <itunes:duration>00:43:03</itunes:duration>
      <itunes:summary>In this episode, Stephanie Wong, head of Google Cloud Developer Engagement, explores Google’s security culture, why it conducts “blameless” postmortems after security testing and how it’s working to dispel lingering misconceptions about the cloud. She also talks about her journey in Silicon Valley and how her experiences winning pageants such as Miss Asian North America 2020 helped her become one of today’s most visible technology content gurus.</itunes:summary>
      <itunes:subtitle>In this episode, Stephanie Wong, head of Google Cloud Developer Engagement, explores Google’s security culture, why it conducts “blameless” postmortems after security testing and how it’s working to dispel lingering misconceptions about the cloud. She also talks about her journey in Silicon Valley and how her experiences winning pageants such as Miss Asian North America 2020 helped her become one of today’s most visible technology content gurus.</itunes:subtitle>
      <itunes:keywords>silicon valley, cloud, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a13d1cc3-d044-4da3-8bbe-3e1378a60a3e</guid>
      <title>Cory Doctorow and the Infosec Apocalypse</title>
      <description><![CDATA[<p>Cory Doctorow, activist, journalist, and author who wrote the influential <i>Little Brother</i> cyberpunk series, gets into some big issues like surveillance capitalism and his work with the Electronic Frontier Foundation. He doesn’t hold anything back.</p><p>--------</p><p><strong>Why you should listen:</strong></p><p>* Hear from one of the smartest and most engaged technologists today on how technology can be used both for malicious purposes or for good.</p><p>* Consider how bias can be built into code and have real-world implications. </p><p>* Listen to Cory’s view on tech monopolies and his proposals for reversing their power over users and the internet more broadly.</p><p>* Better understand why independent security research might seem counterintuitive to many people. </p><p>* Hear the author of one most influential cyberpunk series discuss the origins of his latest book, <i>Attack Surface</i>.</p><p>--------</p><p><strong>Key Quotes:</strong></p><p>* “Wishful thinking isn’t going to solve real-world technical security issues.”</p><p>* “It’s so important that we build safeguards against our own frailty.”</p><p>* “Tech has become a kind of dangerous monoculture ...technologically dangerous because a breach or a defect in a system has consequences for hundreds of millions, if not billions of users.”</p><p>* “Monopoly is a really bad tool for protecting privacy because monopoly only protects privacy where privacy is in the interests of the monopolist.”</p><p>* "We should hold everyone to account for being good privacy actors by having a privacy law -- a real, no fooling privacy law."</p><p>* "One of the things that we need to take consideration of is that the security apocalypse is here. It's just not evenly distributed."</p><p>--------</p><p><strong>Related Links:</strong></p><p>* <a href="Synack.com ">Synack.com </a></p><p>* <a href="https://www.linkedin.com/company/synack-inc-">https://www.linkedin.com/company/synack-inc-</a></p><p>* <a href="https://twitter.com/synack">https://twitter.com/synack</a></p><p>* <a href="https://craphound.com/">https://craphound.com/</a></p><p>* <a href="https://pluralistic.net/">https://pluralistic.net/</a></p><p>* <a href="https://twitter.com/doctorow">https://twitter.com/doctorow</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 22 Sep 2021 09:00:00 +0000</pubDate>
      <author>Bella DeShantz-Cook, Jeremiah Roe, Cory Doctorow</author>
      <link>https://were-in.simplecast.com/episodes/cory-doctorow-and-the-infosec-apocalypse-SeDf3qB_</link>
      <content:encoded><![CDATA[<p>Cory Doctorow, activist, journalist, and author who wrote the influential <i>Little Brother</i> cyberpunk series, gets into some big issues like surveillance capitalism and his work with the Electronic Frontier Foundation. He doesn’t hold anything back.</p><p>--------</p><p><strong>Why you should listen:</strong></p><p>* Hear from one of the smartest and most engaged technologists today on how technology can be used both for malicious purposes or for good.</p><p>* Consider how bias can be built into code and have real-world implications. </p><p>* Listen to Cory’s view on tech monopolies and his proposals for reversing their power over users and the internet more broadly.</p><p>* Better understand why independent security research might seem counterintuitive to many people. </p><p>* Hear the author of one most influential cyberpunk series discuss the origins of his latest book, <i>Attack Surface</i>.</p><p>--------</p><p><strong>Key Quotes:</strong></p><p>* “Wishful thinking isn’t going to solve real-world technical security issues.”</p><p>* “It’s so important that we build safeguards against our own frailty.”</p><p>* “Tech has become a kind of dangerous monoculture ...technologically dangerous because a breach or a defect in a system has consequences for hundreds of millions, if not billions of users.”</p><p>* “Monopoly is a really bad tool for protecting privacy because monopoly only protects privacy where privacy is in the interests of the monopolist.”</p><p>* "We should hold everyone to account for being good privacy actors by having a privacy law -- a real, no fooling privacy law."</p><p>* "One of the things that we need to take consideration of is that the security apocalypse is here. It's just not evenly distributed."</p><p>--------</p><p><strong>Related Links:</strong></p><p>* <a href="Synack.com ">Synack.com </a></p><p>* <a href="https://www.linkedin.com/company/synack-inc-">https://www.linkedin.com/company/synack-inc-</a></p><p>* <a href="https://twitter.com/synack">https://twitter.com/synack</a></p><p>* <a href="https://craphound.com/">https://craphound.com/</a></p><p>* <a href="https://pluralistic.net/">https://pluralistic.net/</a></p><p>* <a href="https://twitter.com/doctorow">https://twitter.com/doctorow</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="35590551" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/779c522c-386a-4aaa-ab8d-ead6d9e62781/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=779c522c-386a-4aaa-ab8d-ead6d9e62781&amp;feed=_SsyS46z"/>
