<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/cyberwire-cso-perspectives-public" rel="self" type="application/rss+xml"/>
    <title>CISO Perspectives (public)</title>
    <link>https://thecyberwire.com/podcasts/cso-perspectives</link>
    <language>en</language>
    <copyright>© 2025 N2K Networks, Inc. 706761</copyright>
    <description>This season on CISO Perspectives, host Kim Jones explores some of the challenges of leading through uncertainty. We explore the complexity of the changing nature of regulation and working with the federal government, the evolution of privacy and fraud, and how emerging technologies like AI and quantum computing are changing cyber. When you don’t know what questions to ask, you’re afraid to ask, or don’t know who to ask, CISO Perspectives provides the foundation for learning in this brave new world.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/79d30abe-9bac-11eb-98a9-33a1e48b6187/image/f882e40a02fd04121e447d6102f1061d.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>CISO Perspectives (public)</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>N2K Networks</itunes:author>
    <itunes:summary>This season on CISO Perspectives, host Kim Jones explores some of the challenges of leading through uncertainty. We explore the complexity of the changing nature of regulation and working with the federal government, the evolution of privacy and fraud, and how emerging technologies like AI and quantum computing are changing cyber. When you don’t know what questions to ask, you’re afraid to ask, or don’t know who to ask, CISO Perspectives provides the foundation for learning in this brave new world.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>This season on CISO Perspectives, host Kim Jones explores some of the challenges of leading through uncertainty. We explore the complexity of the changing nature of regulation and working with the federal government, the evolution of privacy and fraud, and how emerging technologies like AI and quantum computing are changing cyber. When you don’t know what questions to ask, you’re afraid to ask, or don’t know who to ask, CISO Perspectives provides the foundation for learning in this brave new world.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>N2K Networks, Inc.</itunes:name>
      <itunes:email>producer@n2k.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/79d30abe-9bac-11eb-98a9-33a1e48b6187/image/f882e40a02fd04121e447d6102f1061d.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Technology">
    </itunes:category>
    <item>
      <title>Bringing it all together. </title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/132/notes</link>
      <description>Please enjoy this encore of CISO Perspectives.

In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.

Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.</description>
      <pubDate>Tue, 31 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Bringing it all together. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives.

In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.

Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives.</p>
<p>In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.</p>
<p>Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.</p>]]>
      </content:encoded>
      <itunes:duration>3282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcba9f70-5b4a-11f0-a192-8f7390da8991]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW7170356522.mp3?updated=1770732837" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Why is the vendor role so contentious in the cyber ecosystem?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/131/notes</link>
      <description>As the emphasis on improving cybersecurity has continued to grow, so has the number of vendors offering a range of cybersecurity services. However, despite the value many of these vendors bring, the relationship between vendors and clients has become strained. In this episode, Kim explores this relationship, offering his thoughts on this relationship and what both sides can do to better to improve this dynamic.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Fri, 27 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Why is the vendor role so contentious in the cyber ecosystem?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As the emphasis on improving cybersecurity has continued to grow, so has the number of vendors offering a range of cybersecurity services. However, despite the value many of these vendors bring, the relationship between vendors and clients has become strained. In this episode, Kim explores this relationship, offering his thoughts on this relationship and what both sides can do to better to improve this dynamic.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As the emphasis on improving cybersecurity has continued to grow, so has the number of vendors offering a range of cybersecurity services. However, despite the value many of these vendors bring, the relationship between vendors and clients has become strained. In this episode, Kim explores this relationship, offering his thoughts on this relationship and what both sides can do to better to improve this dynamic.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/6e22b9d7763e4f8482fd9bb60192a2c1/why-is-the-vendor-role-so-contentious-in-the-cyber-ecosystem">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>892</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93ab9304-2237-11f1-84e9-e74913f0eae3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW6046836483.mp3?updated=1773776835" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>But what do you really want?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/130/notes</link>
      <description>Despite being adopted and prioritized by many organizations, cybersecurity still faces a significant challenge where leaders still cannot articulate their needs, and find and develop talent. Rather, organizations oftentimes follow the same strategy many others are utilizing, which involves poaching talent with enticing salaries.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ed Vasko, the CEO at High Wire Networks, to discuss this approach and the impacts it is having on the cyber talent ecosystem. Throughout the conversation, Ed and Kim discuss their experience when assessing talent and some of the mistakes made by the industry, and what can be done to begin correcting this approach.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Tue, 24 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>But what do you really want?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Despite being adopted and prioritized by many organizations, cybersecurity still faces a significant challenge where leaders still cannot articulate their needs, and find and develop talent. Rather, organizations oftentimes follow the same strategy many others are utilizing, which involves poaching talent with enticing salaries.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ed Vasko, the CEO at High Wire Networks, to discuss this approach and the impacts it is having on the cyber talent ecosystem. Throughout the conversation, Ed and Kim discuss their experience when assessing talent and some of the mistakes made by the industry, and what can be done to begin correcting this approach.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Despite being adopted and prioritized by many organizations, cybersecurity still faces a significant challenge where leaders still cannot articulate their needs, and find and develop talent. Rather, organizations oftentimes follow the same strategy many others are utilizing, which involves poaching talent with enticing salaries.</p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with <a href="https://www.linkedin.com/in/ed-vasko-cissp-c-ciso-a146283/">Ed Vasko</a>, the CEO at <a href="https://www.linkedin.com/company/high-wire-networks-overwatch/">High Wire Networks</a>, to discuss this approach and the impacts it is having on the cyber talent ecosystem. Throughout the conversation, Ed and Kim discuss their experience when assessing talent and some of the mistakes made by the industry, and what can be done to begin correcting this approach.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion <a href="https://thecyberwire.com/stories/ca102f66c9de44ed8edc2f1648c0dbe8/but-what-do-you-really-want">⁠⁠blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>2527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b098e4a-222f-11f1-b85e-6fb33115d040]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW3142284093.mp3?updated=1773773464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Strategic approaches to talent: A practical guide.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/129/notes</link>
      <description>Even as cybersecurity has grown and become universially accepted, the field has continued to struggle when attempting to assess and aquire talent. Oftentimes, there is a disconnect between what organizations need and what they interview for leading vague job postings and ineffective hirings.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Jeff Welgan, the Chief Strategist and CEO at SkillRex, to discuss how we assess talent. Throughout the conversation, Jeff and Kim will discuss the problems associated with traditional workforce management and how modernizing this approach can provide a strategic advantage.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Fri, 20 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Strategic approaches to talent: A practical guide.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Even as cybersecurity has grown and become universially accepted, the field has continued to struggle when attempting to assess and aquire talent. Oftentimes, there is a disconnect between what organizations need and what they interview for leading vague job postings and ineffective hirings.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Jeff Welgan, the Chief Strategist and CEO at SkillRex, to discuss how we assess talent. Throughout the conversation, Jeff and Kim will discuss the problems associated with traditional workforce management and how modernizing this approach can provide a strategic advantage.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Even as cybersecurity has grown and become universially accepted, the field has continued to struggle when attempting to assess and aquire talent. Oftentimes, there is a disconnect between what organizations need and what they interview for leading vague job postings and ineffective hirings.</p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Jeff Welgan, the Chief Strategist and CEO at SkillRex, to discuss how we assess talent. Throughout the conversation, Jeff and Kim will discuss the problems associated with traditional workforce management and how modernizing this approach can provide a strategic advantage.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion <a href="https://thecyberwire.com/stories/6c3de33503314da3acbea773eaebb112/how-do-we-address-talent-strategically">⁠⁠blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>2542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0836a504-222b-11f1-83ad-13577aa0947a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW8847417352.mp3?updated=1773771039" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mid season reflection with Kim Jones.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/128/notes</link>
      <description>In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</description>
      <pubDate>Tue, 17 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Mid season reflection with Kim Jones.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</p>]]>
      </content:encoded>
      <itunes:duration>2487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[980f848a-4535-11f0-8cb9-b3a9e3c6d483]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW7719682864.mp3?updated=1769098338" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is the role of the CISO adding to the confusion?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/127/notes</link>
      <description>Show Notes:

As cybersecurity has matured, the field has become more formalized within businesses with CISOs leading the way. However, despite the value of the CISO and its widespread adoption, the role has continued to lose agency with other board members. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Patty Ryan, the CISO at QuidelOrtho, to assess the value of the role. Throughout the conversation, Patty and Kim will discuss the challenges facing CISOs, why the role has lost its agency, and what can be done to reverse the current trajectory.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Fri, 13 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Is the role of the CISO adding to the confusion?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Show Notes:

