<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/infosecurity" rel="self" type="application/rss+xml"/>
    <title>Information Security Podcast</title>
    <link>http://informationsecuritysummit.org</link>
    <language>en</language>
    <copyright>All rights reserved 2020</copyright>
    <description>This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/74d1e382-ab2a-11ea-a890-279f28082f2b/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Information Security Podcast</title>
      <link>http://informationsecuritysummit.org</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>Information Security Summit</itunes:author>
    <itunes:summary>This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>Information Security Podcast</itunes:name>
      <itunes:email>events@informationsecuritysummit.org</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/74d1e382-ab2a-11ea-a890-279f28082f2b/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Technology">
    </itunes:category>
    <itunes:category text="Business">
    </itunes:category>
    <itunes:new-feed-url>https://feeds.megaphone.fm/infosecurity</itunes:new-feed-url>
    <item>
      <title>Migrating to the Public Cloud...so, What’s the Big Deal?</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Migrating to the Public Cloud...so, What’s the Big Deal?
 Description:
 This episode of the Information Security Podcast features a keynote from the Information Security Summit 2019 by Grant Asplund @gasplund from Check Point Software @CheckPointSW “Migrating to the Public Cloud...so, What’s the Big Deal?”.  The presentation is both enlightening and entertaining while examining the many factors an organization should consider when migrating to the Public Cloud.
 Key Discussion Points and Actionable Items:
  Parallels between the Mainframe in the past and the Public Cloud today
 Recognition that knowledge from the past of operating and securing On Premise environments don’t directly translate to the Public Cloud
 Importance of an organization asking the basic question “Am I using the Public Cloud securely?”
 The paradigm shift when having an “always connected resource” that must be managed 7x24x365 and the demands it places on IT and Security Teams
 The requirement to “re-tool” the solutions supporting an organization in the Public Cloud especially when using technologies such as Kubernetes and microservices
 Benefits of leveraging the Public Cloud when designed, implemented, and operated properly.
  Special Notice to our Faithful Listeners:
 The Information Security Podcast will be transitioning to a monthly schedule following this episode.
 Thank you for all your support and check back with us in about a month.
 Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
 If you enjoyed Grant’s keynote, check out Grant’s podcast, Talking Cloud, featuring interviews regarding secure migration strategies to the public cloud.</description>
      <pubDate>Tue, 03 Mar 2020 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/751797ba-ab2a-11ea-907b-b3b35a468462/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Migrating to the Public Cloud...so, What’s the Big Deal? Description: This episode of the Information Security Podcast features a keynote from the Information Security Summit 2019 by Grant Asplund  from Check Point Software  “Migrating to...</itunes:subtitle>
      <itunes:summary>Title: Migrating to the Public Cloud...so, What’s the Big Deal?
 Description:
 This episode of the Information Security Podcast features a keynote from the Information Security Summit 2019 by Grant Asplund @gasplund from Check Point Software @CheckPointSW “Migrating to the Public Cloud...so, What’s the Big Deal?”.  The presentation is both enlightening and entertaining while examining the many factors an organization should consider when migrating to the Public Cloud.
 Key Discussion Points and Actionable Items:
  Parallels between the Mainframe in the past and the Public Cloud today
 Recognition that knowledge from the past of operating and securing On Premise environments don’t directly translate to the Public Cloud
 Importance of an organization asking the basic question “Am I using the Public Cloud securely?”
 The paradigm shift when having an “always connected resource” that must be managed 7x24x365 and the demands it places on IT and Security Teams
 The requirement to “re-tool” the solutions supporting an organization in the Public Cloud especially when using technologies such as Kubernetes and microservices
 Benefits of leveraging the Public Cloud when designed, implemented, and operated properly.
  Special Notice to our Faithful Listeners:
 The Information Security Podcast will be transitioning to a monthly schedule following this episode.
 Thank you for all your support and check back with us in about a month.
 Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
 If you enjoyed Grant’s keynote, check out Grant’s podcast, Talking Cloud, featuring interviews regarding secure migration strategies to the public cloud.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Migrating to the Public Cloud...so, What’s the Big Deal?</p> <p><strong>Description:</strong></p> <p>This episode of the Information Security Podcast features a keynote from the Information Security Summit 2019 by Grant Asplund <a href="https://twitter.com/gasplund">@gasplund</a> from Check Point Software <a href="https://twitter.com/CheckPointSW">@CheckPointSW</a> “Migrating to the Public Cloud...so, What’s the Big Deal?”.  The presentation is both enlightening and entertaining while examining the many factors an organization should consider when migrating to the Public Cloud.</p> <p><strong>Key Discussion Points and Actionable Items:</strong></p> <ul> <li>Parallels between the Mainframe in the past and the Public Cloud today</li> <li>Recognition that knowledge from the past of operating and securing On Premise environments don’t directly translate to the Public Cloud</li> <li>Importance of an organization asking the basic question “Am I using the Public Cloud securely?”</li> <li>The paradigm shift when having an “always connected resource” that must be managed 7x24x365 and the demands it places on IT and Security Teams</li> <li>The requirement to “re-tool” the solutions supporting an organization in the Public Cloud especially when using technologies such as Kubernetes and microservices</li> <li>Benefits of leveraging the Public Cloud when designed, implemented, and operated properly.</li> </ul> <p><strong>Special Notice to our Faithful Listeners:</strong></p> <p>The Information Security Podcast will be transitioning to a monthly schedule following this episode.</p> <p>Thank you for all your support and check back with us in about a month.</p> <p><strong>Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong>Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong>Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p> <p>If you enjoyed Grant’s keynote, check out Grant’s podcast, <a href="https://talkingcloud.podbean.com/">Talking Cloud</a>, featuring interviews regarding secure migration strategies to the public cloud.</p>]]>
      </content:encoded>
      <itunes:duration>2865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71bbcb63-f40e-4a72-b08e-5e38a86c898b]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN8004538652.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Top Cyber Security Issues when Migrating to the Cloud</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Top Cyber Security Issues when Migrating to the Cloud
  Description:
 This episode of the Information Security Podcast features a keynote from the Information Security Summit 2019 by Bob Kalka @bobkalka ‏from IBM @IBM entitled “Top Cyber Security Issues when Migrating to the Cloud”.  The presentation examines the many factors that impact an organization as it prepares, migrates, and operates in “the Cloud”.
  Key Discussion Points and Actionable Items:
  Recognition that any IT, Security, or Application issues that exist prior to a Cloud migration are going to be further extenuated once migrated to the Cloud
 The concept of security “For, From, and In” the Cloud
 Understanding the difference between a Risk vs. Compliance posture by a Security Team
 Importance of avoiding the pitfalls of “under-deployed” software investments
 Being aware of the assumptions organizations make regarding the “shared responsibility model” between a customer and a cloud service provider and the potential pitfalls that could impact an organization
 Review the proper controls for a cloud migration including the identification of all critical data and properly protecting it before a cloud migration
 Preparation for appropriate incident response tactics
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
  Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
  Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
  </description>
      <pubDate>Tue, 25 Feb 2020 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7561f13e-ab2a-11ea-907b-ef562606d715/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Top Cyber Security Issues when Migrating to the Cloud  Description: This episode of the Information Security Podcast features a keynote from the Information Security Summit 2019 by Bob Kalka  ‏from IBM  entitled “Top Cyber Security Issues...</itunes:subtitle>
      <itunes:summary>Title: Top Cyber Security Issues when Migrating to the Cloud
  Description:
 This episode of the Information Security Podcast features a keynote from the Information Security Summit 2019 by Bob Kalka @bobkalka ‏from IBM @IBM entitled “Top Cyber Security Issues when Migrating to the Cloud”.  The presentation examines the many factors that impact an organization as it prepares, migrates, and operates in “the Cloud”.
  Key Discussion Points and Actionable Items:
  Recognition that any IT, Security, or Application issues that exist prior to a Cloud migration are going to be further extenuated once migrated to the Cloud
 The concept of security “For, From, and In” the Cloud
 Understanding the difference between a Risk vs. Compliance posture by a Security Team
 Importance of avoiding the pitfalls of “under-deployed” software investments
 Being aware of the assumptions organizations make regarding the “shared responsibility model” between a customer and a cloud service provider and the potential pitfalls that could impact an organization
 Review the proper controls for a cloud migration including the identification of all critical data and properly protecting it before a cloud migration
 Preparation for appropriate incident response tactics
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
  Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
  Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
  </itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong> Title:</strong> Top Cyber Security Issues when Migrating to the Cloud</p> <p><strong> Description:</strong></p> <p>This episode of the Information Security Podcast features a keynote from the Information Security Summit 2019 by Bob Kalka <a>@bobkalka</a> ‏from IBM <a href="https://twitter.com/ibm">@IBM</a> entitled “Top Cyber Security Issues when Migrating to the Cloud”.  The presentation examines the many factors that impact an organization as it prepares, migrates, and operates in “the Cloud”.</p> <p><strong> Key Discussion Points and Actionable Items:</strong></p> <ul> <li>Recognition that any IT, Security, or Application issues that exist prior to a Cloud migration are going to be further extenuated once migrated to the Cloud</li> <li>The concept of security “For, From, and In” the Cloud</li> <li>Understanding the difference between a Risk vs. Compliance posture by a Security Team</li> <li>Importance of avoiding the pitfalls of “under-deployed” software investments</li> <li>Being aware of the assumptions organizations make regarding the “shared responsibility model” between a customer and a cloud service provider and the potential pitfalls that could impact an organization</li> <li>Review the proper controls for a cloud migration including the identification of all critical data and properly protecting it before a cloud migration</li> <li>Preparation for appropriate incident response tactics</li> </ul> <p><strong> Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong> Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong> Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p> <p> </p>]]>
      </content:encoded>
      <itunes:duration>3032</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16c42c5d-0870-4013-ac1a-407e5921b653]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN2314356406.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Delivering Trust and Confidence</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Delivering Trust and Confidence
  Description:
 This episode of the Information Security Podcast features a conversation with Kurt Van Etten @kurtvanetten from RedSeal and host Rob Nettgen (@Robert_Nettgen).  This episode discusses the process of enabling a Security Team with the capability of “Delivering Trust and Confidence” within their organizations.
  Key Discussion Points and Actionable Items:
  Recognition that a Security Team has a requirement to establish credibility within their respective organizations
 Requirement to establish metrics, via frameworks, so benchmarks can be used to validate the activities of the Security Team
 Importance of managing expectations and communicating across the organization
 Communicating to establish the level of risk, via the Executive Management Team, an organization is willing to assume to guide investments in security
 How critical it is to establish the threat landscape of your organization