      <itunes:title>Cory Doctorow and the Infosec Apocalypse</itunes:title>
      <itunes:author>Bella DeShantz-Cook, Jeremiah Roe, Cory Doctorow</itunes:author>
      <itunes:duration>00:37:04</itunes:duration>
      <itunes:summary>Cory Doctorow, activist, journalist, and author who wrote the influential Little Brother cyberpunk series, gets into some big issues like surveillance capitalism and his work with the Electronic Frontier Foundation. He doesn’t hold anything back.</itunes:summary>
      <itunes:subtitle>Cory Doctorow, activist, journalist, and author who wrote the influential Little Brother cyberpunk series, gets into some big issues like surveillance capitalism and his work with the Electronic Frontier Foundation. He doesn’t hold anything back.</itunes:subtitle>
      <itunes:keywords>cyberpunk, surveillance capitalism, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2147668d-2354-4416-8738-51c1d9eb33c2</guid>
      <title>Nationalize Cloudflare? Berkeley Researcher Nick Merrill on Making it a Public Utility</title>
      <description><![CDATA[<p>In this episode, Nick Merrill, a research fellow at the UC Berkeley Center for Long-Term Cybersecurity, makes a cybersecurity case for nationalizing major CDNs such as Cloudflare, issues some pretty stark warnings about the dangers of machine learning, and digs into why stereotypical images of hackers in hoodies doesn’t help anyone. His viewpoints are sobering if not controversial and worth listening to for anyone who cares about the future of the global internet. </p><p>---------</p><p><strong>Why you should listen:</strong></p><p>* Get a fresh perspective on some of the biggest risks to the global web: unchecked algorithmic bias, the risk of attacks on massive CDNs, and the growing internet fragmentation.</p><p>* Consider some of the boldest ideas from one of the sharpest thinkers when it comes to how policymakers can make fundamental changes to protect the internet.</p><p>* Hear Nick’s take on why art matters in cybersecurity -- and why stereotypical images of hackers in hoodies harm the public’s perceptions of information security. </p><p>* Learn more about Fairness, Accountability and Transparency in Machine Learning and the growing movement to look more critically at the hidden algorithms that control the internet and much of technology today. </p><p>* Consider how ransomware takedowns and other large-scale cyberattacks such as Colonial Pipeline erode public trust in technology.</p><p>* Get a better understanding of why diversity in the cybersecurity industry matters when it comes to identifying real-world threats.</p><p>---------</p><p><strong>Key Quotes:</strong></p><p>* “That power over the internet is like a huge strategic asset for the U.S. It's analogous to controlling global trade.”</p><p>* “Imagine a Stuxnet level attack on Cloudflare.”</p><p>* “I would nationalize Cloudflare. I would make it like a national publicly-run utility company.”</p><p>* “This word ‘hacker’ got so diluted. It means different things to different people. And it became this totally useless way for describing what's actually happening in security.” </p><p>* “The future of cybersecurity … is the future of machine learning.”</p><p>* “The real risk of ransomware is just that it freaks people out.” </p><p><br />---------</p><p><strong>Related Links:</strong></p><p><a href="http://synack.com">* Synack.com</a></p><p><a href="https://nickmerrill.substack.com/about">* https://nickmerrill.substack.com/about</a></p><p><a href="https://www.ischool.berkeley.edu/people/nick-merrill">* iSchool (Berkeley) Bio</a></p><p><a href="https://www.synack.com/lp/enterprise-security-testing-101">* https://www.synack.com/lp/enterprise-security-testing-101</a></p><p><a href="https://cltc.berkeley.edu/">* https://cltc.berkeley.edu/</a></p><p><a href="https://daylight.berkeley.edu/">* https://daylight.berkeley.edu/</a></p><p><a href="https://www.codedbias.com/">* https://www.codedbias.com/</a></p><p><a href="https://www.fatml.org/">* https://www.fatml.org/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 10 Sep 2021 09:00:00 +0000</pubDate>
      <author>Bella DeShantz-Cook, Jeremiah Roe, Nick Merrill</author>
      <link>https://were-in.simplecast.com/episodes/nationalize-cloudflare-berkeley-researcher-nick-merrill-on-making-it-a-public-utility-VfV06_bB</link>
      <content:encoded><![CDATA[<p>In this episode, Nick Merrill, a research fellow at the UC Berkeley Center for Long-Term Cybersecurity, makes a cybersecurity case for nationalizing major CDNs such as Cloudflare, issues some pretty stark warnings about the dangers of machine learning, and digs into why stereotypical images of hackers in hoodies doesn’t help anyone. His viewpoints are sobering if not controversial and worth listening to for anyone who cares about the future of the global internet. </p><p>---------</p><p><strong>Why you should listen:</strong></p><p>* Get a fresh perspective on some of the biggest risks to the global web: unchecked algorithmic bias, the risk of attacks on massive CDNs, and the growing internet fragmentation.</p><p>* Consider some of the boldest ideas from one of the sharpest thinkers when it comes to how policymakers can make fundamental changes to protect the internet.