<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>Adopting Zero Trust</title>
		<link>https://adopting-zero-trust.podbean.com</link>
		<atom:link href="https://feeds.acast.com/public/shows/6957361856c11ef40938149c" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Copyright 2026 All rights reserved.</copyright>
		<itunes:keywords/>
		<itunes:author>Adopting Zero Trust</itunes:author>
		<itunes:subtitle/>
		<itunes:summary><![CDATA[Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Adopting Zero Trust</itunes:name>
			<itunes:email>info+6957361856c11ef40938149c@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>6957361856c11ef40938149c</acast:showId>
		<acast:showUrl>adopting-zero-trust</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="6610cba5da0a080016302908" slug="elliot-volkman-6610cba5da0a080016302908"><![CDATA[Elliot Volkman]]></acast:network>
		<acast:importedFeed>https://feed.podbean.com/adopting-zero-trust/feed.xml</acast:importedFeed>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/show-cover.png"/>
			<image>
				<url>https://assets.pippa.io/shows/6957361856c11ef40938149c/show-cover.png</url>
				<link>https://adopting-zero-trust.podbean.com</link>
				<title>Adopting Zero Trust</title>
			</image>
			<itunes:new-feed-url>https://feeds.acast.com/public/shows/6957361856c11ef40938149c</itunes:new-feed-url>
		<item>
			<title>The Security Debt We Pretend Isn’t There</title>
			<itunes:title>The Security Debt We Pretend Isn’t There</itunes:title>
			<pubDate>Thu, 29 Jan 2026 16:39:59 GMT</pubDate>
			<itunes:duration>50:01</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/697b8d2febb1ff695ffe4db6/media.mp3" length="48032813" type="audio/mpeg"/>
			<guid isPermaLink="false">697b8d2febb1ff695ffe4db6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.adoptingzerotrust.com/</link>
			<acast:episodeId>697b8d2febb1ff695ffe4db6</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsCkH97khvrh9N3raGqVtpyESfaAGwHJSi9ncdrxcIH1YlQm+7POVVPhYQLz/K0JSs5t+OnEabIiIItnvx1jXDLM52S6fVpf7XK+h0ZyH5FFF5kFdf1NmnuUj3oy9JR+sa]]></acast:settings>
			<itunes:subtitle>Unpacking RTO fallout, endpoint sprawl, tooling fatigue, junior workforce erosion</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>5</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/show-cover.png"/>
			<description><![CDATA[<p>As organizations push return-to-office (RTO) mandates and chase efficiency, many security teams are quietly accumulating debt they don’t know how to unwind.</p><br><p>In this episode, we are joined by Lea Cure Thorpe and Kayne McGladrey to unpack the less-discussed consequences of recent security decisions: RTO exposure, endpoint blind spots, tooling overload, analyst burnout, and the slow erosion of junior talent (thanks AI).</p><br><p>Rather than going too crazy on hot takes and obvious trends, we focus in on operational reality, business risk, and what security leaders need to confront before these issues compound further.</p><p><br></p><h2>Where to Skim</h2><p>02:00 | Is the perimeter really dead?</p><p>06:30 | RTO fallout and the return of local network risk</p><p>12:30 | Endpoint sprawl, dirty devices, and SOC fatigue</p><p>18:30 | Cloud tooling, visibility gaps, and false assurances</p><p>26:00 | AI adoption: risk appetite vs. reality</p><p>33:30 | Identity, agentic AI, and trust amplification risk</p><p>41:00 | Workforce erosion and the efficiency trap</p><p>50:30 | The business math CISOs can’t avoid</p><p>58:30 | Career development, communication, and relevance</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>As organizations push return-to-office (RTO) mandates and chase efficiency, many security teams are quietly accumulating debt they don’t know how to unwind.</p><br><p>In this episode, we are joined by Lea Cure Thorpe and Kayne McGladrey to unpack the less-discussed consequences of recent security decisions: RTO exposure, endpoint blind spots, tooling overload, analyst burnout, and the slow erosion of junior talent (thanks AI).</p><br><p>Rather than going too crazy on hot takes and obvious trends, we focus in on operational reality, business risk, and what security leaders need to confront before these issues compound further.</p><p><br></p><h2>Where to Skim</h2><p>02:00 | Is the perimeter really dead?</p><p>06:30 | RTO fallout and the return of local network risk</p><p>12:30 | Endpoint sprawl, dirty devices, and SOC fatigue</p><p>18:30 | Cloud tooling, visibility gaps, and false assurances</p><p>26:00 | AI adoption: risk appetite vs. reality</p><p>33:30 | Identity, agentic AI, and trust amplification risk</p><p>41:00 | Workforce erosion and the efficiency trap</p><p>50:30 | The business math CISOs can’t avoid</p><p>58:30 | Career development, communication, and relevance</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics</title>
			<itunes:title>Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics</itunes:title>
			<pubDate>Thu, 11 Dec 2025 11:00:00 GMT</pubDate>
			<itunes:duration>31:37</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fa952567a-dd07-347a-a247-c5f935517c02/media.mp3" length="30366539" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/a952567a-dd07-347a-a247-c5f935517c02</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/whisper-leak-how-encrypted-ai-chats-still-leak-conversation-topics/</link>
			<acast:episodeId>695736224833761f1dc8955c</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eiIS2VTHFfiZFpGFbOjqNpwk6bD+wFsiMfd2O6X9xrXhlTv1lJommhD4Z6nHQxmJflpSXWPPJzCU3LjvfG8pRZA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/400172722cf176fa8798946c2c9ddb71.png"/>
			<description><![CDATA[<p>In this episode, we break down Whisper Leak, a newly disclosed side-channel issue affecting encrypted LLM communications. JBO explains how attackers can infer conversation topics using packet size and timing metadata without breaking encryption. The discussion covers how the research team discovered the issue, how vendors (including Microsoft and OpenAI) mitigated it, and what it means for the future of secure AI systems.</p><p>01:30 – What Whisper Leak Actually Is<br>02:30 – Understanding Side-Channel Attacks<br>04:00 – Why LLMs Are Uniquely Vulnerable<br>08:00 – Stream Ciphers vs Block Ciphers<br>13:30 – “Did You Break Encryption?” Clearing Up Misconceptions<br>16:00 – Fixes &amp; Mitigations Across LLM Vendors<br>18:30 – Why Some Vendors Were More Vulnerable Than Others<br>20:00 – Could High-End Adversaries Still Pull This Off?<br>24:00 – How API Users Can Protect Themselves<br>25:00 – Designing LLM Systems with Side Channels in Mind</p><p>Guests: Jonathan (JBO) Bar Or, Principal Security Researcher, Microsoft Threat Intelligence, who just joined CrowdStrike</p><p>Hosts: Elliot Volkman &amp; Neal Dennis</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, we break down Whisper Leak, a newly disclosed side-channel issue affecting encrypted LLM communications. JBO explains how attackers can infer conversation topics using packet size and timing metadata without breaking encryption. The discussion covers how the research team discovered the issue, how vendors (including Microsoft and OpenAI) mitigated it, and what it means for the future of secure AI systems.</p><p>01:30 – What Whisper Leak Actually Is<br>02:30 – Understanding Side-Channel Attacks<br>04:00 – Why LLMs Are Uniquely Vulnerable<br>08:00 – Stream Ciphers vs Block Ciphers<br>13:30 – “Did You Break Encryption?” Clearing Up Misconceptions<br>16:00 – Fixes &amp; Mitigations Across LLM Vendors<br>18:30 – Why Some Vendors Were More Vulnerable Than Others<br>20:00 – Could High-End Adversaries Still Pull This Off?<br>24:00 – How API Users Can Protect Themselves<br>25:00 – Designing LLM Systems with Side Channels in Mind</p><p>Guests: Jonathan (JBO) Bar Or, Principal Security Researcher, Microsoft Threat Intelligence, who just joined CrowdStrike</p><p>Hosts: Elliot Volkman &amp; Neal Dennis</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>How Critical Infrastructure Leaders Are Rethinking Cybersecurity</title>
			<itunes:title>How Critical Infrastructure Leaders Are Rethinking Cybersecurity</itunes:title>
			<pubDate>Thu, 17 Apr 2025 10:15:00 GMT</pubDate>
			<itunes:duration>44:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fa6aa558a-9108-3d1e-9082-d7207dfbcd97/media.mp3" length="85509995" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/a6aa558a-9108-3d1e-9082-d7207dfbcd97</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/how-critical-infrastructure-leaders-are-rethinking-cybersecurity/</link>
			<acast:episodeId>695736294833761f1dc8972f</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24evkHUUDX1pBblUPbUyrFokn5jAqwrwR8AoHs3H2Ng+xuVU8GpcQ3IkeVxmhs3gG9e1wy9/9B/atshw/6CR9rblA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/4403f5b4c46583b8669d8c1f59805174.png"/>
			<description><![CDATA[<p>In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity at Black and Veatch.</p><p>The discussion centers around the philosophical and strategic approaches to handling incidents and breaches, especially in the operational technology (OT) realm. Branson highlights the importance of understanding what needs protection, the integration of IT and OT security, and the crucial role of threat intelligence. They also explore the evolving need for converging physical and digital security data to manage risks effectively.</p><p> </p><p>01:37 Starting Point for Protecting Critical Infrastructure</p><p>04:52 Funding and Resource Allocation for Cybersecurity</p><p>10:57 Threat Intelligence and Incident Response</p><p>16:25 IT and OT Convergence</p><p>23:47 Discussing Employee and Equipment Management</p><p>26:19 Integrating Physical and Cyber Security</p><p>34:39 Proactive Security Measures in New Constructions</p><p>40:46 Balancing Rapid Response and Availability</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity at Black and Veatch.</p><p>The discussion centers around the philosophical and strategic approaches to handling incidents and breaches, especially in the operational technology (OT) realm. Branson highlights the importance of understanding what needs protection, the integration of IT and OT security, and the crucial role of threat intelligence. They also explore the evolving need for converging physical and digital security data to manage risks effectively.</p><p> </p><p>01:37 Starting Point for Protecting Critical Infrastructure</p><p>04:52 Funding and Resource Allocation for Cybersecurity</p><p>10:57 Threat Intelligence and Incident Response</p><p>16:25 IT and OT Convergence</p><p>23:47 Discussing Employee and Equipment Management</p><p>26:19 Integrating Physical and Cyber Security</p><p>34:39 Proactive Security Measures in New Constructions</p><p>40:46 Balancing Rapid Response and Availability</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Shadows Within Shadows: How AI is Challenging IT Teams</title>
			<itunes:title>Shadows Within Shadows: How AI is Challenging IT Teams</itunes:title>
			<pubDate>Thu, 20 Mar 2025 10:00:00 GMT</pubDate>
			<itunes:duration>48:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F34428a07-b099-3de4-bda7-1523a4ade19e/media.mp3" length="92556386" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/34428a07-b099-3de4-bda7-1523a4ade19e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/shadows-within-shadows-how-ai-is-challenging-it-teams/</link>
			<acast:episodeId>6957363277f9435bdc53e115</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eNYrgb27YutK66wZJEve2fl3Gfd8Xd0+FRiG5VjFXFXyzx/eiORJar2xri6IN37MrrYwagz9W/ivne7bQxXtneA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/show-cover.png"/>
			<description><![CDATA[<p>In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already existing problems tied to shadow IT. The conversation explores how modern enterprises handle the growing complexities of unregulated software use, the role of enterprise browsers in mitigating risks, and the dynamic between user experience and cybersecurity.</p><p>01:16 Shadows within shadows</p><p>04:15 AI in Approved Solutions</p><p>09:14 Enterprise Browser and Security</p><p>14:25 Transition to Browser-Based Applications</p><p>16:23 Enterprise Browser Capabilities</p><p>18:45 Data Protection and Shadow IT</p><p>24:39 Shepherding Data in the Enterprise Browser</p><p>25:17 Policy Perspectives on AI and Data Flow</p><p>28:16 Exploring SBOM and AI Integration</p><p>35:39 Browser Security and Application Boundaries</p><p>41:40 BYOD and Privacy Concerns</p><p>44:48 Third-Party Scenarios and Onboarding</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already existing problems tied to shadow IT. The conversation explores how modern enterprises handle the growing complexities of unregulated software use, the role of enterprise browsers in mitigating risks, and the dynamic between user experience and cybersecurity.</p><p>01:16 Shadows within shadows</p><p>04:15 AI in Approved Solutions</p><p>09:14 Enterprise Browser and Security</p><p>14:25 Transition to Browser-Based Applications</p><p>16:23 Enterprise Browser Capabilities</p><p>18:45 Data Protection and Shadow IT</p><p>24:39 Shepherding Data in the Enterprise Browser</p><p>25:17 Policy Perspectives on AI and Data Flow</p><p>28:16 Exploring SBOM and AI Integration</p><p>35:39 Browser Security and Application Boundaries</p><p>41:40 BYOD and Privacy Concerns</p><p>44:48 Third-Party Scenarios and Onboarding</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust</title>
			<itunes:title>Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust</itunes:title>
			<pubDate>Thu, 06 Mar 2025 11:30:00 GMT</pubDate>
			<itunes:duration>32:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Febdb9aec-dbe9-3068-8953-d6ce977e4426/media.mp3" length="63055192" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/ebdb9aec-dbe9-3068-8953-d6ce977e4426</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/live-at-ztw2025-cyberwire-daily-s-dave-bittner-dr-zero-trust/</link>
			<acast:episodeId>6957362f56c11ef4093819ea</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eoqxuWkUCqOXpKafxdJLmPFiCOup+3vUq+FN0yNLIri7Z5QrwQQN44K8AZ4zOpkDdMIdKAQnUFbhWtn5iNLHD0g==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/0c6af1158199d4ddba41a22447c71505.png"/>
			<description><![CDATA[<p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, or </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>. </em><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><p>Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights <a href='https://www.linkedin.com/in/dave-bittner-27231a4/'>Dave Bittner</a>, host of <a href='https://thecyberwire.com/podcasts/daily-podcast'>CyberWire Daily</a> and Dr. Chase Cunningham AKA <a href='https://www.linkedin.com/in/dr-chase-cunningham/'>Dr. Zero Trust</a> shared their unfiltered thoughts on the state of cybersecurity, AI, and government regulations. From the shifting landscape of compliance enforcement to the role of hitting critical mass of AI in both defense and cybercrime, we can expect an extraordinary level of change in the years ahead.</p><p>01:37 Cybersecurity Landscape Overview</p><p>01:58 Government and Cybersecurity</p><p>02:39 Leadership and Appointments in Cybersecurity</p><p>03:47 Future of CISA and Compliance</p><p>06:41 Managing Cybersecurity News</p><p>14:54 The Role of LLMs in Cybersecurity</p><p>16:22 Global Perspective on AI and LLMs</p><p>18:47 Reflecting on Past Technological Predictions</p><p>20:18 The Double-Edged Sword of AI and Surveillance</p><p>24:21 The Dark Side of Technological Advancements</p><p>26:17 Debating the Term 'AI' and Its Implications</p><p>28:43 Historical Anecdotes and Unanswered Questions</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, or </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>. </em><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><p>Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights <a href='https://www.linkedin.com/in/dave-bittner-27231a4/'>Dave Bittner</a>, host of <a href='https://thecyberwire.com/podcasts/daily-podcast'>CyberWire Daily</a> and Dr. Chase Cunningham AKA <a href='https://www.linkedin.com/in/dr-chase-cunningham/'>Dr. Zero Trust</a> shared their unfiltered thoughts on the state of cybersecurity, AI, and government regulations. From the shifting landscape of compliance enforcement to the role of hitting critical mass of AI in both defense and cybercrime, we can expect an extraordinary level of change in the years ahead.</p><p>01:37 Cybersecurity Landscape Overview</p><p>01:58 Government and Cybersecurity</p><p>02:39 Leadership and Appointments in Cybersecurity</p><p>03:47 Future of CISA and Compliance</p><p>06:41 Managing Cybersecurity News</p><p>14:54 The Role of LLMs in Cybersecurity</p><p>16:22 Global Perspective on AI and LLMs</p><p>18:47 Reflecting on Past Technological Predictions</p><p>20:18 The Double-Edged Sword of AI and Surveillance</p><p>24:21 The Dark Side of Technological Advancements</p><p>26:17 Debating the Term 'AI' and Its Implications</p><p>28:43 Historical Anecdotes and Unanswered Questions</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals]]></title>
			<itunes:title><![CDATA[Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals]]></itunes:title>
			<pubDate>Wed, 05 Mar 2025 21:38:48 GMT</pubDate>
			<itunes:duration>3:20</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F7f499d07-5219-3e79-8e6f-72e0ea4884a2/media.mp3" length="6417505" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/7f499d07-5219-3e79-8e6f-72e0ea4884a2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/rapid-fire-update-silk-typhoon-and-dojs-indictment-of-twelve-chinese-nationals/</link>
			<acast:episodeId>695736284833761f1dc896eb</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eZBjyKg7uPK9HjmZQZX3dyVaTx0ywNxvU2eUz70CyUN0OLdfXhvRSGDkc4WvkJEvrVg0i0VteNbQzkPBHpxMStQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>25</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/show-cover.png"/>
			<description><![CDATA[New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction with the Department of Justice's action against twelve Chinese nationals that includes mercenary hackers, law enforcement officers, and employees of a private hacking company. This group has been charged in connection with global cyberespionage campaigns. Dive into our latest blog for all the details.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction with the Department of Justice's action against twelve Chinese nationals that includes mercenary hackers, law enforcement officers, and employees of a private hacking company. This group has been charged in connection with global cyberespionage campaigns. Dive into our latest blog for all the details.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Predicting the year of cybersecurity ahead (minus regulations)</title>
			<itunes:title>Predicting the year of cybersecurity ahead (minus regulations)</itunes:title>
			<pubDate>Tue, 18 Feb 2025 11:00:00 GMT</pubDate>
			<itunes:duration>1:02:52</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F1391593e-9a0d-3018-9027-debcdd0b2d41/media.mp3" length="120705882" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/1391593e-9a0d-3018-9027-debcdd0b2d41</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/predicting-the-year-of-cybersecurity-ahead-minus-regulations/</link>
			<acast:episodeId>6957363a5f9b0b61aa3d8476</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eXQTOx1xBe/V0zjedc8GFPlFp2vsez0Vxh/qNjyZQ+KqW4LeJfJ3j3ddjRP5i4Ak/myztaCKGp6Q07YgLPUVMfw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/998d5c250640e3aeb3bf4b8a930de0fb.png"/>
			<description><![CDATA[<p>It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… there have been obvious impacts that have downstream effects. Regardless of regulatory changes, which we’ll cover as those impact our space, AZT brought together a few minds who have thoughts on the year ahead.</p><p>To properly kick off season four, we have the privilege of chatting with two wonderful guests:</p><p><a href='https://www.linkedin.com/in/lawrencepingree/'>Lawrence Pingree</a>, VP of Technical Marketing at Dispersive, but you are more likely to know his name from his time at Gartner. However, he has a varied background ranging from CTO to security engineer, so don’t let that marketing line in his title fool you.</p><p><a href='https://www.linkedin.com/in/oliverplante/'>Oliver Plante</a>, VP of Support at ThreatLocker, has around 15-20 years of IT under his belt. He also has seen a thing or two when it comes to implementing new cybersecurity strategies</p><p> </p><p>03:21 Predictions for the Year Ahead</p><p>04:06 Zero Trust and Least Privilege</p><p>05:40 The Future of Cyber Defense</p><p>07:21 AI and Cybersecurity</p><p>08:41 Threat Intelligence and Preemptive Defense</p><p>09:50 Challenges and Innovations in Cybersecurity</p><p>14:23 The Role of AI in Cyber Attacks</p><p>26:18 Quantum Computing: Threat or Savior?</p><p>29:31 Passwordless Security: The Future</p><p>30:57 Challenges of Deepfake Technology and Passwordless Security</p><p>33:03 Blockchain and Its Applications in Security</p><p>35:33 Debate on Password Management Practices</p><p>38:03 User Responsibility and Security Automation</p><p>47:50 Government's Role in Cybersecurity</p><p>57:14 Future of Cybersecurity and Zero Trust </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… there have been obvious impacts that have downstream effects. Regardless of regulatory changes, which we’ll cover as those impact our space, AZT brought together a few minds who have thoughts on the year ahead.</p><p>To properly kick off season four, we have the privilege of chatting with two wonderful guests:</p><p><a href='https://www.linkedin.com/in/lawrencepingree/'>Lawrence Pingree</a>, VP of Technical Marketing at Dispersive, but you are more likely to know his name from his time at Gartner. However, he has a varied background ranging from CTO to security engineer, so don’t let that marketing line in his title fool you.</p><p><a href='https://www.linkedin.com/in/oliverplante/'>Oliver Plante</a>, VP of Support at ThreatLocker, has around 15-20 years of IT under his belt. He also has seen a thing or two when it comes to implementing new cybersecurity strategies</p><p> </p><p>03:21 Predictions for the Year Ahead</p><p>04:06 Zero Trust and Least Privilege</p><p>05:40 The Future of Cyber Defense</p><p>07:21 AI and Cybersecurity</p><p>08:41 Threat Intelligence and Preemptive Defense</p><p>09:50 Challenges and Innovations in Cybersecurity</p><p>14:23 The Role of AI in Cyber Attacks</p><p>26:18 Quantum Computing: Threat or Savior?</p><p>29:31 Passwordless Security: The Future</p><p>30:57 Challenges of Deepfake Technology and Passwordless Security</p><p>33:03 Blockchain and Its Applications in Security</p><p>35:33 Debate on Password Management Practices</p><p>38:03 User Responsibility and Security Automation</p><p>47:50 Government's Role in Cybersecurity</p><p>57:14 Future of Cybersecurity and Zero Trust </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Kicking Off Season 4 of Adoption Zero Trust (AZT)</title>
			<itunes:title>Kicking Off Season 4 of Adoption Zero Trust (AZT)</itunes:title>
			<pubDate>Tue, 11 Feb 2025 11:00:00 GMT</pubDate>
			<itunes:duration>22:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fdacf8d6a-984e-3ffc-b365-20804bc4497f/media.mp3" length="43616346" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/dacf8d6a-984e-3ffc-b365-20804bc4497f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/kicking-off-season-4-of-adoption-zero-trust-azt/</link>
			<acast:episodeId>6957363556c11ef409381b25</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eOCQ/8PkafDkrpNHNenRiyNFUFR6c/eOdXeM2N9yG/cUz7zAbT9aN46VHRKgPa0TcEHwFOx7ZNB+RT9khtxJwmw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/d477b6e558eff336dfb727f4e989abb1.png"/>
			<description><![CDATA[<p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, or </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>. </em><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><p>Neal and I are excited to welcome you back to AZT as we kick off our fourth season. After four years of trying out different formats and episodes, including at least an entire season terrorizing vendors for slapping Zero Trust on their box as if it were something you could buy, we’re ready to narrow our focus a bit.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, or </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>. </em><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><p>Neal and I are excited to welcome you back to AZT as we kick off our fourth season. After four years of trying out different formats and episodes, including at least an entire season terrorizing vendors for slapping Zero Trust on their box as if it were something you could buy, we’re ready to narrow our focus a bit.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The key to growing a cybersecurity career are soft skills</title>
			<itunes:title>The key to growing a cybersecurity career are soft skills</itunes:title>
			<pubDate>Thu, 19 Dec 2024 11:00:00 GMT</pubDate>
			<itunes:duration>50:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fbd0f1fdc-e929-3cc8-a0d4-65a7624f7270/media.mp3" length="97220527" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/bd0f1fdc-e929-3cc8-a0d4-65a7624f7270</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/the-key-to-growing-a-cybersecurity-career-are-soft-skills/</link>
			<acast:episodeId>69573636c84340185be924e5</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24evfw3P5oJv9Ib2LtbflKyZHyW/+LueF8Bxi/RqeJk0R0EvWsqzqWmVbjxtQNKUY3FcwiMHprcnojAunvoIiUtcg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>24</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/de285bbe3fce0e6b46f8710a3817fc1a.png"/>
			<description><![CDATA[<p>In this episode of 'Adopting Zero Trust (AZT)', host Neal Dennis and producer Elliot Volkman delve into the often-overlooked realm of soft or 'non-tech' skills in cybersecurity.</p><p dir="ltr">This week, we chat with <a href='https://www.linkedin.com/in/courtney-hans/'>Courtney Hans</a>, VP of Cyber Services at AmTrust Financial Services, and <a href='https://www.linkedin.com/in/ekharam/'>Evgeniy Kharam</a>, author of Architecting Success: The Art of Soft Skills, who help us explore how non-technical skills are vital in shaping the careers of cybersecurity professionals.</p><p>Our guests share the importance of effective communication, emotional intelligence, and adaptability. The hosts and guests share personal anecdotes, training tips, and the necessity of bridging technical prowess with essential soft skills to improve stakeholder engagement and career advancement. The episode emphasizes the value of being comfortable with discomfort and soliciting feedback to enhance one’s professional journey in cybersecurity.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of 'Adopting Zero Trust (AZT)', host Neal Dennis and producer Elliot Volkman delve into the often-overlooked realm of soft or 'non-tech' skills in cybersecurity.</p><p dir="ltr">This week, we chat with <a href='https://www.linkedin.com/in/courtney-hans/'>Courtney Hans</a>, VP of Cyber Services at AmTrust Financial Services, and <a href='https://www.linkedin.com/in/ekharam/'>Evgeniy Kharam</a>, author of Architecting Success: The Art of Soft Skills, who help us explore how non-technical skills are vital in shaping the careers of cybersecurity professionals.</p><p>Our guests share the importance of effective communication, emotional intelligence, and adaptability. The hosts and guests share personal anecdotes, training tips, and the necessity of bridging technical prowess with essential soft skills to improve stakeholder engagement and career advancement. The episode emphasizes the value of being comfortable with discomfort and soliciting feedback to enhance one’s professional journey in cybersecurity.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Behind the scenes of cybersecurity media and reporting</title>