 Leveraging tabletop exercises to establish the capability to effectively respond to an incident.
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
  Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
  Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 18 Feb 2020 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75765066-ab2a-11ea-907b-9bb0587cdf8a/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Delivering Trust and Confidence  Description: This episode of the Information Security Podcast features a conversation with Kurt Van Etten  from  and host Rob Nettgen ().  This episode discusses the process of enabling a Security Team with...</itunes:subtitle>
      <itunes:summary>Title: Delivering Trust and Confidence
  Description:
 This episode of the Information Security Podcast features a conversation with Kurt Van Etten @kurtvanetten from RedSeal and host Rob Nettgen (@Robert_Nettgen).  This episode discusses the process of enabling a Security Team with the capability of “Delivering Trust and Confidence” within their organizations.
  Key Discussion Points and Actionable Items:
  Recognition that a Security Team has a requirement to establish credibility within their respective organizations
 Requirement to establish metrics, via frameworks, so benchmarks can be used to validate the activities of the Security Team
 Importance of managing expectations and communicating across the organization
 Communicating to establish the level of risk, via the Executive Management Team, an organization is willing to assume to guide investments in security
 How critical it is to establish the threat landscape of your organization
 Leveraging tabletop exercises to establish the capability to effectively respond to an incident.
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
  Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
  Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong> Title:</strong> Delivering Trust and Confidence</p> <p><strong> Description:</strong></p> <p>This episode of the Information Security Podcast features a conversation with Kurt Van Etten <a href="https://twitter.com/kurtvanetten">@kurtvanetten</a> from <a href="https://www.redseal.net/">RedSeal</a> and host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>).  This episode discusses the process of enabling a Security Team with the capability of “Delivering Trust and Confidence” within their organizations.</p> <p><strong> Key Discussion Points and Actionable Items:</strong></p> <ul> <li>Recognition that a Security Team has a requirement to establish credibility within their respective organizations</li> <li>Requirement to establish metrics, via frameworks, so benchmarks can be used to validate the activities of the Security Team</li> <li>Importance of managing expectations and communicating across the organization</li> <li>Communicating to establish the level of risk, via the Executive Management Team, an organization is willing to assume to guide investments in security</li> <li>How critical it is to establish the threat landscape of your organization</li> <li>Leveraging tabletop exercises to establish the capability to effectively respond to an incident.</li> </ul> <p><strong> S</strong><strong>ponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong> Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong> Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>828</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1cc45582-caa9-4652-a39a-ea253a651ed0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN8121147183.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Demystifying Industrial Control System Cyber Risk</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Demystifying Industrial Control System Cyber Risk
 Description:
 This episode of the Information Security Podcast features a conversation with Mike Radigan @RadiganatBOS from Capgemini @Capgemini and host Rob Nettgen (@Robert_Nettgen).  This episode discusses the process of “Demystifying Industrial Control System Cyber Risk”.
 Key Discussion Points and Actionable Items:
  Defining the various types of Industrial Control Systems and how they support a Plant’s Operation
 The inter-relationship of Industrial Control Systems, Information Technology, and Cyber Security
 How Industrial Control Systems have evolved over time and why integrations exist with the balance of an organization’s Information Technology infrastructure
 The role of a Plant Manager and how they assess risk in a Plant’s Operation comparing Cyber Risk and Manufacturing Operations
 The difference between Cyber Risks and Cyber Threats
 Methods to equate, quantify, and explain Operational Risk to Cyber Risk
 Importance of understanding Cyber Risk at the Board level and making educated business decisions
 The impact of regulations and compliance in assessing and managing Cyber Risk.
  Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 11 Feb 2020 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7594cd84-ab2a-11ea-907b-fbb923609f46/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Demystifying Industrial Control System Cyber Risk Description: This episode of the Information Security Podcast features a conversation with Mike Radigan  from Capgemini  and host Rob Nettgen ().  This episode discusses the process of...</itunes:subtitle>
      <itunes:summary>Title: Demystifying Industrial Control System Cyber Risk
 Description:
 This episode of the Information Security Podcast features a conversation with Mike Radigan @RadiganatBOS from Capgemini @Capgemini and host Rob Nettgen (@Robert_Nettgen).  This episode discusses the process of “Demystifying Industrial Control System Cyber Risk”.
 Key Discussion Points and Actionable Items:
  Defining the various types of Industrial Control Systems and how they support a Plant’s Operation
 The inter-relationship of Industrial Control Systems, Information Technology, and Cyber Security
 How Industrial Control Systems have evolved over time and why integrations exist with the balance of an organization’s Information Technology infrastructure
 The role of a Plant Manager and how they assess risk in a Plant’s Operation comparing Cyber Risk and Manufacturing Operations
 The difference between Cyber Risks and Cyber Threats
 Methods to equate, quantify, and explain Operational Risk to Cyber Risk
 Importance of understanding Cyber Risk at the Board level and making educated business decisions
 The impact of regulations and compliance in assessing and managing Cyber Risk.
  Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Demystifying Industrial Control System Cyber Risk</p> <p><strong>Description:</strong></p> <p>This episode of the Information Security Podcast features a conversation with Mike Radigan <a href="https://twitter.com/RadiganatBOS">@RadiganatBOS</a> from Capgemini <a href="https://twitter.com/Capgemini">@Capgemini</a> and host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>).  This episode discusses the process of “Demystifying Industrial Control System Cyber Risk”.</p> <p><strong>Key Discussion Points and Actionable Items:</strong></p> <ul> <li>Defining the various types of Industrial Control Systems and how they support a Plant’s Operation</li> <li>The inter-relationship of Industrial Control Systems, Information Technology, and Cyber Security</li> <li>How Industrial Control Systems have evolved over time and why integrations exist with the balance of an organization’s Information Technology infrastructure</li> <li>The role of a Plant Manager and how they assess risk in a Plant’s Operation comparing Cyber Risk and Manufacturing Operations</li> <li>The difference between Cyber Risks and Cyber Threats</li> <li>Methods to equate, quantify, and explain Operational Risk to Cyber Risk</li> <li>Importance of understanding Cyber Risk at the Board level and making educated business decisions</li> <li>The impact of regulations and compliance in assessing and managing Cyber Risk.</li> </ul> <p><strong>Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong>Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong>Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>1181</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8e9e3920-8027-4935-bd53-a7c1e3cc1ad1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN4306276034.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building a Cyber Security Team</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Building a Cyber Security Team
 Description:
 This episode of the Information Security Podcast features a returning guest and alumni of the Information Security Podcast, Kevin Baker, with host Rob Nettgen (@Robert_Nettgen).  This episode discusses the approach to “Building a Cyber Security Team”.
 Key Discussion Points and Actionable Items:
  The value and importance of maintaining relationships between both the C-Suite and the team executing an organization’s security program
 Recognizing the role of the CISO / security leader to be the “glue” of an organization’s overall security program by being an effective conduit and facilitator within an organization
 Leveraging a full “suite” of skills to be an effective leader to deliver value as part of an organization’s investment in security and business
 The importance of accepting and acknowledging the dependency between Information Technology and Security to complement each other’s respective roles
 Gaining an understanding of the evolving threat landscape and the motivation behind the risks to an organization.
  Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 04 Feb 2020 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75a61594-ab2a-11ea-907b-97ead278efd9/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Building a Cyber Security Team Description: This episode of the Information Security Podcast features a returning guest and alumni of the Information Security Podcast, , with host Rob Nettgen ().  This episode discusses the approach to...</itunes:subtitle>
      <itunes:summary>Title: Building a Cyber Security Team
 Description:
 This episode of the Information Security Podcast features a returning guest and alumni of the Information Security Podcast, Kevin Baker, with host Rob Nettgen (@Robert_Nettgen).  This episode discusses the approach to “Building a Cyber Security Team”.
 Key Discussion Points and Actionable Items:
  The value and importance of maintaining relationships between both the C-Suite and the team executing an organization’s security program
 Recognizing the role of the CISO / security leader to be the “glue” of an organization’s overall security program by being an effective conduit and facilitator within an organization
 Leveraging a full “suite” of skills to be an effective leader to deliver value as part of an organization’s investment in security and business
 The importance of accepting and acknowledging the dependency between Information Technology and Security to complement each other’s respective roles
 Gaining an understanding of the evolving threat landscape and the motivation behind the risks to an organization.
  Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Building a Cyber Security Team</p> <p><strong>Description:</strong></p> <p>This episode of the Information Security Podcast features a returning guest and alumni of the Information Security Podcast, <a href="https://www.linkedin.com/in/kevinleebaker/">Kevin Baker</a>, with host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>).  This episode discusses the approach to “Building a Cyber Security Team”.</p> <p><strong>Key Discussion Points and Actionable Items:</strong></p> <ul> <li>The value and importance of maintaining relationships between both the C-Suite and the team executing an organization’s security program</li> <li>Recognizing the role of the CISO / security leader to be the “glue” of an organization’s overall security program by being an effective conduit and facilitator within an organization</li> <li>Leveraging a full “suite” of skills to be an effective leader to deliver value as part of an organization’s investment in security and business</li> <li>The importance of accepting and acknowledging the dependency between Information Technology and Security to complement each other’s respective roles</li> <li>Gaining an understanding of the evolving threat landscape and the motivation behind the risks to an organization.</li> </ul> <p><strong>Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong>Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong>Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>1035</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5f23561f-14eb-427e-bdb9-003bbd179644]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN4379145843.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Incident Response under the Microscope</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Incident Response under the Microscope
  Description:
 This episode of the Information Security Podcast features an interview with Eric Vanderburg @evanderburg from TCDi @tcdi with host Rob Nettgen (@Robert_Nettgen).  This episode discusses the details surrounding effective “Incident Response”.
  Key Discussion Points and Actionable Items:
  Benefits an organization can realize with a defined “Incident Response Program”
 Importance of an organization knowing its environment including IT assets, applications, and where its data resides before an “Incident” takes place
 Requirements to “train” and prepare employees before an “Incident” takes place so the response is well executed vs. a reaction
 Awareness of an organization’s contractual or compliance requirements to have a defined “Incident Response Program”
 Recognizing that “Incident Response” is a cross-organizational responsibility.
