<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/uncoveringhiddenrisks" rel="self" type="application/rss+xml"/>
    <title>Uncovering Hidden Risks</title>
    <link>http://www.compliancepodcastnetwork.net</link>
    <language>en</language>
    <copyright>2021</copyright>
    <description>Welcome to Uncovering Hidden Risks, a broader set of podcasts focused on identifying the various risks organizations face as they navigate the internal and external requirements they must comply with. We’ll take you through a journey on insider risks to uncover some of the hidden security threats that Microsoft and organizations across the world are facing. We will bring to surface some best-in-class technology and processes to help you protect your organization and employees from risks from trusted insiders. All in an open discussion with topnotch industry experts!</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/d08915f6-7ae6-11eb-a798-eb892854bb3a/image/Microsoft_Podcast_UncoveringHiddenRisks_2000x2000.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Uncovering Hidden Risks</title>
      <link>http://www.compliancepodcastnetwork.net</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>Microsoft</itunes:author>
    <itunes:summary>Welcome to Uncovering Hidden Risks, a broader set of podcasts focused on identifying the various risks organizations face as they navigate the internal and external requirements they must comply with. We’ll take you through a journey on insider risks to uncover some of the hidden security threats that Microsoft and organizations across the world are facing. We will bring to surface some best-in-class technology and processes to help you protect your organization and employees from risks from trusted insiders. All in an open discussion with topnotch industry experts!</itunes:summary>
    <content:encoded>
      <![CDATA[<p>Welcome to Uncovering Hidden Risks, a broader set of podcasts focused on identifying the various risks organizations face as they navigate the internal and external requirements they must comply with. We’ll take you through a journey on insider risks to uncover some of the hidden security threats that Microsoft and organizations across the world are facing. We will bring to surface some best-in-class technology and processes to help you protect your organization and employees from risks from trusted insiders. All in an open discussion with topnotch industry experts!</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>Microsoft</itunes:name>
      <itunes:email>tfox@tfoxlaw.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/d08915f6-7ae6-11eb-a798-eb892854bb3a/image/Microsoft_Podcast_UncoveringHiddenRisks_2000x2000.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Business">
    </itunes:category>
    <itunes:category text="News">
      <itunes:category text="Business News"/>
    </itunes:category>
    <itunes:category text="Technology">
    </itunes:category>
    <item>
      <title>Unveil Data Security Paradoxes</title>
      <description>Herain Oberoi, General Manager of Data Security, Privacy, and Compliance for Microsoft, joins Erica Toelle and guest host Tina Ying, Senior Product Marketing Manager at Microsoft, on this week's episode of Uncovering Hidden Risks. Microsoft has recently released a new report called the Data Security Index. Erica, Tina, and Herain explain what drove the team to complete this research, release the report, and share valuable insights that can empower organizations to optimize their data security programs.
In This Episode You Will Learn:

Why do more tools bring less security, but organizations still adopt them?

When organizations should allocate resources to optimize data security

How security leaders can lead their teams with the goal of enhancing all-up security posture

Some Questions We Ask:

How can organizations enhance their data security posture?

Should organizations purchase best-of-suite or best-of-breed solutions?

What advice do you give organizations facing the challenge of using isolated solutions?

Resources:
View Herain Oberoi on LinkedIn
View Tina Ying on LinkedIn
View Erica Toelle on LinkedIn
Related Microsoft Podcasts:

Afternoon Cyber Tea with Ann Johnson

The BlueHat Podcast

Security Unlocked

Security Unlocked: CISO Series with Bret Arsenault

Microsoft Threat Intelligence Podcast

Secure the Job: Breaking into Security

Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Connect with the Compliance Podcast Network at:
LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/</description>
      <pubDate>Wed, 17 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Unveil Data Security Paradoxes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle>In this episode, Erica visits Tina Ying on a new report called the Data Security Index.</itunes:subtitle>
      <itunes:summary>Herain Oberoi, General Manager of Data Security, Privacy, and Compliance for Microsoft, joins Erica Toelle and guest host Tina Ying, Senior Product Marketing Manager at Microsoft, on this week's episode of Uncovering Hidden Risks. Microsoft has recently released a new report called the Data Security Index. Erica, Tina, and Herain explain what drove the team to complete this research, release the report, and share valuable insights that can empower organizations to optimize their data security programs.
In This Episode You Will Learn:

Why do more tools bring less security, but organizations still adopt them?