As cybersecurity has matured, the field has become more formalized within businesses with CISOs leading the way. However, despite the value of the CISO and its widespread adoption, the role has continued to lose agency with other board members. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Patty Ryan, the CISO at QuidelOrtho, to assess the value of the role. Throughout the conversation, Patty and Kim will discuss the challenges facing CISOs, why the role has lost its agency, and what can be done to reverse the current trajectory.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p>
<p>As cybersecurity has matured, the field has become more formalized within businesses with CISOs leading the way. However, despite the value of the CISO and its widespread adoption, the role has continued to lose agency with other board members. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Patty Ryan, the CISO at QuidelOrtho, to assess the value of the role. Throughout the conversation, Patty and Kim will discuss the challenges facing CISOs, why the role has lost its agency, and what can be done to reverse the current trajectory.</p>
<p><strong>Want more CISO Perspectives?:</strong></p>
<p>Check out a companion<strong> </strong><a href="https://thecyberwire.com/stories/6aa54aa33a894a1aaadf094228889423/is-the-role-of-the-ciso-adding-to-the-confusion"><strong>⁠</strong>⁠blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>2687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b92fcc60-1708-11f1-96cc-2751a2b3a28a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW6532608155.mp3?updated=1772547625" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What role does higher education play in cyber?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/126/notes</link>
      <description>Show Notes:

Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Dr. Lara Ferry, the Vice President of Research at Arizona State University, to explore higher education's role in cyber. Throughout the conversation, Lara and Kim will discuss the challenges facing degree programs, the disconnects between organizations and institutions, and how the gap can be better addressed.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Tue, 10 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>What role does higher education play in cyber?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Show Notes:

Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Dr. Lara Ferry, the Vice President of Research at Arizona State University, to explore higher education's role in cyber. Throughout the conversation, Lara and Kim will discuss the challenges facing degree programs, the disconnects between organizations and institutions, and how the gap can be better addressed.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p>
<p>Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Dr. Lara Ferry, the Vice President of Research at Arizona State University, to explore higher education's role in cyber. Throughout the conversation, Lara and Kim will discuss the challenges facing degree programs, the disconnects between organizations and institutions, and how the gap can be better addressed.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion<strong> </strong><a href="https://thecyberwire.com/stories/95e2c74a640c462286609d13a8c87621/what-role-does-higher-education-play-in-cyber"><strong>⁠</strong>⁠blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>2662</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e475e12-127b-11f1-b7c6-ef9e002fb790]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW2770344887.mp3?updated=1772547087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Do certifications matter?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/125/notes</link>
      <description>Show Notes:

As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with N2K's own, ⁠Simone Petrella, to answer this question and discuss why the value of certifications continue to be debated. Throughout the conversation, Simone and Kim will discuss the challenges associated with certifications, and how the industry can adjust the ways it sees and utilizes them.

Got cybersecurity, IT, or project management certification goals?Want more CISO Perspectives?:

For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Fri, 06 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Do certifications matter?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Show Notes:

As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with N2K's own, ⁠Simone Petrella, to answer this question and discuss why the value of certifications continue to be debated. Throughout the conversation, Simone and Kim will discuss the challenges associated with certifications, and how the industry can adjust the ways it sees and utilizes them.

Got cybersecurity, IT, or project management certification goals?Want more CISO Perspectives?:

For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p>
<p>As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with N2K's own, ⁠Simone Petrella, to answer this question and discuss why the value of certifications continue to be debated. Throughout the conversation, Simone and Kim will discuss the challenges associated with certifications, and how the industry can adjust the ways it sees and utilizes them.</p>
<p><strong>Got cybersecurity, IT, or project management certification goals?Want more CISO Perspectives?:</strong></p>
<p>For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at <a href="http://n2k.com/certify">n2k.com/certify</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion<strong> ⁠</strong>⁠<a href="https://thecyberwire.com/stories/dd36acad8fa24aa98eec3513ff5584d3/do-certifications-matter">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>2733</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc42ca2c-1277-11f1-b6f2-77b8ad788b5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW8906663168.mp3?updated=1772486807" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Does diversity matter in cyber?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/124/notes</link>
      <description>Show Notes:

As cybersecurity matures, one area still lags: diversity. In this thought-provoking episode of CISO Perspectives, host Kim Jones takes the mic solo to address a topic that remains both critical and controversial. Kim explores the current state of diversity in the cybersecurity field, why progress has been slow, and how inclusive teams drive greater innovation and resilience. Tune in for an honest conversation that challenges the status quo and pushes the industry forward.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Tue, 03 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Does diversity matter in cyber?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Show Notes:

As cybersecurity matures, one area still lags: diversity. In this thought-provoking episode of CISO Perspectives, host Kim Jones takes the mic solo to address a topic that remains both critical and controversial. Kim explores the current state of diversity in the cybersecurity field, why progress has been slow, and how inclusive teams drive greater innovation and resilience. Tune in for an honest conversation that challenges the status quo and pushes the industry forward.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p>
<p>As cybersecurity matures, one area still lags: diversity. In this thought-provoking episode of <em>CISO Perspectives</em>, host Kim Jones takes the mic solo to address a topic that remains both critical and controversial. Kim explores the current state of diversity in the cybersecurity field, why progress has been slow, and how inclusive teams drive greater innovation and resilience. Tune in for an honest conversation that challenges the status quo and pushes the industry forward.</p>
<p><strong>Want more CISO Perspectives?:</strong></p>
<p>Check out a companion<strong> ⁠</strong>⁠<a href="https://thecyberwire.com/stories/a2f62e4860e342ec820c3b1a7c36ef52/does-diversity-matter-in-cyber">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>1215</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f89c4e34-1274-11f1-92ca-d79e211883ae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW6449647955.mp3?updated=1772474347" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How do you gain “experience” in cyber without a job in cyber?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/109/notes</link>
      <description>Please enjoy this encore of CISO Perspectives.

Show Notes: 

While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber careers. In this episode of CISO Perspectives, host Kim Jones sits down with Kathleen Smith, the Chief Outreach Officer at clearedjobs.net and the co-host of Security Cleared Jobs: Who’s Hiring &amp; How, to discuss this dilemma and what new entrants can do to account for these difficulties. Throughout the conversation, Kathleen and Kim will discuss the challenges associated with entry-level cyber positions, how to gain meaningful experience, and how the industry as a whole contributes to this problem.



Want more CISO Perspectives?:

Check out a companion ⁠blog post⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Tue, 27 Jan 2026 07:00:00 -0000</pubDate>
      <itunes:title>How do you gain “experience” in cyber without a job in cyber?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives.

Show Notes: 

While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber careers. In this episode of CISO Perspectives, host Kim Jones sits down with Kathleen Smith, the Chief Outreach Officer at clearedjobs.net and the co-host of Security Cleared Jobs: Who’s Hiring &amp; How, to discuss this dilemma and what new entrants can do to account for these difficulties. Throughout the conversation, Kathleen and Kim will discuss the challenges associated with entry-level cyber positions, how to gain meaningful experience, and how the industry as a whole contributes to this problem.



Want more CISO Perspectives?:

Check out a companion ⁠blog post⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives.</p>
<p><strong>Show Notes: </strong></p>
<p>While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber careers. In this episode of CISO Perspectives, host <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a> sits down with <a href="https://www.linkedin.com/in/kathleenesmith/">Kathleen Smith</a>, the Chief Outreach Officer at <a href="https://clearedjobs.net/">clearedjobs.net</a> and the co-host of <a href="https://clearedjobs.net/podcast">Security Cleared Jobs</a>: Who’s Hiring &amp; How, to discuss this dilemma and what new entrants can do to account for these difficulties. Throughout the conversation, Kathleen and Kim will discuss the challenges associated with entry-level cyber positions, how to gain meaningful experience, and how the industry as a whole contributes to this problem.</p>
<p><br></p>
<p><strong>Want more CISO Perspectives?:</strong></p>
<p>Check out a companion ⁠<a href="https://thecyberwire.com//stories/ff8b9cc3f5ae4e33abb384915fe7cd5e/how-do-you-gain-experience-in-cyber-without-a-job-in-cyber">blog post⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>2357</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1b7da5be-2438-11f0-9bab-3314ad85df36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW5256269898.mp3?updated=1768340484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Are we a trade or a profession?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/108/notes</link>
      <description>Please enjoy this encore of CISO Perspectives.

Show Notes: 

Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives, host Kim Jones sits down with Larry Whiteside Jr., the Chief Advisory Officer for The CISO Society, to discuss this identity crisis and how the industry as a whole connects to both of these labels. Throughout the conversation, Larry and Kim will discuss the merits and drawbacks of both labels and how cybersecurity does not solely fall into one category or the other.



Want more CISO Perspectives?:

Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Tue, 20 Jan 2026 07:00:00 -0000</pubDate>
      <itunes:title>Are we a trade or a profession?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives.

Show Notes: 

Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives, host Kim Jones sits down with Larry Whiteside Jr., the Chief Advisory Officer for The CISO Society, to discuss this identity crisis and how the industry as a whole connects to both of these labels. Throughout the conversation, Larry and Kim will discuss the merits and drawbacks of both labels and how cybersecurity does not solely fall into one category or the other.



