<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/aKTBaSVG" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Zero Trusts Given</title>
    <description>In the complex world of Department of Defense (DoD) cybersecurity, Zero Trust has become a critical imperative. Cut through the noise and gain actionable insights with Zero Trusts Given, a podcast series dedicated to demystifying Zero Trust implementation within the DoD and broader defense community. This podcast series brings together leading experts from government and industry to explore the critical aspects of Zero Trust surrounding civilian agencies, the Defense Industrial Base (DIB), MIPDEP, and the overall progress of Zero Trust initiatives within the DoD. Join hosts Tom Tittermary and Tom Gianelos for a practical look into how agencies can navigate the DoD Zero Trust landscape.</description>
    <language>en</language>
    <pubDate>Fri, 20 Feb 2026 22:31:06 +0000</pubDate>
    <lastBuildDate>Fri, 20 Feb 2026 22:31:17 +0000</lastBuildDate>
    <image>
      <link>https://zero-trusts-given.simplecast.com</link>
      <title>Zero Trusts Given</title>
      <url>https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed</url>
    </image>
    <link>https://zero-trusts-given.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>In the complex world of Department of Defense (DoD) cybersecurity, Zero Trust has become a critical imperative. Cut through the noise and gain actionable insights with Zero Trusts Given, a podcast series dedicated to demystifying Zero Trust implementation within the DoD and broader defense community. This podcast series brings together leading experts from government and industry to explore the critical aspects of Zero Trust surrounding civilian agencies, the Defense Industrial Base (DIB), MIPDEP, and the overall progress of Zero Trust initiatives within the DoD. Join hosts Tom Tittermary and Tom Gianelos for a practical look into how agencies can navigate the DoD Zero Trust landscape.</itunes:summary>
    <itunes:author>Tom Tittermary, Tom Gianelos</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/aKTBaSVG</itunes:new-feed-url>
    <itunes:owner>
      <itunes:name>Carahsoft Technology Corp.</itunes:name>
      <itunes:email>zscalermarketing@carahsoft.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Government"/>
    <item>
      <guid isPermaLink="false">47e44905-633b-4b25-96db-232bf67a1ace</guid>
      <title>&quot;Two Great Tastes That Taste Great Together,&quot; Zscaler &amp; Vectra AI in the DoD</title>
      <description><![CDATA[Episode twelve of the podcast, "Two Great Tastes That Taste Great Together," Zscaler & Vectra AI in the DoD, features Robert Marcoux, Federal Principal Technologist at Vectra AI, for a discussion on why traditional perimeter-based security no longer works in a world dominated by remote users, cloud services, and SaaS, and how Zero Trust has become essential. They explore how AI-driven signal analysis cuts through data noise, helping resource strained security teams detect threats faster and more accurately. The conversation also showcases how Vectra AI’s integration with Zscaler accelerates identity-centric detection and response, reducing MTTR by linking anomalous behavior directly to specific users and increasing visibility into attacks. Finally, the discussion emphasizes practical Zero Trust enforcement through a human in the loop model, combining AI-powered context with analyst oversight to maintain resilience across federal, defense, and critical infrastructure environments. 