When organizations should allocate resources to optimize data security

How security leaders can lead their teams with the goal of enhancing all-up security posture

Some Questions We Ask:

How can organizations enhance their data security posture?

Should organizations purchase best-of-suite or best-of-breed solutions?

What advice do you give organizations facing the challenge of using isolated solutions?

Resources:
View Herain Oberoi on LinkedIn
View Tina Ying on LinkedIn
View Erica Toelle on LinkedIn
Related Microsoft Podcasts:

Afternoon Cyber Tea with Ann Johnson

The BlueHat Podcast

Security Unlocked

Security Unlocked: CISO Series with Bret Arsenault

Microsoft Threat Intelligence Podcast

Secure the Job: Breaking into Security

Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Connect with the Compliance Podcast Network at:
LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Herain Oberoi, General Manager of Data Security, Privacy, and Compliance for Microsoft, joins Erica Toelle and guest host Tina Ying, Senior Product Marketing Manager at Microsoft, on this week's episode of Uncovering Hidden Risks. Microsoft has recently released a new report called the Data Security Index. Erica, Tina, and Herain explain what drove the team to complete this research, release the report, and share valuable insights that can empower organizations to optimize their data security programs.</p><p><strong>In This Episode You Will Learn</strong>:</p><ul>
<li>Why do more tools bring less security, but organizations still adopt them?</li>
<li>When organizations should allocate resources to optimize data security</li>
<li>How security leaders can lead their teams with the goal of enhancing all-up security posture</li>
</ul><p><strong>Some Questions We Ask:</strong></p><ul>
<li>How can organizations enhance their data security posture?</li>
<li>Should organizations purchase best-of-suite or best-of-breed solutions?</li>
<li>What advice do you give organizations facing the challenge of using isolated solutions?</li>
</ul><p><strong>Resources:</strong></p><p><a href="https://www.linkedin.com/in/herain/">View Herain Oberoi on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/tinaying/">View Tina Ying on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/ericatoelle/">View Erica Toelle on LinkedIn</a></p><p><strong>Related Microsoft Podcasts:</strong></p><ul>
<li><a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></li>
<li><a href="https://bluehatpodcast.com/">The BlueHat Podcast</a></li>
<li><a href="https://securityunlockedpodcast.com/">Security Unlocked</a></li>
<li><a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a></li>
<li><a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence">Microsoft Threat Intelligence Podcast</a></li>
<li><a href="https://shows.acast.com/secure-the-job-breaking-into-security">Secure the Job: Breaking into Security</a></li>
</ul><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a></p><p><strong>Connect with the Compliance Podcast Network at:</strong></p><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/company/compliance-podcast-network/">https://www.linkedin.com/company/compliance-podcast-network/</a></p><p><strong>Facebook:</strong> <a href="https://www.facebook.com/compliancepodcastnetwork/">https://www.facebook.com/compliancepodcastnetwork/</a></p><p><strong>YouTube:</strong> <a href="https://www.youtube.com/@CompliancePodcastNetwork">https://www.youtube.com/@CompliancePodcastNetwork</a></p><p><strong>Twitter:</strong> <a href="https://twitter.com/tfoxlaw">https://twitter.com/tfoxlaw</a></p><p><strong>Instagram:</strong> <a href="https://www.instagram.com/voiceofcompliance/">https://www.instagram.com/voiceofcompliance/</a></p><p><strong>Website:</strong> <a href="https://compliancepodcastnetwork.net/">https://compliancepodcastnetwork.net/</a></p>]]>
      </content:encoded>
      <itunes:duration>1194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47e78c5e-fb7c-11ee-83c0-dfd67e3a1e6f]]></guid>
      <enclosure url="https://traffic.megaphone.fm/ACS8487965022.mp3?updated=1713222472" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cloud Security Posture Management: Top Risks and Best Practice Solutions</title>
      <description>Drew Nicholas, Microsoft Principal Security Global Black Belt, joins Erica Toelle and guest host Daniela Villarreal, Sr. Product Marketing Manager for Microsoft Defender for Cloud, on this week's episode of Uncovering Hidden Risks. Drew has spent eight-plus years at Microsoft in different roles. These roles include working for Microsoft's consulting services, Microsoft's customer-facing Incident Response team, and his current position. Drew, Erica, and Daniela provide insight into hidden risks in cloud-native apps to help customers gain visibility and control of their cloud security posture and take a risk-based approach to proactive cloud security.
In This Episode You Will Learn:

How cloud security posture fits into the big picture of security

Qualities organizations should look for in a cloud security posture management tool

How different platforms can help strengthen cloud security posture

Some Questions We Ask:

Regarding cloud-native application development, what security trends have you seen?