Want more CISO Perspectives?:

Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives.</p>
<p>Show Notes: </p>
<p>Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives, host <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a> sits down with <a href="https://www.linkedin.com/in/larrywhitesidejr/">Larry Whiteside Jr</a>., the Chief Advisory Officer for The CISO Society, to discuss this identity crisis and how the industry as a whole connects to both of these labels. Throughout the conversation, Larry and Kim will discuss the merits and drawbacks of both labels and how cybersecurity does not solely fall into one category or the other.</p>
<p><br></p>
<p>Want more CISO Perspectives?:</p>
<p>Check out a companion <a href="https://thecyberwire.com//stories/2634f6584cc94b04ac17aed1898724bc/are-we-a-trade-or-a-profession">blog post</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>2673</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d22cbe84-1ed0-11f0-9de1-1b5eedd375b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW6070481296.mp3?updated=1768340343" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is the cyber talent ecosystem broken?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/107/notes</link>
      <description>Please enjoy this encore of CISO Perspectives

Show Notes: 

The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host Kim Jones sits down with Ed Adams, the Head of Cybersecurity for North America at the Bureau Veritas Group, to discuss what has caused this indigestion and how leadership can better address these challenges. A key aspect of this conversation revolved around discussing Ed's book, See Yourself in Cyber: Security Careers Beyond Hacking, and how he expands the conversation surrounding traditional roles associated with cybersecurity.



Want more CISO Perspectives?:

Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</description>
      <pubDate>Tue, 13 Jan 2026 07:00:00 -0000</pubDate>
      <itunes:title>Is the cyber talent ecosystem broken?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives

Show Notes: 

The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host Kim Jones sits down with Ed Adams, the Head of Cybersecurity for North America at the Bureau Veritas Group, to discuss what has caused this indigestion and how leadership can better address these challenges. A key aspect of this conversation revolved around discussing Ed's book, See Yourself in Cyber: Security Careers Beyond Hacking, and how he expands the conversation surrounding traditional roles associated with cybersecurity.



Want more CISO Perspectives?:

Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives</p>
<p>Show Notes: </p>
<p>The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a> sits down with <a href="https://www.linkedin.com/in/edadamsboston/">Ed Adams</a>, the Head of Cybersecurity for North America at the <a href="https://www.linkedin.com/company/bureau-veritas-group/">Bureau Veritas Group</a>, to discuss what has caused this indigestion and how leadership can better address these challenges. A key aspect of this conversation revolved around discussing Ed's <a href="https://www.amazon.com/See-Yourself-Cyber-Security-Careers/dp/1394225598">book</a>, See Yourself in Cyber: Security Careers Beyond Hacking, and how he expands the conversation surrounding traditional roles associated with cybersecurity.</p>
<p><br></p>
<p>Want more CISO Perspectives?:</p>
<p>Check out a companion <a href="https://thecyberwire.com/stories/b7fbcf94e07e48b08bfd6ecf881df1f8/ciso-perspectives-episode-1-is-the-cyber-talent-ecosystem-broken">blog post</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p>]]>
      </content:encoded>
      <itunes:duration>2436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d87d5a38-1718-11f0-a553-dfa3e5c44472]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW6331309957.mp3?updated=1768339742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Season finale: Leading security in a brave new world.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/123/notes</link>
      <description>In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons and lingering challenges facing today’s CISOs. The episode closes with an optimistic—but candid—look at why fundamentals, critical thinking, and leadership still matter as the industry moves forward.

Want more CISO Perspectives?

Check out companion ⁠⁠blog post⁠⁠s by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements episodes throughout the season.</description>
      <pubDate>Tue, 30 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>Season finale: Leading security in a brave new world.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons and lingering challenges facing today’s CISOs. The episode closes with an optimistic—but candid—look at why fundamentals, critical thinking, and leadership still matter as the industry moves forward.

Want more CISO Perspectives?