]]></description>
      <pubDate>Fri, 20 Feb 2026 22:31:06 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/two-great-tastes-that-taste-great-together-zscaler-vectra-ai-in-the-dod-7vhJTD8X</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="30931266" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/035e5b7a-018e-4c74-8e87-9cc1563ea7c0/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/audio/group/df40de65-58a4-49bb-8541-779ac86a7bc9/group-item/1bb93a61-25b0-4284-a1cc-96294cae3f9c/128_default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>&quot;Two Great Tastes That Taste Great Together,&quot; Zscaler &amp; Vectra AI in the DoD</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:12</itunes:duration>
      <itunes:summary>Episode twelve of the podcast, &quot;Two Great Tastes That Taste Great Together,&quot; Zscaler &amp; Vectra AI in the DoD, features Robert Marcoux, Federal Principal Technologist at Vectra AI, for a discussion on why traditional perimeter-based security no longer works in a world dominated by remote users, cloud services, and SaaS, and how Zero Trust has become essential. They explore how AI-driven signal analysis cuts through data noise, helping resource strained security teams detect threats faster and more accurately. The conversation also showcases how Vectra AI’s integration with Zscaler accelerates identity-centric detection and response, reducing MTTR by linking anomalous behavior directly to specific users and increasing visibility into attacks. Finally, the discussion emphasizes practical Zero Trust enforcement through a human in the loop model, combining AI-powered context with analyst oversight to maintain resilience across federal, defense, and critical infrastructure environments.</itunes:summary>
      <itunes:subtitle>Episode twelve of the podcast, &quot;Two Great Tastes That Taste Great Together,&quot; Zscaler &amp; Vectra AI in the DoD, features Robert Marcoux, Federal Principal Technologist at Vectra AI, for a discussion on why traditional perimeter-based security no longer works in a world dominated by remote users, cloud services, and SaaS, and how Zero Trust has become essential. They explore how AI-driven signal analysis cuts through data noise, helping resource strained security teams detect threats faster and more accurately. The conversation also showcases how Vectra AI’s integration with Zscaler accelerates identity-centric detection and response, reducing MTTR by linking anomalous behavior directly to specific users and increasing visibility into attacks. Finally, the discussion emphasizes practical Zero Trust enforcement through a human in the loop model, combining AI-powered context with analyst oversight to maintain resilience across federal, defense, and critical infrastructure environments.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d57c4228-39f7-4323-9824-eb54f3ba912f</guid>
      <title>If You’re Reachable, You’re Breachable: Modernizing Defense with Zero Trust</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Tue, 16 Dec 2025 19:29:06 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/if-youre-reachable-youre-breachable-modernizing-defense-with-zero-trust-aan_sOWA</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="69046650" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/5072df4d-d086-4691-b198-770ade589302/audio/7a8b8b72-a832-47df-8afc-8302c2444967/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>If You’re Reachable, You’re Breachable: Modernizing Defense with Zero Trust</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>01:11:55</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c002f4fe-21d8-4ef7-8d19-098d25a01b41</guid>
      <title>Identity as the Core of Zero Trust</title>
      <description><![CDATA[Episode ten of the podcast, Identity as the Core of Zero Trust, features Dan Miller from Ping Identity, emphasizing that verifying digital identity and assessing user attributes in real time is critical before granting access to any DoD resource. He discusses the importance of using detailed attributes like location, device, and role instead of relying on simple logins to make smarter, real-time access decisions, which is crucial for secure operations in classified and remote environments. Since many DoD units work in disconnected settings, Ping Identity provides local identity solutions that keep missions running and sync with the cloud when reconnected. This episode explores how, in joint missions, enforcing secure data sharing through identity-driven access and tagging paves the way for granular Zero Trust. 