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
  Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
  Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 28 Jan 2020 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75c20916-ab2a-11ea-907b-ef1a751f1076/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Incident Response under the Microscope  Description: This episode of the Information Security Podcast features an interview with Eric Vanderburg  from TCDi  with host Rob Nettgen ().  This episode discusses the details surrounding...</itunes:subtitle>
      <itunes:summary>Title: Incident Response under the Microscope
  Description:
 This episode of the Information Security Podcast features an interview with Eric Vanderburg @evanderburg from TCDi @tcdi with host Rob Nettgen (@Robert_Nettgen).  This episode discusses the details surrounding effective “Incident Response”.
  Key Discussion Points and Actionable Items:
  Benefits an organization can realize with a defined “Incident Response Program”
 Importance of an organization knowing its environment including IT assets, applications, and where its data resides before an “Incident” takes place
 Requirements to “train” and prepare employees before an “Incident” takes place so the response is well executed vs. a reaction
 Awareness of an organization’s contractual or compliance requirements to have a defined “Incident Response Program”
 Recognizing that “Incident Response” is a cross-organizational responsibility.
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
  Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
  Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong> Title:</strong> Incident Response under the Microscope</p> <p><strong> Description:</strong></p> <p>This episode of the Information Security Podcast features an interview with Eric Vanderburg <a href="https://twitter.com/evanderburg">@evanderburg</a> from TCDi <a href="https://twitter.com/tcdi">@tcdi</a> with host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>).  This episode discusses the details surrounding effective “Incident Response”.</p> <p><strong> Key Discussion Points and Actionable Items:</strong></p> <ul> <li>Benefits an organization can realize with a defined “Incident Response Program”</li> <li>Importance of an organization knowing its environment including IT assets, applications, and where its data resides before an “Incident” takes place</li> <li>Requirements to “train” and prepare employees before an “Incident” takes place so the response is well executed vs. a reaction</li> <li>Awareness of an organization’s contractual or compliance requirements to have a defined “Incident Response Program”</li> <li>Recognizing that “Incident Response” is a cross-organizational responsibility.</li> </ul> <p><strong> Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong> Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong> Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>896</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73f07a3a-aee9-47af-8238-9affdc6fc0a4]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN3701082398.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Migrating to the Public Cloud...so what’s the big deal?</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Migrating to the Public Cloud...so what’s the big deal?
  Description:
 This episode of the Information Security Podcast features an interview with Grant Asplund @gasplund from Check Point Software @CheckPointSW with host Rob Nettgen (@Robert_Nettgen).  This episode explores the factors an organization should consider when “Migrating to the Public Cloud”.
  Key Discussion Points and Actionable Items:
  The importance of an organization recognizing the difference between a public cloud provider vs. the end customer’s responsibility in both migrating and operating in the public cloud
 Proper preparation and planning are critical to any cloud migration
 Acknowledging that a key “hindrance” to public cloud adoption is security and the importance of addressing it before attempting a migration to the public cloud
 Take advantage of the “free” resources available from the public cloud providers to prepare for a public cloud migration.
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
  Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
  Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
 If you enjoyed the conversation with Grant Asplund, check out Grant’s podcast, Talking Cloud, featuring interviews regarding secure migration strategies to the public cloud.</description>
      <pubDate>Tue, 21 Jan 2020 12:23:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75e6f64a-ab2a-11ea-907b-43f2e3c0dcad/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Migrating to the Public Cloud...so what’s the big deal?  Description: This episode of the Information Security Podcast features an interview with Grant Asplund  from Check Point Software  with host Rob Nettgen ().  This episode explores...</itunes:subtitle>
      <itunes:summary>Title: Migrating to the Public Cloud...so what’s the big deal?
  Description:
 This episode of the Information Security Podcast features an interview with Grant Asplund @gasplund from Check Point Software @CheckPointSW with host Rob Nettgen (@Robert_Nettgen).  This episode explores the factors an organization should consider when “Migrating to the Public Cloud”.
  Key Discussion Points and Actionable Items:
  The importance of an organization recognizing the difference between a public cloud provider vs. the end customer’s responsibility in both migrating and operating in the public cloud
 Proper preparation and planning are critical to any cloud migration
 Acknowledging that a key “hindrance” to public cloud adoption is security and the importance of addressing it before attempting a migration to the public cloud
 Take advantage of the “free” resources available from the public cloud providers to prepare for a public cloud migration.
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
  Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
  Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
 If you enjoyed the conversation with Grant Asplund, check out Grant’s podcast, Talking Cloud, featuring interviews regarding secure migration strategies to the public cloud.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong> Title:</strong> Migrating to the Public Cloud...so what’s the big deal?</p> <p><strong> Description:</strong></p> <p>This episode of the Information Security Podcast features an interview with Grant Asplund <a href="https://twitter.com/gasplund">@gasplund</a> from Check Point Software <a href="https://twitter.com/CheckPointSW">@CheckPointSW</a> with host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>).  This episode explores the factors an organization should consider when “Migrating to the Public Cloud”.</p> <p><strong> Key Discussion Points and Actionable Items:</strong></p> <ul> <li>The importance of an organization recognizing the difference between a public cloud provider vs. the end customer’s responsibility in both migrating and operating in the public cloud</li> <li>Proper preparation and planning are critical to any cloud migration</li> <li>Acknowledging that a key “hindrance” to public cloud adoption is security and the importance of addressing it before attempting a migration to the public cloud</li> <li>Take advantage of the “free” resources available from the public cloud providers to prepare for a public cloud migration.</li> </ul> <p><strong> Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong> Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong> Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p> <p>If you enjoyed the conversation with Grant Asplund, check out Grant’s podcast, <a href="https://talkingcloud.podbean.com/">Talking Cloud</a>, featuring interviews regarding secure migration strategies to the public cloud.</p>]]>
      </content:encoded>
      <itunes:duration>1166</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e31aa7d4-0bdc-4a4b-9f8b-03d01d155005]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN6532492115.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Employee Security Awareness</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Employee Security Awareness
 Description:
 This episode of the Information Security Podcast features an interview with Lauren Zink from Oportun  @Oportun with host Rob Nettgen (@Robert_Nettgen).  This episode’s conversation discusses the importance of “Employee Security Awareness” as part of an organization’s overall Cyber Security Strategy.
 Key Discussion Points and Actionable Items:
  The importance of understanding the meaning of “Employee Security Awareness”
 Defining the elements of a “Employee Security Awareness” Program and how it should be orchestrated within an organization
 Understanding that “Employee Security Awareness” is not a “one-time” event but starts at the time an employee is hired and evolves as they move through an organization
 The risk organizations assume when technology is the only line of defense and does not incorporate “Employee Security Awareness”
 Integration of third-party vendors and contractors that are part of an organization into the “Employee Security Awareness” Program
 “Employee Security Awareness” is the responsibility of the entire organization, including Human Resources, Training, and Compliance, and is not limited to the Cyber Security Team.
  Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Wed, 15 Jan 2020 03:47:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/760538ee-ab2a-11ea-907b-73faab263a31/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Employee Security Awareness Description: This episode of the Information Security Podcast features an interview with  from Oportun   with host Rob Nettgen ().  This episode’s conversation discusses the importance of “Employee...</itunes:subtitle>
      <itunes:summary>Title: Employee Security Awareness
 Description:
 This episode of the Information Security Podcast features an interview with Lauren Zink from Oportun  @Oportun with host Rob Nettgen (@Robert_Nettgen).  This episode’s conversation discusses the importance of “Employee Security Awareness” as part of an organization’s overall Cyber Security Strategy.
 Key Discussion Points and Actionable Items:
  The importance of understanding the meaning of “Employee Security Awareness”
 Defining the elements of a “Employee Security Awareness” Program and how it should be orchestrated within an organization
 Understanding that “Employee Security Awareness” is not a “one-time” event but starts at the time an employee is hired and evolves as they move through an organization
 The risk organizations assume when technology is the only line of defense and does not incorporate “Employee Security Awareness”
 Integration of third-party vendors and contractors that are part of an organization into the “Employee Security Awareness” Program
 “Employee Security Awareness” is the responsibility of the entire organization, including Human Resources, Training, and Compliance, and is not limited to the Cyber Security Team.
  Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Employee Security Awareness</p> <p><strong>Description:</strong></p> <p>This episode of the Information Security Podcast features an interview with <a href="https://twitter.com/LaurenZinOH">Lauren Zink</a> from Oportun  <a href="https://twitter.com/oportun">@Oportun</a> with host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>).  This episode’s conversation discusses the importance of “Employee Security Awareness” as part of an organization’s overall Cyber Security Strategy.</p> <p><strong>Key Discussion Points and Actionable Items:</strong></p> <ul> <li>The importance of understanding the meaning of “Employee Security Awareness”</li> <li>Defining the elements of a “Employee Security Awareness” Program and how it should be orchestrated within an organization</li> <li>Understanding that “Employee Security Awareness” is not a “one-time” event but starts at the time an employee is hired and evolves as they move through an organization</li> <li>The risk organizations assume when technology is the only line of defense and does not incorporate “Employee Security Awareness”</li> <li>Integration of third-party vendors and contractors that are part of an organization into the “Employee Security Awareness” Program</li> <li>“Employee Security Awareness” is the responsibility of the entire organization, including Human Resources, Training, and Compliance, and is not limited to the Cyber Security Team.</li> </ul> <p><strong>Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong>Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong>Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>691</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e3e3089-cac2-44d7-8816-d5b0f5531574]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN1108833719.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Incident Response and Business</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Cyber Incident Response and Business
 Description:
 This episode of the Information Security Podcast features an interview with Tom Hardin from the Franciscan Alliance @MyFranciscan with host Rob Nettgen (@Robert_Nettgen).  The conversation discusses the correlation between “Cyber Incident Response and Business” and the importance of preparing for Cyber Incidents within an organization.
 Key Discussion Points and Actionable Items:
  The correlation between Cyber Incident Response and Overall Business Incident Response
 The importance of adopting a Cyber Incident Response Framework such as NIST or ISO