Check out companion ⁠⁠blog post⁠⁠s by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements episodes throughout the season.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the season finale of <em>CSO Perspectives</em>, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons and lingering challenges facing today’s CISOs. The episode closes with an optimistic—but candid—look at why fundamentals, critical thinking, and leadership still matter as the industry moves forward.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out companion ⁠⁠<a href="https://thecyberwire.com/stories">blog post⁠⁠s</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements episodes throughout the season.</p>]]>
      </content:encoded>
      <itunes:duration>2639</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ec850ee-d9ea-11f0-8498-37ca77951dbe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW9907735230.mp3?updated=1765827134" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tech Investment Strategies and Overview</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/122/notes</link>
      <description>In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigation over true solutions. John offers a candid look inside the VC decision-making process, breaking down how teams, market fit, and long-term defensibility shape investment choices. Together, they examine how founders, investors, and CISOs can better align to drive meaningful, effective security innovation.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 23 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>Tech Investment Strategies and Overview</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigation over true solutions. John offers a candid look inside the VC decision-making process, breaking down how teams, market fit, and long-term defensibility shape investment choices. Together, they examine how founders, investors, and CISOs can better align to drive meaningful, effective security innovation.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with <a href="https://www.linkedin.com/in/johnfunge/">John Funge</a>, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigation over true solutions. John offers a candid look inside the VC decision-making process, breaking down how teams, market fit, and long-term defensibility shape investment choices. Together, they examine how founders, investors, and CISOs can better align to drive meaningful, effective security innovation.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/af2fb85904a840c292e7bde51850dfe9/tech-investment-strategies-and-overview">blog post</a>⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2919</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[136cbeb6-d467-11f0-ac87-7bbac96122e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW2342228540.mp3?updated=1765220902" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quantum</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/121/notes</link>
      <description>In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, why it matters for cybersecurity, and how leaders should begin planning for its inevitable impact. To help demystify the subject, Kim is joined by longtime colleague and cybersecurity practitioner Michael Sottile—now the CSO of a quantum computing firm—who brings decades of hands-on experience across industries and a front-row seat to quantum's evolution.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 16 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>Quantum</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, why it matters for cybersecurity, and how leaders should begin planning for its inevitable impact. To help demystify the subject, Kim is joined by longtime colleague and cybersecurity practitioner Michael Sottile—now the CSO of a quantum computing firm—who brings decades of hands-on experience across industries and a front-row seat to quantum's evolution.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, why it matters for cybersecurity, and how leaders should begin planning for its inevitable impact. To help demystify the subject, Kim is joined by longtime colleague and cybersecurity practitioner <a href="https://www.linkedin.com/in/michaelsottile/">Michael Sottile</a>—now the CSO of a quantum computing firm—who brings decades of hands-on experience across industries and a front-row seat to quantum's evolution.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0676b65a-caf1-11f0-aeef-236b0fb173d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW3961332995.mp3?updated=1765214998" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI and cyber practicum</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/120/notes</link>
      <description>In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim is joined by technologist Tony Gauda to discuss why AI represents a fundamental shift in how systems and decisions are designed. Together, they explore AI-driven operations, cultural barriers to experimentation, and how CISOs can adopt AI responsibly without compromising security.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 09 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>AI and cyber practicum</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim is joined by technologist Tony Gauda to discuss why AI represents a fundamental shift in how systems and decisions are designed. Together, they explore AI-driven operations, cultural barriers to experimentation, and how CISOs can adopt AI responsibly without compromising security.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim is joined by technologist <a href="https://www.linkedin.com/in/tonygauda/">Tony Gauda</a> to discuss why AI represents a fundamental shift in how systems and decisions are designed. Together, they explore AI-driven operations, cultural barriers to experimentation, and how CISOs can adopt AI responsibly without compromising security.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/f47ed2ce767e47609d8783ac0ca236b5/ai-and-cyber-practicum">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e8522a0-c948-11f0-96b2-13d1ac9d22ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW4772996251.mp3?updated=1763997783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI's impact on business</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/119/notes</link>
      <description>In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and risky, and how issues like bias, hallucinations, and data leakage demand new safeguards—including AI firewalls. 

He also discusses what smaller organizations can do to manage AI risk, how tools like code-generation models change expectations for developers, and the evolving regulatory landscape shaping how companies must deploy AI responsibly.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 02 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>AI's impact on business</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and risky, and how issues like bias, hallucinations, and data leakage demand new safeguards—including AI firewalls. 