]]></description>
      <pubDate>Wed, 3 Dec 2025 14:10:47 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/identity-as-the-core-of-zero-trust-7VClqPqx</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="44467329" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/a5fb780b-83dd-494a-8e2e-74062c299881/audio/bd531840-8d5e-4e97-8c36-5d9adea07753/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>Identity as the Core of Zero Trust</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:18</itunes:duration>
      <itunes:summary>Episode ten of the podcast, Identity as the Core of Zero Trust, features Dan Miller from Ping Identity, emphasizing that verifying digital identity and assessing user attributes in real time is critical before granting access to any DoD resource. He discusses the importance of using detailed attributes like location, device, and role instead of relying on simple logins to make smarter, real-time access decisions, which is crucial for secure operations in classified and remote environments. Since many DoD units work in disconnected settings, Ping Identity provides local identity solutions that keep missions running and sync with the cloud when reconnected. This episode explores how, in joint missions, enforcing secure data sharing through identity-driven access and tagging paves the way for granular Zero Trust.</itunes:summary>
      <itunes:subtitle>Episode ten of the podcast, Identity as the Core of Zero Trust, features Dan Miller from Ping Identity, emphasizing that verifying digital identity and assessing user attributes in real time is critical before granting access to any DoD resource. He discusses the importance of using detailed attributes like location, device, and role instead of relying on simple logins to make smarter, real-time access decisions, which is crucial for secure operations in classified and remote environments. Since many DoD units work in disconnected settings, Ping Identity provides local identity solutions that keep missions running and sync with the cloud when reconnected. This episode explores how, in joint missions, enforcing secure data sharing through identity-driven access and tagging paves the way for granular Zero Trust.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">65a82cf6-adbc-4a4e-9809-a61204c209f5</guid>
      <title>These Guys Literally Wrote the Book</title>
      <description><![CDATA[Episode nine of the podcast, These Guys Literally Wrote the Book, features Rob Freter and Joe Brinker from True Zero Technologies, delving into the evolving implementation of Zero Trust principles across the Department of Defense, the Defense Industrial Base, and the broader federal government. They discuss the importance of starting with a clear problem statement and solution, emphasizing the cultural and practical need for a structured approach to security, including policy enforcement points (PEPs). Drawing analogies to cinematic sequels like The Godfather Part II, the episode explores how Zero Trust architectures have evolved to be even better with their second iterations, offering cleaner lines and easier readability. 
]]></description>
      <pubDate>Mon, 15 Sep 2025 21:20:40 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/these-guys-literally-wrote-the-book-Z8Esr_EM</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="53805777" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/9e32cfd5-560f-4a40-83c9-d45e2483ffb3/audio/faf5cbf7-93b0-4bdd-ae12-282f088869f0/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>These Guys Literally Wrote the Book</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:02</itunes:duration>
      <itunes:summary>Episode nine of the podcast, These Guys Literally Wrote the Book, features Rob Freter and Joe Brinker from True Zero Technologies, delving into the evolving implementation of Zero Trust principles across the Department of Defense, the Defense Industrial Base, and the broader federal government. They discuss the importance of starting with a clear problem statement and solution, emphasizing the cultural and practical need for a structured approach to security, including policy enforcement points (PEPs). Drawing analogies to cinematic sequels like The Godfather Part II, the episode explores how Zero Trust architectures have evolved to be even better with their second iterations, offering cleaner lines and easier readability.</itunes:summary>
      <itunes:subtitle>Episode nine of the podcast, These Guys Literally Wrote the Book, features Rob Freter and Joe Brinker from True Zero Technologies, delving into the evolving implementation of Zero Trust principles across the Department of Defense, the Defense Industrial Base, and the broader federal government. They discuss the importance of starting with a clear problem statement and solution, emphasizing the cultural and practical need for a structured approach to security, including policy enforcement points (PEPs). Drawing analogies to cinematic sequels like The Godfather Part II, the episode explores how Zero Trust architectures have evolved to be even better with their second iterations, offering cleaner lines and easier readability.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">04e2a32d-7c27-4fff-9c8b-76ea316d7495</guid>
      <title>Thinking Tactically</title>
      <description><![CDATA[In this episode of Zero Trusts Given, hosts Tom Tittermary and Tom Gianelos are joined by Jared Shepard, CEO of Hypori, to discuss redefining device security and enabling Zero Trust in edge environments. Jared introduces Hypori’s virtual mobile operating system, which eliminates data at rest and transit on edge devices by streaming encrypted pixels securely, allowing users to work from compromised or personal devices without risk to enterprise systems. This approach enables agility in BYOD, tactical missions, and mission partner environments, simplifying access while maintaining strong security posture. Jared also discusses the importance of a defense-in-depth approach, avoiding reliance on single vendors, and improving downstream supply chain security to protect critical infrastructures. The episode concludes with a heartfelt discussion about Jared’s nonprofit, Warrior’s Ethos, which supports veterans transitioning from military service by providing mentorship, resources, and job support. He encourages listeners to volunteer, hire veterans, and help ease their transition into civilian opportunities.