</p><p>* Hear Nick’s take on why art matters in cybersecurity -- and why stereotypical images of hackers in hoodies harm the public’s perceptions of information security. </p><p>* Learn more about Fairness, Accountability and Transparency in Machine Learning and the growing movement to look more critically at the hidden algorithms that control the internet and much of technology today. </p><p>* Consider how ransomware takedowns and other large-scale cyberattacks such as Colonial Pipeline erode public trust in technology.</p><p>* Get a better understanding of why diversity in the cybersecurity industry matters when it comes to identifying real-world threats.</p><p>---------</p><p><strong>Key Quotes:</strong></p><p>* “That power over the internet is like a huge strategic asset for the U.S. It's analogous to controlling global trade.”</p><p>* “Imagine a Stuxnet level attack on Cloudflare.”</p><p>* “I would nationalize Cloudflare. I would make it like a national publicly-run utility company.”</p><p>* “This word ‘hacker’ got so diluted. It means different things to different people. And it became this totally useless way for describing what's actually happening in security.” </p><p>* “The future of cybersecurity … is the future of machine learning.”</p><p>* “The real risk of ransomware is just that it freaks people out.” </p><p><br />---------</p><p><strong>Related Links:</strong></p><p><a href="http://synack.com">* Synack.com</a></p><p><a href="https://nickmerrill.substack.com/about">* https://nickmerrill.substack.com/about</a></p><p><a href="https://www.ischool.berkeley.edu/people/nick-merrill">* iSchool (Berkeley) Bio</a></p><p><a href="https://www.synack.com/lp/enterprise-security-testing-101">* https://www.synack.com/lp/enterprise-security-testing-101</a></p><p><a href="https://cltc.berkeley.edu/">* https://cltc.berkeley.edu/</a></p><p><a href="https://daylight.berkeley.edu/">* https://daylight.berkeley.edu/</a></p><p><a href="https://www.codedbias.com/">* https://www.codedbias.com/</a></p><p><a href="https://www.fatml.org/">* https://www.fatml.org/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29049490" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/832d0b67-381e-4f1a-82d1-2d638d835b28/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=832d0b67-381e-4f1a-82d1-2d638d835b28&amp;feed=_SsyS46z"/>
      <itunes:title>Nationalize Cloudflare? Berkeley Researcher Nick Merrill on Making it a Public Utility</itunes:title>
      <itunes:author>Bella DeShantz-Cook, Jeremiah Roe, Nick Merrill</itunes:author>
      <itunes:duration>00:30:15</itunes:duration>
      <itunes:summary>In this episode, Nick Merrill, a research fellow at the UC Berkeley Center for Long-Term Cybersecurity, makes a cybersecurity case for nationalizing major CDNs such as Cloudflare, issues some pretty stark warnings about the dangers of machine learning, and digs into why stereotypical images of hackers in hoodies doesn’t help anyone. His viewpoints are sobering if not controversial and worth listening to for anyone who cares about the future of the global internet. </itunes:summary>
      <itunes:subtitle>In this episode, Nick Merrill, a research fellow at the UC Berkeley Center for Long-Term Cybersecurity, makes a cybersecurity case for nationalizing major CDNs such as Cloudflare, issues some pretty stark warnings about the dangers of machine learning, and digs into why stereotypical images of hackers in hoodies doesn’t help anyone. His viewpoints are sobering if not controversial and worth listening to for anyone who cares about the future of the global internet. </itunes:subtitle>
      <itunes:keywords>cybersecurity, machine learning, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">46641efa-33f4-423e-8ef6-245429f43326</guid>
      <title>Hacking the Novel: A Journey From Tech Support to Published Author with Ryan Rutan, Senior Director of Community at Synack</title>
      <description><![CDATA[<p>Ryan Rutan has worked in tech support, as a computer repairman, application developer, software engineer, entrepreneur, and head of community…and most recently, fiction writer. Listen to this episode to hear what inspired <i>Fork This Life</i>, a novel that follows the life of a teenager growing up with the early internet of the 90s who eventually gets into hacking, and how it relates to today’s cybersecurity challenges.</p><p>--------</p><p><strong>Why You Should Listen:</strong></p><p>Hear about Ryan’s approach to hacking the fiction writing process.</p><p>* Get the inside story of how working in tech support informed Ryan’s career in cybersecurity. </p><p>* Nerd out on nostalgia about the nineties tech scene.</p><p>* Pick up tips for developing your creative voice.  </p><p>* Get tips for how you can help spread a culture of good security hygiene. </p><p>--------</p><p><strong>Key Quotes:</strong></p><p>* “I’m a technical person, therefore I create.” </p><p>* “I need a computer but why? I want to get online, but why? Everyone knew they needed it and wanted it but they didn’t know why.”</p><p>* “The people who know and understand what it means to keep things secure... It’s incumbent upon them to pay if forward as much as possible.” </p><p>* “Security back in the 90s.. your death was going to come from a swift sledgehammer to the head...now it’s death by a thousand cuts from a million different websites.” </p><p>--------</p><p><strong>Related Links:</strong></p><p>* <a href="Synack.com">Synack.com</a></p><p>* <a href="https://www.synack.com/lp/enterprise-security-testing-101/">https://www.synack.com/lp/enterprise-security-testing-101/</a></p><p>* <a href="Forkthislife.com">Forkthislife.com</a></p><p><a href="https://twitter.com/ryanrutan">* https://twitter.com/ryanrutan</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 25 Aug 2021 09:00:00 +0000</pubDate>