 The process of engaging government resources, such as the FBI or other organizations, that can provide assistance as part of an Incident Response
 Alignment of a Cyber Incident Response to Cyber Insurance Policies
 Leveraging Industry Association resources to define a Cyber Incident Response Plan
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 07 Jan 2020 13:53:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7619a0f4-ab2a-11ea-907b-5f61905c854f/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Cyber Incident Response and Business Description: This episode of the Information Security Podcast features an interview with  from the Franciscan Alliance  with host Rob Nettgen ().  The conversation discusses the correlation between...</itunes:subtitle>
      <itunes:summary>Title: Cyber Incident Response and Business
 Description:
 This episode of the Information Security Podcast features an interview with Tom Hardin from the Franciscan Alliance @MyFranciscan with host Rob Nettgen (@Robert_Nettgen).  The conversation discusses the correlation between “Cyber Incident Response and Business” and the importance of preparing for Cyber Incidents within an organization.
 Key Discussion Points and Actionable Items:
  The correlation between Cyber Incident Response and Overall Business Incident Response
 The importance of adopting a Cyber Incident Response Framework such as NIST or ISO

 The process of engaging government resources, such as the FBI or other organizations, that can provide assistance as part of an Incident Response
 Alignment of a Cyber Incident Response to Cyber Insurance Policies
 Leveraging Industry Association resources to define a Cyber Incident Response Plan
   Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Cyber Incident Response and Business</p> <p><strong>Description:</strong></p> <p>This episode of the Information Security Podcast features an interview with <a href="https://www.linkedin.com/in/tomh1">Tom Hardin</a> from the Franciscan Alliance <a href="https://twitter.com/MyFranciscan">@MyFranciscan</a> with host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>).  The conversation discusses the correlation between “Cyber Incident Response and Business” and the importance of preparing for Cyber Incidents within an organization.</p> <p><strong>Key Discussion Points and Actionable Items:</strong></p> <ul> <li>The correlation between Cyber Incident Response and Overall Business Incident Response</li> <li>The importance of adopting a Cyber Incident Response Framework such as <a href="https://nvd.nist.gov/800-53/Rev4/family/INCIDENT%20RESPONSE">NIST</a> or <a href="https://www.iso27001security.com/html/27035.html">ISO</a>
</li> <li>The process of engaging government resources, such as the FBI or other organizations, that can provide assistance as part of an Incident Response</li> <li>Alignment of a Cyber Incident Response to Cyber Insurance Policies</li> <li>Leveraging Industry Association resources to define a Cyber Incident Response Plan</li> </ul> <p><strong> </strong><strong>Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong>Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong>Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>835</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[90fa567e-e211-4e5e-a836-e9c99d493772]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN3574068684.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security Friends</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Security Friends
 Description:
 This is a “special” Holiday episode of the Information Security Podcast which features host Rob Nettgen (@Robert_Nettgen) along with a special group of “Security Friends”.  The conversation is lively and entertaining with commentary on a number of recent cyber security news events.
 Please join the Security Friends as the Information Security Podcast celebrates the end of 2019 and looks forward to the start of 2020.
 Following this episode, we will be taking a short break for the Holidays and will return with a new episode of the Information Security Podcast on Tuesday, January 7, 2020.
 Happy Holidays from the Information Security Podcast!
 Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
  </description>
      <pubDate>Tue, 24 Dec 2019 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76364baa-ab2a-11ea-907b-a7447b0a3739/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Happy Holidays from the Information Security Podcast</itunes:subtitle>
      <itunes:summary>Title: Security Friends
 Description:
 This is a “special” Holiday episode of the Information Security Podcast which features host Rob Nettgen (@Robert_Nettgen) along with a special group of “Security Friends”.  The conversation is lively and entertaining with commentary on a number of recent cyber security news events.
 Please join the Security Friends as the Information Security Podcast celebrates the end of 2019 and looks forward to the start of 2020.
 Following this episode, we will be taking a short break for the Holidays and will return with a new episode of the Information Security Podcast on Tuesday, January 7, 2020.
 Happy Holidays from the Information Security Podcast!
 Sponsored By:
 ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
 Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
 Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
 For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!
  </itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Security Friends</p> <p><strong>Description:</strong></p> <p>This is a “special” Holiday episode of the Information Security Podcast which features host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>) along with a special group of “Security Friends”.  The conversation is lively and entertaining with commentary on a number of recent cyber security news events.</p> <p>Please join the Security Friends as the Information Security Podcast celebrates the end of 2019 and looks forward to the start of 2020.</p> <p>Following this episode, we will be taking a short break for the Holidays and will return with a new episode of the Information Security Podcast on Tuesday, January 7, 2020.</p> <p>Happy Holidays from the Information Security Podcast!</p> <p><strong>Sponsored By:</strong></p> <p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p> <p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p> <p><strong>Recorded and Production By:</strong></p> <p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p> <p><strong>Additional Information and Resources:</strong></p> <p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>).  Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p> <p> </p>]]>
      </content:encoded>
      <itunes:duration>2088</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e12927db-5313-44cb-b619-fd125672d50c]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN5141887988.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>In Pursuit of Cyber Criminals</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: In Pursuit of Cyber Criminals
 Description:
This episode of the Information Security Podcast features an interview with Special Agent Ryan Macfarlane from the FBI’s Cyber Crime Unit with host Rob Nettgen (@Robert_Nettgen). The conversation discusses the role of the FBI in the “battle” against Cyber Criminals and how an organization can leverage the services of the FBI in the event of a Cyber Security Incident.
 Key Discussion Points and Actionable Items:
Reporting issues, such as Wire Fraud, to the FBI within 48 hours to improve the chances of recovering losses. 
The importance of establishing a working relationship with the FBI before a cyber incident so they can assist in the event of a cyber incident by contacting the local FBI where your organization is located.
Validation that no organization, regardless of the size or industry, is “immune” from being a target of cyber crime due to the business ecosystem and the use of technology to support business transactions.
The proliferation of Ransomware and the ability of the FBI to assist with these types of incidents.
The benefit of using Multifactor Authentication (MFA) to reduce the likelihood of Social Engineering and Email Fraud.
 Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 17 Dec 2019 16:10:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/767cd728-ab2a-11ea-907b-630f4b03d0c1/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: In Pursuit of Cyber Criminals  Description: This episode of the Information Security Podcast features an interview with Special Agent Ryan Macfarlane from the FBI’s Cyber Crime Unit with host Rob Nettgen ().  The conversation discusses...</itunes:subtitle>
      <itunes:summary>Title: In Pursuit of Cyber Criminals
 Description:
This episode of the Information Security Podcast features an interview with Special Agent Ryan Macfarlane from the FBI’s Cyber Crime Unit with host Rob Nettgen (@Robert_Nettgen). The conversation discusses the role of the FBI in the “battle” against Cyber Criminals and how an organization can leverage the services of the FBI in the event of a Cyber Security Incident.
 Key Discussion Points and Actionable Items:
Reporting issues, such as Wire Fraud, to the FBI within 48 hours to improve the chances of recovering losses. 
The importance of establishing a working relationship with the FBI before a cyber incident so they can assist in the event of a cyber incident by contacting the local FBI where your organization is located.
Validation that no organization, regardless of the size or industry, is “immune” from being a target of cyber crime due to the business ecosystem and the use of technology to support business transactions.
The proliferation of Ransomware and the ability of the FBI to assist with these types of incidents.
The benefit of using Multifactor Authentication (MFA) to reduce the likelihood of Social Engineering and Email Fraud.
 Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
 Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
 Additional Information and Resources:
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong> Title:</strong> In Pursuit of Cyber Criminals</p><p><strong> Description:</strong></p><p>This episode of the Information Security Podcast features an interview with Special Agent Ryan Macfarlane from the FBI’s Cyber Crime Unit with host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>). The conversation discusses the role of the FBI in the “battle” against Cyber Criminals and how an organization can leverage the services of the FBI in the event of a Cyber Security Incident.</p><p><strong> Key Discussion Points and Actionable Items:</strong></p><p>Reporting issues, such as Wire Fraud, to the FBI within 48 hours to improve the chances of recovering losses. </p><p>The importance of establishing a working relationship with the FBI before a cyber incident so they can assist in the event of a cyber incident by contacting the local FBI where your organization is located.</p><p>Validation that no organization, regardless of the size or industry, is “immune” from being a target of cyber crime due to the business ecosystem and the use of technology to support business transactions.</p><p>The proliferation of Ransomware and the ability of the FBI to assist with these types of incidents.</p><p>The benefit of using Multifactor Authentication (MFA) to reduce the likelihood of Social Engineering and Email Fraud.</p><p><strong> Sponsored By:</strong></p><p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p><p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p><p><strong> Recorded and Production By:</strong></p><p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p><p><strong> Additional Information and Resources:</strong></p><p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>1138</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8473e72-ae5e-4bdf-a235-b11c3d54c0bc]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN9619121658.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Resilient Organizations</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Cyber Resilient Organizations
Description:
This episode of the Information Security Podcast features an interview with Steve Hunt @Steve_Hunt from Hunt BI with host Rob Nettgen (@Robert_Nettgen). The conversation discusses and defines the term “Cyber Resilient Organization” and the role of a CISO to facilitate an organization to reach the goal of becoming a “Cyber Resilient Organization”.
Key Discussion Points and Actionable Items:
How a CISO can be an “enabler” within an organization by:

Having credibility and describing the value of security to the business

Allowing an organization to be agile allowing a business to grow

The evolution and positioning of risk management.
What does it mean to be “cyber resilient” and create revenue?
Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
Additional Information and Resources:
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 10 Dec 2019 19:37:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76a3a8d0-ab2a-11ea-907b-eb0b6c592987/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Cyber Resilient Organizations Description: This episode of the Information Security Podcast features an interview with Steve Hunt  from  with host Rob Nettgen ().  The conversation discusses and defines the term “Cyber Resilient...</itunes:subtitle>
      <itunes:summary>Title: Cyber Resilient Organizations
Description:
This episode of the Information Security Podcast features an interview with Steve Hunt @Steve_Hunt from Hunt BI with host Rob Nettgen (@Robert_Nettgen). The conversation discusses and defines the term “Cyber Resilient Organization” and the role of a CISO to facilitate an organization to reach the goal of becoming a “Cyber Resilient Organization”.
Key Discussion Points and Actionable Items:
How a CISO can be an “enabler” within an organization by:

Having credibility and describing the value of security to the business

Allowing an organization to be agile allowing a business to grow

The evolution and positioning of risk management.
What does it mean to be “cyber resilient” and create revenue?
Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
Additional Information and Resources:
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Cyber Resilient Organizations</p><p><strong>Description:</strong></p><p>This episode of the Information Security Podcast features an interview with Steve Hunt <a href="https://twitter.com/Steve_Hunt">@Steve_Hunt</a> from <a href="https://huntbi.com/">Hunt BI</a> with host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>). The conversation discusses and defines the term “Cyber Resilient Organization” and the role of a CISO to facilitate an organization to reach the goal of becoming a “Cyber Resilient Organization”.</p><p><strong>Key Discussion Points and Actionable Items:</strong></p><p>How a CISO can be an “enabler” within an organization by:</p><ul>
<li>Having credibility and describing the value of security to the business</li>
<li>Allowing an organization to be agile allowing a business to grow</li>
</ul><p>The evolution and positioning of risk management.</p><p>What does it mean to be “cyber resilient” and create revenue?</p><p><strong>Sponsored By:</strong></p><p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p><p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p><p><strong>Recorded and Production By:</strong></p><p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p><p><strong>Additional Information and Resources:</strong></p><p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>1118</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7de038d2-e002-4a2a-aa6c-062de5552e5b]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN7650313931.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Control Systems – A New Cyber Security Paradigm</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Control Systems – A New Cyber Security Paradigm
Description:
This episode of the Information Security Podcast features an interview with Joe Weiss, Managing Partner of Applied Control Solutions by host Rob Nettgen (@Robert_Nettgen). The conversation examines the inter-relationship between controls systems and cyber security.
Key Discussion Points and Actionable Items:

Common misconceptions between the inter-relationship between control systems and cyber security.

The parallels between the Northeast Blackout of 2003, Stuxnet, and the attack on Iranian Nuclear Facilities.

The challenges that exist, and the requirement to evolve the interaction, between control systems, information technology, and cyber security engineers and resources.

Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
Additional Information and Resources:
Joe Weiss’ Blog, Unfettered Blog, and his lecture at Stanford University, Cyber Security of Industrial Control Systems.
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 03 Dec 2019 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76bcdc06-ab2a-11ea-907b-8f8b41160142/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Control Systems – A New Cyber Security Paradigm Description: This episode of the Information Security Podcast features an interview with Joe Weiss, Managing Partner of  by host Rob Nettgen ().  The conversation examines the...</itunes:subtitle>
      <itunes:summary>Title: Control Systems – A New Cyber Security Paradigm
Description:
This episode of the Information Security Podcast features an interview with Joe Weiss, Managing Partner of Applied Control Solutions by host Rob Nettgen (@Robert_Nettgen). The conversation examines the inter-relationship between controls systems and cyber security.
Key Discussion Points and Actionable Items:

Common misconceptions between the inter-relationship between control systems and cyber security.

The parallels between the Northeast Blackout of 2003, Stuxnet, and the attack on Iranian Nuclear Facilities.

The challenges that exist, and the requirement to evolve the interaction, between control systems, information technology, and cyber security engineers and resources.

Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
Additional Information and Resources:
Joe Weiss’ Blog, Unfettered Blog, and his lecture at Stanford University, Cyber Security of Industrial Control Systems.
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Control Systems – A New Cyber Security Paradigm</p><p><strong>Description:</strong></p><p>This episode of the Information Security Podcast features an interview with Joe Weiss, Managing Partner of <a href="http://www.realtimeacs.com/">Applied Control Solutions</a> by host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>). The conversation examines the inter-relationship between controls systems and cyber security.</p><p><strong>Key Discussion Points and Actionable Items:</strong></p><ol>
<li>Common misconceptions between the inter-relationship between control systems and cyber security.</li>
<li>The parallels between the <a href="https://en.wikipedia.org/wiki/Northeast_blackout_of_2003">Northeast Blackout of 2003</a>, <a href="https://en.wikipedia.org/wiki/Stuxnet">Stuxnet</a>, and the attack on <a href="https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/">Iranian Nuclear Facilities</a>.</li>
<li>The challenges that exist, and the requirement to evolve the interaction, between control systems, information technology, and cyber security engineers and resources.</li>
</ol><p><strong>Sponsored By:</strong></p><p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p><p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p><p><strong>Recorded and Production By:</strong></p><p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p><p><strong>Additional Information and Resources:</strong></p><p>Joe Weiss’ Blog, <a href="http://www.controlglobal.com/unfettered">Unfettered Blog</a>, and his lecture at Stanford University, <a href="https://www.youtube.com/watch?v=S3Yyv53dZ5A">Cyber Security of Industrial Control Systems</a>.</p><p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>1575</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f3448a42-4f0a-4eba-9c7d-bea57aaf0871]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN2590164088.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Security Issues and Cloud Migration</title>
      <link>https://evergreenpodcasts.com/information-security-podcast</link>
      <description>Title: Cyber Security Issues and Cloud Migration
Description:
This episode of the Information Security Podcast features an interview with Bob Kalka @bobkalka ‏from IBM @IBM with host Rob Nettgen (@Robert_Nettgen). The conversation examines the definition of Cyber Security and its relationship with and how it is impacted by an organization’s migration to the Cloud.
Key Discussion Points and Actionable Items:

As part of a migration to the Cloud, do you know where your sensitive data exists?

The perception that Cloud service providers will manage all an organization’s cyber security requirements once their workloads reside in the Cloud.

The level of sophistication of “cyber criminals” continues to evolve as they further leverage contemporary technologies to assist their efforts.

Requirement to exercise Incident Response preparedness and response plans through simulated attacks and exercises.

Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
Additional Information and Resources:
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</description>
      <pubDate>Tue, 19 Nov 2019 14:15:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76d79e60-ab2a-11ea-907b-bf8068f42a73/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Cyber Security Issues and Cloud Migration Description: This episode of the Information Security Podcast features an interview with Bob Kalka  ‏from IBM  with host Rob Nettgen ().  The conversation examines the definition of Cyber...</itunes:subtitle>
      <itunes:summary>Title: Cyber Security Issues and Cloud Migration
Description:
This episode of the Information Security Podcast features an interview with Bob Kalka @bobkalka ‏from IBM @IBM with host Rob Nettgen (@Robert_Nettgen). The conversation examines the definition of Cyber Security and its relationship with and how it is impacted by an organization’s migration to the Cloud.
Key Discussion Points and Actionable Items:

As part of a migration to the Cloud, do you know where your sensitive data exists?

The perception that Cloud service providers will manage all an organization’s cyber security requirements once their workloads reside in the Cloud.

The level of sophistication of “cyber criminals” continues to evolve as they further leverage contemporary technologies to assist their efforts.

Requirement to exercise Incident Response preparedness and response plans through simulated attacks and exercises.

Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
Additional Information and Resources:
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Cyber Security Issues and Cloud Migration</p><p><strong>Description:</strong></p><p>This episode of the Information Security Podcast features an interview with Bob Kalka @bobkalka ‏from IBM <a href="https://twitter.com/ibm">@IBM</a> with host Rob Nettgen (<a href="https://twitter.com/Robert_Nettgen">@Robert_Nettgen</a>). The conversation examines the definition of Cyber Security and its relationship with and how it is impacted by an organization’s migration to the Cloud.</p><p><strong>Key Discussion Points and Actionable Items:</strong></p><ol>
<li>As part of a migration to the Cloud, do you know where your sensitive data exists?</li>
<li>The perception that Cloud service providers will manage all an organization’s cyber security requirements once their workloads reside in the Cloud.</li>
<li>The level of sophistication of “cyber criminals” continues to evolve as they further leverage contemporary technologies to assist their efforts.</li>
<li>Requirement to exercise Incident Response preparedness and response plans through simulated attacks and exercises.</li>
</ol><p><strong>Sponsored By:</strong></p><p>ASMGi (<a href="https://twitter.com/ASMGi_CLE">@ASMGi_CLE</a>) and <a href="https://www.asmgi.com/">https://www.asmgi.com/</a></p><p>Briteskies (<a href="https://twitter.com/nobrowncow">@NoBrownCow</a>) and <a href="https://www.briteskies.com/">https://www.briteskies.com/</a></p><p><strong>Recorded and Production By:</strong></p><p>Evergreen Podcasts <a href="https://twitter.com/StreamEvergreen">(@StreamEvergreen</a>) at <a href="https://evergreenpodcasts.com/">https://evergreenpodcasts.com/</a> and production assistance provided by Frank Yako (<a href="https://twitter.com/fyako">@fyako</a>).</p><p><strong>Additional Information and Resources:</strong></p><p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://www.informationsecuritysummit.org/">https://www.informationsecuritysummit.org/</a> or on Twitter (<a href="https://twitter.com/InfoSecurSummit">@InfoSecurSummit</a>). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!</p>]]>
      </content:encoded>
      <itunes:duration>1069</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[727ab7c4a7b6437aa404e630ab635ab6]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN1682831214.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IoT – Benefits and Security Challenges</title>
      <link>https://www.informationsecuritysummit.org/</link>
      <description>Title: IoT – Benefits and Security Challenges
Description:
During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with Chris Bush, Principal Security Consultant at McAfee, who will be presenting at the 2019 Information Security Summit on “The Internet of Things (IoT) that Shouldn’t Be on the Internet”. Chris is a veteran of the Information Security Summit and has attended every Summit since the event started and has presented 11 times. The presentation will be a thought-provoking discussion and informative discussion as many organizations are dealing with the benefits and security challenges of IoT.
We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.
Sponsored By:
ASMGi (@ASMGi_CLE) and www.asmgi.com/
 Briteskies at http://www.briteskies.com/
Produced By:
Evergreen Podcasts (@streamevergreen) at www.evergreenpodcasts.com with production assistance provided by Frank Yako (@fyako).
Additional Information:
For additional information on the Information Security Summit, please visit us on the web at www.informationsecuritysummit.org/, on Twitter (@InfoSecurSummit) or on LinkedIn.</description>
      <pubDate>Tue, 15 Oct 2019 09:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76f55860-ab2a-11ea-907b-931f1d01f720/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chris Bush, Principal Security Consultant at McAfee</itunes:subtitle>
      <itunes:summary>Title: IoT – Benefits and Security Challenges
Description:
During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with Chris Bush, Principal Security Consultant at McAfee, who will be presenting at the 2019 Information Security Summit on “The Internet of Things (IoT) that Shouldn’t Be on the Internet”. Chris is a veteran of the Information Security Summit and has attended every Summit since the event started and has presented 11 times. The presentation will be a thought-provoking discussion and informative discussion as many organizations are dealing with the benefits and security challenges of IoT.
We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.
Sponsored By:
ASMGi (@ASMGi_CLE) and www.asmgi.com/
 Briteskies at http://www.briteskies.com/
Produced By:
Evergreen Podcasts (@streamevergreen) at www.evergreenpodcasts.com with production assistance provided by Frank Yako (@fyako).
Additional Information:
For additional information on the Information Security Summit, please visit us on the web at www.informationsecuritysummit.org/, on Twitter (@InfoSecurSummit) or on LinkedIn.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> IoT – Benefits and Security Challenges</p><p><strong>Description:</strong></p><p>During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with Chris Bush, Principal Security Consultant at McAfee, who will be presenting at the 2019 Information Security Summit on “The Internet of Things (IoT) that Shouldn’t Be on the Internet”. Chris is a veteran of the Information Security Summit and has attended every Summit since the event started and has presented 11 times. The presentation will be a thought-provoking discussion and informative discussion as many organizations are dealing with the benefits and security challenges of IoT.</p><p>We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.</p><p><strong>Sponsored By:</strong></p><p>ASMGi (@<a href="https://soundcloud.com/ASMGi_CLE">ASMGi_CLE</a>) and <a href="https://gate.sc/?url=https%3A%2F%2Fwww.asmgi.com%2F&amp;token=78e4eb-1-1569865624791">www.asmgi.com/</a></p><p> Briteskies at <a href="http://www.briteskies.com/">http://www.briteskies.com/</a></p><p><strong>Produced By:</strong></p><p>Evergreen Podcasts (@streamevergreen) at <a href="http://www.evergreenpodcasts.com/">www.evergreenpodcasts.com</a> with production assistance provided by Frank Yako (@<a href="https://soundcloud.com/fyako">fyako</a>).</p><p><strong>Additional Information:</strong></p><p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://gate.sc/?url=https%3A%2F%2Fwww.informationsecuritysummit.org%2F&amp;token=393de7-1-1569865624791">www.informationsecuritysummit.org/</a>, on Twitter (@InfoSecurSummit) or on LinkedIn.</p>]]>
      </content:encoded>
      <itunes:duration>180</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e2d707fc3f504262a40c56c19ec6d8b5]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN1386705327.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Applied Side of Attending the 2019 Information Security Summit</title>
      <link>https://www.informationsecuritysummit.org/</link>
      <description>Title: The Applied Side of Attending the 2019 Information Security Summit
Description:
During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with William (Billy) Heiser, Manager, IT Security at Lincoln Electric, who explains why he plans to attend the 2019 Information Security Summit and the value and benefits he has realized from past Summits. Billy appreciates the value of participating in discussions and presentations from both the practitioner as well as from solution providers in the security space. From past Summits, Billy has been able to speak with presenters and peers and has directly been able to take away information he learned from the Summit to directly apply it to the his organization’s cyber security needs.  
We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.
Sponsored By:
ASMGi (@ASMGi_CLE) and www.asmgi.com/
 Briteskies at http://www.briteskies.com/
Produced By:
Evergreen Podcasts (@streamevergreen) at www.evergreenpodcasts.com with production assistance provided by Frank Yako (@fyako).
Additional Information:
For additional information on the Information Security Summit, please visit us on the web at www.informationsecuritysummit.org/, on Twitter (@InfoSecurSummit) or on LinkedIn.</description>
      <pubDate>Tue, 08 Oct 2019 09:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/77265faa-ab2a-11ea-907b-53d5aeeea5c1/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>William (Billy) Heiser, Manager, IT Security at Lincoln Electric</itunes:subtitle>
      <itunes:summary>Title: The Applied Side of Attending the 2019 Information Security Summit
Description:
During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with William (Billy) Heiser, Manager, IT Security at Lincoln Electric, who explains why he plans to attend the 2019 Information Security Summit and the value and benefits he has realized from past Summits. Billy appreciates the value of participating in discussions and presentations from both the practitioner as well as from solution providers in the security space. From past Summits, Billy has been able to speak with presenters and peers and has directly been able to take away information he learned from the Summit to directly apply it to the his organization’s cyber security needs.  
We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.
Sponsored By:
ASMGi (@ASMGi_CLE) and www.asmgi.com/
 Briteskies at http://www.briteskies.com/
Produced By:
Evergreen Podcasts (@streamevergreen) at www.evergreenpodcasts.com with production assistance provided by Frank Yako (@fyako).
Additional Information:
For additional information on the Information Security Summit, please visit us on the web at www.informationsecuritysummit.org/, on Twitter (@InfoSecurSummit) or on LinkedIn.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> The Applied Side of Attending the 2019 Information Security Summit</p><p><strong>Description:</strong></p><p>During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with William (Billy) Heiser, Manager, IT Security at Lincoln Electric, who explains why he plans to attend the 2019 Information Security Summit and the value and benefits he has realized from past Summits. Billy appreciates the value of participating in discussions and presentations from both the practitioner as well as from solution providers in the security space. From past Summits, Billy has been able to speak with presenters and peers and has directly been able to take away information he learned from the Summit to directly apply it to the his organization’s cyber security needs.  </p><p>We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.</p><p><strong>Sponsored By:</strong></p><p>ASMGi (@<a href="https://soundcloud.com/ASMGi_CLE">ASMGi_CLE</a>) and <a href="https://gate.sc/?url=https%3A%2F%2Fwww.asmgi.com%2F&amp;token=78e4eb-1-1569865624791">www.asmgi.com/</a></p><p> Briteskies at <a href="http://www.briteskies.com/">http://www.briteskies.com/</a></p><p><strong>Produced By:</strong></p><p>Evergreen Podcasts (@streamevergreen) at <a href="http://www.evergreenpodcasts.com/">www.evergreenpodcasts.com</a> with production assistance provided by Frank Yako (@<a href="https://soundcloud.com/fyako">fyako</a>).</p><p><strong>Additional Information:</strong></p><p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://gate.sc/?url=https%3A%2F%2Fwww.informationsecuritysummit.org%2F&amp;token=393de7-1-1569865624791">www.informationsecuritysummit.org/</a>, on Twitter (@InfoSecurSummit) or on LinkedIn.</p>]]>
      </content:encoded>
      <itunes:duration>179</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2965728a0ebb44bb8ef4bdea81641ff7]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN6733796278.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Value of Attending the 2019 Information Security Summit</title>
      <link>https://www.informationsecuritysummit.org/</link>
      <description>Title: The Value of Attending the 2019 Information Security Summit
Description:
During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with Christopher (Chris) Ortiz, Security Engineer with MTD Products, who explains why he plans to attend the 2019 Information Security Summit and the value and benefits he has realized from past Summits. Chris articulates how it has helped his career not only to refresh his current knowledge but also to cross train himself on other topics that could help his organization.
We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.
Sponsored By:
ASMGi (@ASMGi_CLE) and www.asmgi.com/
 Briteskies at http://www.briteskies.com/
Produced By:
Evergreen Podcasts (@streamevergreen) at www.evergreenpodcasts.com with production assistance provided by Frank Yako (@fyako).
Additional Information:
For additional information on the Information Security Summit, please visit us on the web at www.informationsecuritysummit.org/, on Twitter (@InfoSecurSummit) or on LinkedIn.</description>
      <pubDate>Tue, 01 Oct 2019 09:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7744b7a2-ab2a-11ea-907b-678944374c42/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Christopher Ortiz, Security Engineer with MTD Products</itunes:subtitle>
      <itunes:summary>Title: The Value of Attending the 2019 Information Security Summit
Description:
During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with Christopher (Chris) Ortiz, Security Engineer with MTD Products, who explains why he plans to attend the 2019 Information Security Summit and the value and benefits he has realized from past Summits. Chris articulates how it has helped his career not only to refresh his current knowledge but also to cross train himself on other topics that could help his organization.
We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.
Sponsored By:
ASMGi (@ASMGi_CLE) and www.asmgi.com/
 Briteskies at http://www.briteskies.com/
Produced By:
Evergreen Podcasts (@streamevergreen) at www.evergreenpodcasts.com with production assistance provided by Frank Yako (@fyako).
Additional Information:
For additional information on the Information Security Summit, please visit us on the web at www.informationsecuritysummit.org/, on Twitter (@InfoSecurSummit) or on LinkedIn.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> The Value of Attending the 2019 Information Security Summit</p><p><strong>Description:</strong></p><p>During this episode, Host Rob Nettgen (@Robert_Nettgen) speaks with Christopher (Chris) Ortiz, Security Engineer with MTD Products, who explains why he plans to attend the 2019 Information Security Summit and the value and benefits he has realized from past Summits. Chris articulates how it has helped his career not only to refresh his current knowledge but also to cross train himself on other topics that could help his organization.</p><p>We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.</p><p><strong>Sponsored By:</strong></p><p>ASMGi (@<a href="https://soundcloud.com/ASMGi_CLE">ASMGi_CLE</a>) and <a href="https://gate.sc/?url=https%3A%2F%2Fwww.asmgi.com%2F&amp;token=78e4eb-1-1569865624791">www.asmgi.com/</a></p><p> Briteskies at <a href="http://www.briteskies.com/">http://www.briteskies.com/</a></p><p><strong>Produced By:</strong></p><p>Evergreen Podcasts (@streamevergreen) at <a href="http://www.evergreenpodcasts.com">www.evergreenpodcasts.com</a> with production assistance provided by Frank Yako (@<a href="https://soundcloud.com/fyako">fyako</a>).</p><p><strong>Additional Information:</strong></p><p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://gate.sc/?url=https%3A%2F%2Fwww.informationsecuritysummit.org%2F&amp;token=393de7-1-1569865624791">www.informationsecuritysummit.org/</a>, on Twitter (@InfoSecurSummit) or on LinkedIn.</p>]]>
      </content:encoded>
      <itunes:duration>179</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[82c546e5fffd44dbb7842173cc28ce27]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN5739508551.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Information Security Summit 2019 Promo</title>
      <link>https://www.evergreenpodcasts.com/informationsecuritypodcast</link>
      <description>Title: Information Security Summit 2019 Promo
Description:
During this episode, Host Rob Nettgen (@Robert_Nettgen) provides an overview of the 2019 Information Security Summit.
We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.
Sponsored By:
ASMGi (@ASMGi_CLE) and www.asmgi.com/
 Brite Skies at http://www.briteskies.com/
Produced By:
Evergreen Podcasts (@streamevergreen) at www.evergreenpodcasts.com with production assistance provided by Frank Yako (@fyako).
Additional Information:
For additional information on the Information Security Summit, please visit us on the web at www.informationsecuritysummit.org/, on Twitter (@InfoSecurSummit) or on LinkedIn.</description>
      <pubDate>Tue, 24 Sep 2019 20:19:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7793051a-ab2a-11ea-907b-57c2261ebba0/image/ISS_logo2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title: Information Security Summit 2019 Promo Description: During this episode, Host Rob Nettgen (@Robert_Nettgen) provides an overview of the 2019 Information Security Summit. We will be shining a light on the big event coming up, the Information...</itunes:subtitle>
      <itunes:summary>Title: Information Security Summit 2019 Promo
Description:
During this episode, Host Rob Nettgen (@Robert_Nettgen) provides an overview of the 2019 Information Security Summit.
We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.
Sponsored By:
ASMGi (@ASMGi_CLE) and www.asmgi.com/
 Brite Skies at http://www.briteskies.com/
Produced By:
Evergreen Podcasts (@streamevergreen) at www.evergreenpodcasts.com with production assistance provided by Frank Yako (@fyako).
Additional Information:
For additional information on the Information Security Summit, please visit us on the web at www.informationsecuritysummit.org/, on Twitter (@InfoSecurSummit) or on LinkedIn.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Title:</strong> Information Security Summit 2019 Promo</p><p><strong>Description:</strong></p><p>During this episode, Host Rob Nettgen (@Robert_Nettgen) provides an overview of the 2019 Information Security Summit.</p><p>We will be shining a light on the big event coming up, the Information Security Summit in Cleveland, Ohio at the IX-Center, October 21st through the 25th. The Information Security Summit is a great place to meet your peers who are dealing with the same issues, meet experts who will share their knowledge and a one-stop shop for a whole host of top-notch information security vendors with helpful services and products. We look forward to seeing you there.</p><p><strong>Sponsored By:</strong></p><p>ASMGi (@<a href="https://soundcloud.com/ASMGi_CLE">ASMGi_CLE</a>) and <a href="https://gate.sc/?url=https%3A%2F%2Fwww.asmgi.com%2F&amp;token=78e4eb-1-1569865624791">www.asmgi.com/</a></p><p> Brite Skies at <a href="http://www.briteskies.com/">http://www.briteskies.com/</a></p><p><strong>Produced By:</strong></p><p>Evergreen Podcasts (@streamevergreen) at <a href="http://www.evergreenpodcasts.com/">www.evergreenpodcasts.com</a> with production assistance provided by Frank Yako (@<a href="https://soundcloud.com/fyako">fyako</a>).</p><p><strong>Additional Information:</strong></p><p>For additional information on the Information Security Summit, please visit us on the web at <a href="https://gate.sc/?url=https%3A%2F%2Fwww.informationsecuritysummit.org%2F&amp;token=393de7-1-1569865624791">www.informationsecuritysummit.org/</a>, on Twitter (@InfoSecurSummit) or on LinkedIn.</p>]]>
      </content:encoded>
      <itunes:duration>130</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[daec148398854562aef51863c9eecd57]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN3592742738.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Private Partnerships Impact Cyber Investigations</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/592134027-user-224801079-iss-gunner-keynote.mp3</link>
      <description>Title: How Private Partnerships Impact Cyber Investigations Description: This episode of the Information Security Podcast features a presentation delivered by SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch M</description>
      <pubDate>Mon, 18 Mar 2019 20:34:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/781b13ec-ab2a-11ea-907b-178b1589f685/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title:  How Private Partnerships Impact Cyber I…</itunes:subtitle>
      <itunes:summary>Title: How Private Partnerships Impact Cyber Investigations Description: This episode of the Information Security Podcast features a presentation delivered by SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch M</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Title: How Private Partnerships Impact Cyber Investigations Description: This episode of the Information Security Podcast features a presentation delivered by SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch M</p>]]>
      </content:encoded>
      <itunes:duration>2426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/592134027]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN3838799739.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Changing Role of ISC2 (ISC "Squared")</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/582694347-user-224801079-the-changing-role-of-isc2-isc-squared.mp3</link>
      <description>Title: Changing Role of ISC2 (ISC "Squared") Description: This episode of the Information Security Podcast features an interview with Chris Robinson @redhatcrob from ISC2 (@ISC2) and Red Hat with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https:/</description>
      <pubDate>Thu, 28 Feb 2019 13:59:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78a73886-ab2a-11ea-907b-bb6af2a6e268/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title:  Changing Role of ISC2  (ISC "Squared")D…</itunes:subtitle>
      <itunes:summary>Title: Changing Role of ISC2 (ISC "Squared") Description: This episode of the Information Security Podcast features an interview with Chris Robinson @redhatcrob from ISC2 (@ISC2) and Red Hat with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https:/</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Title: Changing Role of ISC2 (ISC "Squared") Description: This episode of the Information Security Podcast features an interview with Chris Robinson @redhatcrob from ISC2 (@ISC2) and Red Hat with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https:/</p>]]>
      </content:encoded>
      <itunes:duration>885</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/582694347]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN9156569203.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Changing Cyber Threat Landscape</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/575880510-user-224801079-the-changing-cyber-threat-landscape.mp3</link>
      <description>Title: The Changing Cyber Threat Landscape Description: This episode of the Information Security Podcast features an interview with Bradford Cross @bradfordcross from Tower Street @towerstreetHQ with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https</description>
      <pubDate>Fri, 15 Feb 2019 15:15:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79132dfc-ab2a-11ea-907b-670a2722939b/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title:The Changing Cyber Threat LandscapeDesc…</itunes:subtitle>
      <itunes:summary>Title: The Changing Cyber Threat Landscape Description: This episode of the Information Security Podcast features an interview with Bradford Cross @bradfordcross from Tower Street @towerstreetHQ with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Title: The Changing Cyber Threat Landscape Description: This episode of the Information Security Podcast features an interview with Bradford Cross @bradfordcross from Tower Street @towerstreetHQ with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https</p>]]>
      </content:encoded>
      <itunes:duration>769</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/575880510]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN4396487041.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Toward Computing Infrastructure You Can Trust:  A Personal Story of Troy and Byzantium</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/568268349-user-224801079-toward-computing-infrastructure-you-can-trust-a-personal-story-of-troy-and-byzantium.mp3</link>
      <description>Title: Toward Computing Infrastructure You Can Trust: A Personal Story of Troy and Byzantium Description: This episode of the Information Security Podcast features a presentation delivered by Simon Crosby @simoncrosby from SWIM @SWIMedge with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front</description>
      <pubDate>Fri, 01 Feb 2019 02:49:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/796fe786-ab2a-11ea-907b-8be24e74153b/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title:  Toward Computing Infrastructure You Can…</itunes:subtitle>
      <itunes:summary>Title: Toward Computing Infrastructure You Can Trust: A Personal Story of Troy and Byzantium Description: This episode of the Information Security Podcast features a presentation delivered by Simon Crosby @simoncrosby from SWIM @SWIMedge with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Title: Toward Computing Infrastructure You Can Trust: A Personal Story of Troy and Byzantium Description: This episode of the Information Security Podcast features a presentation delivered by Simon Crosby @simoncrosby from SWIM @SWIMedge with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front</p>]]>
      </content:encoded>
      <itunes:duration>3936</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/568268349]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN9462602082.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Information Security and the Edge</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/559562073-user-224801079-information-security-and-the-edge.mp3</link>
      <description>Title: Information Security and the Edge Description: This episode of the Information Security Podcast features an interview with Randy Cole @OHTurnpikeGuy from the Ohio Turnpike @OhioTurnpike #OHTPK with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at</description>
      <pubDate>Tue, 15 Jan 2019 20:16:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79ccd7ac-ab2a-11ea-907b-3f7fc8a5302b/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Title:Information Security and the EdgeDescri…</itunes:subtitle>