This episode is perfect for tech enthusiasts, cybersecurity professionals, and anyone interested in understanding how Zero Trust is transforming the defense landscape. Tune in to gain valuable insights from leading experts on the forefront of innovation and cybersecurity policy in the DoD!
 
]]></description>
      <pubDate>Mon, 14 Jul 2025 21:05:55 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/thinking-tactically-IGSUlmsV</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="54009564" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/d05b8226-b216-4ae2-8180-d7a9a6b35179/audio/bcf8102a-3cd7-41e1-9bf8-c74aafe4a064/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>Thinking Tactically</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:56:15</itunes:duration>
      <itunes:summary>In this episode of Zero Trusts Given, hosts Tom Tittermary and Tom Gianelos are joined by Jared Shepard, CEO of Hypori, to discuss redefining device security and enabling Zero Trust in edge environments. Jared introduces Hypori’s virtual mobile operating system, which eliminates data at rest and transit on edge devices by streaming encrypted pixels securely, allowing users to work from compromised or personal devices without risk to enterprise systems. This approach enables agility in BYOD, tactical missions, and mission partner environments, simplifying access while maintaining strong security posture. Jared also discusses the importance of a defense-in-depth approach, avoiding reliance on single vendors, and improving downstream supply chain security to protect critical infrastructures. The episode concludes with a heartfelt discussion about Jared’s nonprofit, Warrior’s Ethos, which supports veterans transitioning from military service by providing mentorship, resources, and job support. He encourages listeners to volunteer, hire veterans, and help ease their transition into civilian opportunities.

This episode is perfect for tech enthusiasts, cybersecurity professionals, and anyone interested in understanding how Zero Trust is transforming the defense landscape. Tune in to gain valuable insights from leading experts on the forefront of innovation and cybersecurity policy in the DoD!
</itunes:summary>
      <itunes:subtitle>In this episode of Zero Trusts Given, hosts Tom Tittermary and Tom Gianelos are joined by Jared Shepard, CEO of Hypori, to discuss redefining device security and enabling Zero Trust in edge environments. Jared introduces Hypori’s virtual mobile operating system, which eliminates data at rest and transit on edge devices by streaming encrypted pixels securely, allowing users to work from compromised or personal devices without risk to enterprise systems. This approach enables agility in BYOD, tactical missions, and mission partner environments, simplifying access while maintaining strong security posture. Jared also discusses the importance of a defense-in-depth approach, avoiding reliance on single vendors, and improving downstream supply chain security to protect critical infrastructures. The episode concludes with a heartfelt discussion about Jared’s nonprofit, Warrior’s Ethos, which supports veterans transitioning from military service by providing mentorship, resources, and job support. He encourages listeners to volunteer, hire veterans, and help ease their transition into civilian opportunities.

This episode is perfect for tech enthusiasts, cybersecurity professionals, and anyone interested in understanding how Zero Trust is transforming the defense landscape. Tune in to gain valuable insights from leading experts on the forefront of innovation and cybersecurity policy in the DoD!
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">90361fea-f877-4e78-9759-b8f4f2d16aee</guid>
      <title>Strategies with How to Eat an Elephant</title>
      <description><![CDATA[In this episode of Zero Trust Given, hosts Tom Tittermary and Tom Gianelos chat with Jean-Paul (JP) Bergeaux, CTO of GuidePoint Federal, about implementing Zero Trust in government and DoD environments. They explore key challenges, such as tackling the data pillar, breaking down silos between teams, and automating risk-based decision-making. JP emphasizes the importance of starting small with achievable wins, leveraging existing tools, and taking an iterative approach. He shares how his team helped a DoD agency make significant progress without new tech, showing that Zero Trust is more about collaboration, strategy, and mindset than an overnight overhaul. Zero Trust is a journey of gradual improvement that integrates security into everything while supporting mission effectiveness.