      <author>Jeremiah Roe, Bella DeShantz-Cook, Ryan Rutan</author>
      <link>https://were-in.simplecast.com/episodes/hacking-the-novel-a-journey-from-tech-support-to-published-author-W9JmW39e</link>
      <content:encoded><![CDATA[<p>Ryan Rutan has worked in tech support, as a computer repairman, application developer, software engineer, entrepreneur, and head of community…and most recently, fiction writer. Listen to this episode to hear what inspired <i>Fork This Life</i>, a novel that follows the life of a teenager growing up with the early internet of the 90s who eventually gets into hacking, and how it relates to today’s cybersecurity challenges.</p><p>--------</p><p><strong>Why You Should Listen:</strong></p><p>Hear about Ryan’s approach to hacking the fiction writing process.</p><p>* Get the inside story of how working in tech support informed Ryan’s career in cybersecurity. </p><p>* Nerd out on nostalgia about the nineties tech scene.</p><p>* Pick up tips for developing your creative voice.  </p><p>* Get tips for how you can help spread a culture of good security hygiene. </p><p>--------</p><p><strong>Key Quotes:</strong></p><p>* “I’m a technical person, therefore I create.” </p><p>* “I need a computer but why? I want to get online, but why? Everyone knew they needed it and wanted it but they didn’t know why.”</p><p>* “The people who know and understand what it means to keep things secure... It’s incumbent upon them to pay if forward as much as possible.” </p><p>* “Security back in the 90s.. your death was going to come from a swift sledgehammer to the head...now it’s death by a thousand cuts from a million different websites.” </p><p>--------</p><p><strong>Related Links:</strong></p><p>* <a href="Synack.com">Synack.com</a></p><p>* <a href="https://www.synack.com/lp/enterprise-security-testing-101/">https://www.synack.com/lp/enterprise-security-testing-101/</a></p><p>* <a href="Forkthislife.com">Forkthislife.com</a></p><p><a href="https://twitter.com/ryanrutan">* https://twitter.com/ryanrutan</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23204331" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/8e9cc54b-1c2c-404a-93e5-ddc458d9de41/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=8e9cc54b-1c2c-404a-93e5-ddc458d9de41&amp;feed=_SsyS46z"/>
      <itunes:title>Hacking the Novel: A Journey From Tech Support to Published Author with Ryan Rutan, Senior Director of Community at Synack</itunes:title>
      <itunes:author>Jeremiah Roe, Bella DeShantz-Cook, Ryan Rutan</itunes:author>
      <itunes:duration>00:24:10</itunes:duration>
      <itunes:summary>Ryan Rutan has worked in tech support, as a computer repairman, application developer, software engineer, entrepreneur, and head of community…and most recently, fiction writer. Listen to this episode to hear what inspired Fork This Life, a novel that follows the life of a teenager growing up with the early internet of the 90s who eventually gets into hacking, and how it relates to today’s cybersecurity challenges.</itunes:summary>
      <itunes:subtitle>Ryan Rutan has worked in tech support, as a computer repairman, application developer, software engineer, entrepreneur, and head of community…and most recently, fiction writer. Listen to this episode to hear what inspired Fork This Life, a novel that follows the life of a teenager growing up with the early internet of the 90s who eventually gets into hacking, and how it relates to today’s cybersecurity challenges.</itunes:subtitle>
      <itunes:keywords>author, cybersecurity, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">457222d1-3031-430b-9825-6ee64f0dc90a</guid>
      <title>Why Identity Matters in National Security with Lauren Buitta, CEO, Girl Security</title>
      <description><![CDATA[<p>In this episode, Girl Security CEO Lauren Bean Buitta discusses the importance of supporting, encouraging, and training girls for careers in cybersecurity. She gets into why it's so critical to create — and protect — pathways for young women in order to build a more diverse industry, and why that really matters when it comes to making tough national security decisions that affect the entire population. She also describes her journey into security, and what led her to start Girl Security in the first place. </p><p>----------</p><p><strong>Why You Should Listen:</strong></p><p>* To better understand the value of gender diversity in cybersecurity.</p><p>* Learn how to create trauma-informed programming that builds trust and understanding.</p><p>* Discover how you can help develop new pathways for underrepresented cybersecurity talent.</p><p>* Hear Lauren’s take on how identity can inform security decisions.</p><p>----------</p><p><strong>5 Key Quotes:</strong></p><p>* “Everyone’s identity has a place in a discussion about national security because it's the most consequential field in the world.”</p><p>* “What we are seeing in in our country is evidence of how long it takes to uproot any kind of systemic discrimination.”</p><p>* “We are cultivating a generation of girls and women who will hopefully be more well represented in the short, near and long term and we hope that that results in more equitable national security policies of which cyber is so crucial”</p><p>* “Girls and women from childhood live in a world in which they are taught to fear everything … and we do a really good job at keeping ourselves secure.”</p><p>* “We don't know what a national security field would look like where there's gender parody. What would national security look like if women were co-equally represented? I want to see what that world looks like.”</p><p>----------</p><p><strong>Related Links:</strong></p><p><a href="Synack.com  ">* Synack.com  </a></p><p><a href="https://www.synack.com/were-in-synack-podcast/">* https://www.synack.com/were-in-synack-podcast/</a></p><p><a href="https://www.girlsecurity.org/about">* https://www.girlsecurity.org/about</a></p><p><a href="https://www.linkedin.com/in/lauren-bean-buitta/">* https://www.linkedin.com/in/lauren-bean-buitta/</a></p><p><a href="https://www.synack.com/trust-report/">* https://www.synack.com/trust-report/</a></p><p><a href="https://www.synack.com/lp/enterprise-security-testing-101/">* https://www.synack.com/lp/enterprise-security-testing-101/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 13 Aug 2021 15:01:01 +0000</pubDate>