			<itunes:title>Behind the scenes of cybersecurity media and reporting</itunes:title>
			<pubDate>Thu, 21 Nov 2024 11:00:00 GMT</pubDate>
			<itunes:duration>1:04:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fb42a9de5-1c28-3737-8e63-742c576c33f5/media.mp3" length="124601263" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/b42a9de5-1c28-3737-8e63-742c576c33f5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/behind-the-scenes-of-cybersecurity-media-and-reporting/</link>
			<acast:episodeId>695736334833761f1dc89987</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e+n3xpnsfF41jZPB2VV1qLh6B2DXrjmd3yCADH49nUGPIyAYgmnQtKwkQ1bhfG8PzXYEiemWvP85toTwxIhSI+g==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/f4770556b654cc72279bcef3acb4ad67.png"/>
			<description><![CDATA[<p><em>Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported.</em></p><p><em><a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>In the world of cybersecurity journalism, you can broadly divide it into four competing forces: reporters, communications teams, researchers, and readers. Each requires the other to accomplish its goals, but they all have very different priorities and goals.</p><ul><li>Journalists have a duty to inform the public about security-related events.</li><li>Communication teams have a duty to inform the public about related incidents and research, but in a controlled setting.</li><li>Researchers help provide answers to communication teams and journalists.</li><li>Readers want to be informed of information that impact them, and their habits shape what kind of reporting is invested in the most.</li></ul><p>This week we explore some of these dynamics by bringing together a panel representing comms, journalism, and research to discuss the game of tug-of-war during incident response and incident reporting.</p><p>Danny Palmer was a long-standing cybersecurity reporter at ZDNet prior to recently joining DarkTrace, Josh Swarz is the Senior Communications Manager at Microsoft focusing on threat intelligence, our host Neal Dennis is former NSA and has lived many lives around either keeping secrets or uncovering them, and producer Elliot Volkman has been a reporter for two decades and works with Josh on elevating research at Microsoft Threat Intelligence.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported.</em></p><p><em><a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>In the world of cybersecurity journalism, you can broadly divide it into four competing forces: reporters, communications teams, researchers, and readers. Each requires the other to accomplish its goals, but they all have very different priorities and goals.</p><ul><li>Journalists have a duty to inform the public about security-related events.</li><li>Communication teams have a duty to inform the public about related incidents and research, but in a controlled setting.</li><li>Researchers help provide answers to communication teams and journalists.</li><li>Readers want to be informed of information that impact them, and their habits shape what kind of reporting is invested in the most.</li></ul><p>This week we explore some of these dynamics by bringing together a panel representing comms, journalism, and research to discuss the game of tug-of-war during incident response and incident reporting.</p><p>Danny Palmer was a long-standing cybersecurity reporter at ZDNet prior to recently joining DarkTrace, Josh Swarz is the Senior Communications Manager at Microsoft focusing on threat intelligence, our host Neal Dennis is former NSA and has lived many lives around either keeping secrets or uncovering them, and producer Elliot Volkman has been a reporter for two decades and works with Josh on elevating research at Microsoft Threat Intelligence.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>GRC tool or spreadsheets, that is the question | GRC Uncensored Preview</title>
			<itunes:title>GRC tool or spreadsheets, that is the question | GRC Uncensored Preview</itunes:title>
			<pubDate>Thu, 24 Oct 2024 11:30:00 GMT</pubDate>
			<itunes:duration>43:13</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fe1e2ac17-7f30-30d2-81b6-1e4e3c15b5ef/media.mp3" length="83004001" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/e1e2ac17-7f30-30d2-81b6-1e4e3c15b5ef</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/grc-tool-or-spreadsheets-that-is-the-question-grc-uncensored-preview/</link>
			<acast:episodeId>69573635c84340185be92474</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eamQCCfcgp2G1Y0HpZKjlk3oSeNUVzYFRsYnxso6yTCnqRa1tzEEvnX24jqXw8N6zDsCnogEBau9LMgoYs/OpeQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>23</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/8996c4cbb06fcfda09bfd6a78ef4fe84.png"/>
			<description><![CDATA[<p>In our final preview episode of GRC Uncensored, we explore a particularly bipolar debate: do you need a GRC tool to manage compliance, or will spreadsheets suffice?</p><p>After this, we will be back to our regularly produced AZT episodes. The last episodes of our pilot for GRC Uncensored can be found on your favorite podcast app or newsletter on Substack.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In our final preview episode of GRC Uncensored, we explore a particularly bipolar debate: do you need a GRC tool to manage compliance, or will spreadsheets suffice?</p><p>After this, we will be back to our regularly produced AZT episodes. The last episodes of our pilot for GRC Uncensored can be found on your favorite podcast app or newsletter on Substack.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Podcast Preview: GRC Uncensored and the commoditization of compliance</title>
			<itunes:title>Podcast Preview: GRC Uncensored and the commoditization of compliance</itunes:title>
			<pubDate>Thu, 10 Oct 2024 10:30:00 GMT</pubDate>
			<itunes:duration>41:30</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F6e446ff9-3447-32ba-89e7-a7a1fae22a02/media.mp3" length="79686233" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/6e446ff9-3447-32ba-89e7-a7a1fae22a02</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/podcast-preview-grc-uncensored-and-the-commoditization-of-compliance/</link>
			<acast:episodeId>6957363777f9435bdc53e236</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eeWovc44LoLANsXtlYNriLnDzco3r1v3TV1onCbJTRUhiq0JyDpLWXvt0VCsZTIAbRnE/l/H8pjBw/7xrthPwug==]]></acast:settings>
			<itunes:episodeType>bonus</itunes:episodeType>
			<itunes:episode>22</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/9464381a10aa786f170c478b3c33056b.png"/>
			<description><![CDATA[<p>We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored.</p><p>This pilot season will elevate conversations about GRC that are often buried under millions of dollars in marketing spend. No boring talks about controls or frameworks, just unfiltered discussions with auditors and practitioners in the GRC space. We'll be back to our regular AZT episodes in a couple of weeks.</p><p>-----</p><p>In the first episode of 'GRC Uncensored,' hosts Troy Fine, dubbed the 'GRC Meme King,' and Elliot Volkman, alongside guest Kendra Cooley dive into the complexities of Governance, Risk, and Compliance (GRC) in cybersecurity. The discussion unravels the 'love-hate' relationship many security professionals have with compliance frameworks like SOC 2, exploring how they have become commoditized and possibly devalued over time.</p><p>The conversation touches upon the challenges security practitioners face in conveying the true value of GRC to businesses, the potential pitfalls of 'SOC in a box' offerings, and the broader implications of compliance becoming a 'check the box' exercise. Moreover, the episode delves into the broader regulatory landscape and the ongoing debates about the role of government regulations in cybersecurity compliance. This candid dialogue sets the stage for future episodes that promise further to dissect the nuances of cybersecurity audits and standards.</p><p>00:00 Welcome to GRC Uncensored</p><p>01:34 Introducing Kendra Cooley</p><p>02:05 Love-Hate Relationship with GRC</p><p>03:16 The SOC 2 Debate</p><p>04:33 Challenges with SOC 2 Audits</p><p>09:10 The Value of SOC 2 in the Industry</p><p>12:04 The Evolution of Compliance Frameworks</p><p>20:39 False Sense of Security in Compliance</p><p>24:46 The Buzz Around AI and Quantum</p><p>25:10 Staying Updated as a Security Professional</p><p>26:45 Challenges in Penetration Testing and Vendor Assessments</p><p>27:37 Compliance and Its Impact on Security</p><p>30:10 Government Regulations and Their Effectiveness</p><p>32:23 The Complexity of Privacy Laws</p><p>38:29 The Role of GRC Teams in Risk Management</p><p>42:30 Concluding Thoughts and Future Episodes</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored.</p><p>This pilot season will elevate conversations about GRC that are often buried under millions of dollars in marketing spend. No boring talks about controls or frameworks, just unfiltered discussions with auditors and practitioners in the GRC space. We'll be back to our regular AZT episodes in a couple of weeks.</p><p>-----</p><p>In the first episode of 'GRC Uncensored,' hosts Troy Fine, dubbed the 'GRC Meme King,' and Elliot Volkman, alongside guest Kendra Cooley dive into the complexities of Governance, Risk, and Compliance (GRC) in cybersecurity. The discussion unravels the 'love-hate' relationship many security professionals have with compliance frameworks like SOC 2, exploring how they have become commoditized and possibly devalued over time.</p><p>The conversation touches upon the challenges security practitioners face in conveying the true value of GRC to businesses, the potential pitfalls of 'SOC in a box' offerings, and the broader implications of compliance becoming a 'check the box' exercise. Moreover, the episode delves into the broader regulatory landscape and the ongoing debates about the role of government regulations in cybersecurity compliance. This candid dialogue sets the stage for future episodes that promise further to dissect the nuances of cybersecurity audits and standards.</p><p>00:00 Welcome to GRC Uncensored</p><p>01:34 Introducing Kendra Cooley</p><p>02:05 Love-Hate Relationship with GRC</p><p>03:16 The SOC 2 Debate</p><p>04:33 Challenges with SOC 2 Audits</p><p>09:10 The Value of SOC 2 in the Industry</p><p>12:04 The Evolution of Compliance Frameworks</p><p>20:39 False Sense of Security in Compliance</p><p>24:46 The Buzz Around AI and Quantum</p><p>25:10 Staying Updated as a Security Professional</p><p>26:45 Challenges in Penetration Testing and Vendor Assessments</p><p>27:37 Compliance and Its Impact on Security</p><p>30:10 Government Regulations and Their Effectiveness</p><p>32:23 The Complexity of Privacy Laws</p><p>38:29 The Role of GRC Teams in Risk Management</p><p>42:30 Concluding Thoughts and Future Episodes</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>How to prepare your operations team for Zero Trust</title>
			<itunes:title>How to prepare your operations team for Zero Trust</itunes:title>
			<pubDate>Thu, 26 Sep 2024 14:30:11 GMT</pubDate>
			<itunes:duration>46:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F027d225f-19e1-3272-9712-802930374989/media.mp3" length="88889283" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/027d225f-19e1-3272-9712-802930374989</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/how-to-prepare-your-operations-team-for-zero-trust/</link>
			<acast:episodeId>69573632e3c8c736bd088ba1</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e+rYsVHPyFuAiMjs1aNcP6YToQinbLhhXNb9isVVuLNkSvxMa9UoASU1Vb8Efqy191F98mufxJrmxb8dLXf/p3w==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/6594784a4c2c80bc98f1f35846c0cafe.png"/>
			<description><![CDATA[<p>Welcome back to Adopting Zero Trust! In this episode, hosts Elliot Volkman and Neal Dennis are joined by Rob Allen, Chief Product Officer of ThreatLocker, to dive deep into the operationalization of Zero Trust. Despite covering various aspects over three seasons, this crucial topic is addressed thoroughly.</p><p>They explore pre-adoption preparation, aligning organizational actions, and the importance of education in security. Additionally, the conversation highlights the 'assume breach' perspective and how concepts like default deny and least privilege are essential. With real-world examples and anecdotes, they provide actionable insights on implementing Zero Trust strategies effectively. Tune in to learn about the foundational steps necessary to transition into a Zero Trust environment.</p><p>This is the first of a three-part mini-series, so stay tuned as we explore more aspects of how to prepare your organization for adopting a Zero Trust strategy.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Welcome back to Adopting Zero Trust! In this episode, hosts Elliot Volkman and Neal Dennis are joined by Rob Allen, Chief Product Officer of ThreatLocker, to dive deep into the operationalization of Zero Trust. Despite covering various aspects over three seasons, this crucial topic is addressed thoroughly.</p><p>They explore pre-adoption preparation, aligning organizational actions, and the importance of education in security. Additionally, the conversation highlights the 'assume breach' perspective and how concepts like default deny and least privilege are essential. With real-world examples and anecdotes, they provide actionable insights on implementing Zero Trust strategies effectively. Tune in to learn about the foundational steps necessary to transition into a Zero Trust environment.</p><p>This is the first of a three-part mini-series, so stay tuned as we explore more aspects of how to prepare your organization for adopting a Zero Trust strategy.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Log4j Continues to act as Organizational Vulnerability</title>
			<itunes:title>Log4j Continues to act as Organizational Vulnerability</itunes:title>
			<pubDate>Thu, 05 Sep 2024 11:13:06 GMT</pubDate>
			<itunes:duration>47:56</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F51827261-48c5-3536-9e87-d11653ef6d99/media.mp3" length="92033455" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/51827261-48c5-3536-9e87-d11653ef6d99</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/log4j-continues-to-act-as-organizational-vulnerability/</link>
			<acast:episodeId>69573638e3c8c736bd088cc5</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24ekr/67TmONB7WNZrnppX0PXMB1bRXe7HJ/I9rVJHOwU0MNX2TT/FXP9Bnk6ZDuxjI5B+JZnWN3W7lo6q3JhJgMQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/e777b4a663055254218b011979b72660.png"/>
			<description><![CDATA[<p>Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, or <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>This week on Adopting Zero Trust (AZT), we highlight a significant cybersecurity risk focused on the notorious Log4j vulnerability and the growing concern around shadow IT. Featuring expert insights from Etay Maor, the Chief Cybersecurity Strategist at Cato Networks, the conversation initially looks into the persistent exploitation methods, the importance of knowing one’s cybersecurity environment, and strategic approaches to mitigating risks.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, or <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>This week on Adopting Zero Trust (AZT), we highlight a significant cybersecurity risk focused on the notorious Log4j vulnerability and the growing concern around shadow IT. Featuring expert insights from Etay Maor, the Chief Cybersecurity Strategist at Cato Networks, the conversation initially looks into the persistent exploitation methods, the importance of knowing one’s cybersecurity environment, and strategic approaches to mitigating risks.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Overturning of Chevron Deference’s Impact on Cybersecurity Regulation</title>
			<itunes:title>Overturning of Chevron Deference’s Impact on Cybersecurity Regulation</itunes:title>
			<pubDate>Tue, 20 Aug 2024 10:00:00 GMT</pubDate>
			<itunes:duration>51:44</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F22c471d8-b540-3a4c-a7fc-ef6481f5ea0c/media.mp3" length="99328687" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/22c471d8-b540-3a4c-a7fc-ef6481f5ea0c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/overturning-of-chevron-deference-s-impact-on-cybersecurity-regulation/</link>
			<acast:episodeId>6957363bc84340185be9261c</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eYbfqhmnbSUjgx5O1atEbsS8FMh+9gvoWLnCA4v34/+h/5fsihqqBlofiXvDHO+jYOOS/nTTCQNdZtdUFS+lP/Q==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/da4a3b83599811ad03f8dd43e22b7bb4.png"/>
			<description><![CDATA[<p>Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations?</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, or <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Welcome back to Adopting Zero Trust or AZT. In our latest episode, we assembled a distinguished panel to dig into a timely topic affecting the cybersecurity landscape but has the fog of war wrapped around it. Today’s conversation centered around the recent developments in cybersecurity regulations and their potential impacts, ignited by the Supreme Court overturning Chevron Deference. This, of course, has other potential impacts on all regulation types enforced and shaped by federal agencies, but our focus is, of course, on cybersecurity, privacy, and AI.</p>The Panel<p>We welcome back Ilona Cohen, Chief Legal and Policy Officer at HackerOne, who joined us last year to discuss the <a href='https://www.adoptingzerotrust.com/p/azt-the-national-cybersecurity-strategy'>National Cybersecurity Strategy</a>. Ilona is also the former General Counsel for OMB. We are also joined by the GRC meme king, Troy Fine, the Director of SOC and ISO Assurance Services at Gills Norton. Beyond the memes, Troy takes a practical perspective on regulations and acts as our voice for those who may be most immediately impacted.</p>Key Takeaways<ul><li>Chevron Deference overturned: The Supreme Court's decision removes the requirement for courts to defer to federal agencies' interpretations of ambiguous statutes and now relies on the courts.</li><li>Increased regulatory uncertainty: This ruling may lead to more challenges to existing and future regulations, potentially affecting cybersecurity and AI policies.</li><li>State vs. Federal regulation: The uncertainty at the federal level might prompt states to act more quickly on issues like AI and cybersecurity, potentially creating a patchwork of regulations.</li><li>Impact on AI regulation: With about 40 federal bills addressing AI in the pipeline, the ruling could complicate the process of creating comprehensive federal AI regulations.</li><li>Cybersecurity implications: Existing and proposed cybersecurity regulations, such as the Cyber Incident Reporting for Critical Infrastructure Act, may face new challenges.</li><li>Business concerns: While some business organizations applauded the ruling, the resulting regulatory uncertainty could be problematic for companies trying to plan and comply with regulations.</li><li>Expertise concerns: There are worries that courts may lack the technical expertise to make decisions on complex technological issues like AI without deferring to agency experts.</li><li>Potential for innovation: The regulatory uncertainty might create a wild west period for AI, potentially fostering innovation before more stringent regulations are imposed.</li><li>Self-regulation importance: In the absence of clear federal regulations, industry self-regulation initiatives may become more significant, especially in rapidly evolving fields like AI.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations?</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, or <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Welcome back to Adopting Zero Trust or AZT. In our latest episode, we assembled a distinguished panel to dig into a timely topic affecting the cybersecurity landscape but has the fog of war wrapped around it. Today’s conversation centered around the recent developments in cybersecurity regulations and their potential impacts, ignited by the Supreme Court overturning Chevron Deference. This, of course, has other potential impacts on all regulation types enforced and shaped by federal agencies, but our focus is, of course, on cybersecurity, privacy, and AI.</p>The Panel<p>We welcome back Ilona Cohen, Chief Legal and Policy Officer at HackerOne, who joined us last year to discuss the <a href='https://www.adoptingzerotrust.com/p/azt-the-national-cybersecurity-strategy'>National Cybersecurity Strategy</a>. Ilona is also the former General Counsel for OMB. We are also joined by the GRC meme king, Troy Fine, the Director of SOC and ISO Assurance Services at Gills Norton. Beyond the memes, Troy takes a practical perspective on regulations and acts as our voice for those who may be most immediately impacted.</p>Key Takeaways<ul><li>Chevron Deference overturned: The Supreme Court's decision removes the requirement for courts to defer to federal agencies' interpretations of ambiguous statutes and now relies on the courts.</li><li>Increased regulatory uncertainty: This ruling may lead to more challenges to existing and future regulations, potentially affecting cybersecurity and AI policies.</li><li>State vs. Federal regulation: The uncertainty at the federal level might prompt states to act more quickly on issues like AI and cybersecurity, potentially creating a patchwork of regulations.</li><li>Impact on AI regulation: With about 40 federal bills addressing AI in the pipeline, the ruling could complicate the process of creating comprehensive federal AI regulations.</li><li>Cybersecurity implications: Existing and proposed cybersecurity regulations, such as the Cyber Incident Reporting for Critical Infrastructure Act, may face new challenges.</li><li>Business concerns: While some business organizations applauded the ruling, the resulting regulatory uncertainty could be problematic for companies trying to plan and comply with regulations.</li><li>Expertise concerns: There are worries that courts may lack the technical expertise to make decisions on complex technological issues like AI without deferring to agency experts.</li><li>Potential for innovation: The regulatory uncertainty might create a wild west period for AI, potentially fostering innovation before more stringent regulations are imposed.</li><li>Self-regulation importance: In the absence of clear federal regulations, industry self-regulation initiatives may become more significant, especially in rapidly evolving fields like AI.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Applying Vulnerability Management to Zero Trust</title>
			<itunes:title>Applying Vulnerability Management to Zero Trust</itunes:title>
			<pubDate>Thu, 01 Aug 2024 10:00:00 GMT</pubDate>
			<itunes:duration>45:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F89776ac6-5210-3308-9e96-2c964f08e5a8/media.mp3" length="87800597" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/89776ac6-5210-3308-9e96-2c964f08e5a8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/applying-vulnerability-management-to-zero-trust/</link>
			<acast:episodeId>6957363577f9435bdc53e1a0</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e6rCqmMWbdnQsE76jvXFoh+voHWTndOQEmhXaLLFekXgG37paeF98XpJfHU8muxGr+KLtbz/At04GvY+zFormmw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/2031a0989b8f1ba8f49fdf746aaae01b.png"/>
			<description><![CDATA[<p>Season 3, Episode 11: Vulnerability management is critical to any Zero Trust strategy, but you probably already know that. Fortra’s Tyler Reguly breaks down severity vs. risk.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, or <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Every organization relies on some form of technology to run, and each tool you add increases the risk of vulnerabilities causing problems. If you don’t stay on top of patching, you increase the odds of a bad actor finding their way more easily within your network.</p><p>This week, we chat with Tyler Reguly, a senior manager of security research at Fortra, who shares insights from his 18 years in vulnerability management. Tyler discusses the importance of staying on top of patching to maintain a Zero Trust strategy, the differences between vulnerability and patch management, and emphasizes that the Common Vulnerability Scoring System (CVSS) measures severity, not risk.</p><p>We also briefly nerd out about the significance of groups like the Canadian Cyber Threat Exchange (CCTX) for knowledge sharing and collaboration in cybersecurity. And then, we wrap things up by exploring the efficacy of existing security policies and benchmarks, such as CIS and DISA STIGs, and the role of vendor relationships in maintaining effective security practices.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 3, Episode 11: Vulnerability management is critical to any Zero Trust strategy, but you probably already know that. Fortra’s Tyler Reguly breaks down severity vs. risk.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, or <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Every organization relies on some form of technology to run, and each tool you add increases the risk of vulnerabilities causing problems. If you don’t stay on top of patching, you increase the odds of a bad actor finding their way more easily within your network.</p><p>This week, we chat with Tyler Reguly, a senior manager of security research at Fortra, who shares insights from his 18 years in vulnerability management. Tyler discusses the importance of staying on top of patching to maintain a Zero Trust strategy, the differences between vulnerability and patch management, and emphasizes that the Common Vulnerability Scoring System (CVSS) measures severity, not risk.</p><p>We also briefly nerd out about the significance of groups like the Canadian Cyber Threat Exchange (CCTX) for knowledge sharing and collaboration in cybersecurity. And then, we wrap things up by exploring the efficacy of existing security policies and benchmarks, such as CIS and DISA STIGs, and the role of vendor relationships in maintaining effective security practices.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Unstoppable Phish: A Discussion with Vivek Ramachandran</title>
			<itunes:title>The Unstoppable Phish: A Discussion with Vivek Ramachandran</itunes:title>
			<pubDate>Tue, 02 Jul 2024 10:00:00 GMT</pubDate>
			<itunes:duration>26:31</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F6663ca51-c2a8-30b7-b586-8404392be588/media.mp3" length="50928473" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/6663ca51-c2a8-30b7-b586-8404392be588</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/the-unstoppable-phish-a-discussion-with-vivek-ramachandran/</link>
			<acast:episodeId>6957362ac84340185be921be</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e+ZAMLQ5ntj+Fz4fZ4FLKxv5SCIqCl/Et9VSSEcc9Xmapjpd8eIiVuV4/qoVNMLlMwXmXBvpebDne9saHYA7H8g==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/11abee31bb008b88cf70d8b0b12a31ac.png"/>