      <itunes:summary>Title: Information Security and the Edge Description: This episode of the Information Security Podcast features an interview with Randy Cole @OHTurnpikeGuy from the Ohio Turnpike @OhioTurnpike #OHTPK with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Title: Information Security and the Edge Description: This episode of the Information Security Podcast features an interview with Randy Cole @OHTurnpikeGuy from the Ohio Turnpike @OhioTurnpike #OHTPK with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at</p>]]>
      </content:encoded>
      <itunes:duration>826</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/559562073]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN8251346002.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Role of the Federal Government in Information Security</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/550736754-user-224801079-role-of-the-federal-government-in-information-security.mp3</link>
      <description>This episode of the Information Security Podcast features an interview with SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https://www.thefrontporchpeople.com/ with production assistance provided by Frank Yako (@fyako). Additional Information For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/, on Twitter (@NEOSecSummit) or on LinkedIn.</description>
      <pubDate>Thu, 27 Dec 2018 20:02:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79e502fa-ab2a-11ea-907b-1fffe167d2f9/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>This episode of the Information Security Podcast features an interview with SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/...</itunes:subtitle>
      <itunes:summary>This episode of the Information Security Podcast features an interview with SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https://www.thefrontporchpeople.com/ with production assistance provided by Frank Yako (@fyako). Additional Information For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/, on Twitter (@NEOSecSummit) or on LinkedIn.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This episode of the Information Security Podcast features an interview with SSA Ganpat (Gunner) Wagh from the Federal Bureau of Investigation (FBI) with host Rob Nettgen (@Robert_Nettgen). Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://www.betterwithmustard.com/ Hurricane Labs (@hurricanelabs) and https://www.hurricanelabs.com/ Produced By: Front Porch Media Network (@Front_Porch_Ppl) at https://www.thefrontporchpeople.com/ with production assistance provided by Frank Yako (@fyako). Additional Information For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/, on Twitter (@NEOSecSummit) or on LinkedIn.</p>]]>
      </content:encoded>
      <itunes:duration>964</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/550736754]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN3581021377.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Educating the Next Generation of Information Security Professionals</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/546972678-user-224801079-educating-the-next-generation-of-information-security-professionals.mp3</link>
      <description>Title: Educating the Next Generation of Information Security Professionals Description: This episode of the Information Security Podcast features an interview with John O’Leary from O’Leary Education Management with host Rob Nettgen (@Robert_Nettgen) during which they discuss the discuss the requirements and plans to meet the ever growing demand for Information Security Professionals. Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://ww</description>
      <pubDate>Tue, 18 Dec 2018 21:51:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a079180-ab2a-11ea-907b-8b858575347b/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Title: Educating the Next Generation of Information Security Professionals Description: This episode of the Information Security Podcast features an interview with John O’Leary from O’Leary Education Management with host Rob Nettgen (@Robert_Nettgen) during which they discuss the discuss the requirements and plans to meet the ever growing demand for Information Security Professionals. Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://ww</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Title: Educating the Next Generation of Information Security Professionals Description: This episode of the Information Security Podcast features an interview with John O’Leary from O’Leary Education Management with host Rob Nettgen (@Robert_Nettgen) during which they discuss the discuss the requirements and plans to meet the ever growing demand for Information Security Professionals. Sponsored By: ASMGi (@ASMGi_CLE) and https://www.asmgi.com/ Better with Mustard(@MustardBusiness) and http://ww</p>]]>
      </content:encoded>
      <itunes:duration>877</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/546972678]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN9112087930.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who was Right...Apple or the FBI?</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/514807941-user-224801079-who-was-rightapple-or-the-fbi.mp3</link>
      <description>In this final “bonus” episode leading up to the Information Security Summit, Simon Crosby challenges our listeners to think “outside of the box” as it relates to the broader question of “who is right” when it comes to security. This concept along with many others will be the basis of Simon’s keynote presentation at the Information Security Summit. Join us at the ISS, Oct 22-26 to attend Simon’s presentation at the I-X Center in Cleveland by registering at www.informationsecuritysummit.org</description>
      <pubDate>Mon, 15 Oct 2018 20:13:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a527d1c-ab2a-11ea-907b-57d2e5ba336a/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this final “bonus” episode leading up to the Information Security Summit, Simon Crosby challenges our listeners to think “outside of the box” as it relates to the broader question of “who is right” when it comes to security. This concept along with many others will be the basis of Simon’s keynote presentation at the Information Security Summit. Join us at the ISS, Oct 22-26 to attend Simon’s presentation at the I-X Center in Cleveland by registering at www.informationsecuritysummit.org</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this final “bonus” episode leading up to the Information Security Summit, Simon Crosby challenges our listeners to think “outside of the box” as it relates to the broader question of “who is right” when it comes to security. This concept along with many others will be the basis of Simon’s keynote presentation at the Information Security Summit. Join us at the ISS, Oct 22-26 to attend Simon’s presentation at the I-X Center in Cleveland by registering at www.informationsecuritysummit.org</p>]]>
      </content:encoded>
      <itunes:duration>109</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/514807941]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN4549040330.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Balance between Innovation, Data Privacy, and Risk</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/511751472-user-224801079-how-to-balance-between-innovation-data-privacy-and-risk.mp3</link>
      <description>In this podcast, Kevin Baker of Westfield Insurance continues his conversation with Rob Nettgen and provides an overview of his ISS presentation entitled “The Data Tsunami and Innovation Risk”. Listen to Kevin describe the opportunity of the “Data Tsunami” for an organization while balancing the challenges of information security, compliance, and confidentiality. Join us at the ISS, Oct 22-26 to attend Kevin’s presentation at the I-X Center in Cleveland by registering at https://www.informationse</description>
      <pubDate>Tue, 09 Oct 2018 12:24:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a72e4a8-ab2a-11ea-907b-eba5990cea1c/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this podcast, Kevin Baker of Westfield Insurance continues his conversation with Rob Nettgen and provides an overview of his ISS presentation entitled “The Data Tsunami and Innovation Risk”. Listen to Kevin describe the opportunity of the “Data Tsunami” for an organization while balancing the challenges of information security, compliance, and confidentiality. Join us at the ISS, Oct 22-26 to attend Kevin’s presentation at the I-X Center in Cleveland by registering at https://www.informationse</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this podcast, Kevin Baker of Westfield Insurance continues his conversation with Rob Nettgen and provides an overview of his ISS presentation entitled “The Data Tsunami and Innovation Risk”. Listen to Kevin describe the opportunity of the “Data Tsunami” for an organization while balancing the challenges of information security, compliance, and confidentiality. Join us at the ISS, Oct 22-26 to attend Kevin’s presentation at the I-X Center in Cleveland by registering at https://www.informationse</p>]]>
      </content:encoded>
      <itunes:duration>201</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/511751472]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN1859963822.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Benefits of Attending the Information Security Summit</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/508919328-user-224801079-benefits-of-attending-the-information-security-summit.mp3</link>
      <description>In this Podcast, Kevin Baker of Westfield Insurance provides his perspective on the benefit of attending the Information Security Summit for both business and security professionals. Listen to Kevin explain why security is at the intersection of business and IT and how he and his team leverage the Information Security Summit for continuing knowledge across information security. Join us at the I-X Center in Cleveland by registering at informationsecuritysummit.org.</description>
      <pubDate>Wed, 03 Oct 2018 13:51:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7aa2a77e-ab2a-11ea-907b-738b7e590a3d/image/avatars-000567519462-5ohe1l-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this Podcast, Kevin Baker of Westfield Insurance provides his perspective on the benefit of attending the Information Security Summit for both business and security professionals. Listen to Kevin explain why security is at the intersection of business and IT and how he and his team leverage the Information Security Summit for continuing knowledge across information security. Join us at the I-X Center in Cleveland by registering at informationsecuritysummit.org.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this Podcast, Kevin Baker of Westfield Insurance provides his perspective on the benefit of attending the Information Security Summit for both business and security professionals. Listen to Kevin explain why security is at the intersection of business and IT and how he and his team leverage the Information Security Summit for continuing knowledge across information security. Join us at the I-X Center in Cleveland by registering at informationsecuritysummit.org.</p>]]>
      </content:encoded>
      <itunes:duration>235</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/508919328]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN9620686852.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Democracy Runs on Windows XP</title>
      <link>https://traffic.libsyn.com/secure/infosecpod/502608009-user-224801079-democracy-runs-on-windows-xp.mp3</link>
      <description>Simon Crosby gives a sneak preview of his presentation for the 2018 Information Security Summit. Hear his take on the use of outdated technology and its impact on governments. Join us for the presentation on October 25 at the I-X Center in Cleveland by registering at informationsecuritysummit.org.</description>
      <pubDate>Thu, 20 Sep 2018 14:43:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Information Security Summit</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ae9f052-ab2a-11ea-907b-bff70e55f538/image/artworks-000408411867-8v0jqu-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Simon Crosby gives a sneak preview of his present…</itunes:subtitle>
      <itunes:summary>Simon Crosby gives a sneak preview of his presentation for the 2018 Information Security Summit. Hear his take on the use of outdated technology and its impact on governments. Join us for the presentation on October 25 at the I-X Center in Cleveland by registering at informationsecuritysummit.org.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Simon Crosby gives a sneak preview of his presentation for the 2018 Information Security Summit. Hear his take on the use of outdated technology and its impact on governments. Join us for the presentation on October 25 at the I-X Center in Cleveland by registering at informationsecuritysummit.org.</p>]]>
      </content:encoded>
      <itunes:duration>110</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/502608009]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FPMN1775238597.mp3" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