      <author>Lauren Buitta, Bella DeShantz-Cook, Jeremiah Roe</author>
      <link>https://were-in.simplecast.com/episodes/why-identity-matters-in-national-security-with-lauren-buitta-ceo-girl-security-oCWEb1eE</link>
      <content:encoded><![CDATA[<p>In this episode, Girl Security CEO Lauren Bean Buitta discusses the importance of supporting, encouraging, and training girls for careers in cybersecurity. She gets into why it's so critical to create — and protect — pathways for young women in order to build a more diverse industry, and why that really matters when it comes to making tough national security decisions that affect the entire population. She also describes her journey into security, and what led her to start Girl Security in the first place. </p><p>----------</p><p><strong>Why You Should Listen:</strong></p><p>* To better understand the value of gender diversity in cybersecurity.</p><p>* Learn how to create trauma-informed programming that builds trust and understanding.</p><p>* Discover how you can help develop new pathways for underrepresented cybersecurity talent.</p><p>* Hear Lauren’s take on how identity can inform security decisions.</p><p>----------</p><p><strong>5 Key Quotes:</strong></p><p>* “Everyone’s identity has a place in a discussion about national security because it's the most consequential field in the world.”</p><p>* “What we are seeing in in our country is evidence of how long it takes to uproot any kind of systemic discrimination.”</p><p>* “We are cultivating a generation of girls and women who will hopefully be more well represented in the short, near and long term and we hope that that results in more equitable national security policies of which cyber is so crucial”</p><p>* “Girls and women from childhood live in a world in which they are taught to fear everything … and we do a really good job at keeping ourselves secure.”</p><p>* “We don't know what a national security field would look like where there's gender parody. What would national security look like if women were co-equally represented? I want to see what that world looks like.”</p><p>----------</p><p><strong>Related Links:</strong></p><p><a href="Synack.com  ">* Synack.com  </a></p><p><a href="https://www.synack.com/were-in-synack-podcast/">* https://www.synack.com/were-in-synack-podcast/</a></p><p><a href="https://www.girlsecurity.org/about">* https://www.girlsecurity.org/about</a></p><p><a href="https://www.linkedin.com/in/lauren-bean-buitta/">* https://www.linkedin.com/in/lauren-bean-buitta/</a></p><p><a href="https://www.synack.com/trust-report/">* https://www.synack.com/trust-report/</a></p><p><a href="https://www.synack.com/lp/enterprise-security-testing-101/">* https://www.synack.com/lp/enterprise-security-testing-101/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="37348557" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/8731a654-67cf-45ef-b1c9-88aa316700be/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=8731a654-67cf-45ef-b1c9-88aa316700be&amp;feed=_SsyS46z"/>
      <itunes:title>Why Identity Matters in National Security with Lauren Buitta, CEO, Girl Security</itunes:title>
      <itunes:author>Lauren Buitta, Bella DeShantz-Cook, Jeremiah Roe</itunes:author>
      <itunes:duration>00:38:54</itunes:duration>
      <itunes:summary>In this episode, Girl Security CEO Lauren Bean Buitta discusses the importance of supporting, encouraging, and training girls for careers in cybersecurity. She gets into why it&apos;s so critical to create — and protect — pathways for young women in order to build a more diverse industry, and why that really matters when it comes to making tough national security decisions that affect the entire population. She also describes her journey into security, and what led her to start Girl Security in the first place. </itunes:summary>
      <itunes:subtitle>In this episode, Girl Security CEO Lauren Bean Buitta discusses the importance of supporting, encouraging, and training girls for careers in cybersecurity. She gets into why it&apos;s so critical to create — and protect — pathways for young women in order to build a more diverse industry, and why that really matters when it comes to making tough national security decisions that affect the entire population. She also describes her journey into security, and what led her to start Girl Security in the first place. </itunes:subtitle>
      <itunes:keywords>national security, cybersecurity, code</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fa292351-fbd3-4b5d-a01e-eb65570ab501</guid>
      <title>From Digital Delinquent to Government Hacker with Author, Entrepreneur, and Cybersecurity Influencer Alissa Knight</title>