He also discusses what smaller organizations can do to manage AI risk, how tools like code-generation models change expectations for developers, and the evolving regulatory landscape shaping how companies must deploy AI responsibly.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and risky, and how issues like bias, hallucinations, and data leakage demand new safeguards—including AI firewalls. </p>
<p>He also discusses what smaller organizations can do to manage AI risk, how tools like code-generation models change expectations for developers, and the evolving regulatory landscape shaping how companies must deploy AI responsibly.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/05734e1af67c4113807b3453f635e4d7/ais-impact-on-business">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2455</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ede5c20-c3d7-11f0-a964-d7a3bed63336]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW7471912760.mp3?updated=1763413708" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A midseason takeaway.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/118/notes</link>
      <description>In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</description>
      <pubDate>Tue, 25 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>A midseason takeaway.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</p>]]>
      </content:encoded>
      <itunes:duration>2797</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[601a2976-b8cc-11f0-a84a-df76f6445cb2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW1133886382.mp3?updated=1762892635" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fraud and Identity</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/117/notes</link>
      <description>Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Richard Bird from Singular AI to discuss this evolving paradigm. Throughout this conversation, Kim and Richard tackle how managing identity has evolved and how security leaders can get ahead of AI to better secure their systems and networks.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 18 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>Fraud and Identity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Richard Bird from Singular AI to discuss this evolving paradigm. Throughout this conversation, Kim and Richard tackle how managing identity has evolved and how security leaders can get ahead of AI to better secure their systems and networks.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. </p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with <a href="https://www.linkedin.com/in/rbird/">Richard Bird</a> from Singular AI to discuss this evolving paradigm. Throughout this conversation, Kim and Richard tackle how managing identity has evolved and how security leaders can get ahead of AI to better secure their systems and networks.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/8e5c8b4d669047d69da0061240c9c4d5/fraud-and-identity">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2414</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab095bc4-b35d-11f0-8454-eb4cb425de2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW4331322243.mp3?updated=1762892644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The changing face of fraud.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/116/notes</link>
      <description>Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From exploiting cryptocurrencies to utilizing emerging technologies, Kim and Mel look into how threat actors are changing and refining tactics in the current threat landscape.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 11 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>The changing face of fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From exploiting cryptocurrencies to utilizing emerging technologies, Kim and Mel look into how threat actors are changing and refining tactics in the current threat landscape.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. </p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From exploiting cryptocurrencies to utilizing emerging technologies, Kim and Mel look into how threat actors are changing and refining tactics in the current threat landscape.</p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">Meter</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/82487a095a194f8ab0db5ea93df0027a/fraud-in-a-new-world">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2211</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[30b93188-ade9-11f0-957d-ab801dec2f03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW4108038671.mp3?updated=1762892579" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privacy needs where you least expect it</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/115/notes</link>
      <description>When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things has only continued to grow larger and larger, so has the risk these devices inherently create as they collect and store more information than many would instinctively assume.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Merry Marwig, the Vice President of Global Communications &amp; Advocacy at Privacy4Cars, to explore how privacy risks are in places many do not think to look. Together, Merry and Kim discuss why security leaders need to rethink how they approach privacy and consider how the devices we use every day could inadvertently expose our sensitive information.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 04 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>Privacy needs where you least expect it</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things has only continued to grow larger and larger, so has the risk these devices inherently create as they collect and store more information than many would instinctively assume.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Merry Marwig, the Vice President of Global Communications &amp; Advocacy at Privacy4Cars, to explore how privacy risks are in places many do not think to look. Together, Merry and Kim discuss why security leaders need to rethink how they approach privacy and consider how the devices we use every day could inadvertently expose our sensitive information.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things has only continued to grow larger and larger, so has the risk these devices inherently create as they collect and store more information than many would instinctively assume.</p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with <a href="https://www.linkedin.com/in/marwig/">Merry Marwig</a>, the Vice President of Global Communications &amp; Advocacy at <a href="https://www.linkedin.com/company/privacy4cars/">Privacy4Cars</a>, to explore how privacy risks are in places many do not think to look. Together, Merry and Kim discuss why security leaders need to rethink how they approach privacy and consider how the devices we use every day could inadvertently expose our sensitive information.</p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">Meter</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/b07735d6ef8940a19646b5fc558aacd9/privacy-needs-where-you-least-expect-it">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2168</itunes:duration>
      <guid isPermaLink="false"><![CDATA[63e0a9a8-a603-11f0-8bb2-b7c3727cb0da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW7915602468.mp3?updated=1762892536" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The impact of data privacy on cyber.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/114/notes</link>
      <description>Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Kristy Westphal, the Global Security Director of Spirent Communications, to explore data privacy's impacts on cybersecurity efforts. Together, Kristy and Kim discuss why privacy cannot be an afterthought but rather must be something actively addressed through proactive security efforts, shifting security culture mindsets, and staying ahead of rapidly changing technologies.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 28 Oct 2025 06:00:00 -0000</pubDate>
      <itunes:title>The impact of data privacy on cyber.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Kristy Westphal, the Global Security Director of Spirent Communications, to explore data privacy's impacts on cybersecurity efforts. Together, Kristy and Kim discuss why privacy cannot be an afterthought but rather must be something actively addressed through proactive security efforts, shifting security culture mindsets, and staying ahead of rapidly changing technologies.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. </p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Kristy Westphal, the Global Security Director of Spirent Communications, to explore data privacy's impacts on cybersecurity efforts. Together, Kristy and Kim discuss why privacy cannot be an afterthought but rather must be something actively addressed through proactive security efforts, shifting security culture mindsets, and staying ahead of rapidly changing technologies.</p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">Meter</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/b43484e68a394666abf7f7fb23ead0ce/the-impact-of-data-privacy-on-cyber">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[633e082c-a2d1-11f0-b82a-03442fbe7311]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW4323353803.mp3?updated=1762892514" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Regulation takeaways with Ethan Cook.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/113/notes</link>
      <description>On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters.