Why is cloud security posture so important?

What risks can a unified security posture management approach help address?

Resources:
View Drew Nicholas on LinkedIn
View Daniela Villarreal on LinkedIn
View Erica Toelle on LinkedIn
Related Microsoft Podcasts:          
Listen to: Afternoon Cyber Tea with Ann Johnson 
Listen to: Security Unlocked
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Connect with the Compliance Podcast Network at:
LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/</description>
      <pubDate>Tue, 16 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cloud Security Posture Management: Top Risks and Best Practice Solutions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Drew Nicholas, Microsoft Principal Security Global Black Belt, joins Erica Toelle and guest host Daniela Villarreal, Sr. Product Marketing Manager for Microsoft Defender for Cloud, on this week's episode of Uncovering Hidden Risks. Drew has spent eight-plus years at Microsoft in different roles. These roles include working for Microsoft's consulting services, Microsoft's customer-facing Incident Response team, and his current position. Drew, Erica, and Daniela provide insight into hidden risks in cloud-native apps to help customers gain visibility and control of their cloud security posture and take a risk-based approach to proactive cloud security.
In This Episode You Will Learn:

How cloud security posture fits into the big picture of security

Qualities organizations should look for in a cloud security posture management tool

How different platforms can help strengthen cloud security posture

Some Questions We Ask:

Regarding cloud-native application development, what security trends have you seen?

Why is cloud security posture so important?

What risks can a unified security posture management approach help address?

Resources:
View Drew Nicholas on LinkedIn
View Daniela Villarreal on LinkedIn
View Erica Toelle on LinkedIn
Related Microsoft Podcasts:          
Listen to: Afternoon Cyber Tea with Ann Johnson 
Listen to: Security Unlocked
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Connect with the Compliance Podcast Network at:
LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Drew Nicholas, Microsoft Principal Security Global Black Belt, joins Erica Toelle and guest host Daniela Villarreal, Sr. Product Marketing Manager for Microsoft Defender for Cloud, on this week's episode of Uncovering Hidden Risks. Drew has spent eight-plus years at Microsoft in different roles. These roles include working for Microsoft's consulting services, Microsoft's customer-facing Incident Response team, and his current position. Drew, Erica, and Daniela provide insight into hidden risks in cloud-native apps to help customers gain visibility and control of their cloud security posture and take a risk-based approach to proactive cloud security.</p><p><strong>In This Episode You Will Learn</strong>:</p><ul>
<li>How cloud security posture fits into the big picture of security</li>
<li>Qualities organizations should look for in a cloud security posture management tool</li>
<li>How different platforms can help strengthen cloud security posture</li>
</ul><p><strong>Some Questions We Ask:</strong></p><ul>
<li>Regarding cloud-native application development, what security trends have you seen?</li>
<li>Why is cloud security posture so important?</li>
<li>What risks can a unified security posture management approach help address?</li>
</ul><p><strong>Resources:</strong></p><p><a href="https://www.linkedin.com/in/drewnicholas1/">View Drew Nicholas on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/danielavillarr/">View Daniela Villarreal on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/ericatoelle/">View Erica Toelle on LinkedIn</a></p><p><strong>Related Microsoft Podcasts:          </strong></p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson </a></p><p>Listen to: <a href="https://thecyberwire.com/podcasts/security-unlocked">Security Unlocked</a></p><p>Listen to: <a href="https://thecyberwire.com/podcasts/security-unlocked-ciso-series">Security Unlocked: CISO Series with Bret Arsenault</a></p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a></p><p><strong>Connect with the Compliance Podcast Network at:</strong></p><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/company/compliance-podcast-network/">https://www.linkedin.com/company/compliance-podcast-network/</a></p><p><strong>Facebook:</strong> <a href="https://www.facebook.com/compliancepodcastnetwork/">https://www.facebook.com/compliancepodcastnetwork/</a></p><p><strong>YouTube:</strong> <a href="https://www.youtube.com/@CompliancePodcastNetwork">https://www.youtube.com/@CompliancePodcastNetwork</a></p><p><strong>Twitter:</strong> <a href="https://twitter.com/tfoxlaw">https://twitter.com/tfoxlaw</a></p><p><strong>Instagram:</strong> <a href="https://www.instagram.com/voiceofcompliance/">https://www.instagram.com/voiceofcompliance/</a></p><p><strong>Website:</strong> <a href="https://compliancepodcastnetwork.net/">https://compliancepodcastnetwork.net/</a></p>]]>
      </content:encoded>
      <itunes:duration>1810</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b31c2ada-fb7b-11ee-8fc4-db319ac4475d]]></guid>
      <enclosure url="https://traffic.megaphone.fm/ACS7710626297.mp3?updated=1713222222" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity 101: What Are the Three Pillars of a Robust Strategy </title>
      <description>Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization's success. In this episode, host Erica Toelle talks to Nashid Shaker, AVP, Information and Cyber Security Strategy at Canadian Western Bank Financial Group, and Antonio Maio, Managing Director at Protiviti, about how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation. Nash is an experienced and innovative cybersecurity leader passionate about orchestrating secure digital transformations that fuel growth, leveraging a multidisciplinary background in strategic planning and cybersecurity.
 