      <description><![CDATA[<p>In this episode, author, hacker, entrepreneur, and content creator Alissa Knight reveals her journey from “bullied computer nerd” to federal cybersecurity contractor to famed car hacker. She gets real about the risk of APIs, offers up some must-hear advice for anyone getting into cybersecurity, and delivers candid views about the infosec industry as a whole. </p><p>-------</p><p><strong>Why you should listen:</strong></p><p>* Get inside the head of one of the most provocative and interesting cybersecurity influencers today.</p><p>* Hear about her work with federal agencies to help secure the future of transportation.</p><p>* Learn more about the urgent need for better Application Programming Interface (API) security.</p><p>* Get new insights into the growing threat to health care organizations and financial institutions.</p><p>* Hear Alissa’s take on how cybersecurity companies can improve their approach to content and marketing.</p><p>-------</p><p><strong>Key Quotes: </strong></p><p>* “I care more about the adversary that can hack my car from her living room. I care more about the hacker that can take remote control of my car that I'm driving around in my family with, from anywhere.”</p><p>* “Okay. Yes. I <i>can </i>take remote control of this vehicle. I <i>can </i>move the steering wheel. I <i>can </i>push the brakes.”</p><p>* “You would be shocked if I told you how endemic [it is in] the industry to hard-code not only tokens, keys, and credentials like usernames and passwords and to apps for their own APIs, but also third-party APIs like payment processors.”</p><p>* “The plumbing for our entire financial system and healthcare system is APIs...that data is worth more than oil, right? So hackers are shifting their attention to hacking APIs.”</p><p>-------</p><p><strong>Related Links:</strong></p><p>* Alissa Knight’s Twitter: <a href="https://twitter.com/alissaknight">@alissaknight </a></p><p>* Knight Ink Media: ​​<a href="https://knightinkmedia.com/">https://knightinkmedia.com/</a></p><p>* Alissa Knight’s Website: <a href="https://www.alissaknight.com/">https://www.alissaknight.com/</a></p><p>* Official Trailer: Law Enforcement Vehicle Hack: <a href="https://www.youtube.com/watch?v=Soj3P3S3i_o">https://www.youtube.com/watch?v=Soj3P3S3i_o</a></p><p>* Synack Website: <a href="Synack.com ">Synack.com </a></p><p>* Synack Trust Report: <a href="https://www.synack.com/trust-report/">https://www.synack.com/trust-report/</a></p><p>* Jeremiah Roe’s Twitter: ​​<a href="https://twitter.com/c1ph3rflux">@c1ph3rflux</a></p><p>* Bella DeShantz-Cook’s Twitter: <a href="https://twitter.com/bellarosedc">@bellarosedc</a></p><p>* Black Hat Events: <a href="https://go.synack.com/black-hat-events-2021" target="_blank">https://go.synack.com/black-hat-events-2021</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 30 Jul 2021 09:00:00 +0000</pubDate>
      <author>Jeremiah Roe, Alissa Knight, Bella DeShantz-Cook</author>
      <link>https://were-in.simplecast.com/episodes/from-digital-delinquent-to-government-hacker-with-alissa-knight-Uzc30uvZ</link>
      <content:encoded><![CDATA[<p>In this episode, author, hacker, entrepreneur, and content creator Alissa Knight reveals her journey from “bullied computer nerd” to federal cybersecurity contractor to famed car hacker. She gets real about the risk of APIs, offers up some must-hear advice for anyone getting into cybersecurity, and delivers candid views about the infosec industry as a whole. </p><p>-------</p><p><strong>Why you should listen:</strong></p><p>* Get inside the head of one of the most provocative and interesting cybersecurity influencers today.</p><p>* Hear about her work with federal agencies to help secure the future of transportation.</p><p>* Learn more about the urgent need for better Application Programming Interface (API) security.</p><p>* Get new insights into the growing threat to health care organizations and financial institutions.</p><p>* Hear Alissa’s take on how cybersecurity companies can improve their approach to content and marketing.</p><p>-------</p><p><strong>Key Quotes: </strong></p><p>* “I care more about the adversary that can hack my car from her living room. I care more about the hacker that can take remote control of my car that I'm driving around in my family with, from anywhere.”</p><p>* “Okay. Yes. I <i>can </i>take remote control of this vehicle. I <i>can </i>move the steering wheel. I <i>can </i>push the brakes.”</p><p>* “You would be shocked if I told you how endemic [it is in] the industry to hard-code not only tokens, keys, and credentials like usernames and passwords and to apps for their own APIs, but also third-party APIs like payment processors.”</p><p>* “The plumbing for our entire financial system and healthcare system is APIs...that data is worth more than oil, right? So hackers are shifting their attention to hacking APIs.”</p><p>-------</p><p><strong>Related Links:</strong></p><p>* Alissa Knight’s Twitter: <a href="https://twitter.com/alissaknight">@alissaknight </a></p><p>* Knight Ink Media: ​​<a href="https://knightinkmedia.com/">https://knightinkmedia.com/</a></p><p>* Alissa Knight’s Website: <a href="https://www.alissaknight.com/">https://www.alissaknight.com/</a></p><p>* Official Trailer: Law Enforcement Vehicle Hack: <a href="https://www.youtube.com/watch?v=Soj3P3S3i_o">https://www.youtube.com/watch?v=Soj3P3S3i_o</a></p><p>* Synack Website: <a href="Synack.com ">Synack.com </a></p><p>* Synack Trust Report: <a href="https://www.synack.com/trust-report/">https://www.synack.com/trust-report/</a></p><p>* Jeremiah Roe’s Twitter: ​​<a href="https://twitter.com/c1ph3rflux">@c1ph3rflux</a></p><p>* Bella DeShantz-Cook’s Twitter: <a href="https://twitter.com/bellarosedc">@bellarosedc</a></p><p>* Black Hat Events: <a href="https://go.synack.com/black-hat-events-2021" target="_blank">https://go.synack.com/black-hat-events-2021</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="46404050" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/67a2381a-20d2-4316-9cec-230e8e878b00/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=67a2381a-20d2-4316-9cec-230e8e878b00&amp;feed=_SsyS46z"/>