Ethan, who will join the show regularly this season to provide big-picture analysis after major policy conversations, shares his perspective on the evolving balance between government oversight, innovation, and individual responsibility.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.</description>
      <pubDate>Tue, 21 Oct 2025 06:00:00 -0000</pubDate>
      <itunes:title>Regulation takeaways with Ethan Cook.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters.

Ethan, who will join the show regularly this season to provide big-picture analysis after major policy conversations, shares his perspective on the evolving balance between government oversight, innovation, and individual responsibility.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters.</p>
<p>Ethan, who will join the show regularly this season to provide big-picture analysis after major policy conversations, shares his perspective on the evolving balance between government oversight, innovation, and individual responsibility.</p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">Meter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67a3ed30-9d47-11f0-95cd-37649b7e3038]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW5134232051.mp3?updated=1762892473" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The existing state of regulation.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/112/notes</link>
      <description>Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ben Yelin, from the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the current state of regulation. Throughout the conversation, Ben and Kim discuss how the current administration views regulations and the future role of the federal government. 

Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ben Yelin, from the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the current state of regulation. Throughout the conversation, Ben and Kim discuss how the current administration views regulations and the future role of the federal government. 

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</description>
      <pubDate>Tue, 23 Sep 2025 06:00:00 -0000</pubDate>
      <itunes:title>The existing state of regulation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ben Yelin, from the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the current state of regulation. Throughout the conversation, Ben and Kim discuss how the current administration views regulations and the future role of the federal government. 

Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ben Yelin, from the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the current state of regulation. Throughout the conversation, Ben and Kim discuss how the current administration views regulations and the future role of the federal government. 

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations.</p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ben Yelin, from the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the current state of regulation. Throughout the conversation, Ben and Kim discuss how the current administration views regulations and the future role of the federal government. </p>
<p>Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations.</p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ben Yelin, from the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the current state of regulation. Throughout the conversation, Ben and Kim discuss how the current administration views regulations and the future role of the federal government. </p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">Meter</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/04a3f01bb85b41188b6d58058c95e7fd/the-existing-state-of-regulation">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p>]]>
      </content:encoded>
      <itunes:duration>2400</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8665b448-97ce-11f0-a04f-6ff8ca16c1c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW4395883526.mp3?updated=1762892375" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The return of CISO Perspectives.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/112/notes</link>
      <description>This season on CISO Perspectives—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen your defenses.

Industry leaders join the discussion to share their insights, challenges, and hard-earned lessons. Together, we’ll connect the dots across regulation, privacy, fraud, leadership, and talent—helping you build a stronger, more resilient cybersecurity ecosystem.

This is CISO Perspectives. Real conversations. Real strategies. Real impact.</description>
      <pubDate>Tue, 16 Sep 2025 06:00:00 -0000</pubDate>
      <itunes:title>The return of CISO Perspectives.</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This season on CISO Perspectives—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen your defenses.

Industry leaders join the discussion to share their insights, challenges, and hard-earned lessons. Together, we’ll connect the dots across regulation, privacy, fraud, leadership, and talent—helping you build a stronger, more resilient cybersecurity ecosystem.

This is CISO Perspectives. Real conversations. Real strategies. Real impact.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This season on <em>CISO Perspectives</em>—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen your defenses.</p>
<p>Industry leaders join the discussion to share their insights, challenges, and hard-earned lessons. Together, we’ll connect the dots across regulation, privacy, fraud, leadership, and talent—helping you build a stronger, more resilient cybersecurity ecosystem.</p>
<p><em>This is CISO Perspectives. Real conversations. Real strategies. Real impact.</em></p>]]>
      </content:encoded>
      <itunes:duration>96</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[771844b4-926b-11f0-960f-1f7d108402f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7e0daf/traffic.megaphone.fm/CYBW5798924784.mp3?updated=1757965439" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