			<description><![CDATA[<p>Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>For nearly three decades, social engineering, particularly phishing, has been one of the most impactful and financially draining cyber threats. Between security awareness training, email security gateways, generative AI, enterprise browsers, and a slew of other tech like EDRs and XDRs, social engineering has yet to be thoroughly thwarted. The reason for that is straightforward enough: social engineering is a psychological threat, not just a technological one.</p><p>In our last round of interviews from RSA, we chatted with Vivek Ramachandran, the founder of SquareX, who is attempting to tackle the challenge. Vivek also walks us through a more realistic perspective of how threat actors use generative AI today, which goes beyond the more unique what-if scenarios we’ve seen in headlines in the past two years.</p>Key Takeaways<ul><li>Social engineering and phishing attacks remain a significant threat, and everyone can be a target. The sophistication of these attacks has increased due to advances in AI.</li><li>AI can craft messages that sound remarkably like someone the recipient knows, enabling rapid scalability.</li><li>Social media platforms are becoming common channels for launching phishing attacks. Attackers exploit the trust that users place in these platforms and their contacts.</li><li>Vivek Ramachandran's company, SquareX, deploys a browser extension that can attribute attacks and detect and block them in real-time, providing valuable information to the enterprise.</li><li>Traditional technologies like Secure Web Gateways (SWG) have matured, and attackers can easily bypass them.</li><li>Enterprise browsers solve the problem for a small niche group of websites but have adoption friction due to the inconvenience of having a dedicated browser.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>For nearly three decades, social engineering, particularly phishing, has been one of the most impactful and financially draining cyber threats. Between security awareness training, email security gateways, generative AI, enterprise browsers, and a slew of other tech like EDRs and XDRs, social engineering has yet to be thoroughly thwarted. The reason for that is straightforward enough: social engineering is a psychological threat, not just a technological one.</p><p>In our last round of interviews from RSA, we chatted with Vivek Ramachandran, the founder of SquareX, who is attempting to tackle the challenge. Vivek also walks us through a more realistic perspective of how threat actors use generative AI today, which goes beyond the more unique what-if scenarios we’ve seen in headlines in the past two years.</p>Key Takeaways<ul><li>Social engineering and phishing attacks remain a significant threat, and everyone can be a target. The sophistication of these attacks has increased due to advances in AI.</li><li>AI can craft messages that sound remarkably like someone the recipient knows, enabling rapid scalability.</li><li>Social media platforms are becoming common channels for launching phishing attacks. Attackers exploit the trust that users place in these platforms and their contacts.</li><li>Vivek Ramachandran's company, SquareX, deploys a browser extension that can attribute attacks and detect and block them in real-time, providing valuable information to the enterprise.</li><li>Traditional technologies like Secure Web Gateways (SWG) have matured, and attackers can easily bypass them.</li><li>Enterprise browsers solve the problem for a small niche group of websites but have adoption friction due to the inconvenience of having a dedicated browser.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall</title>
			<itunes:title>Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall</itunes:title>
			<pubDate>Thu, 13 Jun 2024 10:00:00 GMT</pubDate>
			<itunes:duration>46:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Faa696ca5-0b8a-30a1-b1bf-2945f11e303f/media.mp3" length="89048916" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/aa696ca5-0b8a-30a1-b1bf-2945f11e303f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/breaking-down-the-smb-threat-landscape-and-the-value-of-msps-with-sonicwall/</link>
			<acast:episodeId>6957362f77f9435bdc53e07c</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eKRY8LmnMX2rBMK8yaAR5PX80DU0tCpR3kmPqgVnY9ax3b8JijgM9PCS36yUx6lN3kQNIaDb8cyYvO4xnhK7Ung==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/70457dc414c5b2c62aaa0386d9d83291.png"/>
			<description><![CDATA[<p><em>Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research.</em></p><p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>, or </em><a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'><em>Google</em></a><em>. </em><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><p>Cybersecurity challenges come in many different flavors regardless of how old your company is or how many employees it houses. Larger companies have to deal with layers upon layers of technology, processes, and the people who support it. Smaller organizations are resource-constrained, often lack the experience or expertise to build a proper program, and typically rely on external support systems.</p><p>While larger companies may not be nimble, typically, they employ and understand the value of threat intelligence to hone in on risks that could impact the business. They also have larger targets on their back because they are seen as more valuable targets for data, financial drain, and other nefarious purposes. In the same, smaller organizations may not be as valuable as a direct target, but they can be seen as a doorway into these larger companies. It’s for these reasons that supply chain attacks, even older ones, are among the top threats targeting small businesses and startups.</p><p>This week on AZT, we examine the top five threats targeting startups and small businesses and chat with SonicWall’s Executive Director of Threat Research about the WHY behind them. As a researcher and educator through SANS, Doug McKee shares his perspective on why smaller shops need to consider threat intelligence as part of their cybersecurity program and how MSPs can help fulfill that capability.</p>Top 5 threats to SMBs <em>(According to SonicWall)</em><ul><li><p>Log4j (2021) more than 43% of organizations were under attack</p></li><li><p>Fortinet SSL VPN CVE-2018-13379 - 35% of orgs were under attack</p></li><li><p>Heartbleed (2012) - 35% of organizations</p></li><li><p>Atlassian CVE-2021- 26085 - 32 %</p></li><li><p>Vmware CVE-2021 - 21975 - 28% of orgs</p></li></ul>The Guest: <a href='https://www.linkedin.com/in/douglas-mckee-77460677/'>Douglas McKee</a><p>Doug is an experienced information security professional who possesses extensive technical expertise acquired through involvement in application and system security testing, hardware and software vulnerability research, malware analysis, forensics, penetration testing, red team exercises, protocol analysis, application development, and risk mitigation activities. These technical proficiencies are complemented by adept leadership and communication skills, honed through the leadership of teams and projects, collaboration within both large and small teams, and the composition of technical reports for clients.</p><p>Doug is recognized for discovering numerous CVEs and regularly speaks at prominent security conferences such as Blackhat, DEFCON, RSA, <a href='http://Hardware.io'>Hardware.io</a>, and Ekoparty. Additionally, Douglas's research is frequently featured in publications with a wide readership, including Wired, Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.</p>Key Takeaways<ul><li><p>None of these vulnerabilities in SonicWall’s research were found or disclosed between 2022-2024, and yet we’re still dealing with them</p></li><li><p>Old vulnerabilities remain a significant threat</p></li><li><p>The most widespread attacks for SMBs include Heartbleed and Log4j vulnerabilities</p></li><li><p>Many widespread vulnerabilities are supply chain vulnerabilities</p></li><li><p>These vulnerabilities are embedded in multiple products and systems</p></li><li><p>Patching vulnerabilities can be complex and costly</p></li><li><p>Compliance and regulatory standards can complicate the process</p></li><li><p>Attackers are becoming increasingly nuanced in their approaches</p></li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research.</em></p><p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>, or </em><a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'><em>Google</em></a><em>. </em><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><p>Cybersecurity challenges come in many different flavors regardless of how old your company is or how many employees it houses. Larger companies have to deal with layers upon layers of technology, processes, and the people who support it. Smaller organizations are resource-constrained, often lack the experience or expertise to build a proper program, and typically rely on external support systems.</p><p>While larger companies may not be nimble, typically, they employ and understand the value of threat intelligence to hone in on risks that could impact the business. They also have larger targets on their back because they are seen as more valuable targets for data, financial drain, and other nefarious purposes. In the same, smaller organizations may not be as valuable as a direct target, but they can be seen as a doorway into these larger companies. It’s for these reasons that supply chain attacks, even older ones, are among the top threats targeting small businesses and startups.</p><p>This week on AZT, we examine the top five threats targeting startups and small businesses and chat with SonicWall’s Executive Director of Threat Research about the WHY behind them. As a researcher and educator through SANS, Doug McKee shares his perspective on why smaller shops need to consider threat intelligence as part of their cybersecurity program and how MSPs can help fulfill that capability.</p>Top 5 threats to SMBs <em>(According to SonicWall)</em><ul><li><p>Log4j (2021) more than 43% of organizations were under attack</p></li><li><p>Fortinet SSL VPN CVE-2018-13379 - 35% of orgs were under attack</p></li><li><p>Heartbleed (2012) - 35% of organizations</p></li><li><p>Atlassian CVE-2021- 26085 - 32 %</p></li><li><p>Vmware CVE-2021 - 21975 - 28% of orgs</p></li></ul>The Guest: <a href='https://www.linkedin.com/in/douglas-mckee-77460677/'>Douglas McKee</a><p>Doug is an experienced information security professional who possesses extensive technical expertise acquired through involvement in application and system security testing, hardware and software vulnerability research, malware analysis, forensics, penetration testing, red team exercises, protocol analysis, application development, and risk mitigation activities. These technical proficiencies are complemented by adept leadership and communication skills, honed through the leadership of teams and projects, collaboration within both large and small teams, and the composition of technical reports for clients.</p><p>Doug is recognized for discovering numerous CVEs and regularly speaks at prominent security conferences such as Blackhat, DEFCON, RSA, <a href='http://Hardware.io'>Hardware.io</a>, and Ekoparty. Additionally, Douglas's research is frequently featured in publications with a wide readership, including Wired, Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.</p>Key Takeaways<ul><li><p>None of these vulnerabilities in SonicWall’s research were found or disclosed between 2022-2024, and yet we’re still dealing with them</p></li><li><p>Old vulnerabilities remain a significant threat</p></li><li><p>The most widespread attacks for SMBs include Heartbleed and Log4j vulnerabilities</p></li><li><p>Many widespread vulnerabilities are supply chain vulnerabilities</p></li><li><p>These vulnerabilities are embedded in multiple products and systems</p></li><li><p>Patching vulnerabilities can be complex and costly</p></li><li><p>Compliance and regulatory standards can complicate the process</p></li><li><p>Attackers are becoming increasingly nuanced in their approaches</p></li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Decoding Emerging Threats: MITRE, OWASP, and Threat Intel</title>
			<itunes:title>Decoding Emerging Threats: MITRE, OWASP, and Threat Intel</itunes:title>
			<pubDate>Thu, 06 Jun 2024 10:00:00 GMT</pubDate>
			<itunes:duration>25:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F9795717c-a7c9-3e2d-b84b-172160e35920/media.mp3" length="48006248" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/9795717c-a7c9-3e2d-b84b-172160e35920</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/decoding-emerging-threats-mitre-owasp-and-threat-intel/</link>
			<acast:episodeId>6957363cc84340185be9264d</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e6YOq5VD0OLZXOuZDYbYUFvrJ1ugaZzEhkpMmyQBGo4Ql0agJhlbs5NbvxBmRvLFgzulOAr/bRBqnetatCgtueA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/1c01fa277c822d1b249f79853d537ca9.png"/>
			<description><![CDATA[<p>Season 3, Episode 8: AZT and Dr. Zero Trust have a crossover episode where we chat with reps from MITRE and OWASP about challenges associated with emerging threats.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Every few weeks, and occasionally every few days, we hear report of a new novel technique or zero day. Those headlines often create an unnecessary level of fear for organizations, but battle-worn cybersecurity professionals know just because it’s on a headline doesn’t necessarily mean it will impact their environment. That is because emerging threats are just that, new and novel. While zero day threats can be interesting and something to be aware of, most threat actors stick to tried and true methods.</p><p>But how do we identify what is most impactful to our security posture, attack surface, or insert your other buzzy term? Threat intelligence and the collective defense. And for that, it’s time to introduce our two very equipped guests to navigate this conversation and our guest moderator:</p><p>This week on AZT, we have representatives from OWASP and MITRE, with Dr Zero Trust leading the charge.</p>The GuestsSpecial Guest Moderator<p><a href='https://www.linkedin.com/in/dr-chase-cunningham/'>Dr. Chase Cunningham</a> - Dr. Zero Trust and Vice President of Security Market Research for G2</p><p><a href='https://www.linkedin.com/in/avidouglen/'>Avi Douglen</a> - Chair of the Global Board of Directors for the OWASP Foundation and Founder and CEO of Bounce Security.</p><p>Avi is a security architect and software developer, leading development teams in building secure products for over 20 years. As a systems developer and security consultant, over the years Avi has amassed much technical knowledge and understanding of the enterprise security needs at the business level. Avi currently serves on the OWASP Global Board of Directors, and leads the Israel chapter. He is the founder and leader of the the popular AppSecIL security conference, the OWASP Threat Modeling Project, and co-authored the <a href='https://www.threatmodelingmanifesto.org/'>Threat Modeling Manifesto</a>. He is a community moderator on <a href='https://security.stackexchange.com/'>Security StackExchange</a>, and a frequent speaker at industry conferences, recent ones can be seen <a href='https://www.bouncesecurity.com/team-members/events.md'>here</a>.</p><p><a href='https://www.linkedin.com/in/stanley-barr-1b921693/'>Stanley Barr</a> - Senior Principcal Cyber Researcher for MITRE</p><p>Dr. Stanley Barr is a three time graduate of University of Massachusetts Lowell. He has a BS in Information Sciences, an MS in Mathematics, and a PhD in Computer Science. He has coauthored published papers in malware analysis, barrier coverage problems, expert systems for network security, and robotic manufacturing. He has spoken at MILCOM, RSA, Bsides Boston, and Defcon. He has been a panelist for conferences. Panels topics have included fighting through real world computer network attacks from both external and internal threats. Currently, he is a Senior Principal Scientist at The MITRE Corporation, a not-for-profit corporation that manages six federally funded research and development centers (FFRDCs).</p>Key Takeaways<ul><li>Emerging threats are interesting, but threat modeling and understanding how systems work to identify potential issues is more impactful</li><li>AI can pose a threat due to its ability to remember and tailor information, as well as its scalability.</li><li>The panel emphasized that basic security hygiene is often overlooked, such as enabling 2FA on all accounts.</li><li>The OWASP Top 10 most common attack vectors are still a significant concern, but they should not be the only focus.</li><li>The panel argued that responsibility for security breaches should extend beyond the CISO to the entire board and engineering organization.</li><li>Cybersecurity is a people-centric challenge, and relying on people not to make mistakes is not a sustainable strategy.</li><li>There is value in investing in proper security measures, as it can save organizations money in the long run.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 3, Episode 8: AZT and Dr. Zero Trust have a crossover episode where we chat with reps from MITRE and OWASP about challenges associated with emerging threats.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Every few weeks, and occasionally every few days, we hear report of a new novel technique or zero day. Those headlines often create an unnecessary level of fear for organizations, but battle-worn cybersecurity professionals know just because it’s on a headline doesn’t necessarily mean it will impact their environment. That is because emerging threats are just that, new and novel. While zero day threats can be interesting and something to be aware of, most threat actors stick to tried and true methods.</p><p>But how do we identify what is most impactful to our security posture, attack surface, or insert your other buzzy term? Threat intelligence and the collective defense. And for that, it’s time to introduce our two very equipped guests to navigate this conversation and our guest moderator:</p><p>This week on AZT, we have representatives from OWASP and MITRE, with Dr Zero Trust leading the charge.</p>The GuestsSpecial Guest Moderator<p><a href='https://www.linkedin.com/in/dr-chase-cunningham/'>Dr. Chase Cunningham</a> - Dr. Zero Trust and Vice President of Security Market Research for G2</p><p><a href='https://www.linkedin.com/in/avidouglen/'>Avi Douglen</a> - Chair of the Global Board of Directors for the OWASP Foundation and Founder and CEO of Bounce Security.</p><p>Avi is a security architect and software developer, leading development teams in building secure products for over 20 years. As a systems developer and security consultant, over the years Avi has amassed much technical knowledge and understanding of the enterprise security needs at the business level. Avi currently serves on the OWASP Global Board of Directors, and leads the Israel chapter. He is the founder and leader of the the popular AppSecIL security conference, the OWASP Threat Modeling Project, and co-authored the <a href='https://www.threatmodelingmanifesto.org/'>Threat Modeling Manifesto</a>. He is a community moderator on <a href='https://security.stackexchange.com/'>Security StackExchange</a>, and a frequent speaker at industry conferences, recent ones can be seen <a href='https://www.bouncesecurity.com/team-members/events.md'>here</a>.</p><p><a href='https://www.linkedin.com/in/stanley-barr-1b921693/'>Stanley Barr</a> - Senior Principcal Cyber Researcher for MITRE</p><p>Dr. Stanley Barr is a three time graduate of University of Massachusetts Lowell. He has a BS in Information Sciences, an MS in Mathematics, and a PhD in Computer Science. He has coauthored published papers in malware analysis, barrier coverage problems, expert systems for network security, and robotic manufacturing. He has spoken at MILCOM, RSA, Bsides Boston, and Defcon. He has been a panelist for conferences. Panels topics have included fighting through real world computer network attacks from both external and internal threats. Currently, he is a Senior Principal Scientist at The MITRE Corporation, a not-for-profit corporation that manages six federally funded research and development centers (FFRDCs).</p>Key Takeaways<ul><li>Emerging threats are interesting, but threat modeling and understanding how systems work to identify potential issues is more impactful</li><li>AI can pose a threat due to its ability to remember and tailor information, as well as its scalability.</li><li>The panel emphasized that basic security hygiene is often overlooked, such as enabling 2FA on all accounts.</li><li>The OWASP Top 10 most common attack vectors are still a significant concern, but they should not be the only focus.</li><li>The panel argued that responsibility for security breaches should extend beyond the CISO to the entire board and engineering organization.</li><li>Cybersecurity is a people-centric challenge, and relying on people not to make mistakes is not a sustainable strategy.</li><li>There is value in investing in proper security measures, as it can save organizations money in the long run.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata</title>
			<itunes:title>Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata</itunes:title>
			<pubDate>Thu, 30 May 2024 10:00:00 GMT</pubDate>
			<itunes:duration>30:10</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F2154a6de-857f-39d8-9d88-30fc9d6e930d/media.mp3" length="57944154" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/2154a6de-857f-39d8-9d88-30fc9d6e930d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/navigating-the-ever-changing-landscape-of-cybersecurity-regulations-with-lacework-and-drata/</link>
			<acast:episodeId>6957363dc84340185be9266a</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eqjUWrBgEhQ5tflk1xb86AYVA1GXs8pRoF53TdtnC4Ew1rRHQ9sXmk4brDX0Kn8eWnix8G4PdpsEsEfoX8Lp+HA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/f5a5ebc52e6a7a712bdb32924b96e3c9.png"/>
			<description><![CDATA[<p><em>Season 3, Episode 7: Though regulation impacting cybersecurity moves slow, when new laws are introduced it often puts significant strain on companies. Lacework’s Tim Chase and Drata’s Matt HIllary discuss navigating the latest broad-sweeping regulations.</em></p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>The time between a law being proposed and going into effect may feel like a snails pace, but for cybersecurity and GRC professionals, it may feel like the DNA of an organization may need to change. This week we chat with cybersecurity leaders Tim Chase from Laceworks and Matt Hillary of Drata who delve deep into the ever-evolving landscape of cybersecurity regulations. They explore topics such as the challenges of rapid incident reporting, the role of collaboration in the industry, and the emerging onslaught of AI-related laws and proposed bills.</p>This Week’s Guests<p><a href='https://www.linkedin.com/in/timchase2/'>Tim Chase, Lacework’s Global Field CISO</a></p><p>With over 15 years of experience in the cybersecurity industry, Tim is a Global Field CISO at Lacework, a leading cloud security platform. Tim holds CCSK, CISSP, and GCCC certifications and has a deep understanding of product security, DevSecOps, application security, and the current and emerging threats in the cybersecurity landscape.</p><p><a href='https://www.linkedin.com/in/matthewhillary/'>Matt Hillary, Drata’s CISO</a></p><p>Matt Hillary currently serves as VP, Security and Chief Information Security Officer at Drata. With more than 15 years of security experience, Matt has a track record of building exceptional security programs. He most recently served as SVP, Systems and Security and CISO at Lumio, and he’s also held CISO and lead security roles at Weave and Workfront, Instructure, Adobe, MX, and Amazon Web Services. He is also a closet raver. Like really, actually is.</p>TL;DR<ol><li>The landscape of cybersecurity regulations is ever-changing, with new bills and regulations continually emerging which impact businesses of various sizes.</li><li>The recent rules released by the SEC regarding the time frame for announcing a breach or incident have significantly impacted organizations. The term "material" is a key aspect of these rules, leading to discussions around what constitutes a material cybersecurity incident.</li><li>The role of a CISO is challenging due to the potential for breaches and incidents despite implementing comprehensive security measures. The additional regulations add further complexity to the role.</li><li>Transparency and honesty are vital in the event of a breach. Companies that are open about incidents and their impact are viewed more favorably than those that attempt to cover things up.</li><li>The concept of 'carrot and stick' in regulation is discussed. There are mixed feelings about this approach, with some preferring collaboration and industry-led standards over punitive measures such as fines. However, there is recognition that both incentives (the carrot) and punitive measures (the stick) can drive companies to improve their cybersecurity measures.</li><li>AI is a hot topic in the cybersecurity field, with potential to assist in quickly sorting through data and reducing false positives. However, the implementation of AI also brings its own set of regulations and challenges.</li></ol><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Season 3, Episode 7: Though regulation impacting cybersecurity moves slow, when new laws are introduced it often puts significant strain on companies. Lacework’s Tim Chase and Drata’s Matt HIllary discuss navigating the latest broad-sweeping regulations.</em></p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>The time between a law being proposed and going into effect may feel like a snails pace, but for cybersecurity and GRC professionals, it may feel like the DNA of an organization may need to change. This week we chat with cybersecurity leaders Tim Chase from Laceworks and Matt Hillary of Drata who delve deep into the ever-evolving landscape of cybersecurity regulations. They explore topics such as the challenges of rapid incident reporting, the role of collaboration in the industry, and the emerging onslaught of AI-related laws and proposed bills.</p>This Week’s Guests<p><a href='https://www.linkedin.com/in/timchase2/'>Tim Chase, Lacework’s Global Field CISO</a></p><p>With over 15 years of experience in the cybersecurity industry, Tim is a Global Field CISO at Lacework, a leading cloud security platform. Tim holds CCSK, CISSP, and GCCC certifications and has a deep understanding of product security, DevSecOps, application security, and the current and emerging threats in the cybersecurity landscape.</p><p><a href='https://www.linkedin.com/in/matthewhillary/'>Matt Hillary, Drata’s CISO</a></p><p>Matt Hillary currently serves as VP, Security and Chief Information Security Officer at Drata. With more than 15 years of security experience, Matt has a track record of building exceptional security programs. He most recently served as SVP, Systems and Security and CISO at Lumio, and he’s also held CISO and lead security roles at Weave and Workfront, Instructure, Adobe, MX, and Amazon Web Services. He is also a closet raver. Like really, actually is.</p>TL;DR<ol><li>The landscape of cybersecurity regulations is ever-changing, with new bills and regulations continually emerging which impact businesses of various sizes.</li><li>The recent rules released by the SEC regarding the time frame for announcing a breach or incident have significantly impacted organizations. The term "material" is a key aspect of these rules, leading to discussions around what constitutes a material cybersecurity incident.</li><li>The role of a CISO is challenging due to the potential for breaches and incidents despite implementing comprehensive security measures. The additional regulations add further complexity to the role.</li><li>Transparency and honesty are vital in the event of a breach. Companies that are open about incidents and their impact are viewed more favorably than those that attempt to cover things up.</li><li>The concept of 'carrot and stick' in regulation is discussed. There are mixed feelings about this approach, with some preferring collaboration and industry-led standards over punitive measures such as fines. However, there is recognition that both incentives (the carrot) and punitive measures (the stick) can drive companies to improve their cybersecurity measures.</li><li>AI is a hot topic in the cybersecurity field, with potential to assist in quickly sorting through data and reducing false positives. However, the implementation of AI also brings its own set of regulations and challenges.</li></ol><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Ransomware: To Pay or Not to Pay?</title>