This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders, and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
 
]]></description>
      <pubDate>Tue, 24 Jun 2025 20:07:34 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/strategies-with-how-to-eat-an-elephant-gPl_YBlj</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="49305852" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/0bb311a8-40af-4faa-8f73-f043e85aabe7/audio/98c257db-c185-49c5-85c7-ff99cbf939ec/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>Strategies with How to Eat an Elephant</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:21</itunes:duration>
      <itunes:summary>In this episode of Zero Trust Given, hosts Tom Tittermary and Tom Gianelos chat with Jean-Paul (JP) Bergeaux, CTO of GuidePoint Federal, about implementing Zero Trust in government and DoD environments. They explore key challenges, such as tackling the data pillar, breaking down silos between teams, and automating risk-based decision-making. JP emphasizes the importance of starting small with achievable wins, leveraging existing tools, and taking an iterative approach. He shares how his team helped a DoD agency make significant progress without new tech, showing that Zero Trust is more about collaboration, strategy, and mindset than an overnight overhaul. Zero Trust is a journey of gradual improvement that integrates security into everything while supporting mission effectiveness.

This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders, and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
</itunes:summary>
      <itunes:subtitle>In this episode of Zero Trust Given, hosts Tom Tittermary and Tom Gianelos chat with Jean-Paul (JP) Bergeaux, CTO of GuidePoint Federal, about implementing Zero Trust in government and DoD environments. They explore key challenges, such as tackling the data pillar, breaking down silos between teams, and automating risk-based decision-making. JP emphasizes the importance of starting small with achievable wins, leveraging existing tools, and taking an iterative approach. He shares how his team helped a DoD agency make significant progress without new tech, showing that Zero Trust is more about collaboration, strategy, and mindset than an overnight overhaul. Zero Trust is a journey of gradual improvement that integrates security into everything while supporting mission effectiveness.

This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders, and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db6c1e26-572d-4a6c-a62e-0cde742be9fc</guid>
      <title>The Conrad</title>
      <description><![CDATA[This episode, featuring hosts Tom Tittermary and Tom Gianelos with special Zscaler guest Conrad Maiorino, explores how Zero Trust eliminates network access points by making applications unreachable, as opposed to traditional security. They discuss Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA), which are used for secure, mutually authenticated user-to-application tunnels, disrupting adversary tactics.
The discussion highlights Zscaler's solution for "Denied, Deprecated, Intermittent or Low Bandwidth" (DDIL/CDOL) scenarios, ensuring secure access even without constant cloud connectivity. The speakers also cover integrating Zscaler with identity providers for policy building based on user attributes and why this Zero Trust security is valuable for the DoD and other critical sectors like hospitals and manufacturing.
This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
 
]]></description>
      <pubDate>Tue, 10 Jun 2025 19:09:08 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/the-conrad-mn4VA2PG</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="52087370" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/6e6ff390-64ee-41ec-8385-87476f6ba23b/audio/7144b633-eb54-416c-91f0-d3e2d593fa0f/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>The Conrad</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:15</itunes:duration>
      <itunes:summary>This episode, featuring hosts Tom Tittermary and Tom Gianelos with special Zscaler guest Conrad Maiorino, explores how Zero Trust eliminates network access points by making applications unreachable, as opposed to traditional security. They discuss Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA), which are used for secure, mutually authenticated user-to-application tunnels, disrupting adversary tactics.
The discussion highlights Zscaler&apos;s solution for &quot;Denied, Deprecated, Intermittent or Low Bandwidth&quot; (DDIL/CDOL) scenarios, ensuring secure access even without constant cloud connectivity. The speakers also cover integrating Zscaler with identity providers for policy building based on user attributes and why this Zero Trust security is valuable for the DoD and other critical sectors like hospitals and manufacturing.