In This Episode, You Will Learn:

When it’s time to re-evaluate your cybersecurity strategy

What cybersecurity leaders should think about today to prepare for a future that will use AI.

Predictions for cybersecurity in the next 2–4 years.

Some Questions We Ask:

What is the top risk that organizations tend to overlook?

What are some tips for how cybersecurity leaders should engage with the C-suite?

Can cybersecurity contribute to an organization's bottom line or mission?

Resources:
View Nash Shaker on LinkedIn
View Antonio Maio on LinkedIn
View Erica Toelle on LinkedIn
Connect with the Compliance Podcast Network at:
LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/</description>
      <pubDate>Mon, 15 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization's success. In this episode, host Erica Toelle talks to Nashid Shaker, AVP, Information and Cyber Security Strategy at Canadian Western Bank Financial Group, and Antonio Maio, Managing Director at Protiviti, about how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation. Nash is an experienced and innovative cybersecurity leader passionate about orchestrating secure digital transformations that fuel growth, leveraging a multidisciplinary background in strategic planning and cybersecurity.
 
In This Episode, You Will Learn:

When it’s time to re-evaluate your cybersecurity strategy

What cybersecurity leaders should think about today to prepare for a future that will use AI.

Predictions for cybersecurity in the next 2–4 years.

Some Questions We Ask:

What is the top risk that organizations tend to overlook?

What are some tips for how cybersecurity leaders should engage with the C-suite?

Can cybersecurity contribute to an organization's bottom line or mission?