			<itunes:title>Ransomware: To Pay or Not to Pay?</itunes:title>
			<pubDate>Tue, 30 Apr 2024 09:30:00 GMT</pubDate>
			<itunes:duration>59:08</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fe39dd58c-fe5a-3548-b051-6d4680e0f4a1/media.mp3" length="113541976" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/e39dd58c-fe5a-3548-b051-6d4680e0f4a1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/ransomware-to-pay-or-not-to-pay/</link>
			<acast:episodeId>695736405f9b0b61aa3d865c</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eTBgmjkyrZQdpeMmo6tWQv9MR4WBubCP4JzpPKJbvQvE5oQKgba7hPWOsxW3YsNiBkvHTDilM8maVBSgUoFH+/w==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/bc75b7ab489743421cd8fa1ba70a7e98.png"/>
			<description><![CDATA[<p><em>Season 3, Episode 6: Two seasoned cybersecurity professionals, Bryan Willett and Kris Lovejoy, shed light on the dilemma organizations face when hit by ransomware: Should they pay the ransom or not?</em></p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Ransomware: To Pay or Not to Pay? It’s an easy question, and we all have the same ideal answer, but how often does life throw us simplicity? Rarely.</p><p>This week on Adopting Zero Trust, we continue our conversation that looked at the role cyber insurance plays in organizations and drill into one of the most challenging topics associated with it: Ransomware. And, because this is a heavy subject, we brought in two heavy hitters from past episodes to share their perspectives, Kris Lovejoy and Brian Willett</p>TL;DR<ul><li>Paying ransomware ransoms is a complex decision that depends on various factors, such as the potential impact on the organization's services or employees.</li><li>Having robust and tested backups is crucial in a ransomware situation, but organizations must be prepared for scenarios where ransomware affects backups.</li><li>Cyber insurance can help mitigate the financial impact of ransomware attacks, but organizations should be cautious and consider all the potential outcomes.</li><li>Avoiding ransomware attacks requires a proactive approach, which includes implementing hardening standards, good practices around vulnerability management, enforcing compliance on systems, and having good identity protection.</li><li>AI holds promise in the cybersecurity sector, but its role in ransomware attacks is still in its infancy.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Season 3, Episode 6: Two seasoned cybersecurity professionals, Bryan Willett and Kris Lovejoy, shed light on the dilemma organizations face when hit by ransomware: Should they pay the ransom or not?</em></p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Ransomware: To Pay or Not to Pay? It’s an easy question, and we all have the same ideal answer, but how often does life throw us simplicity? Rarely.</p><p>This week on Adopting Zero Trust, we continue our conversation that looked at the role cyber insurance plays in organizations and drill into one of the most challenging topics associated with it: Ransomware. And, because this is a heavy subject, we brought in two heavy hitters from past episodes to share their perspectives, Kris Lovejoy and Brian Willett</p>TL;DR<ul><li>Paying ransomware ransoms is a complex decision that depends on various factors, such as the potential impact on the organization's services or employees.</li><li>Having robust and tested backups is crucial in a ransomware situation, but organizations must be prepared for scenarios where ransomware affects backups.</li><li>Cyber insurance can help mitigate the financial impact of ransomware attacks, but organizations should be cautious and consider all the potential outcomes.</li><li>Avoiding ransomware attacks requires a proactive approach, which includes implementing hardening standards, good practices around vulnerability management, enforcing compliance on systems, and having good identity protection.</li><li>AI holds promise in the cybersecurity sector, but its role in ransomware attacks is still in its infancy.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Insurance: Sexy? No. Important? Critically yes.</title>
			<itunes:title>Cyber Insurance: Sexy? No. Important? Critically yes.</itunes:title>
			<pubDate>Thu, 11 Apr 2024 10:00:00 GMT</pubDate>
			<itunes:duration>1:14</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F98946629-5f47-3c5b-817e-c599e10d96a7/media.mp3" length="2396257" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/98946629-5f47-3c5b-817e-c599e10d96a7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/cyber-insurance-sexy-no-important-critically-yes/</link>
			<acast:episodeId>69573635e3c8c736bd088c3f</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e6Ksubxd4aqi88Bv5MDYWRi3oolfc6WzxxAo64zBeiUchYU6J8kIkKeqHaxyKeJNsQD5cX5TgrvPBZeRVUs82Xw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/20f444e48597ef025b62b6d796044b41.png"/>
			<description><![CDATA[<p>Season 3, Episode 5: Cyber Insurance may not be the sexiest topic, but it’s an important piece of any mature cyber program. We chatted with a lawyer and a VC who share their perspective.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>There are many aspects of cybersecurity that are not classified as cool or sexy, but every component plays a role in securing people, data, and businesses. One particular aspect that is often seen as a necessary evil, even more so than policies and documentation, is cyber insurance. On one hand, you have a system that forces backstops to protect the organization in the event of an incident; on the other, requirements to not only remain insured but reduce premiums encourage businesses to invest more in securing the business.</p><p>This week, we chatted with Karl Sharman of Forgepoint Capital and Andy Moss of Reed Smith to better understand the role cyber insurance plays today.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 3, Episode 5: Cyber Insurance may not be the sexiest topic, but it’s an important piece of any mature cyber program. We chatted with a lawyer and a VC who share their perspective.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>There are many aspects of cybersecurity that are not classified as cool or sexy, but every component plays a role in securing people, data, and businesses. One particular aspect that is often seen as a necessary evil, even more so than policies and documentation, is cyber insurance. On one hand, you have a system that forces backstops to protect the organization in the event of an incident; on the other, requirements to not only remain insured but reduce premiums encourage businesses to invest more in securing the business.</p><p>This week, we chatted with Karl Sharman of Forgepoint Capital and Andy Moss of Reed Smith to better understand the role cyber insurance plays today.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Current and Future State of Zero Trust With Forrester’s David Holmes</title>
			<itunes:title>The Current and Future State of Zero Trust With Forrester’s David Holmes</itunes:title>
			<pubDate>Thu, 28 Mar 2024 09:30:00 GMT</pubDate>
			<itunes:duration>54:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fb87e3b47-5ff6-31e0-9347-4b49f0b50ea6/media.mp3" length="103868246" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/b87e3b47-5ff6-31e0-9347-4b49f0b50ea6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/the-current-and-future-state-of-zero-trust-with-forrester-s-david-holmes/</link>
			<acast:episodeId>69573644e3c8c736bd089056</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24ej91pk1z+syjDGhw7a3kTbtCABTv+T4nNFDGz6UN2w7h2lKtaT7ZD7uXGc8F5XAILWiCGKLPa/2710EIwjvSbUQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>21</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/bb0d05cbe3cfa60a06edd7a6320c6afe.png"/>
			<description><![CDATA[<p>Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Zero Trust is a concept, a strategy, a philosophy, and, for some poor souls, a solution you can buy (<a href='https://www.topzerotrust.com/'>it’s not</a>). Through our three seasons, <a href='https://www.adoptingzerotrust.com/p/canvas-kane-narraway-on-building'>we have heard about MVPs</a>, learned from the <a href='https://www.adoptingzerotrust.com/p/adopting-zero-trust-apis-and-a-history'>godfather of Zero Trust</a>, been aided by <a href='https://www.adoptingzerotrust.com/p/adopting-zero-trust-with-chase-cunningham'>Dr Zero Trust</a>, and even heard from current and former federal officials about their stance on the concept. However, we have yet to touch on the current an future state of Zero Trust, and for that, we look to Forrester Principal Research Analyst on Zero Trust, David Holmes.</p><p>Prior to joining Forrester, David spent a decade researching, writing, and speaking about cybersecurity topics for network and application security vendors. Before entering the cybersecurity space, he was a C/C++ software developer specializing in authentication and authorization, network protocols, and cryptography. So you could say he knows a thing or two about the subject at hand.</p><p></p>TL;DR<ul><li>Holmes explains that Zero Trust's core principles remain unchanged: all networks are untrusted, least privilege access is enforced, and everything is inspected and monitored.</li><li>The COVID-19 pandemic has accelerated the adoption of Zero Trust as organizations were forced to work remotely and faced VPN overloads.</li><li>David shares his perspective on the current and future state of Zero Trust, as well as areas he would like to see the vendor market seek to solve.</li><li>The biggest example of successful Zero Trust implementation is Google. Since implementing Zero Trust, no major breaches have been reported.</li><li>In addition to Google, there is a smaller organization that successfully implemented Zero Trust using existing tools, indicating that Zero Trust can be achieved without significant financial investment.</li><li>However, achieving full Zero Trust is a journey rather than a destination, similar to cybersecurity itself. It's an ongoing process of adaptation and improvement.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>Zero Trust is a concept, a strategy, a philosophy, and, for some poor souls, a solution you can buy (<a href='https://www.topzerotrust.com/'>it’s not</a>). Through our three seasons, <a href='https://www.adoptingzerotrust.com/p/canvas-kane-narraway-on-building'>we have heard about MVPs</a>, learned from the <a href='https://www.adoptingzerotrust.com/p/adopting-zero-trust-apis-and-a-history'>godfather of Zero Trust</a>, been aided by <a href='https://www.adoptingzerotrust.com/p/adopting-zero-trust-with-chase-cunningham'>Dr Zero Trust</a>, and even heard from current and former federal officials about their stance on the concept. However, we have yet to touch on the current an future state of Zero Trust, and for that, we look to Forrester Principal Research Analyst on Zero Trust, David Holmes.</p><p>Prior to joining Forrester, David spent a decade researching, writing, and speaking about cybersecurity topics for network and application security vendors. Before entering the cybersecurity space, he was a C/C++ software developer specializing in authentication and authorization, network protocols, and cryptography. So you could say he knows a thing or two about the subject at hand.</p><p></p>TL;DR<ul><li>Holmes explains that Zero Trust's core principles remain unchanged: all networks are untrusted, least privilege access is enforced, and everything is inspected and monitored.</li><li>The COVID-19 pandemic has accelerated the adoption of Zero Trust as organizations were forced to work remotely and faced VPN overloads.</li><li>David shares his perspective on the current and future state of Zero Trust, as well as areas he would like to see the vendor market seek to solve.</li><li>The biggest example of successful Zero Trust implementation is Google. Since implementing Zero Trust, no major breaches have been reported.</li><li>In addition to Google, there is a smaller organization that successfully implemented Zero Trust using existing tools, indicating that Zero Trust can be achieved without significant financial investment.</li><li>However, achieving full Zero Trust is a journey rather than a destination, similar to cybersecurity itself. It's an ongoing process of adaptation and improvement.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Canva's Kane Narraway on Building a Zero Trust MVP]]></title>
			<itunes:title><![CDATA[Canva's Kane Narraway on Building a Zero Trust MVP]]></itunes:title>
			<pubDate>Thu, 07 Mar 2024 10:45:00 GMT</pubDate>
			<itunes:duration>46:10</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F1faf25bc-4eb6-39e9-a752-74b57528f6e5/media.mp3" length="88658775" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/1faf25bc-4eb6-39e9-a752-74b57528f6e5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/canvas-kane-narraway-on-building-a-zero-trust-mvp/</link>
			<acast:episodeId>6957363177f9435bdc53e0fd</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eLSlM6Q2TYJ/iQZxXfrEUcZjvISIziei8mlYquI6NJEEUxJGwrZaX8gF9TPSVvddJw/bV9DV2AXRXWHiD7/3+Lg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>20</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/923020b0d3b3083b8a7c955b84fb68c4.png"/>
			<description><![CDATA[<p>Season 3, Episode 3: Canva’s Head of Enterprise Security, Kane Narraway, discusses how to deploy a Zero Trust strategy in under a year.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p></p><p>This week on Adopting Zero Trust (AZT) we chat with <a href='https://www.linkedin.com/in/kane-n/'>Kane Narraway</a>, the head of Head of Enterprise Security at Canva. Prior to his current role. Kane has been adopting Zero Trust for around a decade, starting with the UK government, and later to organizations like Shopify, Atlassian, and BT. You could say he’s seen a thing or two, and has absolutely been part of the evolutions occurring within cybersecurity and Zero Trust. Kane walks, crawls, and runs us through how he has built out Zero Trust strategies and recommends where organizations get started.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 3, Episode 3: Canva’s Head of Enterprise Security, Kane Narraway, discusses how to deploy a Zero Trust strategy in under a year.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p></p><p>This week on Adopting Zero Trust (AZT) we chat with <a href='https://www.linkedin.com/in/kane-n/'>Kane Narraway</a>, the head of Head of Enterprise Security at Canva. Prior to his current role. Kane has been adopting Zero Trust for around a decade, starting with the UK government, and later to organizations like Shopify, Atlassian, and BT. You could say he’s seen a thing or two, and has absolutely been part of the evolutions occurring within cybersecurity and Zero Trust. Kane walks, crawls, and runs us through how he has built out Zero Trust strategies and recommends where organizations get started.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AZT: Quit Bugging the CISO + CIO</title>
			<itunes:title>AZT: Quit Bugging the CISO + CIO</itunes:title>
			<pubDate>Thu, 08 Feb 2024 10:00:00 GMT</pubDate>
			<itunes:duration>46:58</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fe8fc8059-f9d1-3227-870d-2a82c73b9aa2/media.mp3" length="90199383" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/e8fc8059-f9d1-3227-870d-2a82c73b9aa2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/azt-quit-bugging-the-ciso-cio/</link>
			<acast:episodeId>695736435f9b0b61aa3d873e</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e9ejm7s5v2c2RwIRpoLHDwqYUJk+6+FI1a/Qxok/sKB7P8jI7/53T4bWpl0UKmYp+3oyp2IVhVnQrjJ0FnIsyeA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/a2c297bded0bbcaad1310374d235da33.png"/>
			<description><![CDATA[<p><em>Season 3, Episode 2: In our conversation with Energy Solution’s CIO David Weisong we chat about how new processes, technology, and budgets are formed.</em></p><p> </p><p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>, or </em><a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'><em>Google</em></a><em>. </em><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><p>It’s a mystery as old as time: the cybersecurity and technology budget and acquisition strategy. How are they formed? How are these projects prioritized? How are internal teams proposing changes and asking for new dollars (and likely not getting them)? This week, we chat with someone at the heart of the matter for their business who walks us through how they build their security and information roadmap, or in what I lovingly call: quit bugging the C-suite.</p><p><a href='https://www.linkedin.com/in/davidweisong/'>David Weisong</a> is the CIO for <a href='https://energy-solution.com/'>Energy Solutions</a> and has a background in software development, DevOps, and managing IT functions, which makes him the perfect candidate to properly discuss the ins and outs of cybersecurity and IT roadmaps.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Season 3, Episode 2: In our conversation with Energy Solution’s CIO David Weisong we chat about how new processes, technology, and budgets are formed.</em></p><p> </p><p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>, or </em><a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'><em>Google</em></a><em>. </em><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><p>It’s a mystery as old as time: the cybersecurity and technology budget and acquisition strategy. How are they formed? How are these projects prioritized? How are internal teams proposing changes and asking for new dollars (and likely not getting them)? This week, we chat with someone at the heart of the matter for their business who walks us through how they build their security and information roadmap, or in what I lovingly call: quit bugging the C-suite.</p><p><a href='https://www.linkedin.com/in/davidweisong/'>David Weisong</a> is the CIO for <a href='https://energy-solution.com/'>Energy Solutions</a> and has a background in software development, DevOps, and managing IT functions, which makes him the perfect candidate to properly discuss the ins and outs of cybersecurity and IT roadmaps.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Hacker Valley Dishes on Breaking Into Cybersecurity</title>
			<itunes:title>Hacker Valley Dishes on Breaking Into Cybersecurity</itunes:title>
			<pubDate>Thu, 18 Jan 2024 10:30:00 GMT</pubDate>
			<itunes:duration>49:49</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fde49d56d-08a6-3695-a3a8-bf692aaf0587/media.mp3" length="95650649" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/de49d56d-08a6-3695-a3a8-bf692aaf0587</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/hacker-valley-dishes-on-breaking-into-cybersecurity/</link>
			<acast:episodeId>6957363177f9435bdc53e102</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e8Y06dl9YpuRx0+RpbBshkP6HuIM6ZGDC3L8qFUir6p/3039n6R16vB3pu5evm2MKk2wzdPjP9CKATmrLdssTDA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/9c4de52f6a632186d8e9371ed036c76d.png"/>
			<description><![CDATA[<p><em>To start the new season, we are joined by Hacker Valley Media’s Ron Eddings and Chris Cochran, who discuss breaking into cybersecurity and the role storytelling plays.</em></p><p> </p><p>A new year, a new season, and plenty of new threats to impact the world of cybersecurity. This week we break from our typical conversations about modern cybersecurity strategies and concepts to focus on one of the most important aspects of our space: people.</p><p>People are the why behind what we do. We protect, support, and educate them about the dangers that lurk online. However, cybersecurity is also driven by people, and for new entries into our field, it can feel nearly impossible to break in. This week we turn to two experts who lived the lives of practitioners and shifted their energy toward telling amazing stories that drive our industry forward. This duo has built a masterclass on what it means to be in cybersecurity and has guided countless people through every nook and cranny.</p><p>And with that, we’re excited to introduce Hacker Valley Media’s Ron Eddings and Chris Cochran who discuss breaking down the barriers to cybersecurity and why practitioners need to invest in soft skills.</p><p>Read more at adoptingzerotrust.com</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>To start the new season, we are joined by Hacker Valley Media’s Ron Eddings and Chris Cochran, who discuss breaking into cybersecurity and the role storytelling plays.</em></p><p> </p><p>A new year, a new season, and plenty of new threats to impact the world of cybersecurity. This week we break from our typical conversations about modern cybersecurity strategies and concepts to focus on one of the most important aspects of our space: people.</p><p>People are the why behind what we do. We protect, support, and educate them about the dangers that lurk online. However, cybersecurity is also driven by people, and for new entries into our field, it can feel nearly impossible to break in. This week we turn to two experts who lived the lives of practitioners and shifted their energy toward telling amazing stories that drive our industry forward. This duo has built a masterclass on what it means to be in cybersecurity and has guided countless people through every nook and cranny.</p><p>And with that, we’re excited to introduce Hacker Valley Media’s Ron Eddings and Chris Cochran who discuss breaking down the barriers to cybersecurity and why practitioners need to invest in soft skills.</p><p>Read more at adoptingzerotrust.com</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.</title>
			<itunes:title>From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.</itunes:title>
			<pubDate>Thu, 30 Nov 2023 10:00:00 GMT</pubDate>
			<itunes:duration>56:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F6cec49a5-467f-34e1-966e-c7a5ad6aab97/media.mp3" length="108115289" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/6cec49a5-467f-34e1-966e-c7a5ad6aab97</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/from-hacktivist-to-white-hat-hacker-a-chat-with-lulzsec-s-sabu/</link>
			<acast:episodeId>695736425f9b0b61aa3d86b7</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24elhmTwL2g8XBwsgoptOQ/L1yinxOrHXDGeaZIqmuDVdY2f38d7KZieqwRkWOrQ82aGu4/xSZWY0PZX1C6NcZ+CQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>19</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/64446931d7c8fde987bd1e4122ee473a.png"/>