This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
</itunes:summary>
      <itunes:subtitle>This episode, featuring hosts Tom Tittermary and Tom Gianelos with special Zscaler guest Conrad Maiorino, explores how Zero Trust eliminates network access points by making applications unreachable, as opposed to traditional security. They discuss Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA), which are used for secure, mutually authenticated user-to-application tunnels, disrupting adversary tactics.
The discussion highlights Zscaler&apos;s solution for &quot;Denied, Deprecated, Intermittent or Low Bandwidth&quot; (DDIL/CDOL) scenarios, ensuring secure access even without constant cloud connectivity. The speakers also cover integrating Zscaler with identity providers for policy building based on user attributes and why this Zero Trust security is valuable for the DoD and other critical sectors like hospitals and manufacturing.
This episode is perfect for cybersecurity professionals, especially those working with or for the Department of Defense, IT leaders and network architects looking to implement or deepen their understanding of Zero Trust principles. Listen today!
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3119f992-bb65-46e2-89e2-c5159beac24b</guid>
      <title>Drowning in Data</title>
      <description><![CDATA[It can be daunting to think of the amount of data held by the Federal Government and specifically the DOD. Considering that a full zero trust implementation would mean tagging every piece, regardless of if it is a file, or in a database, we wonder how we could ever get there. Throw into the mix that every day more data is being generated than there is capacity for humans to tag that data effectively. What is there to do? How can we clear the backlog and create new methodologies to tag data effectively in line? Listen this week for some ideas and directions on the matter. 
]]></description>
      <pubDate>Wed, 28 May 2025 19:18:47 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/drowning-in-data-lQ0zj_b_</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="46162381" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/d8c85757-2b44-4e7f-98df-c92add8f0401/audio/79fe7619-0402-4679-a54a-080f327c029b/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>Drowning in Data</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:05</itunes:duration>
      <itunes:summary>It can be daunting to think of the amount of data held by the Federal Government and specifically the DOD. Considering that a full zero trust implementation would mean tagging every piece, regardless of if it is a file, or in a database, we wonder how we could ever get there. Throw into the mix that every day more data is being generated than there is capacity for humans to tag that data effectively. What is there to do? How can we clear the backlog and create new methodologies to tag data effectively in line? Listen this week for some ideas and directions on the matter.</itunes:summary>
      <itunes:subtitle>It can be daunting to think of the amount of data held by the Federal Government and specifically the DOD. Considering that a full zero trust implementation would mean tagging every piece, regardless of if it is a file, or in a database, we wonder how we could ever get there. Throw into the mix that every day more data is being generated than there is capacity for humans to tag that data effectively. What is there to do? How can we clear the backlog and create new methodologies to tag data effectively in line? Listen this week for some ideas and directions on the matter.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">decad34d-3d5b-4614-814c-c8efac26a7f1</guid>
      <title>Needle in the Haystack</title>
      <description><![CDATA[During this episode, David Pearson from ServiceNow joins hosts Tom Tittermary and Tom Gianelos to discuss the process of analyzing and simplifying large amounts of data, and how to make decisions based on the data collected. They also touch on the different Zero Trust Pillars.
This episode is perfect for anyone interested in better understanding data management and the complexities of implementing Zero Trust in large organizations. Tune in today to discover actionable insights on leveraging data for Zero Trust and fortifying your organization's security! 
]]></description>
      <pubDate>Mon, 19 May 2025 17:13:03 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/needle-in-the-haystack-e7a8owdJ</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="42386955" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/b9abfc51-658c-4a46-a902-dbc7ce7c4d41/audio/76857dba-cf4f-409c-aa0d-91a9122f18fb/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>Needle in the Haystack</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:09</itunes:duration>
      <itunes:summary>During this episode, David Pearson from ServiceNow joins hosts Tom Tittermary and Tom Gianelos to discuss the process of analyzing and simplifying large amounts of data, and how to make decisions based on the data collected. They also touch on the different Zero Trust Pillars.