Resources:
View Nash Shaker on LinkedIn
View Antonio Maio on LinkedIn
View Erica Toelle on LinkedIn
Connect with the Compliance Podcast Network at:
LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization's success. In this episode, host Erica Toelle talks to <a href="https://www.linkedin.com/in/nashid-shaker-mba-38711258/">Nashid Shaker</a>, AVP, Information and Cyber Security Strategy at Canadian Western Bank Financial Group, and <a href="https://www.linkedin.com/in/antonio-maio-b082191/">Antonio Maio</a>, Managing Director at Protiviti, about how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation. Nash is an experienced and innovative cybersecurity leader passionate about orchestrating secure digital transformations that fuel growth, leveraging a multidisciplinary background in strategic planning and cybersecurity.</p><p> </p><p><strong>In This Episode, You Will Learn:</strong></p><ul>
<li>When it’s time to re-evaluate your cybersecurity strategy</li>
<li>What cybersecurity leaders should think about today to prepare for a future that will use AI.</li>
<li>Predictions for cybersecurity in the next 2–4 years.</li>
</ul><p><strong>Some Questions We Ask:</strong></p><ul>
<li>What is the top risk that organizations tend to overlook?</li>
<li>What are some tips for how cybersecurity leaders should engage with the C-suite?</li>
<li>Can cybersecurity contribute to an organization's bottom line or mission?</li>
</ul><p><strong>Resources:</strong></p><p><a href="https://www.linkedin.com/in/nashid-shaker-mba-38711258/">View Nash Shaker on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/antonio-maio-b082191/">View Antonio Maio on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/ericatoelle/">View Erica Toelle on LinkedIn</a></p><p><strong>Connect with the Compliance Podcast Network at:</strong></p><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/company/compliance-podcast-network/">https://www.linkedin.com/company/compliance-podcast-network/</a></p><p><strong>Facebook:</strong> <a href="https://www.facebook.com/compliancepodcastnetwork/">https://www.facebook.com/compliancepodcastnetwork/</a></p><p><strong>YouTube:</strong> <a href="https://www.youtube.com/@CompliancePodcastNetwork">https://www.youtube.com/@CompliancePodcastNetwork</a></p><p><strong>Twitter:</strong> <a href="https://twitter.com/tfoxlaw">https://twitter.com/tfoxlaw</a></p><p><strong>Instagram:</strong> <a href="https://www.instagram.com/voiceofcompliance/">https://www.instagram.com/voiceofcompliance/</a></p><p><strong>Website:</strong> <a href="https://compliancepodcastnetwork.net/">https://compliancepodcastnetwork.net/</a></p>]]>
      </content:encoded>
      <itunes:duration>2163</itunes:duration>
      <guid isPermaLink="false"><![CDATA[efcf673a-f8e7-11ee-9822-17ec71f18ee4]]></guid>
      <enclosure url="https://traffic.megaphone.fm/ACS7686550409.mp3?updated=1712939435" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Practitioners guide to effectively managing insider risks</title>
      <description>In this podcast we explore steps to take to set up and run an insider risk management program. We talk about specific organizations to collaborate with, and top risks to address first. We hear directly from an expert with three decades of experience setting up impactful insider risk management programs in government and private sector.</description>
      <pubDate>Thu, 01 Apr 2021 07:01:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/693ef514-8365-11eb-b404-2f2f1acb0b75/image/1400X1400.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this podcast we explore steps to take to set up and run an insider risk management program. We talk about specific organizations to collaborate with, and top risks to address first.</itunes:subtitle>
      <itunes:summary>In this podcast we explore steps to take to set up and run an insider risk management program. We talk about specific organizations to collaborate with, and top risks to address first. We hear directly from an expert with three decades of experience setting up impactful insider risk management programs in government and private sector.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this podcast we explore steps to take to set up and run an insider risk management program. We talk about specific organizations to collaborate with, and top risks to address first. We hear directly from an expert with three decades of experience setting up impactful insider risk management programs in government and private sector.</p>]]>
      </content:encoded>
      <itunes:duration>1381</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[693ef514-8365-11eb-b404-2f2f1acb0b75]]></guid>
      <enclosure url="https://traffic.megaphone.fm/ACS2390806758.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Insider risk programs have come a long way</title>
      <description>In this podcast we discover the history of the practice of insider threat management; the role of technology, psychology, people, and cross-organizational collaboration to drive an effective insider risk program today; and things to consider as we look ahead and across an ever-changing risk landscape.</description>
      <pubDate>Thu, 25 Mar 2021 07:01:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ed0005c4-8364-11eb-b404-f79cd2235ae2/image/1400X1400.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this podcast we discover the history of the practice of insider threat management; the role of technology, psychology, people, and cross-organizational collaboration to drive an effective insider risk program today; and things to consider as we look ahead and across an ever-changing risk landscape.</itunes:subtitle>
      <itunes:summary>In this podcast we discover the history of the practice of insider threat management; the role of technology, psychology, people, and cross-organizational collaboration to drive an effective insider risk program today; and things to consider as we look ahead and across an ever-changing risk landscape.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this podcast we discover the history of the practice of insider threat management; the role of technology, psychology, people, and cross-organizational collaboration to drive an effective insider risk program today; and things to consider as we look ahead and across an ever-changing risk landscape.</p>]]>
      </content:encoded>
      <itunes:duration>1813</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed0005c4-8364-11eb-b404-f79cd2235ae2]]></guid>
      <enclosure url="https://traffic.megaphone.fm/ACS6535185522.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Insider risks aren’t just a security problem</title>
      <description>In this podcast we explore how partnering with Human Resources can create a strong insider risk management program, a better workplace and more secure organization. We uncover the types of HR data that can be added to an insider risk management system, using artificial intelligence to contextualize the data, all while respecting privacy and keeping in line with applicable policies.</description>