			<description><![CDATA[<p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>. PS, we're giving away a Flipper Zero on our site as a little season finale gift. Check out details on our site.</em></p><p></p><p>You know what they say, you save the best for last. As we wrap season two of Adopting Zero Trust, we take a shift from our standard conversations about modern cybersecurity strategies and look back at some of the history that got us to where we are today.</p><p>This week we chat with <a href='https://www.linkedin.com/in/hxmonsegur/'>Hector Monsegur</a>, Co-Founder of <a href='https://en.wikipedia.org/wiki/LulzSec'>LulzSec</a>, and current Director of Research for Alacrinet, who discusses his journey from hacktivism to white hat pen testing.</p><p>In May of 2011, a series of cyber attacks swept the globe. Starting with Fox News, after a broadcaster called rapper Common ‘vile’, then an attack on X Factor (yes, the show Joe Rogan used to host) leaking contestant data, and through to taking down the Sony Playstation network. A, at the time, black hat hacking group was founded and picked off targets for laughs (lulz) rather than financial gain. Among the group was co-founder Hector Monsegur, better known by his alias Sabu, who shaped the movement into cause-based cyber attacks or hacktivism.</p><p>But the story starts well before the formation of Lulzsec, and before the FBI knocked on Hector’s door. It stretches back to a time when there weren’t resources for people to learn how to hack, pen test, and become cybersecurity practitioners didn’t exist, unlike the endless amount of certs and higher education programs that exist today.</p>Key Takeaways<ul><li>The evolution of one's ethical stance: Hector's journey highlights the importance of questioning and reassessing one's actions and beliefs.</li><li>Collaboration and collective impact: Working together can amplify efforts and create positive change, even in the realm of cybersecurity.</li><li>Balancing curiosity and responsibility: Exploring technology and hacking skills should be accompanied by a sense of responsibility and ethical considerations.</li></ul>Editor’s Note<p>The season finale of AZT is here, and we couldn’t have found a more interesting way to wrap things up. Hector has such a unique and storied past, and we can’t recommend his own series enough. The very agent who knocked on his door joins him as the cohost on <a href='https://open.spotify.com/show/4uze2AoxrCv0dRjvElUpTy'>Hacker and the Fed</a>.</p><p>We also can’t thank you, our listeners, enough for another year of the show. Neal and I do this as a passion project first and foremost, but as we seek to attract harder-to-reach guests, we are also building in some ad opportunities. We are ensuring that doesn't impact how we highlight the practitioner's perspective on modern cybersecurity strategies, too.</p><p>Speaking of growing, that other podcast I mentioned last episode? <a href='http://failingpod.com/'>Mastering the Art of Failing</a> can now be found at <a href='http://failingpod.com'>failingpod.com</a> or on your favorite podcast app. The pilot series will highlight people who have found success in their lives, but not without some challenges along the way. Our first guest, Glen Hellman, was part of several successful exits… and quite a few not-so-successful flops. As the series progresses we’ll expand beyond just career-oriented stories and dig into physical, mental, and other states of pushing boundaries and levels of success.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>. PS, we're giving away a Flipper Zero on our site as a little season finale gift. Check out details on our site.</em></p><p></p><p>You know what they say, you save the best for last. As we wrap season two of Adopting Zero Trust, we take a shift from our standard conversations about modern cybersecurity strategies and look back at some of the history that got us to where we are today.</p><p>This week we chat with <a href='https://www.linkedin.com/in/hxmonsegur/'>Hector Monsegur</a>, Co-Founder of <a href='https://en.wikipedia.org/wiki/LulzSec'>LulzSec</a>, and current Director of Research for Alacrinet, who discusses his journey from hacktivism to white hat pen testing.</p><p>In May of 2011, a series of cyber attacks swept the globe. Starting with Fox News, after a broadcaster called rapper Common ‘vile’, then an attack on X Factor (yes, the show Joe Rogan used to host) leaking contestant data, and through to taking down the Sony Playstation network. A, at the time, black hat hacking group was founded and picked off targets for laughs (lulz) rather than financial gain. Among the group was co-founder Hector Monsegur, better known by his alias Sabu, who shaped the movement into cause-based cyber attacks or hacktivism.</p><p>But the story starts well before the formation of Lulzsec, and before the FBI knocked on Hector’s door. It stretches back to a time when there weren’t resources for people to learn how to hack, pen test, and become cybersecurity practitioners didn’t exist, unlike the endless amount of certs and higher education programs that exist today.</p>Key Takeaways<ul><li>The evolution of one's ethical stance: Hector's journey highlights the importance of questioning and reassessing one's actions and beliefs.</li><li>Collaboration and collective impact: Working together can amplify efforts and create positive change, even in the realm of cybersecurity.</li><li>Balancing curiosity and responsibility: Exploring technology and hacking skills should be accompanied by a sense of responsibility and ethical considerations.</li></ul>Editor’s Note<p>The season finale of AZT is here, and we couldn’t have found a more interesting way to wrap things up. Hector has such a unique and storied past, and we can’t recommend his own series enough. The very agent who knocked on his door joins him as the cohost on <a href='https://open.spotify.com/show/4uze2AoxrCv0dRjvElUpTy'>Hacker and the Fed</a>.</p><p>We also can’t thank you, our listeners, enough for another year of the show. Neal and I do this as a passion project first and foremost, but as we seek to attract harder-to-reach guests, we are also building in some ad opportunities. We are ensuring that doesn't impact how we highlight the practitioner's perspective on modern cybersecurity strategies, too.</p><p>Speaking of growing, that other podcast I mentioned last episode? <a href='http://failingpod.com/'>Mastering the Art of Failing</a> can now be found at <a href='http://failingpod.com'>failingpod.com</a> or on your favorite podcast app. The pilot series will highlight people who have found success in their lives, but not without some challenges along the way. Our first guest, Glen Hellman, was part of several successful exits… and quite a few not-so-successful flops. As the series progresses we’ll expand beyond just career-oriented stories and dig into physical, mental, and other states of pushing boundaries and levels of success.</p><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Market For Enterprise (Secure) Browsers</title>
			<itunes:title>The Market For Enterprise (Secure) Browsers</itunes:title>
			<pubDate>Thu, 16 Nov 2023 10:30:00 GMT</pubDate>
			<itunes:duration>46:10</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F8c4fd121-d0c2-3ca4-b2f3-02f105b85788/media.mp3" length="88644984" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/8c4fd121-d0c2-3ca4-b2f3-02f105b85788</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/the-market-for-enterprise-secure-browsers/</link>
			<acast:episodeId>695736405f9b0b61aa3d8617</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eMG4YTHzja5ypg6q/s3VYC0XeNX5+8BgxiuhJF0VQH26wBZjFTl8MFBvByr/jA8pBmvHlnMNaSptwuhUPIkAuPA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>18</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/529ec48c265977adcf910166d015ee46.png"/>
			<description><![CDATA[<p>Season two, episode 18: Evgeniy Kharam, a founder, CISO, architect, and podcast producer discusses the rise of Enterprise (Secure) browsers.</p><p><em><a href='https://www.adoptingzerotrust.com/'>You can read the show notes here and subscribe to updates.</a></em></p><p>In the latest episode of AZT, Evgeniy Kharam, a founder, CISO, architect, and podcast producer, joins the discussion to talk about the rise of Enterprise (Secure) browsers. The conversation explores the importance of browser security and its relevance to the Zero Trust framework.</p>Key Takeaways<ol><li>The birth of the enterprise browser - Remote Browser Isolation: Evgeniy explains the concept of remote browser isolation, which creates a layer of separation between users and potentially harmful websites. By browsing through a remote browser, users can mitigate the risks associated with malware and other online threats.</li><li>Customized Browser Profiles: The conversation delves into the idea of using customized browser profiles to enhance security and control access. By providing contractors or temporary workers with specific browser profiles, organizations can ensure that only authorized individuals can access certain applications or data.</li><li>Managed Device and Compliance: The discussion highlights the trend of using managed devices and the impact on compliance requirements. With the ability to enforce the use of specific browsers through Mobile Device Management (MDM), organizations can strengthen security measures and simplify compliance audits.</li></ol><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season two, episode 18: Evgeniy Kharam, a founder, CISO, architect, and podcast producer discusses the rise of Enterprise (Secure) browsers.</p><p><em><a href='https://www.adoptingzerotrust.com/'>You can read the show notes here and subscribe to updates.</a></em></p><p>In the latest episode of AZT, Evgeniy Kharam, a founder, CISO, architect, and podcast producer, joins the discussion to talk about the rise of Enterprise (Secure) browsers. The conversation explores the importance of browser security and its relevance to the Zero Trust framework.</p>Key Takeaways<ol><li>The birth of the enterprise browser - Remote Browser Isolation: Evgeniy explains the concept of remote browser isolation, which creates a layer of separation between users and potentially harmful websites. By browsing through a remote browser, users can mitigate the risks associated with malware and other online threats.</li><li>Customized Browser Profiles: The conversation delves into the idea of using customized browser profiles to enhance security and control access. By providing contractors or temporary workers with specific browser profiles, organizations can ensure that only authorized individuals can access certain applications or data.</li><li>Managed Device and Compliance: The discussion highlights the trend of using managed devices and the impact on compliance requirements. With the ability to enforce the use of specific browsers through Mobile Device Management (MDM), organizations can strengthen security measures and simplify compliance audits.</li></ol><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Beyond the Buzzword: Applicable use of AI in Cybersecurity</title>
			<itunes:title>Beyond the Buzzword: Applicable use of AI in Cybersecurity</itunes:title>
			<pubDate>Thu, 02 Nov 2023 09:30:00 GMT</pubDate>
			<itunes:duration>56:37</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fc026e0d0-1d2b-3a98-a1df-f15a4313b2ab/media.mp3" length="108735847" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/c026e0d0-1d2b-3a98-a1df-f15a4313b2ab</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/beyond-the-buzzword-applicable-use-of-ai-in-cybersecurity/</link>
			<acast:episodeId>695736404833761f1dc89da3</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e24Ls5WqsgZiMxumfhGgvKax8ejZepJe9Hf9NmEo/3EDI69mNc7SJfEBcv9fmTN10Pkz4N/MYw2UCI5VRDhK4Qg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>17</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/7eaf9abb7c672476f0fbc840d4138b16.png"/>
			<description><![CDATA[<p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p> </p><p>The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term that’s been misused, slapped on the front of startups’ overpriced booths at RSA and Black Hat, and it feels like every cybersecurity product under the sun now supports it in some flavor or fashion. It's the same cycle we’ve been in the past, but this time everyone is jumping in. This week we are getting in front of the bandwagon and chat with a pioneer in the cybersec AI space who has seen how the technology has been evolving over the past decade, Oliver Tavakoli, the CTO of Vectra AI.</p><p> </p><p>“My contemporaneous definition of AI at any given moment in time is there's got to be enough pixie dust in it for people to view it as somewhat magical; so that's my incredibly technical definition. I'd say over the past 10-15 years, that is typically meant neural nets-that has those have been a stand in-and and obviously, neural nets can be used for discrimination <em>[As opposed to a generative AI model]</em>. Again, the example of cat (You search “Cat” on Google images, and it returns results that show images, in theory, of only cats) is an example of how they can be used in a generative sense, which is really the latest revolution that you see. And then the other thing is how broadly applicable they are and how well read they are.</p><p> </p><p>Tavakoli’s definition of AI provides the context for how AI is primarily applicable today in cybersecurity. But, in the past, typically these concepts were held back by technology. There is also a <a href='https://www.turing.com/kb/generative-models-vs-discriminative-models-for-deep-learning'>stark difference between</a> what has been referred to as AI, or a discriminative AI model, and what is most popular today, or generative AI.</p><p>It turns out in these large language models, as you make them bigger, there was always kind of the question of if you make them big enough. Will they just plateau or will they take off? It really wasn't a foregone conclusion that if you made them big enough they would take off, but it was a bet that was placed and a bet that turned out to have some merit to it.</p><p>And that is the crux of today’s interview: what was and will be the past and future impact of AI on cybersecurity?</p>Key Takeaways<ul><li>AI plays a significant role in both offensive and defensive cybersecurity strategies.</li><li>Threat actors use AI to enhance their attacks, making them more believable and harder to detect.</li><li>Defensive uses of AI include improving workflow and making SOCs more productive.</li><li>Organizations must always assume that compromise is possible and focus on minimizing the impact of breaches.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p> </p><p>The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term that’s been misused, slapped on the front of startups’ overpriced booths at RSA and Black Hat, and it feels like every cybersecurity product under the sun now supports it in some flavor or fashion. It's the same cycle we’ve been in the past, but this time everyone is jumping in. This week we are getting in front of the bandwagon and chat with a pioneer in the cybersec AI space who has seen how the technology has been evolving over the past decade, Oliver Tavakoli, the CTO of Vectra AI.</p><p> </p><p>“My contemporaneous definition of AI at any given moment in time is there's got to be enough pixie dust in it for people to view it as somewhat magical; so that's my incredibly technical definition. I'd say over the past 10-15 years, that is typically meant neural nets-that has those have been a stand in-and and obviously, neural nets can be used for discrimination <em>[As opposed to a generative AI model]</em>. Again, the example of cat (You search “Cat” on Google images, and it returns results that show images, in theory, of only cats) is an example of how they can be used in a generative sense, which is really the latest revolution that you see. And then the other thing is how broadly applicable they are and how well read they are.</p><p> </p><p>Tavakoli’s definition of AI provides the context for how AI is primarily applicable today in cybersecurity. But, in the past, typically these concepts were held back by technology. There is also a <a href='https://www.turing.com/kb/generative-models-vs-discriminative-models-for-deep-learning'>stark difference between</a> what has been referred to as AI, or a discriminative AI model, and what is most popular today, or generative AI.</p><p>It turns out in these large language models, as you make them bigger, there was always kind of the question of if you make them big enough. Will they just plateau or will they take off? It really wasn't a foregone conclusion that if you made them big enough they would take off, but it was a bet that was placed and a bet that turned out to have some merit to it.</p><p>And that is the crux of today’s interview: what was and will be the past and future impact of AI on cybersecurity?</p>Key Takeaways<ul><li>AI plays a significant role in both offensive and defensive cybersecurity strategies.</li><li>Threat actors use AI to enhance their attacks, making them more believable and harder to detect.</li><li>Defensive uses of AI include improving workflow and making SOCs more productive.</li><li>Organizations must always assume that compromise is possible and focus on minimizing the impact of breaches.</li></ul><p></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices</title>
			<itunes:title>AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices</itunes:title>
			<pubDate>Thu, 19 Oct 2023 09:00:00 GMT</pubDate>
			<itunes:duration>54:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fcb9e0cc9-b298-3447-a414-4d7f258ca977/media.mp3" length="105527156" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/cb9e0cc9-b298-3447-a414-4d7f258ca977</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/azt-zack-butcher-on-building-zero-trust-standards-and-securing-microservices/</link>
			<acast:episodeId>6957364577f9435bdc53e65f</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24ewAP1/3Zw2Mk6bkrfMw4fbEiCi38nZumogJx/8mg5CddX+7I0kA3XJ0/hcO1PDspk3IDH+cSzW96X7nV8l1jr1Q==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>16</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/70b539a501a436c3304207ea6bdc71fe.png"/>
			<description><![CDATA[<p><em>Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices.</em></p><p> </p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p> </p><p>There are several guiding concepts that make it easier for organizations to build a Zero Trust strategy. The first that typically come to mind come from CISA and NIST. These core elements, ranging from the five pillars through to building a ZT architecture, offer a vendor-neutral path towards removing implicit trust. Organizations like CSA also do a great job of expanding upon this knowledge with more contributions from technology and service providers. This week, we take our first step towards understanding what goes on behind these policies, standards, and recommendations, and for that we have a well-equipped guest to walk us through it.</p><p> </p><p>Zack Butcher is one of the founding engineers over at Tetrate, a vendor that provides a consistent way to connect and protect thousands of individual microservices and deliver Zero Trust security operations across any environment. They also have their roots stemming from a team that worked at Google, which many of you are likely familiar with their connection to Zero Trust through BeyondCorp. However, he is also the co-author on NIST special publication <a href='https://csrc.nist.gov/pubs/sp/800/207/a/final'>800-207A</a>. If that looks familiar, it’s because it’s an expansion of the earlier mentioned core NIST resource, <a href='https://csrc.nist.gov/pubs/sp/800/207/final'>800-207</a>.</p><p> </p><p>NIST SP 800-207A builds upon that core architecture piece and hones in on access controls in cloud-native applications in multi-cloud environments. That is a bit of a mouthful, so here is Zack on what you need to know.</p><p> </p><p>When we talk about Zero Trust at runtime, there's a lot of FUD and a frustrating amount of FUD in the in the marketplace and a lot of vendors claiming certain things are Zero Trust and not.</p><p>And you know, in that landscape, I wanted to really kind of push for people to have a very clear definition of Zero Trust at runtime, and it's a minimum definition. Let me be clear. You can do a whole lot more than what we talk about in the SP, but I try and give a very, very simple minimum definition. And that is five policy checks at runtime, and we call that identity based segmentation.</p><p>Butcher also co-authored <a href='https://csrc.nist.gov/pubs/sp/800/204/a/final'>NIST SP 800-204A</a> that focuses on building secure microservices-based applications using service-mesh architecture. So this week, Neal and Butcher ran down the rabbit hole of expanding upon these core Zero Trust resources, implications of a more secure environment at runtime, and identity-based segmentation.</p><p><em></em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices.</em></p><p> </p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p> </p><p>There are several guiding concepts that make it easier for organizations to build a Zero Trust strategy. The first that typically come to mind come from CISA and NIST. These core elements, ranging from the five pillars through to building a ZT architecture, offer a vendor-neutral path towards removing implicit trust. Organizations like CSA also do a great job of expanding upon this knowledge with more contributions from technology and service providers. This week, we take our first step towards understanding what goes on behind these policies, standards, and recommendations, and for that we have a well-equipped guest to walk us through it.</p><p> </p><p>Zack Butcher is one of the founding engineers over at Tetrate, a vendor that provides a consistent way to connect and protect thousands of individual microservices and deliver Zero Trust security operations across any environment. They also have their roots stemming from a team that worked at Google, which many of you are likely familiar with their connection to Zero Trust through BeyondCorp. However, he is also the co-author on NIST special publication <a href='https://csrc.nist.gov/pubs/sp/800/207/a/final'>800-207A</a>. If that looks familiar, it’s because it’s an expansion of the earlier mentioned core NIST resource, <a href='https://csrc.nist.gov/pubs/sp/800/207/final'>800-207</a>.</p><p> </p><p>NIST SP 800-207A builds upon that core architecture piece and hones in on access controls in cloud-native applications in multi-cloud environments. That is a bit of a mouthful, so here is Zack on what you need to know.</p><p> </p><p>When we talk about Zero Trust at runtime, there's a lot of FUD and a frustrating amount of FUD in the in the marketplace and a lot of vendors claiming certain things are Zero Trust and not.</p><p>And you know, in that landscape, I wanted to really kind of push for people to have a very clear definition of Zero Trust at runtime, and it's a minimum definition. Let me be clear. You can do a whole lot more than what we talk about in the SP, but I try and give a very, very simple minimum definition. And that is five policy checks at runtime, and we call that identity based segmentation.</p><p>Butcher also co-authored <a href='https://csrc.nist.gov/pubs/sp/800/204/a/final'>NIST SP 800-204A</a> that focuses on building secure microservices-based applications using service-mesh architecture. So this week, Neal and Butcher ran down the rabbit hole of expanding upon these core Zero Trust resources, implications of a more secure environment at runtime, and identity-based segmentation.</p><p><em></em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird</title>
			<itunes:title>AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird</itunes:title>
			<pubDate>Thu, 31 Aug 2023 10:00:00 GMT</pubDate>
			<itunes:duration>38:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F2e225d55-e09f-3f94-ad43-d466905a5ed5/media.mp3" length="73347161" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/2e225d55-e09f-3f94-ad43-d466905a5ed5</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/azt-api-security-with-john-kindervag-chase-cunningham-and-richard-bird/</link>
			<acast:episodeId>6957363b56c11ef409381c9d</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24epV6iGsY+zpk0Ry/gLDfgsega1svdxviU2ieuyGEexbGu0F9hoAZT91OROxG3u76NwJ3r1k3WJ7aYDQLaz2G1sg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/6893040fbd560dbc6720b170dbfee69c.png"/>
			<description><![CDATA[<p>Season two, episode 15: We talk ZT History and API security with the godfather of Zero Trust, Dr Zero Trust, and Richard Bird.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>In the past few years, supply chain attacks and their impacts have or will soon overtake that of the damage done by ransomware. It’s of no surprise then that APIs are a critical attack vector that threat actors like to exploit, yet many organizations do not have a good understanding of how many doors they have running into their data.</p><p>This week we chat with the godfather of Zero Trust, Dr. Zero Trust, and a chief security officer about the current state of API security maturity. Considering our guests, we, of course, also took the opportunity to chat a bit about Zero Trust's history.</p><p>This week we have three very special guests:</p><ul><li>John Kindervag, the creator (godfather) of Zero Trust</li><li>Chase Cunningham, AKA Dr Zero Trust, and the now VP of Market Research for G2</li><li>Richard Bird, Traceable AI’s Chief Security Officer</li></ul>Key Takeaways<ul><li>Like any other cybersecurity concept, APIs must have an asset inventory</li><li>There is enough margin of error tied to the intended use of APIs that require continuous monitoring/verification</li><li>There is a current maturity gap associated with securing the use of APIs in the name of speed and innovation, and often there is not a well-established owner</li></ul>Editors Note<p>We will be taking a publishing break for the month of September as my daughter has arrived, and I will need to catch up on all the sleep I can get. We should be back in October and run through until the holiday break before we wrap season two. I’m also working on a few experimental podcast series during my parental leave, so stay tuned. At least one in particular should be of interest to our audience here. Also, if you work for a cybersecurity org and are interested in launching a podcast, slide into my inbox if you need a hand.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season two, episode 15: We talk ZT History and API security with the godfather of Zero Trust, Dr Zero Trust, and Richard Bird.</p><p><em>Catch this episode on <a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'>YouTube</a>, <a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'>Apple</a>, <a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'>Spotify</a>, <a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'>Amazon</a>, or <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'>Google</a>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p>In the past few years, supply chain attacks and their impacts have or will soon overtake that of the damage done by ransomware. It’s of no surprise then that APIs are a critical attack vector that threat actors like to exploit, yet many organizations do not have a good understanding of how many doors they have running into their data.</p><p>This week we chat with the godfather of Zero Trust, Dr. Zero Trust, and a chief security officer about the current state of API security maturity. Considering our guests, we, of course, also took the opportunity to chat a bit about Zero Trust's history.</p><p>This week we have three very special guests:</p><ul><li>John Kindervag, the creator (godfather) of Zero Trust</li><li>Chase Cunningham, AKA Dr Zero Trust, and the now VP of Market Research for G2</li><li>Richard Bird, Traceable AI’s Chief Security Officer</li></ul>Key Takeaways<ul><li>Like any other cybersecurity concept, APIs must have an asset inventory</li><li>There is enough margin of error tied to the intended use of APIs that require continuous monitoring/verification</li><li>There is a current maturity gap associated with securing the use of APIs in the name of speed and innovation, and often there is not a well-established owner</li></ul>Editors Note<p>We will be taking a publishing break for the month of September as my daughter has arrived, and I will need to catch up on all the sleep I can get. We should be back in October and run through until the holiday break before we wrap season two. I’m also working on a few experimental podcast series during my parental leave, so stay tuned. At least one in particular should be of interest to our audience here. Also, if you work for a cybersecurity org and are interested in launching a podcast, slide into my inbox if you need a hand.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: The Illusion of Passwordless</title>
			<itunes:title>Adopting Zero Trust: The Illusion of Passwordless</itunes:title>
			<pubDate>Thu, 10 Aug 2023 09:00:00 GMT</pubDate>
			<itunes:duration>51:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fb43900a9-e454-3c71-9c51-95ad23c0d8db/media.mp3" length="98723436" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/b43900a9-e454-3c71-9c51-95ad23c0d8db</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-the-illusion-of-passwordless/</link>
			<acast:episodeId>695736405f9b0b61aa3d8654</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e9RWo0MWdfnVAMAQ9bctt4VNFewybUoWPFcN1yytzDo4ewvcrcuq5NAkTLimf8yVpfiSe2yEsiSYZZ+Q+59S1DQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/0ddf5334f8f932a185842eee03647067.png"/>