This episode is perfect for anyone interested in better understanding data management and the complexities of implementing Zero Trust in large organizations. Tune in today to discover actionable insights on leveraging data for Zero Trust and fortifying your organization&apos;s security!</itunes:summary>
      <itunes:subtitle>During this episode, David Pearson from ServiceNow joins hosts Tom Tittermary and Tom Gianelos to discuss the process of analyzing and simplifying large amounts of data, and how to make decisions based on the data collected. They also touch on the different Zero Trust Pillars.
This episode is perfect for anyone interested in better understanding data management and the complexities of implementing Zero Trust in large organizations. Tune in today to discover actionable insights on leveraging data for Zero Trust and fortifying your organization&apos;s security!</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">05f9f55b-74b5-499f-a22c-017b8e9d9a3a</guid>
      <title>Do Androids Dream of Electric Data?</title>
      <description><![CDATA[This episode of Zero Trust Given features Skip Farmer from Primer, alongside hosts Tom Tittermary and Tom Gianelos, and examines the role of AI in the Zero Trust security model. From determining access and trust levels for AI entities to the phenomenon of AI “hallucinations” that produce inaccurate information, this episode dives deep into the possibilities and challenges presented by Artificial Intelligence.
This episode is perfect for cybersecurity professionals, tech enthusiasts, and anyone interested in the intersection of artificial intelligence and data security, especially with Zero Trust. Tune in today! 
]]></description>
      <pubDate>Mon, 12 May 2025 18:48:04 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/do-androids-dream-of-electric-data-sd1INoRp</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="58095115" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/93b6f61a-0700-406f-b1c5-30e82f2d6a37/audio/eccd3413-7082-4de7-8fe8-32d2b6cd2754/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>Do Androids Dream of Electric Data?</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:30</itunes:duration>
      <itunes:summary>This episode of Zero Trust Given features Skip Farmer from Primer, alongside hosts Tom Tittermary and Tom Gianelos, and examines the role of AI in the Zero Trust security model. From determining access and trust levels for AI entities to the phenomenon of AI “hallucinations” that produce inaccurate information, this episode dives deep into the possibilities and challenges presented by Artificial Intelligence.
This episode is perfect for cybersecurity professionals, tech enthusiasts, and anyone interested in the intersection of artificial intelligence and data security, especially with Zero Trust. Tune in today!</itunes:summary>
      <itunes:subtitle>This episode of Zero Trust Given features Skip Farmer from Primer, alongside hosts Tom Tittermary and Tom Gianelos, and examines the role of AI in the Zero Trust security model. From determining access and trust levels for AI entities to the phenomenon of AI “hallucinations” that produce inaccurate information, this episode dives deep into the possibilities and challenges presented by Artificial Intelligence.
This episode is perfect for cybersecurity professionals, tech enthusiasts, and anyone interested in the intersection of artificial intelligence and data security, especially with Zero Trust. Tune in today!</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">18ab502f-95fc-4bc6-a491-b81f5c3f8843</guid>
      <title>Zero Faith</title>
      <description><![CDATA[This episode features actionable insights on navigating culture change, discussing the importance of data protection and identity management. Guest speakers James Carnall and Quent Strandburg join hosts Tom Tittermary and Tom Gianelos to discuss the need for integration of cloud solutions and AI to enhance security in a multi-vendor environment. They focus on faster, smarter approaches to cybersecurity workflows through collaboration. 