      <itunes:title>From Digital Delinquent to Government Hacker with Author, Entrepreneur, and Cybersecurity Influencer Alissa Knight</itunes:title>
      <itunes:author>Jeremiah Roe, Alissa Knight, Bella DeShantz-Cook</itunes:author>
      <itunes:duration>00:48:20</itunes:duration>
      <itunes:summary>In this episode, author, hacker, entrepreneur, and content creator Alissa Knight reveals her journey from “bullied computer nerd” to federal cybersecurity contractor to famed car hacker. She gets real about the risk of APIs, offers up some must-hear advice for anyone getting into cybersecurity, and delivers candid views about the infosec industry as a whole. </itunes:summary>
      <itunes:subtitle>In this episode, author, hacker, entrepreneur, and content creator Alissa Knight reveals her journey from “bullied computer nerd” to federal cybersecurity contractor to famed car hacker. She gets real about the risk of APIs, offers up some must-hear advice for anyone getting into cybersecurity, and delivers candid views about the infosec industry as a whole. </itunes:subtitle>
      <itunes:keywords>hackers, computers, cybersecurity, hacking, government, coding</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7718663e-02df-410b-8130-3d5c55f1f6a5</guid>
      <title>There is No ‘Take Down the Whole US Grid’ with Sarah Freeman and Andy Bochman</title>
      <description><![CDATA[<p><strong>Why you should listen:</strong></p><ul><li>Hackers are targeting critical infrastructure and there’s an urgent need for smarter cybersecurity defenses to protect Operational Technology. </li><li>The best practices to defend against attacks on utilities.</li><li>Why there is no such thing as “taking down the whole US grid.”</li></ul><p><strong>Five Key Quotes: </strong></p><ul><li>“How can you secure what you don’t even know you have? If you don’t even know what you have down to some level of detail...you’re not going to be in a good position to defend it.”  - Andy Bochman </li><li>“The most senior person with the word cyber in their title ideally is at least at the VP level.” - Andy Bochman </li><li>“You have to not only understand how the attacker can gain access to your network but ultimately gain access to the accounts that are most valuable – where are those crown jewel accounts?” - Sarah Freeman</li><li>“IT and OT needs to be merged …the problem is cyber is here to stay and everybody needs to take part in this security process.” - Sarah Freeman</li><li>“The government is most interested in <i>who</i> conducted the attack... The fact that there are two parties here with differing interests is a core issue.” - Sarah Freeman</li></ul><p><strong>Related Links:</strong></p><ul><li><a href="https://www.amazon.com/Countering-Cyber-Sabotage-Consequence-Driven-Cyber-Informed/dp/036749115X">Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) 1st Edition</a></li><li><a href="https://hbr.org/2018/05/internet-insecurity">https://hbr.org/2018/05/internet-insecurity</a></li><li><a href="https://medium.com/cxo-magazine/the-missing-chief-security-officer-11979a54fbf9">https://medium.com/cxo-magazine/the-missing-chief-security-officer-11979a54fbf9</a></li><li><a href="https://www.synack.com/">https://www.synack.com/</a></li><li>LinkedIn: <ul><li><a href="https://www.linkedin.com/in/andybochman">Andy Bochman</a></li><li><a href="https://www.linkedin.com/in/sarah-freeman-7817b121/">Sarah Freeman</a></li></ul></li><li>Twitter:<ul><li><a href="https://twitter.com/andybochman">@andybochman</a></li></ul></li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 14 Jul 2021 09:00:00 +0000</pubDate>
      <author>Andy Bochman, Bella DeShantz-Cook, Jeremiah Roe, Sarah Freeman</author>
      <link>https://were-in.simplecast.com/episodes/there-is-no-take-down-the-whole-us-grid-o05hBZCM</link>
      <content:encoded><![CDATA[<p><strong>Why you should listen:</strong></p><ul><li>Hackers are targeting critical infrastructure and there’s an urgent need for smarter cybersecurity defenses to protect Operational Technology. </li><li>The best practices to defend against attacks on utilities.</li><li>Why there is no such thing as “taking down the whole US grid.”</li></ul><p><strong>Five Key Quotes: </strong></p><ul><li>“How can you secure what you don’t even know you have? If you don’t even know what you have down to some level of detail...you’re not going to be in a good position to defend it.”  - Andy Bochman </li><li>“The most senior person with the word cyber in their title ideally is at least at the VP level.” - Andy Bochman </li><li>“You have to not only understand how the attacker can gain access to your network but ultimately gain access to the accounts that are most valuable – where are those crown jewel accounts?” - Sarah Freeman</li><li>“IT and OT needs to be merged …the problem is cyber is here to stay and everybody needs to take part in this security process.” - Sarah Freeman</li><li>“The government is most interested in <i>who</i> conducted the attack... The fact that there are two parties here with differing interests is a core issue.” - Sarah Freeman</li></ul><p><strong>Related Links:</strong></p><ul><li><a href="https://www.amazon.com/Countering-Cyber-Sabotage-Consequence-Driven-Cyber-Informed/dp/036749115X">Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) 1st Edition</a></li><li><a href="https://hbr.org/2018/05/internet-insecurity">https://hbr.org/2018/05/internet-insecurity</a></li><li><a href="https://medium.com/cxo-magazine/the-missing-chief-security-officer-11979a54fbf9">https://medium.com/cxo-magazine/the-missing-chief-security-officer-11979a54fbf9</a></li><li><a href="https://www.synack.com/">https://www.synack.com/</a></li><li>LinkedIn: <ul><li><a href="https://www.linkedin.com/in/andybochman">Andy Bochman</a></li><li><a href="https://www.linkedin.com/in/sarah-freeman-7817b121/">Sarah Freeman</a></li></ul></li><li>Twitter:<ul><li><a href="https://twitter.com/andybochman">@andybochman</a></li></ul></li></ul><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="40890347" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/0f56a086-75d7-4537-9468-7d7df8b1ec77/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=0f56a086-75d7-4537-9468-7d7df8b1ec77&amp;feed=_SsyS46z"/>