			<description><![CDATA[<p>The illusion of going passwordless with Derek Hanson, Vice President Solutions Architecture and Alliances at Yubico. <em><a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p> </p><p>True or False: The concept of passwordless is new. False.</p><p> </p><p>This is shocking, we know.</p><p> </p><p>Considering the amount of hype around the concept, it certainly can feel like a new concept since the masses are becoming more familiar with it; however, the message is a bit jumbled.</p><p> </p><p>For ages, we’ve used things like biometrics (fingerprints or iris scans) and even a PIN to access money on a debit card, but more recently, there has been an increase in misrepresentations about how secure passwordless technology is, simply because there is not a password involved. As cybersecurity practitioners, we know that the simple removal of passwords alone won’t prevent a successful phishing attack, which means multifactor authentication needs to play a role in getting us closer to the Zero Trust concept.</p><p> </p><p>Fortunately, we have a guest this week who is well-equipped to help us navigate the ins and outs of passwordless concepts, passkeys, and the split between identification and authentication. Derek Hanson is the Vice President of Solutions Architecture and Alliances at Yubico, who has spent the last 8 years contributing to the shaping of a physical piece of hardware, Yubikeys, designed to improve authentication. Prior to that, he worked at Costco, focusing on identification and IAM. But first, let’s improve your personal security stack…</p><p> </p>Giveaway - Yubikeys!<p>If you already have a Yubikey, you already know there is always an opportunity for one more in your stack. If you’re new to Yubico’s offering, this is the perfect time for you to grab your very own YubiKey 5C NFC and gain phishing-resistant MFA. It even works with most password managers, too.</p><p> </p><p>To enter, we’ve given you a bunch of options on how you can increase your odds of winning one of two keys. You must be based in the US, though.</p><p> </p><p>[**Enter the giveaway here](<a href='https://www.rafflecopter.com/rafl/display/c9435e741/?).**'>https://www.rafflecopter.com/rafl/display/c9435e741/?).**</a></p><p>We’ll close the giveaway in about two weeks and announce it in our next episode.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>The illusion of going passwordless with Derek Hanson, Vice President Solutions Architecture and Alliances at Yubico. <em><a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p> </p><p>True or False: The concept of passwordless is new. False.</p><p> </p><p>This is shocking, we know.</p><p> </p><p>Considering the amount of hype around the concept, it certainly can feel like a new concept since the masses are becoming more familiar with it; however, the message is a bit jumbled.</p><p> </p><p>For ages, we’ve used things like biometrics (fingerprints or iris scans) and even a PIN to access money on a debit card, but more recently, there has been an increase in misrepresentations about how secure passwordless technology is, simply because there is not a password involved. As cybersecurity practitioners, we know that the simple removal of passwords alone won’t prevent a successful phishing attack, which means multifactor authentication needs to play a role in getting us closer to the Zero Trust concept.</p><p> </p><p>Fortunately, we have a guest this week who is well-equipped to help us navigate the ins and outs of passwordless concepts, passkeys, and the split between identification and authentication. Derek Hanson is the Vice President of Solutions Architecture and Alliances at Yubico, who has spent the last 8 years contributing to the shaping of a physical piece of hardware, Yubikeys, designed to improve authentication. Prior to that, he worked at Costco, focusing on identification and IAM. But first, let’s improve your personal security stack…</p><p> </p>Giveaway - Yubikeys!<p>If you already have a Yubikey, you already know there is always an opportunity for one more in your stack. If you’re new to Yubico’s offering, this is the perfect time for you to grab your very own YubiKey 5C NFC and gain phishing-resistant MFA. It even works with most password managers, too.</p><p> </p><p>To enter, we’ve given you a bunch of options on how you can increase your odds of winning one of two keys. You must be based in the US, though.</p><p> </p><p>[**Enter the giveaway here](<a href='https://www.rafflecopter.com/rafl/display/c9435e741/?).**'>https://www.rafflecopter.com/rafl/display/c9435e741/?).**</a></p><p>We’ll close the giveaway in about two weeks and announce it in our next episode.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins</title>
			<itunes:title>Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins</itunes:title>
			<pubDate>Thu, 27 Jul 2023 10:00:00 GMT</pubDate>
			<itunes:duration>44:02</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fd01c2b94-ea7a-3abd-a09b-1a2e94a3f3fc/media.mp3" length="84562275" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/d01c2b94-ea7a-3abd-a09b-1a2e94a3f3fc</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-philosophy-of-prevention-with-iheartmedia-s-janet-heins/</link>
			<acast:episodeId>69573639c84340185be9258c</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eju8E/t/TMrEv4YxClq853+GJh/TnFxfEjyPi+RKSg5EZ+7uAxxncAT3pYCkUSd8g7PifYAanC4cKpCPpS+zUNQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/9befbdf5cfcddd871f3ec519bf090609.png"/>
			<description><![CDATA[<p>Season two, episode 13: Cybersecurity prevention on a global scale with Janey Heins, Global CISO for iHeartMedia.</p><p> </p><p>At the heart of Zero Trust is the idea of prevention. If you don’t trust anything or any person, you are playing in the same pool as risk avoidance. While total risk avoidance isn’t feasible, Zero Trust gets us closer to reality. Now, map this up to an organization with a global footprint, with significant infrastructure sprawl, and you’ve got one very complex scenario on your hands.</p><p> </p><p>This brings us to this week’s guest, Janet Heins, iHeartMedia's Global CISO, who will help us navigate the philosophy of cybersecurity prevention on a global scale.</p><p> </p><p>Putting The Conversation Into Context</p><p>With more than a decade behind her as a CISO, Heins’ experience stems from working with some massive brands. As a leader, she’s particularly passionate about translating business needs into technology processes or solutions, while at the same time bridging the language barriers that often stem between IT, cybersecurity, and the other adjacent areas.</p><p> </p><p>iHeartMedia has over 11,000 employees and a vast physical and digital footprint. With 860 radio stations across the US and 20,000 events annually, the company is part of the emergency broadcast system and has to be ready to respond to threats quickly.</p><p> </p><p>At a global level, Heins makes it clear that strong detection and response capabilities, as well as prevention measures, are critical elements of prevention. And while prevention can take many forms, in the context of today’s episode, we dig into security tools, hiring security professionals, and the basics, such as providing security awareness training to employees.</p><p> </p><p>One challenge of securing a large organization like iHeartMedia is consolidating the tech stack. iHeartMedia has a blended architecture of OT and IT, with legacy hardware and systems that need to be secured. Heins stresses the importance of communication and collaboration between the IT and OT teams, as well as being open to new tools and automation.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season two, episode 13: Cybersecurity prevention on a global scale with Janey Heins, Global CISO for iHeartMedia.</p><p> </p><p>At the heart of Zero Trust is the idea of prevention. If you don’t trust anything or any person, you are playing in the same pool as risk avoidance. While total risk avoidance isn’t feasible, Zero Trust gets us closer to reality. Now, map this up to an organization with a global footprint, with significant infrastructure sprawl, and you’ve got one very complex scenario on your hands.</p><p> </p><p>This brings us to this week’s guest, Janet Heins, iHeartMedia's Global CISO, who will help us navigate the philosophy of cybersecurity prevention on a global scale.</p><p> </p><p>Putting The Conversation Into Context</p><p>With more than a decade behind her as a CISO, Heins’ experience stems from working with some massive brands. As a leader, she’s particularly passionate about translating business needs into technology processes or solutions, while at the same time bridging the language barriers that often stem between IT, cybersecurity, and the other adjacent areas.</p><p> </p><p>iHeartMedia has over 11,000 employees and a vast physical and digital footprint. With 860 radio stations across the US and 20,000 events annually, the company is part of the emergency broadcast system and has to be ready to respond to threats quickly.</p><p> </p><p>At a global level, Heins makes it clear that strong detection and response capabilities, as well as prevention measures, are critical elements of prevention. And while prevention can take many forms, in the context of today’s episode, we dig into security tools, hiring security professionals, and the basics, such as providing security awareness training to employees.</p><p> </p><p>One challenge of securing a large organization like iHeartMedia is consolidating the tech stack. iHeartMedia has a blended architecture of OT and IT, with legacy hardware and systems that need to be secured. Heins stresses the importance of communication and collaboration between the IT and OT teams, as well as being open to new tools and automation.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: Continuous Trust</title>
			<itunes:title>Adopting Zero Trust: Continuous Trust</itunes:title>
			<pubDate>Thu, 13 Jul 2023 10:00:00 GMT</pubDate>
			<itunes:duration>29:49</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F8414d4e5-b6c6-305e-87ab-5767998b3e03/media.mp3" length="57269094" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/8414d4e5-b6c6-305e-87ab-5767998b3e03</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-continuous-trust/</link>
			<acast:episodeId>69573640e3c8c736bd088ebe</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24egs9SslfznEKG6uQgYyqUG5z786AvsT1bLl9lsZBKSjKSGOnQJ8L8X1YAhPJ0iFqsH1g+6x8PMhzrBSSlx8+q9A==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/53659801de72371030134153cca327a9.png"/>
			<description><![CDATA[<p>Over the past two years, we’ve explored the ins and outs of Zero Trust, ranging from the concept as a strategy down to the more technical components, such as how it impacts the physical world as found in IoT devices. However, what is often missed in these conversations, is at what point an organization can actually build trust.</p><p>Not just crawling up from the baseline of zero but achieving continuous trust. The short answer? Defense in depth, building security in layers, and ensuring every 1 and 0 is secure at the offset while continuously monitored through automation.</p><p>And this is where we get to introduce this week’s guests, who were kind enough to be pulled away from a busy conference. This is also a special episode for us, too, as it’s the first in-person interview we’ve done since launching this series. Live (June 22, 2023) from Drataverse, we have Daniel Marashlian, the co-founder and CTO of Drata, Ty Sbano, the CISO for Vercel and an angel investor at Silicon Valley CISO Investment Group (SVCI), and Matt Hilary, the Vice President of Security and CISO at Drata.</p><p><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Over the past two years, we’ve explored the ins and outs of Zero Trust, ranging from the concept as a strategy down to the more technical components, such as how it impacts the physical world as found in IoT devices. However, what is often missed in these conversations, is at what point an organization can actually build trust.</p><p>Not just crawling up from the baseline of zero but achieving continuous trust. The short answer? Defense in depth, building security in layers, and ensuring every 1 and 0 is secure at the offset while continuously monitored through automation.</p><p>And this is where we get to introduce this week’s guests, who were kind enough to be pulled away from a busy conference. This is also a special episode for us, too, as it’s the first in-person interview we’ve done since launching this series. Live (June 22, 2023) from Drataverse, we have Daniel Marashlian, the co-founder and CTO of Drata, Ty Sbano, the CISO for Vercel and an angel investor at Silicon Valley CISO Investment Group (SVCI), and Matt Hilary, the Vice President of Security and CISO at Drata.</p><p><a href='https://www.adoptingzerotrust.com/'><em>You can read the show notes here</em></a><em>.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: Nonfederated Apps</title>
			<itunes:title>Adopting Zero Trust: Nonfederated Apps</itunes:title>
			<pubDate>Thu, 29 Jun 2023 10:00:00 GMT</pubDate>
			<itunes:duration>54:44</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Feb040a7c-8408-3ea6-a779-988f3e98ed01/media.mp3" length="105115483" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/eb040a7c-8408-3ea6-a779-988f3e98ed01</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-nonfederated-apps/</link>
			<acast:episodeId>6957363ee3c8c736bd088e6b</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24enRff4I7Dh+gHxJzfUKg6aoIg2jqPRcPTJJONF02u0joA3Wi9RlwLC+M4EnFW2tuU+zWN90ekAFygBQwAtNo8kQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/c744cfdbbd2a39c8d0917bed72cf5cb6.png"/>
			<description><![CDATA[<p>Last episode, we brought to you a wild story of a victim who was SIM-swapped four times, and this week we’re back to basics with some fresh research and a closer look at a critical piece of Zero Trust: Non-federated applications.</p><p> </p><p><a href='https://www.cerby.com/'>Cerby’s</a> Chief Trust Officer, Matt Chiodi, was kind enough to add a bit of color to a research report they released at RSA that helps validate what they’ve been building the past 3 years. Before we get to that, it’s worthwhile to define what nonfederated applications are, as, like many cybersecurity concepts, it’s going through an identity crisis.</p><p> </p><p>Nonfederated applications are essentially the opposite of how organizations should be inventorying, tracking, and providing access to applications (SaaS platforms are a good example). To align with Zero Trust, or really any modern cybersecurity strategy, SSO, SAML, and other solutions designed to scale are necessary so IT and security teams can properly manage access. However, there are always outliers, which the business still needs access to, such as managing admin access to a social media profile.</p><p> </p><p>This brings us back to Matt and the Ponemon Institute, who produced the recent research report: <em><a href='https://www.cerby.com/the-hidden-cybersecurity-threat-in-organizations'>The Hidden Cybersecurity Threat in Organizations: Nonfederated Applications</a></em>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Last episode, we brought to you a wild story of a victim who was SIM-swapped four times, and this week we’re back to basics with some fresh research and a closer look at a critical piece of Zero Trust: Non-federated applications.</p><p> </p><p><a href='https://www.cerby.com/'>Cerby’s</a> Chief Trust Officer, Matt Chiodi, was kind enough to add a bit of color to a research report they released at RSA that helps validate what they’ve been building the past 3 years. Before we get to that, it’s worthwhile to define what nonfederated applications are, as, like many cybersecurity concepts, it’s going through an identity crisis.</p><p> </p><p>Nonfederated applications are essentially the opposite of how organizations should be inventorying, tracking, and providing access to applications (SaaS platforms are a good example). To align with Zero Trust, or really any modern cybersecurity strategy, SSO, SAML, and other solutions designed to scale are necessary so IT and security teams can properly manage access. However, there are always outliers, which the business still needs access to, such as managing admin access to a social media profile.</p><p> </p><p>This brings us back to Matt and the Ponemon Institute, who produced the recent research report: <em><a href='https://www.cerby.com/the-hidden-cybersecurity-threat-in-organizations'>The Hidden Cybersecurity Threat in Organizations: Nonfederated Applications</a></em>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: SIM Swapped</title>
			<itunes:title>Adopting Zero Trust: SIM Swapped</itunes:title>
			<pubDate>Thu, 15 Jun 2023 10:00:00 GMT</pubDate>
			<itunes:duration>59:44</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F0b7790b0-5dda-3d15-80c0-5681cef84025/media.mp3" length="114697813" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/0b7790b0-5dda-3d15-80c0-5681cef84025</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-sim-swapped/</link>
			<acast:episodeId>69573648c84340185be929f5</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e91GIVQ0BC9c/vsaWhSYG7htqWDgnLAL9qcurj2KHtsJwl85i7f6ZBRUBWdur+/13ab2UWmLWs/KnY7PKZw0Ldg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/3c358517ca483615491b2b108adc7914.png"/>
			<description><![CDATA[<p>Taking a break from our usual format, this week we chat with a victim-turned-CEO who was hit by SIM-swapping attacks. However, not all harsh starts have to end that way, and <a href='https://www.linkedin.com/in/haseebawan/'>Haseeb Awan</a> made the best of a bad situation. After being compromised not once… nor twice, but four times, Haseeb eventually took matters into his own hands and developed a new solution and company, <a href='https://www.efani.com/'>Efani</a>.</p><p>Haseeb was kind enough to share his personal experience of being SIM swapped where he describes the fear and anxiety felt as a result of the attacks and explained how easy it is to compromise a phone number.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Taking a break from our usual format, this week we chat with a victim-turned-CEO who was hit by SIM-swapping attacks. However, not all harsh starts have to end that way, and <a href='https://www.linkedin.com/in/haseebawan/'>Haseeb Awan</a> made the best of a bad situation. After being compromised not once… nor twice, but four times, Haseeb eventually took matters into his own hands and developed a new solution and company, <a href='https://www.efani.com/'>Efani</a>.</p><p>Haseeb was kind enough to share his personal experience of being SIM swapped where he describes the fear and anxiety felt as a result of the attacks and explained how easy it is to compromise a phone number.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Bloomberg: Implemented</title>
			<itunes:title>Adopting Zero Trust with Bloomberg: Implemented</itunes:title>
			<pubDate>Thu, 25 May 2023 14:54:50 GMT</pubDate>
			<itunes:duration>51:49</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F46e23872-5332-3e2d-94de-03bbf2172042/media.mp3" length="99488420" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/46e23872-5332-3e2d-94de-03bbf2172042</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-bloomberg-implemented/</link>
			<acast:episodeId>6957363b77f9435bdc53e372</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eNv5cYtAEL7Ol+aPRldIAlNZ/m9S1WeyCC7692mbHGSL04/ONBosCsYn+gO3uqhOrFRJmcJmy4160UAahHKDQ6A==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/126cf635062f083ed4f15ca530eab4b5.png"/>
			<description><![CDATA[<p><em>Season two, episode nine: Featuring Bloomberg’s Head of Information Security Architecture and the Information Security Program, Phil Vachon.</em></p><p> </p><p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>, or </em><a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'><em>Google</em></a><em>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p> </p><p>What does implementing a Zero Trust strategy actually look like in an organization? Nearly a year into our podcast’s journey covering how practitioners view, define, and apply zero trust, it’s time to look under the hood at how a notable organization put its strategy into motion. This week we chat with Bloomberg’s Head of Information Security Architecture and the Information Security Program, <a href='https://www.linkedin.com/in/philvachon/'>Phil Vachon</a>, about how they transformed their security organization with Zero Trust.</p><p> </p><p>Most interestingly though, while many organizations are just now exploring how they will start their zero trust journey, Bloomberg was ahead of the curve even before covid thrust the concept into the limelight.</p><p>“I will always say it is continuing to be a journey. It's not a destination,” said Vachon.</p>Key TakeawaysZero Trust Principles<ul><li style="font-weight:400;">Zero trust is not a new concept but has been repackaged and branded as a solid ideology.</li><li style="font-weight:400;">Zero trust involves three principles: trust but verify, assume compromise, and strong posture.</li></ul>Zero Trust Journey<ul><li style="font-weight:400;">Zero trust is a continuing journey, not a destination.</li><li style="font-weight:400;">Zero trust requires a good mindset about how to implement controls and how to reason about security architecture.</li><li style="font-weight:400;">Zero trust is not just about securing the corporate IT estate but also about securing the data center estate and the communications between components.</li></ul>Challenges in Implementing Zero Trust<ul><li style="font-weight:400;">Balancing security with usability is a challenge that must be addressed to enable a high-collaboration, low-friction workflow.</li><li style="font-weight:400;">Bloomberg leverages many SaaS services for collaboration, but they also have their own core services that are still on-premises. They focus heavily on their offerings on-premises and have a big drink-your-own champagne culture around them.</li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>Season two, episode nine: Featuring Bloomberg’s Head of Information Security Architecture and the Information Security Program, Phil Vachon.</em></p><p> </p><p><em>Catch this episode on </em><a href='https://www.youtube.com/channel/UCOTUC_MaIidzMJ7seMkj5Fg'><em>YouTube</em></a><em>, </em><a href='https://podcasts.apple.com/us/podcast/adopting-zero-trust/id1633461773'><em>Apple</em></a><em>, </em><a href='https://open.spotify.com/show/5hrfiDWuthYUQwj7wyIMzI'><em>Spotify</em></a><em>, </em><a href='https://music.amazon.com/podcasts/5572cd74-4d8a-4a7b-ac46-8cfa52a5a9fe'><em>Amazon</em></a><em>, or </em><a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fkb3B0aW5nLXplcm8tdHJ1c3QvZmVlZC54bWw'><em>Google</em></a><em>. <a href='https://www.adoptingzerotrust.com/'>You can read the show notes here</a>.</em></p><p> </p><p>What does implementing a Zero Trust strategy actually look like in an organization? Nearly a year into our podcast’s journey covering how practitioners view, define, and apply zero trust, it’s time to look under the hood at how a notable organization put its strategy into motion. This week we chat with Bloomberg’s Head of Information Security Architecture and the Information Security Program, <a href='https://www.linkedin.com/in/philvachon/'>Phil Vachon</a>, about how they transformed their security organization with Zero Trust.</p><p> </p><p>Most interestingly though, while many organizations are just now exploring how they will start their zero trust journey, Bloomberg was ahead of the curve even before covid thrust the concept into the limelight.</p><p>“I will always say it is continuing to be a journey. It's not a destination,” said Vachon.</p>Key TakeawaysZero Trust Principles<ul><li style="font-weight:400;">Zero trust is not a new concept but has been repackaged and branded as a solid ideology.</li><li style="font-weight:400;">Zero trust involves three principles: trust but verify, assume compromise, and strong posture.</li></ul>Zero Trust Journey<ul><li style="font-weight:400;">Zero trust is a continuing journey, not a destination.</li><li style="font-weight:400;">Zero trust requires a good mindset about how to implement controls and how to reason about security architecture.</li><li style="font-weight:400;">Zero trust is not just about securing the corporate IT estate but also about securing the data center estate and the communications between components.</li></ul>Challenges in Implementing Zero Trust<ul><li style="font-weight:400;">Balancing security with usability is a challenge that must be addressed to enable a high-collaboration, low-friction workflow.</li><li style="font-weight:400;">Bloomberg leverages many SaaS services for collaboration, but they also have their own core services that are still on-premises. They focus heavily on their offerings on-premises and have a big drink-your-own champagne culture around them.</li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Bitwarden: The Mighty Password</title>
			<itunes:title>Adopting Zero Trust with Bitwarden: The Mighty Password</itunes:title>
			<pubDate>Thu, 11 May 2023 09:59:00 GMT</pubDate>
			<itunes:duration>54:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F4efeece1-c69b-3857-b600-1a3143b3dec9/media.mp3" length="104735329" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/4efeece1-c69b-3857-b600-1a3143b3dec9</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-bitwarden-the-mighty-password/</link>
			<acast:episodeId>6957363e4833761f1dc89d27</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24edpkAwJLJI81TQD66cpf416xL/BVbupVT7CXvHRHKjREaPoWb3Z3mvB29ymQFzYnJxZRXlhMGyczK5r/fXAoUDA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/0e854dba788557ddc57302cfe2e32a0a.png"/>
			<description><![CDATA[<p>There’s no avoiding it, the headlines have not been kind to the ways we access systems today. Users are still using 1234, <em>password</em>, and even their dog's name. Not just using these weak passwords but also reusing them across multiple platforms, making it incredibly easy to breach someone once they’ve been caught up in a previous breach. On the vendor side, well we all know what’s happened there in the past 12 months, and now more than ever, password management platforms have growing targets on their back as high-value assets.</p><p><em> </em></p><p>But we are not here to throw rocks in the glass house nor try to dissect what goes well or goes wrong in these situations; however, we should all focus on what we can take away from them and ensure they are not repeated. This concept aligns well with Zero Trust, where we should assume systems are already breached, that your users - be it intentionally to shitpost in a discord channel or accidentally fall for a phishing lure- and we should remove as much implicit, unchecked trust as possible. At least until Skynet takes us all out, but we have a few good years ahead. </p><p><em> </em></p><p>Jokes aside, we have a great episode for you and appreciate Bitwarden lending us two of their C-suite members who cover a range of topics, including how they navigate these challenges. This week we chat with Bitwarden’s CEO Michael Crandell and Chief Customer Officer Gary Orenstein. Bitwarden offers an integrated open-source password management solution for individuals, teams, and business organizations. It also offers a self-hosted solution, which appeals to those who want greater control over their secrets.</p>Key Takeaways<ul><li style="font-weight:400;">The use of a Zero Knowledge architecture means that the company, whether cloud-hosted or self-hosted, should not be able to access sensitive information without the user's permission.</li><li style="font-weight:400;">Open-sourced solutions offer additional layers of trust as there are more eyes are on the product and can vet it for security</li><li style="font-weight:400;">Passwordless authentication is the future</li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>There’s no avoiding it, the headlines have not been kind to the ways we access systems today. Users are still using 1234, <em>password</em>, and even their dog's name. Not just using these weak passwords but also reusing them across multiple platforms, making it incredibly easy to breach someone once they’ve been caught up in a previous breach. On the vendor side, well we all know what’s happened there in the past 12 months, and now more than ever, password management platforms have growing targets on their back as high-value assets.</p><p><em> </em></p><p>But we are not here to throw rocks in the glass house nor try to dissect what goes well or goes wrong in these situations; however, we should all focus on what we can take away from them and ensure they are not repeated. This concept aligns well with Zero Trust, where we should assume systems are already breached, that your users - be it intentionally to shitpost in a discord channel or accidentally fall for a phishing lure- and we should remove as much implicit, unchecked trust as possible. At least until Skynet takes us all out, but we have a few good years ahead. </p><p><em> </em></p><p>Jokes aside, we have a great episode for you and appreciate Bitwarden lending us two of their C-suite members who cover a range of topics, including how they navigate these challenges. This week we chat with Bitwarden’s CEO Michael Crandell and Chief Customer Officer Gary Orenstein. Bitwarden offers an integrated open-source password management solution for individuals, teams, and business organizations. It also offers a self-hosted solution, which appeals to those who want greater control over their secrets.</p>Key Takeaways<ul><li style="font-weight:400;">The use of a Zero Knowledge architecture means that the company, whether cloud-hosted or self-hosted, should not be able to access sensitive information without the user's permission.</li><li style="font-weight:400;">Open-sourced solutions offer additional layers of trust as there are more eyes are on the product and can vet it for security</li><li style="font-weight:400;">Passwordless authentication is the future</li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy</title>