      <pubDate>Thu, 18 Mar 2021 07:01:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle>In this podcast we explore how partnering with Human Resources can create a strong insider risk management program, a better workplace and more secure organization.</itunes:subtitle>
      <itunes:summary>In this podcast we explore how partnering with Human Resources can create a strong insider risk management program, a better workplace and more secure organization. We uncover the types of HR data that can be added to an insider risk management system, using artificial intelligence to contextualize the data, all while respecting privacy and keeping in line with applicable policies.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this podcast we explore how partnering with Human Resources can create a strong insider risk management program, a better workplace and more secure organization. We uncover the types of HR data that can be added to an insider risk management system, using artificial intelligence to contextualize the data, all while respecting privacy and keeping in line with applicable policies.</p>]]>
      </content:encoded>
      <itunes:duration>1905</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8af3cea-8364-11eb-a723-5747bc23cc14]]></guid>
      <enclosure url="https://traffic.megaphone.fm/ACS4905476739.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Predicting your next insider risks</title>
      <description>In this podcast we explore the challenges of addressing insider threats and how organizations can improve their security posture by understanding the conditions and triggers that precede a potentially harmful act. And how technological advances in prevention and detection can help organizations stay safe and steps ahead of threats from trusted insiders.</description>
      <pubDate>Thu, 11 Mar 2021 10:01:00 -0000</pubDate>
      <itunes:title>Predicting your next insider risks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6045fc4-8054-11eb-b2ae-c371ced3ea7c/image/1400X1400.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>We explore the challenges of addressing insider threats and how organizations can improve their security posture by understanding the conditions and triggers that precede a potentially harmful act.</itunes:subtitle>
      <itunes:summary>In this podcast we explore the challenges of addressing insider threats and how organizations can improve their security posture by understanding the conditions and triggers that precede a potentially harmful act. And how technological advances in prevention and detection can help organizations stay safe and steps ahead of threats from trusted insiders.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this podcast we explore the challenges of addressing insider threats and how organizations can improve their security posture by understanding the conditions and triggers that precede a potentially harmful act. And how technological advances in prevention and detection can help organizations stay safe and steps ahead of threats from trusted insiders.</p>]]>
      </content:encoded>
      <itunes:duration>1806</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6045fc4-8054-11eb-b2ae-c371ced3ea7c]]></guid>
      <enclosure url="https://traffic.megaphone.fm/ACS1773522607.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Artificial intelligence hunts for insider risks</title>
      <description>Welcome to Uncovering Hidden Risks, a broader set of podcasts focused on identifying the various risks organizations face as they navigate the internal and external requirements they must comply with. We’ll take you through a journey on insider risks to uncover some of the hidden security threats that Microsoft and organizations across the world are facing. We will bring to surface some best-in-class technology and processes to help you protect your organization and employees from risks from trusted insiders. All in an open discussion with topnotch industry experts!
 In this podcast we explore how new advances in artificial intelligence and machine learning take on the challenge of hunting for insider risks within your organization. Insider risks aren’t easy to find, however, with its ability to leverage the power of machine learning, artificial intelligence can uncover hidden risks that would otherwise be impossible to find.</description>
      <pubDate>Wed, 03 Mar 2021 10:01:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bcf07e7e-7b83-11eb-915b-3f1ab384349e/image/Uncovering+Hidden+Risks.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Insider risks aren’t easy to find, however, with its ability to leverage the power of machine learning, artificial intelligence can uncover hidden risks that would otherwise be impossible to find.</itunes:subtitle>
      <itunes:summary>Welcome to Uncovering Hidden Risks, a broader set of podcasts focused on identifying the various risks organizations face as they navigate the internal and external requirements they must comply with. We’ll take you through a journey on insider risks to uncover some of the hidden security threats that Microsoft and organizations across the world are facing. We will bring to surface some best-in-class technology and processes to help you protect your organization and employees from risks from trusted insiders. All in an open discussion with topnotch industry experts!
 In this podcast we explore how new advances in artificial intelligence and machine learning take on the challenge of hunting for insider risks within your organization. Insider risks aren’t easy to find, however, with its ability to leverage the power of machine learning, artificial intelligence can uncover hidden risks that would otherwise be impossible to find.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to Uncovering Hidden Risks, a broader set of podcasts focused on identifying the various risks organizations face as they navigate the internal and external requirements they must comply with. We’ll take you through a journey on insider risks to uncover some of the hidden security threats that Microsoft and organizations across the world are facing. We will bring to surface some best-in-class technology and processes to help you protect your organization and employees from risks from trusted insiders. All in an open discussion with topnotch industry experts!</p><p> In this podcast we explore how new advances in artificial intelligence and machine learning take on the challenge of hunting for insider risks within your organization. Insider risks aren’t easy to find, however, with its ability to leverage the power of machine learning, artificial intelligence can uncover hidden risks that would otherwise be impossible to find.</p>]]>
      </content:encoded>
      <itunes:duration>1801</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bcf07e7e-7b83-11eb-915b-3f1ab384349e]]></guid>
      <enclosure url="https://traffic.megaphone.fm/ACS6525471982.mp3" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