      <itunes:title>There is No ‘Take Down the Whole US Grid’ with Sarah Freeman and Andy Bochman</itunes:title>
      <itunes:author>Andy Bochman, Bella DeShantz-Cook, Jeremiah Roe, Sarah Freeman</itunes:author>
      <itunes:duration>00:42:35</itunes:duration>
      <itunes:summary>In this episode, security experts and authors Sarah Freeman and Andy Bochman of the Idaho National Laboratory discuss today’s cyberthreat to utilities, debunk myths about taking down the grid and explain just how significantly the 2015 Ukraine power grid hack shifted everyone’s thinking when it comes to protecting critical infrastructure.</itunes:summary>
      <itunes:subtitle>In this episode, security experts and authors Sarah Freeman and Andy Bochman of the Idaho National Laboratory discuss today’s cyberthreat to utilities, debunk myths about taking down the grid and explain just how significantly the 2015 Ukraine power grid hack shifted everyone’s thinking when it comes to protecting critical infrastructure.</itunes:subtitle>
      <itunes:keywords>cybersecurity, security, hacking, ukraine, tech, cyber attacks, network, it</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">32eaf8fa-1f70-4e91-9be1-68c7689109f3</guid>
      <title>Trailer</title>
      <description><![CDATA[<p><i>News about cyberattacks and data breaches is relentless and overwhelming. We're drowning in stories about ransomware and the latest digital threats. But we don't hear enough about the people fighting on the frontlines of information security, the researchers making us more secure and the pioneers doing the hard work to fix today’s cybersecurity crisis. </i></p><p><i>We launched WE’RE IN! to tell those stories. You'll hear directly from hackers, security pioneers and technologists working in the trenches of cybersecurity. They’ll share their strategies, tactics and solutions for today's tough problems. We'll also go inside the cybersecurity community to talk about the issues and challenges in the industry. You'll hear from some of the most prominent, interesting and provocative people in the field about their journeys in this community, and what it’s like on the inside.</i></p><p><i>WE'RE IN! is for anyone who cares about cybersecurity. It’s for anyone who wants to go beyond the headlines. It’s for anyone who wants to drive change. We're all facing the cybersecurity dilemma together -- and together we can solve it. Join the conversation on WE'RE IN!</i></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 12 Jul 2021 21:47:52 +0000</pubDate>
      <author>Synack</author>
      <link>https://were-in.simplecast.com/episodes/trailer-ktm10PxR</link>
      <content:encoded><![CDATA[<p><i>News about cyberattacks and data breaches is relentless and overwhelming. We're drowning in stories about ransomware and the latest digital threats. But we don't hear enough about the people fighting on the frontlines of information security, the researchers making us more secure and the pioneers doing the hard work to fix today’s cybersecurity crisis. </i></p><p><i>We launched WE’RE IN! to tell those stories. You'll hear directly from hackers, security pioneers and technologists working in the trenches of cybersecurity. They’ll share their strategies, tactics and solutions for today's tough problems. We'll also go inside the cybersecurity community to talk about the issues and challenges in the industry. You'll hear from some of the most prominent, interesting and provocative people in the field about their journeys in this community, and what it’s like on the inside.</i></p><p><i>WE'RE IN! is for anyone who cares about cybersecurity. It’s for anyone who wants to go beyond the headlines. It’s for anyone who wants to drive change. We're all facing the cybersecurity dilemma together -- and together we can solve it. Join the conversation on WE'RE IN!</i></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1518092" type="audio/mpeg" url="https://media.casted.us/track/afp-922686-injected.calisto.simplecastaudio.com/040d0778-1673-421f-bdbd-8a3f69f6796e/episodes/21d28d94-dad7-4d73-ad7d-2ffc6a0b4071/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=040d0778-1673-421f-bdbd-8a3f69f6796e&amp;awEpisodeId=21d28d94-dad7-4d73-ad7d-2ffc6a0b4071&amp;feed=_SsyS46z"/>
      <itunes:title>Trailer</itunes:title>
      <itunes:author>Synack</itunes:author>
      <itunes:duration>00:01:34</itunes:duration>
      <itunes:summary>WE&apos;RE IN! is for anyone who cares about cybersecurity. It’s for anyone who wants to go beyond the headlines. It’s for anyone who wants to drive change. We&apos;re all facing the cybersecurity dilemma together -- and together we can solve it. Join the conversation on WE&apos;RE IN!</itunes:summary>
      <itunes:subtitle>WE&apos;RE IN! is for anyone who cares about cybersecurity. It’s for anyone who wants to go beyond the headlines. It’s for anyone who wants to drive change. We&apos;re all facing the cybersecurity dilemma together -- and together we can solve it. Join the conversation on WE&apos;RE IN!</itunes:subtitle>
      <itunes:keywords>digital, technology, cyber, information security, cybersecurity, security, digital security, tech, hacker</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
  </channel>
</rss>