			<itunes:title>Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy</itunes:title>
			<pubDate>Thu, 27 Apr 2023 10:00:00 GMT</pubDate>
			<itunes:duration>57:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fd4c1b915-355a-392f-96f3-fce893f3ca54/media.mp3" length="110905428" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/d4c1b915-355a-392f-96f3-fce893f3ca54</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-empathetic-leadership-with-kyndryl-s-kris-lovejoy/</link>
			<acast:episodeId>695736414833761f1dc89dd3</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eKheRghCnl72gEipdHBFnV2zYyzXQ7zF8UHi+SqUPnf1r/Vc8u/sRrYs9R1+GBaez1w4Aargg+iboPO45pee2fg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/fc47cea859eec3de2c7a1ebe58538cbf.png"/>
			<description><![CDATA[<p>For many, cybersecurity is seen as a cost center that reduces risk to the business. This can be oversimplified to something akin to how HR reduces people-related risks but comes with layer on top of layer of complexities ranging from technology to physical buildings and, of course, people. Regardless of organizational size, cybersecurity leadership requires a top-down approach, leaving room for discussion at the board level and aligning it with business goals.</p><p>This week on AZT, Neal and I chat with <a href='https://www.linkedin.com/in/klovejoy/'>Kris Lovejoy</a>, Kyndryl’s (IBM spinoff) Global Security and Resilience Leader, former CEO of Virginia-based BluVector, and a former IBM CISO prior to being made GM of their security division. Having danced the line between startups and mega-enterprise organizations, there are few others who could so adequately discuss the role of cybersecurity leadership within modern organizations and why having a competent person at the helm is critical to the business (not just to reduce risk). We also play a bit of RSA buzzword bingo.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>For many, cybersecurity is seen as a cost center that reduces risk to the business. This can be oversimplified to something akin to how HR reduces people-related risks but comes with layer on top of layer of complexities ranging from technology to physical buildings and, of course, people. Regardless of organizational size, cybersecurity leadership requires a top-down approach, leaving room for discussion at the board level and aligning it with business goals.</p><p>This week on AZT, Neal and I chat with <a href='https://www.linkedin.com/in/klovejoy/'>Kris Lovejoy</a>, Kyndryl’s (IBM spinoff) Global Security and Resilience Leader, former CEO of Virginia-based BluVector, and a former IBM CISO prior to being made GM of their security division. Having danced the line between startups and mega-enterprise organizations, there are few others who could so adequately discuss the role of cybersecurity leadership within modern organizations and why having a competent person at the helm is critical to the business (not just to reduce risk). We also play a bit of RSA buzzword bingo.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto</title>
			<itunes:title>Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto</itunes:title>
			<pubDate>Thu, 13 Apr 2023 10:00:00 GMT</pubDate>
			<itunes:duration>39:14</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F1b1ec58c-7b56-31f4-a848-95f2a111d32c/media.mp3" length="75340116" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/1b1ec58c-7b56-31f4-a848-95f2a111d32c</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-cybersecurity-innovation-with-stanford-fellow-aj-grotto/</link>
			<acast:episodeId>695736404833761f1dc89d9e</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e4PbD/vrxoYDw9QZmzW+M3rB58yycQI+DVpy74LSk7HHcQ/47Gzqb5WBmxejXYLx0RTAG6UtE+Rt1rTwxxVkfOA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/58b4aa81d3daff6e6b5662e9f2cac417.png"/>
			<description><![CDATA[<p>For more than a decade, Zero Trust as a concept has moved from a philosophy and now into a practical architecture and strategy that organizations can adopt. While Zero Trust encapsulates much of what has gone well in cybersecurity for the past 30 years or so, does it truly offer an innovative approach or just iterative change? Is the concept positioned well so others can adapt it to their needs and prevent greater cyber-related risks? While we know it’s certainly not a silver bullet, and use cases are still reasonably immature, there is a firm argument for it helping to drive cybersecurity innovation forward.</p><p>This week on AZT, Neal and I chat with Andrew “AJ” Grotto, current Stanford University Fellow and Director of Security at Turtle Rock Studios (makers of Back 4 Blood and other popular video games). Prior to his current roles, AJ was an advisor at NIST and was the Senior Director for Cybersecurity Policy for The White House National Security Council. As a practitioner and academic who danced the line between public and private sectors, AJ is well suited to help us navigate the question of what drives innovation around cybersecurity if the federal government is behind the curve or creates chain reactions, and where policy comes into play.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>For more than a decade, Zero Trust as a concept has moved from a philosophy and now into a practical architecture and strategy that organizations can adopt. While Zero Trust encapsulates much of what has gone well in cybersecurity for the past 30 years or so, does it truly offer an innovative approach or just iterative change? Is the concept positioned well so others can adapt it to their needs and prevent greater cyber-related risks? While we know it’s certainly not a silver bullet, and use cases are still reasonably immature, there is a firm argument for it helping to drive cybersecurity innovation forward.</p><p>This week on AZT, Neal and I chat with Andrew “AJ” Grotto, current Stanford University Fellow and Director of Security at Turtle Rock Studios (makers of Back 4 Blood and other popular video games). Prior to his current roles, AJ was an advisor at NIST and was the Senior Director for Cybersecurity Policy for The White House National Security Council. As a practitioner and academic who danced the line between public and private sectors, AJ is well suited to help us navigate the question of what drives innovation around cybersecurity if the federal government is behind the curve or creates chain reactions, and where policy comes into play.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>AZT: The National Cybersecurity Strategy</title>
			<itunes:title>AZT: The National Cybersecurity Strategy</itunes:title>
			<pubDate>Thu, 23 Mar 2023 09:00:00 GMT</pubDate>
			<itunes:duration>55:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Ff7a3732f-c8eb-329c-8f38-ee6eca6f25f9/media.mp3" length="106781269" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/f7a3732f-c8eb-329c-8f38-ee6eca6f25f9</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/azt-the-national-cybersecurity-strategy/</link>
			<acast:episodeId>695736475f9b0b61aa3d888f</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e4zRJts+DqILR7avbLmSrYb3kMzyDk1SJvp1aFZXjNSn5P6A/1kojy1xDXObaBLaqfGX7c2NlkqSE4ll8FqImOg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/2ae948b5b08d3c4d74140882c05253a1.png"/>
			<description><![CDATA[<p>This week on AZT, we chat about something timely and impactful to everyone in the cybersecurity and users impacted by related decisions: the new <a href='https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/'>National Cybersecurity Strategy</a> (<a href='https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf'>full strategy here</a>). Our guests this week are Tony Scott and Ilona Cohen, both industry powerhouses and experts well-equipped to navigate this complex document.</p><p> </p><p><a href='https://www.linkedin.com/in/ilona-cohen-3094b255/'>Ilona Cohen</a> is the former General Counsel at Office of Management and Budget (OMB), was an Associate White House Counsel and Special Assistant to the President during the Obama administration, and is currently the Chief Legal Officer, Chief Policy Officer, and Corporate Secretary at HackerOne.</p><p> </p><p><a href='https://www.linkedin.com/in/tony-scott-9ab2172a/'>Tony Scott</a> is the former U.S. Federal CIO during the Obama administration, has worked for brands such as Disney and GM, and is currently the President and CEO of Intrusion.</p><p><br>Together, they both experienced the Office of Personnel Management (OPM) breach of 2015, and have been involved with the ever-shifting threat landscape that impacts and leads to new initiatives like the latest National Cybersecurity Strategy. In particular, it resulted in the <a href='https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan'>Cybersecurity National Action Plan</a>, which resulted in the first bug bounty program.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week on AZT, we chat about something timely and impactful to everyone in the cybersecurity and users impacted by related decisions: the new <a href='https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/'>National Cybersecurity Strategy</a> (<a href='https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf'>full strategy here</a>). Our guests this week are Tony Scott and Ilona Cohen, both industry powerhouses and experts well-equipped to navigate this complex document.</p><p> </p><p><a href='https://www.linkedin.com/in/ilona-cohen-3094b255/'>Ilona Cohen</a> is the former General Counsel at Office of Management and Budget (OMB), was an Associate White House Counsel and Special Assistant to the President during the Obama administration, and is currently the Chief Legal Officer, Chief Policy Officer, and Corporate Secretary at HackerOne.</p><p> </p><p><a href='https://www.linkedin.com/in/tony-scott-9ab2172a/'>Tony Scott</a> is the former U.S. Federal CIO during the Obama administration, has worked for brands such as Disney and GM, and is currently the President and CEO of Intrusion.</p><p><br>Together, they both experienced the Office of Personnel Management (OPM) breach of 2015, and have been involved with the ever-shifting threat landscape that impacts and leads to new initiatives like the latest National Cybersecurity Strategy. In particular, it resulted in the <a href='https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan'>Cybersecurity National Action Plan</a>, which resulted in the first bug bounty program.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: Open Source</title>
			<itunes:title>Adopting Zero Trust: Open Source</itunes:title>
			<pubDate>Thu, 09 Mar 2023 10:30:00 GMT</pubDate>
			<itunes:duration>58:46</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fccaaa603-4fae-3932-b10a-93fbff4fd383/media.mp3" length="112851561" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/ccaaa603-4fae-3932-b10a-93fbff4fd383</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-open-source/</link>
			<acast:episodeId>6957363c4833761f1dc89c72</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eLgjqbhFnzJ6vlGFQ4i6mX7vBEv3sPjmPOto5j+Ukny1flNS/RQqSj2oSbL9Rg+UMqz90+omhqQnMYRQKJrOPmA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/11130ebb19d77cc4c2ea3c70c4f88c7a.png"/>
			<description><![CDATA[<p>This week Neal and I continue with our exploration of new formats, and this time we go one-on-one with the Founder and CEO of Netfoundry, <a href='https://www.linkedin.com/in/gzino/'>Galeal Zino</a>. Prior to <a href='https://netfoundry.io/'>Netfoundry</a>, Zino spent much of his career traversing R&D, and later moving into a key role for Tata Communications. </p><p><br>Though Netfoundry’s bread and butter is a Zero Trust Network Access (ZTNA) solution that can be built into other technology via API and even supports IoT systems, and they also manage OpenZiti. <a href='https://docs.openziti.io/index.html'>OpenZiti</a> is an open-source self-hosted solution of a similar nature with input and contributions from Zero Trust and developer communities. Rather than honing too deep into the technology aspect, Zino and Neal go down the rabbit hole of open source tools and communities and why they are so critical to much of today’s existing security infrastructure.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week Neal and I continue with our exploration of new formats, and this time we go one-on-one with the Founder and CEO of Netfoundry, <a href='https://www.linkedin.com/in/gzino/'>Galeal Zino</a>. Prior to <a href='https://netfoundry.io/'>Netfoundry</a>, Zino spent much of his career traversing R&D, and later moving into a key role for Tata Communications. </p><p><br>Though Netfoundry’s bread and butter is a Zero Trust Network Access (ZTNA) solution that can be built into other technology via API and even supports IoT systems, and they also manage OpenZiti. <a href='https://docs.openziti.io/index.html'>OpenZiti</a> is an open-source self-hosted solution of a similar nature with input and contributions from Zero Trust and developer communities. Rather than honing too deep into the technology aspect, Zino and Neal go down the rabbit hole of open source tools and communities and why they are so critical to much of today’s existing security infrastructure.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Author George Finney: Approachable</title>
			<itunes:title>Adopting Zero Trust with Author George Finney: Approachable</itunes:title>
			<pubDate>Thu, 23 Feb 2023 10:00:00 GMT</pubDate>
			<itunes:duration>50:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F769eb13c-0886-35bd-9d21-0e28193dab73/media.mp3" length="97398613" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/769eb13c-0886-35bd-9d21-0e28193dab73</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-author-george-finney-approachable/</link>
			<acast:episodeId>69573642e3c8c736bd088f5e</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24egQbEYCIiCxJHeiBkt7+OW7EKYLlBZZulFcVJXfnLPib8KOnrucJt4t+sh7oauVMXLj0ClRmQJ+pi/0ZKoTqyAg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/7b215f0f82bc3f638f71133f8dd0224b.png"/>
			<description><![CDATA[<p>Zero Trust as a concept or strategy on the surface appears simple in nature. Heck, it’s only two words. However, when push comes to shove, and it’s time for organizational adoption, Zero Trust impacts every aspect of a business in the form of a digital transformation. Fortunately, for every complexity and question, there is an answer and solution, which is where our latest guest comes into play.</p><p>This week on Adopting Zero Trust (AZT), we chat with infosec author, practitioner, and educator George Finney about ways to make ZT more approachable. Finney is the best-selling author of Project Zero Trust, which currently offers the most approachable way to understand John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Zero Trust as a concept or strategy on the surface appears simple in nature. Heck, it’s only two words. However, when push comes to shove, and it’s time for organizational adoption, Zero Trust impacts every aspect of a business in the form of a digital transformation. Fortunately, for every complexity and question, there is an answer and solution, which is where our latest guest comes into play.</p><p>This week on Adopting Zero Trust (AZT), we chat with infosec author, practitioner, and educator George Finney about ways to make ZT more approachable. Finney is the best-selling author of Project Zero Trust, which currently offers the most approachable way to understand John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: Zero Knowledge Authority</title>
			<itunes:title>Adopting Zero Trust: Zero Knowledge Authority</itunes:title>
			<pubDate>Fri, 10 Feb 2023 11:00:00 GMT</pubDate>
			<itunes:duration>48:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fd29dcfc5-8bc0-32bf-8251-c33fde2a4738/media.mp3" length="93767517" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/d29dcfc5-8bc0-32bf-8251-c33fde2a4738</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-zero-knowledge-authority/</link>
			<acast:episodeId>6957363ac84340185be925da</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e2xk2ju9wRCMt3EyfSFLTWhLj35/NS1ndiJekrb9l85KXytRkxM7SAaVEtyd0mHgdyS0IQuV73aZKhwSEw6HGLw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/545f9b7488f3e88f04aa3ae3b6fe1a13.png"/>
			<description><![CDATA[<p>This week we have a two-for-one special and feature our newest panel-style format. On the practitioner side, we have crowd favorite Andrew Abel, who currently works with a financial institution, but has worked across multiple other industries in the past. On the Zero Trust technology side, we have <a href='https://www.linkedin.com/in/michaelloewy/'>Michael Loewy,</a> Co-Founder of <a href='https://tide.org/'>Tide Foundation</a>. </p><p>Tide Foundation lives between authentication and micro-segmentation, or if we look at <a href='https://www.cisa.gov/sites/default/files/publications/CISA%20Zero%20Trust%20Maturity%20Model_Draft.pdf'>CISA’s Foundation of Zero Trust principles</a>: identity, network/environment, and data. The solution also impacts devices and application workloads, which means they fully align with the philosophy behind Zero Trust.</p><p>On today’s episode, we ground Zero Trust back to reality with how much implicit trust can truly be removed, dig into the concept of Zero-Knowledge Authority and how it chips away at ZT gaps of today, and follow up with Abel on how ZT has changed over the past 6 months.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week we have a two-for-one special and feature our newest panel-style format. On the practitioner side, we have crowd favorite Andrew Abel, who currently works with a financial institution, but has worked across multiple other industries in the past. On the Zero Trust technology side, we have <a href='https://www.linkedin.com/in/michaelloewy/'>Michael Loewy,</a> Co-Founder of <a href='https://tide.org/'>Tide Foundation</a>. </p><p>Tide Foundation lives between authentication and micro-segmentation, or if we look at <a href='https://www.cisa.gov/sites/default/files/publications/CISA%20Zero%20Trust%20Maturity%20Model_Draft.pdf'>CISA’s Foundation of Zero Trust principles</a>: identity, network/environment, and data. The solution also impacts devices and application workloads, which means they fully align with the philosophy behind Zero Trust.</p><p>On today’s episode, we ground Zero Trust back to reality with how much implicit trust can truly be removed, dig into the concept of Zero-Knowledge Authority and how it chips away at ZT gaps of today, and follow up with Abel on how ZT has changed over the past 6 months.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust With Ismael Valenzuela: Less Trust</title>
			<itunes:title>Adopting Zero Trust With Ismael Valenzuela: Less Trust</itunes:title>
			<pubDate>Thu, 26 Jan 2023 11:00:00 GMT</pubDate>
			<itunes:duration>48:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F54629e6b-32e3-350a-b8ff-2ebf5cec8556/media.mp3" length="93666909" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/54629e6b-32e3-350a-b8ff-2ebf5cec8556</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-ismael-valenzuela-less-trust/</link>
			<acast:episodeId>695736345f9b0b61aa3d8334</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eLBqo/iv8AH9R55mB1+Qh0ThjIbGTJsNDYajcYF/98iHmoDUpt7uTwJguN54UTHQ6LXhlgGsd8DolFuDSQnqQiw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/987e75325badebd5ba59890d716e24bd.png"/>
			<description><![CDATA[<p>This week we chat with <a href='https://www.linkedin.com/in/ivalenzuela/'>Ismael Valenzuela</a>, VP of Threat Intel at Blackberry, a 13-year SANS instructor, and has balanced his time between educator and practitioner for decades. Before peppering Ismael with our usual questions and falling down the rabbit hole, we dug a bit deeper into his background and what drives him to split his time between educating peers and working for some of the biggest names in tech.</p><p>On the docket for this week is Zero Trust as a philosophy, why Less Trust is a more applicable term, and the need for a threat model to narrow down your protect surface. As a side note, Ismael also just <a href='https://blogs.blackberry.com/en/2023/01/new-blackberry-threat-intel-report'>published a new post</a> highlighting findings from BlackBerry’s new global threat intel report. The team will also discuss these findings today (Jan 26) on <a href='https://www.linkedin.com/video/event/urn:li:ugcPost:7021894516303421440/'>LinkedIn live</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week we chat with <a href='https://www.linkedin.com/in/ivalenzuela/'>Ismael Valenzuela</a>, VP of Threat Intel at Blackberry, a 13-year SANS instructor, and has balanced his time between educator and practitioner for decades. Before peppering Ismael with our usual questions and falling down the rabbit hole, we dug a bit deeper into his background and what drives him to split his time between educating peers and working for some of the biggest names in tech.</p><p>On the docket for this week is Zero Trust as a philosophy, why Less Trust is a more applicable term, and the need for a threat model to narrow down your protect surface. As a side note, Ismael also just <a href='https://blogs.blackberry.com/en/2023/01/new-blackberry-threat-intel-report'>published a new post</a> highlighting findings from BlackBerry’s new global threat intel report. The team will also discuss these findings today (Jan 26) on <a href='https://www.linkedin.com/video/event/urn:li:ugcPost:7021894516303421440/'>LinkedIn live</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust: Season One is Wrapped</title>
			<itunes:title>Adopting Zero Trust: Season One is Wrapped</itunes:title>
			<pubDate>Thu, 15 Dec 2022 10:00:00 GMT</pubDate>
			<itunes:duration>49:52</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F87e69f0d-759c-348b-a760-b9408cd04279/media.mp3" length="95768146" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/87e69f0d-759c-348b-a760-b9408cd04279</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-season-one-is-wrapped/</link>
			<acast:episodeId>6957364556c11ef409381f89</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eqAc6cnd4TJakMmPGWtnq0M7wJ86kPzTIJa9qfrGUoZC6RsmCwqPX7l/GeUkkrImnri7GxkUKq8ftCkmY/4IUUg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/9ef9ca68862266a3c8cc0eccc848bfc4.png"/>
			<description><![CDATA[<p>Welcome to the last episode of season one, where Neal and I go on a rambling adventure and look back on some of the interesting and eye-opening conversations we’ve had over the past few months. To wrap things up, and what was supposed to be a 20-minute conversation, we felt it was time to better introduce ourselves to our listeners, discuss some plans for season two, highlight perhaps some aspirations of bringing AZT into the real world at a conference or two in 2023, and that we will finally open the doors to Zero Trust technology vendors.</p><p> </p><p>Since this is our season one wrap episode, and much of what we cover is a stream of consciousness, there are no key takeaways. Swing back around in January as we kick off the next season with another group of amazing guests. We have plenty of surprises in the works, too!</p><p> </p><p>We hope your year winds down well, and we will cross our fingers for no X-mas cyber incidents.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Welcome to the last episode of season one, where Neal and I go on a rambling adventure and look back on some of the interesting and eye-opening conversations we’ve had over the past few months. To wrap things up, and what was supposed to be a 20-minute conversation, we felt it was time to better introduce ourselves to our listeners, discuss some plans for season two, highlight perhaps some aspirations of bringing AZT into the real world at a conference or two in 2023, and that we will finally open the doors to Zero Trust technology vendors.</p><p> </p><p>Since this is our season one wrap episode, and much of what we cover is a stream of consciousness, there are no key takeaways. Swing back around in January as we kick off the next season with another group of amazing guests. We have plenty of surprises in the works, too!</p><p> </p><p>We hope your year winds down well, and we will cross our fingers for no X-mas cyber incidents.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Chase Cunningham: The Doctor is in</title>
			<itunes:title>Adopting Zero Trust with Chase Cunningham: The Doctor is in</itunes:title>
			<pubDate>Tue, 22 Nov 2022 11:30:00 GMT</pubDate>
			<itunes:duration>56:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F3d42e3a8-79ad-3c55-9e70-2641cd098bee/media.mp3" length="108086110" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/3d42e3a8-79ad-3c55-9e70-2641cd098bee</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-chase-cunningham-the-doctor-is-in/</link>
			<acast:episodeId>6957363877f9435bdc53e2ac</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24erH2FwE1pm+NrrjxwSg93tv0nY0ezbn4KnUhBpxEyBo1NJ2U6FwMmEQOG6qatIifuEU7WQ3C2h/W9SNbMyQV0mw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/5c233f2ab94e971f99aeb50991ae7f1f.png"/>