]]></description>
      <pubDate>Mon, 14 Apr 2025 19:27:39 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/zero-trusts-given-expert-perspectives-on-dod-security-strategy-with-quent-strandburg-james-carnall-4uMlEHM_</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/7b54d527-588e-4d96-a6e0-e58864af806f/zscaler-20podcast-20series-20graphics-280x280.jpg" width="1280"/>
      <enclosure length="49054240" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/1886b785-273d-486c-8db4-d11adaf72ecb/audio/3eac54eb-27b7-451e-b603-3f642a562731/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>Zero Faith</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:05</itunes:duration>
      <itunes:summary>This episode features actionable insights on navigating culture change, discussing the importance of data protection and identity management. Guest speakers James Carnall and Quent Strandburg join hosts Tom Tittermary and Tom Gianelos to discuss the need for integration of cloud solutions and AI to enhance security in a multi-vendor environment. They focus on faster, smarter approaches to cybersecurity workflows through collaboration.</itunes:summary>
      <itunes:subtitle>This episode features actionable insights on navigating culture change, discussing the importance of data protection and identity management. Guest speakers James Carnall and Quent Strandburg join hosts Tom Tittermary and Tom Gianelos to discuss the need for integration of cloud solutions and AI to enhance security in a multi-vendor environment. They focus on faster, smarter approaches to cybersecurity workflows through collaboration.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">43c7288b-5a1c-47fb-866c-143f3cf854d3</guid>
      <title>In the Beginning</title>
      <description><![CDATA[In this insightful episode, join Tom Tittermary, Rich Johnson, and Ryan McArthur as they dive into the critical role Zero Trust plays within the Department of Defense (DoD). The panel explores how Zero Trust principles are reshaping cybersecurity strategies, improving data protection, and strengthening national security in an era of evolving threats.
The conversation addresses key challenges in implementing Zero Trust within the DoD, including cultural shifts, technological barriers, and the complexities of securing legacy systems. The panel also discusses the evolution of Zero Trust policies, frameworks, and tactics over the years, shedding light on lessons learned and what the future holds for its adoption.
 
]]></description>
      <pubDate>Mon, 24 Mar 2025 18:42:42 +0000</pubDate>
      <author>zscalermarketing@carahsoft.com (Carahsoft Technology Corp. )</author>
      <link>https://zero-trusts-given.simplecast.com/episodes/zero-trusts-given-expert-perspectives-on-dod-security-strategy-with-ryan-mcarthur-4OaQrLwP</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/b757db49-b4fc-42b1-80e4-6e4c51d0af9d/zscaler-20podcast-20series-20graphics-1920x1080-20-1.jpg" width="1280"/>
      <enclosure length="58321231" type="audio/mpeg" url="https://cdn.simplecast.com/audio/79f83f95-b9e3-42a8-8298-12d585f875b6/episodes/b9a15a21-f7b8-4a15-aa85-645cc3a1da5d/audio/a2e56d6f-9d7e-4033-90ef-596542b1c710/default_tc.mp3?aid=rss_feed&amp;feed=aKTBaSVG"/>
      <itunes:title>In the Beginning</itunes:title>
      <itunes:author>Carahsoft Technology Corp. </itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a8b31d7e-b0ec-4b38-8b94-d4e75e7a00aa/a03862d8-4a37-4577-88f1-170376080ee5/3000x3000/zscaler-20podcast-20series-20graphics-280x280.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:45</itunes:duration>
      <itunes:summary>In this insightful episode, join Tom Tittermary, Rich Johnson, and Ryan McArthur as they dive into the critical role Zero Trust plays within the Department of Defense (DoD). The panel explores how Zero Trust principles are reshaping cybersecurity strategies, improving data protection, and strengthening national security in an era of evolving threats.
The conversation addresses key challenges in implementing Zero Trust within the DoD, including cultural shifts, technological barriers, and the complexities of securing legacy systems. The panel also discusses the evolution of Zero Trust policies, frameworks, and tactics over the years, shedding light on lessons learned and what the future holds for its adoption.
</itunes:summary>
      <itunes:subtitle>In this insightful episode, join Tom Tittermary, Rich Johnson, and Ryan McArthur as they dive into the critical role Zero Trust plays within the Department of Defense (DoD). The panel explores how Zero Trust principles are reshaping cybersecurity strategies, improving data protection, and strengthening national security in an era of evolving threats.
The conversation addresses key challenges in implementing Zero Trust within the DoD, including cultural shifts, technological barriers, and the complexities of securing legacy systems. The panel also discusses the evolution of Zero Trust policies, frameworks, and tactics over the years, shedding light on lessons learned and what the future holds for its adoption.
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>