			<description><![CDATA[This week we chat with <a href='https://www.linkedin.com/in/dr-chase-cunningham/'>Chase Cunningham</a>, <a href='https://podcasts.apple.com/us/podcast/drzerotrust/id1570251081'>Doctor Zero Trust</a> himself, about the decade-overnight success of Zero Trust, how he got involved with the concept, and methods for navigating vendors wanting to shape the concept. For those initiated into the world of Zero Trust, you are no doubt familiar with his podcast, regular LinkedIn musings, and history as a Forrester analyst. Beyond the podcast, Chase is the CSO for Ericom Software, has a long history in threat intel, and built a significant track record while at the NSA as a chief cryptologic technician.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This week we chat with <a href='https://www.linkedin.com/in/dr-chase-cunningham/'>Chase Cunningham</a>, <a href='https://podcasts.apple.com/us/podcast/drzerotrust/id1570251081'>Doctor Zero Trust</a> himself, about the decade-overnight success of Zero Trust, how he got involved with the concept, and methods for navigating vendors wanting to shape the concept. For those initiated into the world of Zero Trust, you are no doubt familiar with his podcast, regular LinkedIn musings, and history as a Forrester analyst. Beyond the podcast, Chase is the CSO for Ericom Software, has a long history in threat intel, and built a significant track record while at the NSA as a chief cryptologic technician.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Chris Reinhold: Pen Testing Zero Trust</title>
			<itunes:title>Adopting Zero Trust with Chris Reinhold: Pen Testing Zero Trust</itunes:title>
			<pubDate>Thu, 10 Nov 2022 05:49:48 GMT</pubDate>
			<itunes:duration>46:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F3a136a00-b752-3ae3-b31f-a387e35aafe6/media.mp3" length="88914519" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/3a136a00-b752-3ae3-b31f-a387e35aafe6</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-chris-reinhold-pen-testing-zero-trust/</link>
			<acast:episodeId>6957363a77f9435bdc53e2f3</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24ed72M6+Spw4OjZ2fKIVRjobz5yprAGA5N+wrzb0gZZkI8CaLtDgFHifTwQhswd7wp1i/oeitg8GdKCQF2q2pNfA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/9a8e0f17d2059a470bb7615fa6325d1f.png"/>
			<description><![CDATA[This week we chatted with <a href='https://www.linkedin.com/in/chrisreinhold/'>Chris Reinhold</a>, Director of Innovation at <a href='https://www.linkedin.com/company/core-bts/'>Core BTS</a>, a managed security service provider (MSSP) and IT consulting firm. We dig into the long-awaited answer to our previous call, pen testing Zero Trust systems. Plus, we chat about the idea of Zero Trust as a certification and the always relevant factoid that compliance is not security.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This week we chatted with <a href='https://www.linkedin.com/in/chrisreinhold/'>Chris Reinhold</a>, Director of Innovation at <a href='https://www.linkedin.com/company/core-bts/'>Core BTS</a>, a managed security service provider (MSSP) and IT consulting firm. We dig into the long-awaited answer to our previous call, pen testing Zero Trust systems. Plus, we chat about the idea of Zero Trust as a certification and the always relevant factoid that compliance is not security.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with J. R. Cunningham: The Moat Has Dried Up</title>
			<itunes:title>Adopting Zero Trust with J. R. Cunningham: The Moat Has Dried Up</itunes:title>
			<pubDate>Thu, 20 Oct 2022 10:15:00 GMT</pubDate>
			<itunes:duration>48:56</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F37ab2f06-c046-3914-a3a6-24b318f04e98/media.mp3" length="93966423" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/37ab2f06-c046-3914-a3a6-24b318f04e98</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-j-r-cunningham-the-moat-has-dried-up/</link>
			<acast:episodeId>695736384833761f1dc89a9a</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e6SljPtskgYwVsLfiG4ZdMLiGzhErdZALGy9c5TDyOqXltJ/I7s9LzQ9RPX4sGgetYf5EaW2kCd7vwKEvUbaYvg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/63564eb16109dc1d85c7e7fcc514a95c.png"/>
			<description><![CDATA[This week we chat with <a href='https://www.linkedin.com/in/j-r-cunningham-65a15b5/'>J. R. Cunningham</a>, Chief Security Officer at <a href='https://www.nuspire.com/'>Nuspire</a>, and we dig into Zero Trust as a journey. Nuspire is a managed security service provider that provides support ranging from managed detection and response (MDR), endpoint detection, vulnerability management, and of course supporting their customers with adopting Zero Trust. This week we chat about unpacking the idea of Zero Trust when a brand wants to pursue it, the increasing threats targeting the automotive industry, and Nuspire’s ongoing <a href='https://www.nuspire.com/resources/q2-2022-threat-report/'>threat reports</a>.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This week we chat with <a href='https://www.linkedin.com/in/j-r-cunningham-65a15b5/'>J. R. Cunningham</a>, Chief Security Officer at <a href='https://www.nuspire.com/'>Nuspire</a>, and we dig into Zero Trust as a journey. Nuspire is a managed security service provider that provides support ranging from managed detection and response (MDR), endpoint detection, vulnerability management, and of course supporting their customers with adopting Zero Trust. This week we chat about unpacking the idea of Zero Trust when a brand wants to pursue it, the increasing threats targeting the automotive industry, and Nuspire’s ongoing <a href='https://www.nuspire.com/resources/q2-2022-threat-report/'>threat reports</a>.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust With Maureen Rosado: Selling Zero Trust</title>
			<itunes:title>Adopting Zero Trust With Maureen Rosado: Selling Zero Trust</itunes:title>
			<pubDate>Thu, 06 Oct 2022 09:00:00 GMT</pubDate>
			<itunes:duration>49:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fc113d0f3-5ce1-3f2b-8847-2cf2e2921381/media.mp3" length="47558437" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/c113d0f3-5ce1-3f2b-8847-2cf2e2921381</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-maureen-rosado-selling-zero-trust/</link>
			<acast:episodeId>6957363277f9435bdc53e11a</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24efAIWO95HB26Zaacj7Zq0wo/ivgqG7f8Li5GhfTTqX7Od/bjX5UrIMCTQFZVz93LsfxAHp+4e7BCfoyH5pHI5Kw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/d2e9c5911be416f576affaaf81c3d310.png"/>
			<description><![CDATA[<p>This week we chat with Maureen Rosado, a Zero Trust Strategist for BT, who has an outstanding history of business development for enterprise companies like IBM and Microsoft. This week we break away from our norms of the technical ins and outs of Zero Trust, and take a look at the ideal way to consult and coach security teams through the process of adopting Zero Trust. </p><p>For those who have been on the receiving end of cyber security solution pitches, and there are twice as many wrong ways as those that are considered beneficial. Fortunately, Maureen has seen it all, is a wonderful example of being a neutral party, and has a long history of speaking to the subject (including recently with <a href='https://www.linkedin.com/feed/update/urn:li:activity:6967506575087341568/'>Dr Zero Trust</a>).</p><p>Get the full recap on adoptingzerotrust.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week we chat with Maureen Rosado, a Zero Trust Strategist for BT, who has an outstanding history of business development for enterprise companies like IBM and Microsoft. This week we break away from our norms of the technical ins and outs of Zero Trust, and take a look at the ideal way to consult and coach security teams through the process of adopting Zero Trust. </p><p>For those who have been on the receiving end of cyber security solution pitches, and there are twice as many wrong ways as those that are considered beneficial. Fortunately, Maureen has seen it all, is a wonderful example of being a neutral party, and has a long history of speaking to the subject (including recently with <a href='https://www.linkedin.com/feed/update/urn:li:activity:6967506575087341568/'>Dr Zero Trust</a>).</p><p>Get the full recap on adoptingzerotrust.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Christine Owen: Searching For the Finish Line</title>
			<itunes:title>Adopting Zero Trust with Christine Owen: Searching For the Finish Line</itunes:title>
			<pubDate>Thu, 22 Sep 2022 11:07:00 GMT</pubDate>
			<itunes:duration>59:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F049d9088-8096-3845-919d-d4f17d4877c8/media.mp3" length="57110047" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/049d9088-8096-3845-919d-d4f17d4877c8</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-christine-owen-searching-for-the-finish-line/</link>
			<acast:episodeId>6957363a5f9b0b61aa3d847b</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24elPH2BYFxjuLHNg9V0CYCLIyeKodNU37d6JNjJfyxnfAo66Ntlra2t14QdEWXF4QCl0LZVcSWEbG8gKsS/oj4YA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/5b2e7ca06ea7ff4df515a11b723f8636.png"/>
			<description><![CDATA[<p>This week we chat with <a href='https://www.linkedin.com/in/chowen/'>Christine Owen</a>, Director at Guidehouse, and we dig into Zero Trust as an approach to harden your identity and access management strategy, her dislike of passwords, and phishing-resistant multifactor authentification. Christine brings to the table the expertise of an IAM (identity and access management) pro and an attorney, who currently consults and educates federal departments and commercial enterprise organizations on IAM and Zero Trust.</p><p>Get the full recap on http://adoptingzerotrust.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week we chat with <a href='https://www.linkedin.com/in/chowen/'>Christine Owen</a>, Director at Guidehouse, and we dig into Zero Trust as an approach to harden your identity and access management strategy, her dislike of passwords, and phishing-resistant multifactor authentification. Christine brings to the table the expertise of an IAM (identity and access management) pro and an attorney, who currently consults and educates federal departments and commercial enterprise organizations on IAM and Zero Trust.</p><p>Get the full recap on http://adoptingzerotrust.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Lexmark’s Bryan Willett: Culture of Security</title>
			<itunes:title>Adopting Zero Trust with Lexmark’s Bryan Willett: Culture of Security</itunes:title>
			<pubDate>Thu, 08 Sep 2022 11:00:00 GMT</pubDate>
			<itunes:duration>49:27</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fcdd7a54a-0f57-3ae5-ba78-53838fd495b7/media.mp3" length="47481119" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/cdd7a54a-0f57-3ae5-ba78-53838fd495b7</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-lexmark-s-bryan-willett-culture-of-security/</link>
			<acast:episodeId>6957362f77f9435bdc53e084</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e4P44vrPN/XSzUM0xKZwyryb9tNuT9CVtStNvx8SfTfGLIeYsxGiEk9QBnUUzD5RvWdG9yTP3OpWzcVSb0jMkog==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/9fcd6166e2e7869a844ea6755d8b63fe.png"/>
			<description><![CDATA[<p>This week we chat with <a href='https://www.linkedin.com/in/bryanwillett/'>Bryan Willett</a>, <a href='https://www.lexmark.com/en_us.html'>Lexmark’s</a> CISO, who has built a legacy over the past 25 years working for the global company. Starting from his early days as a firmware developer, transitioning into managing teams and projects, and now as the CISO, Bryan has built a long-standing successful career. During our chat, we talk about how security professionals can advance their careers from protecting products and users and converting that into business language that CISOs navigate on a daily basis.</p><p>Be sure to get the full recap on adoptingzerotrust.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week we chat with <a href='https://www.linkedin.com/in/bryanwillett/'>Bryan Willett</a>, <a href='https://www.lexmark.com/en_us.html'>Lexmark’s</a> CISO, who has built a legacy over the past 25 years working for the global company. Starting from his early days as a firmware developer, transitioning into managing teams and projects, and now as the CISO, Bryan has built a long-standing successful career. During our chat, we talk about how security professionals can advance their careers from protecting products and users and converting that into business language that CISOs navigate on a daily basis.</p><p>Be sure to get the full recap on adoptingzerotrust.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Dom Glavach: Staffing Up</title>
			<itunes:title>Adopting Zero Trust with Dom Glavach: Staffing Up</itunes:title>
			<pubDate>Thu, 25 Aug 2022 12:00:00 GMT</pubDate>
			<itunes:duration>41:39</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F587ed238-996e-3d27-a513-99bba2472bcf/media.mp3" length="40207408" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/587ed238-996e-3d27-a513-99bba2472bcf</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-dom-glavach-staffing-up/</link>
			<acast:episodeId>6957363456c11ef409381afe</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e+3FQGMdqLjN1GBwWMrCIoh2XQMJ7b6Z96/gJJLQFKWhhy5Uxbt16+RPkJYXB+6OSLispCfK+a8LozVaq5h9kgA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/7c38381aca58e8931ebce308121209d1.png"/>
			<description><![CDATA[<p>This week we chat with <a href='https://www.linkedin.com/in/domglavach/'>Dom Glavach</a>, Chief Security Officer (CSO) of <a href='https://cybersn.com/'>CyberSN</a> (Cyber Security Network) and a security consultant, and we dig into Zero Trust as a journey, the delta between buzzwords and tool upgrades, and the hunt for red teams focused on prodding Zero Trust architectures. For those unfamiliar with CyberSN, they connect cybersecurity professionals to in-demand jobs and have some of the best visibility into hiring trends and how/if Zero Trust is being staffed up for.</p><p>Be sure to get the full recap on adoptingzerotrust.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week we chat with <a href='https://www.linkedin.com/in/domglavach/'>Dom Glavach</a>, Chief Security Officer (CSO) of <a href='https://cybersn.com/'>CyberSN</a> (Cyber Security Network) and a security consultant, and we dig into Zero Trust as a journey, the delta between buzzwords and tool upgrades, and the hunt for red teams focused on prodding Zero Trust architectures. For those unfamiliar with CyberSN, they connect cybersecurity professionals to in-demand jobs and have some of the best visibility into hiring trends and how/if Zero Trust is being staffed up for.</p><p>Be sure to get the full recap on adoptingzerotrust.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust With Nicolas Chaillan: From Policy to DHS</title>
			<itunes:title>Adopting Zero Trust With Nicolas Chaillan: From Policy to DHS</itunes:title>
			<pubDate>Thu, 11 Aug 2022 12:00:00 GMT</pubDate>
			<itunes:duration>44:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Ff15723e2-fd35-34b8-aa1b-2ee6f5368f11/media.mp3" length="43413531" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/f15723e2-fd35-34b8-aa1b-2ee6f5368f11</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-nicolas-chaillan-from-policy-to-dhs/</link>
			<acast:episodeId>695736354833761f1dc899d8</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24ezO0ENQy49//ujfLjx2VAxBq18FR1CH8Rdu48duvTa4HQZUprziS3uGzASq0q22H71USmIiBzlWt2rp1tTv+Dyg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/dedbc2848e995764df429f926b41c825.png"/>
			<description><![CDATA[<p>Nicolas Chaillan is an Entrepreneur who became a US citizen about six years ago, and immediately joined the DHS where he became the chief architect and special advisor for cyber, leading him to become the first chief software officer for Space Force where he led the shift to DevSecOps for DoD and at the time implementation of Zero Trust. Prior to Space Force, Nic funded 12 tech companies, they built more than 187 products, which were then sold across 45 Fortunate 500 companies. Now, in his spare time, Nic produces an ongoing series, In the Nic of Time, where he discusses everything from Zero Trust to cyber and taps into a diverse set of experts.</p><p>Be sure to get the full recap on adoptingzerotrust.com</p><p> </p><p>Takeaways From Nic and Neal</p><p>A decade ago, Iran got into federal systems, but Zero Trust would have prevented lateral movement</p><p>The days of boots-on-the-ground war is shifting towards cyber, and federal Zero Trust implementation may curb a potentially colossal attack</p><p>Beuarcacy is the largest hindrance of momentum when pursuing a cybersecurity-driven digital transformation</p><p>It’s easy to become obsolete in IT and cybersecurity, you need to educate yourself constantly</p><p>Neutral Zero Trust resources and maturity models are important, but are incredibly complex</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Nicolas Chaillan is an Entrepreneur who became a US citizen about six years ago, and immediately joined the DHS where he became the chief architect and special advisor for cyber, leading him to become the first chief software officer for Space Force where he led the shift to DevSecOps for DoD and at the time implementation of Zero Trust. Prior to Space Force, Nic funded 12 tech companies, they built more than 187 products, which were then sold across 45 Fortunate 500 companies. Now, in his spare time, Nic produces an ongoing series, In the Nic of Time, where he discusses everything from Zero Trust to cyber and taps into a diverse set of experts.</p><p>Be sure to get the full recap on adoptingzerotrust.com</p><p> </p><p>Takeaways From Nic and Neal</p><p>A decade ago, Iran got into federal systems, but Zero Trust would have prevented lateral movement</p><p>The days of boots-on-the-ground war is shifting towards cyber, and federal Zero Trust implementation may curb a potentially colossal attack</p><p>Beuarcacy is the largest hindrance of momentum when pursuing a cybersecurity-driven digital transformation</p><p>It’s easy to become obsolete in IT and cybersecurity, you need to educate yourself constantly</p><p>Neutral Zero Trust resources and maturity models are important, but are incredibly complex</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust with Ryan Alford: IoT Secured</title>
			<itunes:title>Adopting Zero Trust with Ryan Alford: IoT Secured</itunes:title>
			<pubDate>Wed, 27 Jul 2022 13:00:00 GMT</pubDate>
			<itunes:duration>47:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2Fb31075d8-1727-3d36-ad29-9b424c08ae7e/media.mp3" length="45354872" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/b31075d8-1727-3d36-ad29-9b424c08ae7e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-ryan-alford-iot-secured/</link>
			<acast:episodeId>6957362b77f9435bdc53df66</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e9n8FsT65x9A4BTPMeUMvZ2azOdd4BISwpIGjk05X9a/gwxyBH36TByCzA97Up203zOlSpnIMAWiQmJIyF3e41A==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/2162954eb6e31e72f75037d73c50dd3e.png"/>
			<description><![CDATA[<p>This week we chat with Ryan Alford, Founder and CEO of Engineering Design Group (EDG), and we dig into how Zero Trust impacts the future of hardware, software, IoT, and access (both human and machine).</p><p>EDG provides distributed sensor monitoring through a cloud-based solution and associated hardware for organizations with critical data needs. As a hardware manufacturer, that also provides software with important data sets, they have a double edge sword to consider when securing their products.</p><p>Find the transcript and video format of AZT on adoptingzerotrust.com</p><p> </p><p>Episode Takeaways</p><p>Access by contractors and third-party vendors should be highly limited, which is why solutions like VPNs do not align with Zero Trust</p><p>Through an Identity Provider (IdP) such as Okta, Microsoft, Apple, etc. you can limit access by user to specific cloud-based apps, but these solutions may not support 100% of your items out of the box (may need custom builds via API integrations).</p><p>From hardware to software, it should be assumed that nothing is fully secure and that runs under the scope that you already have been infiltrated.</p><p>There are no silver bullets in security, ever. Always verify, especially security claims, and lean on third-party validators (pen testing, security or privacy compliance, etc.)</p><p>Being transparent and honest is one of the best ways to build trust. Ryan suggests having a continuity plan that includes a vulnerability disclosure plan and a way for people to report issues.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week we chat with Ryan Alford, Founder and CEO of Engineering Design Group (EDG), and we dig into how Zero Trust impacts the future of hardware, software, IoT, and access (both human and machine).</p><p>EDG provides distributed sensor monitoring through a cloud-based solution and associated hardware for organizations with critical data needs. As a hardware manufacturer, that also provides software with important data sets, they have a double edge sword to consider when securing their products.</p><p>Find the transcript and video format of AZT on adoptingzerotrust.com</p><p> </p><p>Episode Takeaways</p><p>Access by contractors and third-party vendors should be highly limited, which is why solutions like VPNs do not align with Zero Trust</p><p>Through an Identity Provider (IdP) such as Okta, Microsoft, Apple, etc. you can limit access by user to specific cloud-based apps, but these solutions may not support 100% of your items out of the box (may need custom builds via API integrations).</p><p>From hardware to software, it should be assumed that nothing is fully secure and that runs under the scope that you already have been infiltrated.</p><p>There are no silver bullets in security, ever. Always verify, especially security claims, and lean on third-party validators (pen testing, security or privacy compliance, etc.)</p><p>Being transparent and honest is one of the best ways to build trust. Ryan suggests having a continuity plan that includes a vulnerability disclosure plan and a way for people to report issues.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust With Andrew Abel: Translating Zero Trust Into Business Concepts</title>
			<itunes:title>Adopting Zero Trust With Andrew Abel: Translating Zero Trust Into Business Concepts</itunes:title>
			<pubDate>Thu, 14 Jul 2022 02:58:37 GMT</pubDate>
			<itunes:duration>42:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/adopting-zero-trust.podbean.com%2F7f7d8aa9-ce3a-3797-82c7-58bb1ef36883/media.mp3" length="82651657" type="audio/mpeg"/>
			<guid isPermaLink="false">adopting-zero-trust.podbean.com/7f7d8aa9-ce3a-3797-82c7-58bb1ef36883</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-with-andrew-abel/</link>
			<acast:episodeId>6957363b4833761f1dc89c0a</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e8EWbTbmd4Wlu//iEU916RLvElTUmuhSSlcvXRnEdP7OHJviNESd+NokEOk+mfTltd+cpctERuji+6Kdtro63mg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/ce8e1e35ada11a5ca9eebb1bc4a14d15.png"/>
			<description><![CDATA[<p>This week we chat with Andrew Abel, our defacto Zero Trust expert who is currently the EUC Cyber Security Strategy and Architecture Lead for an energy company out of Brisbane Australia.</p><p>Andrew has been involved with Zero Trust for some time, holds Forrester’s Zero Trust certification, and has an extensive background with solutions architecture and identity management, both of which play significant roles in the adopting of Zero Trust.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week we chat with Andrew Abel, our defacto Zero Trust expert who is currently the EUC Cyber Security Strategy and Architecture Lead for an energy company out of Brisbane Australia.</p><p>Andrew has been involved with Zero Trust for some time, holds Forrester’s Zero Trust certification, and has an extensive background with solutions architecture and identity management, both of which play significant roles in the adopting of Zero Trust.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Adopting Zero Trust, Episode Zero: Let’s Make a Podcast</title>
			<itunes:title>Adopting Zero Trust, Episode Zero: Let’s Make a Podcast</itunes:title>
			<pubDate>Thu, 07 Jul 2022 14:59:20 GMT</pubDate>
			<itunes:duration>28:04</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/elliotj.podbean.com%2Ff2234058-e16b-37e2-8552-5ac6c80f3840/media.mp3" length="54223979" type="audio/mpeg"/>
			<guid isPermaLink="false">elliotj.podbean.com/f2234058-e16b-37e2-8552-5ac6c80f3840</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/adopting-zero-trust-ep-01-let-s-make-a-podcast/</link>
			<acast:episodeId>695736355f9b0b61aa3d8370</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24eHKxG3blbdfIisDGEb1LPQ1XwY1pSmagGxoLu/PyY7Jno3+umHmQbIrMnjJ7Hq9SZ4FcHge8cYCzDyxVjyLA4sw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/c08a2a99ed91627fd586b459138f58b1.png"/>
			<description><![CDATA[Today, Zero Trust is a fuzzy term with more than a dozen different definitions. Threat Analyst Neal Dennis and Cybersecurity Journalist Elliot Volkman set off on a journey to get a better understanding of Zero Trust and what it truly offers. Is Zero Trust a concept, a strategy, framework, set of technology, or perhaps a mix of each? Each episode Neal and Elliot will chat with those adopting, implementing, and pushing Zero Trust forward without the vendor hype.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Today, Zero Trust is a fuzzy term with more than a dozen different definitions. Threat Analyst Neal Dennis and Cybersecurity Journalist Elliot Volkman set off on a journey to get a better understanding of Zero Trust and what it truly offers. Is Zero Trust a concept, a strategy, framework, set of technology, or perhaps a mix of each? Each episode Neal and Elliot will chat with those adopting, implementing, and pushing Zero Trust forward without the vendor hype.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Introducing Adopting Zero Trust</title>
			<itunes:title>Introducing Adopting Zero Trust</itunes:title>
			<pubDate>Thu, 07 Jul 2022 14:19:30 GMT</pubDate>
			<itunes:duration>0:31</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6957361856c11ef40938149c/e/elliotj.podbean.com%2F0e287a43-6bb7-3705-a0e7-3793840f1403/media.mp3" length="1001224" type="audio/mpeg"/>
			<guid isPermaLink="false">elliotj.podbean.com/0e287a43-6bb7-3705-a0e7-3793840f1403</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://adopting-zero-trust.podbean.com/e/introducing-adopting-zero-trust/</link>
			<acast:episodeId>695736315f9b0b61aa3d82a3</acast:episodeId>
			<acast:showId>6957361856c11ef40938149c</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlPDfk/injkgxy9fdU5K24e+fhdQ7Fij4fJY2h7TtWC7galDxgbgaa1fcBOj/0n+/l7/0KbFtJ881kp2Swb3SeqXVTJSpraX0jQo1qbs2mRoQ==]]></acast:settings>
			<itunes:episodeType>trailer</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:image href="https://assets.pippa.io/shows/6957361856c11ef40938149c/efb410cdb75627cfe96fca12830b15fd.png"/>
			<description><![CDATA[Today, Zero Trust is a fuzzy term with more than a dozen<br>different definitions. We are on a mission to give a voice to<br>cybersecurity practitioners and others who have been in these shoes,<br>have begun adopting or implementing a Zero Trust<br>strategy, and to share their experience and insight with<br>peers while not influenced by vendor hype.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Today, Zero Trust is a fuzzy term with more than a dozen<br>different definitions. We are on a mission to give a voice to<br>cybersecurity practitioners and others who have been in these shoes,<br>have begun adopting or implementing a Zero Trust<br>strategy, and to share their experience and insight with<br>peers while not influenced by vendor hype.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Technology"/>
    </channel>
</rss>
