<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>Security Insider Conversations</title>
		<link>https://feeds.acast.com/public/shows/security-insider-conversations</link>
		<atom:link href="https://feeds.acast.com/public/shows/69792e2da40f59499ec752a3" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Microsoft</copyright>
		<itunes:keywords>cybersecurity,cyber security,Microsoft</itunes:keywords>
		<itunes:author>Microsoft Security Insider</itunes:author>
		<itunes:subtitle/>
		<itunes:summary><![CDATA[Welcome to Security Insider Conversations, your home to insights, guidance, and expertise from within the Microsoft Security ecosystem. It's not a podcast, it's a conversation.&nbsp;<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[Welcome to Security Insider Conversations, your home to insights, guidance, and expertise from within the Microsoft Security ecosystem. It's not a podcast, it's a conversation.&nbsp;<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Microsoft Security Insider</itunes:name>
			<itunes:email>info+69792e2da40f59499ec752a3@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>69792e2da40f59499ec752a3</acast:showId>
		<acast:showUrl>security-insider-conversations</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="6610cba5da0a080016302908" slug="elliot-volkman-6610cba5da0a080016302908"><![CDATA[Elliot Volkman]]></acast:network>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/cover/1769549287777-a8647bac-f00e-4467-ae91-7688c288287c.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/cover/1769549287777-a8647bac-f00e-4467-ae91-7688c288287c.jpeg</url>
				<link>https://feeds.acast.com/public/shows/security-insider-conversations</link>
				<title>Security Insider Conversations</title>
			</image>
		<item>
			<title>Modern threats demand modern discipline</title>
			<itunes:title>Modern threats demand modern discipline</itunes:title>
			<pubDate>Tue, 03 Mar 2026 10:00:00 GMT</pubDate>
			<itunes:duration>19:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/69792e2da40f59499ec752a3/e/69a1aaeb0b98e7a136b2008f/media.mp3" length="18612647" type="audio/mpeg"/>
			<guid isPermaLink="false">69a1aaeb0b98e7a136b2008f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.microsoft.com/en-us/security/security-insider/threat-landscape/modern-threat-demand-modern-discipline</link>
			<acast:episodeId>69a1aaeb0b98e7a136b2008f</acast:episodeId>
			<acast:showId>69792e2da40f59499ec752a3</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs9pHi1cZ02TuMRePj+e6yAaAVORYqvTzOKxjq5/u16k1Kuz9HRrc+XP1s9lZrjCCvbn9rit9wrPiS//NqNkLNWjT8DbNclMK/lC12uKiUfVK5v3U7tuMkuowloIyHRPZC]]></acast:settings>
			<itunes:subtitle>What it takes to run modern security operation</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1769549287777-a8647bac-f00e-4467-ae91-7688c288287c.jpeg"/>
			<description><![CDATA[<p>When looking at the far reaches of the current threat landscape, typically we articulate change through the by highlighting the most active threat actors, their tactics and techniques, and what role shifting technology plays. However, when applying this information to security strategy, resilience and operational maturity are the&nbsp;result.</p><br><p>In a recent Security Insider Conversation with Capgemini’s Vice President of Cloud and Infrastructure Services,&nbsp;<a href="https://go.microsoft.com/fwlink/?linkid=2353613" rel="noopener noreferrer" target="_blank">Mona Ghadiri</a>, the discussion moved quickly beyond novel techniques and into something more consequential: what it actually takes to run modern security operations at scale. Governance that produces proof, not paperwork. Security programs that reinforce good behavior instead of just flagging failures. And resilience that extends far beyond disaster recovery.</p><br><p>The takeaway for security leaders is straightforward: emerging technologies&nbsp;don’t&nbsp;change the fundamentals of security. They expose whether those fundamentals were strong to begin with.</p><p>Get the latest executive perspectives on the threat landscape, emerging threats, and managing cyber risks on <a href="https://www.microsoft.com/en-us/security/security-insider" rel="noopener noreferrer" target="_blank">Microsoft Security Insider</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>When looking at the far reaches of the current threat landscape, typically we articulate change through the by highlighting the most active threat actors, their tactics and techniques, and what role shifting technology plays. However, when applying this information to security strategy, resilience and operational maturity are the&nbsp;result.</p><br><p>In a recent Security Insider Conversation with Capgemini’s Vice President of Cloud and Infrastructure Services,&nbsp;<a href="https://go.microsoft.com/fwlink/?linkid=2353613" rel="noopener noreferrer" target="_blank">Mona Ghadiri</a>, the discussion moved quickly beyond novel techniques and into something more consequential: what it actually takes to run modern security operations at scale. Governance that produces proof, not paperwork. Security programs that reinforce good behavior instead of just flagging failures. And resilience that extends far beyond disaster recovery.</p><br><p>The takeaway for security leaders is straightforward: emerging technologies&nbsp;don’t&nbsp;change the fundamentals of security. They expose whether those fundamentals were strong to begin with.</p><p>Get the latest executive perspectives on the threat landscape, emerging threats, and managing cyber risks on <a href="https://www.microsoft.com/en-us/security/security-insider" rel="noopener noreferrer" target="_blank">Microsoft Security Insider</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Operationalizing security: Lessons from the Secure Future Initiative</title>
			<itunes:title>Operationalizing security: Lessons from the Secure Future Initiative</itunes:title>
			<pubDate>Fri, 27 Feb 2026 14:30:30 GMT</pubDate>
			<itunes:duration>18:51</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/69792e2da40f59499ec752a3/e/69a1aa87f0bb26c2960938f7/media.mp3" length="18102326" type="audio/mpeg"/>
			<guid isPermaLink="false">69a1aa87f0bb26c2960938f7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.microsoft.com/en-us/security/security-insider/risk-management/sfi-insights-for-modern-security-ops</link>
			<acast:episodeId>69a1aa87f0bb26c2960938f7</acast:episodeId>
			<acast:showId>69792e2da40f59499ec752a3</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs9pHi1cZ02TuMRePj+e6yAaAVORYqvTzOKxjq5/u16k2DsBzAUGHNH830BSVm9vIqeVpToFXkP4NMKEnRDVyfSnceQVOQggSknvjVJ4WGEdq2e+1kAdlKwNZnhZO0ErX3]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1769549287777-a8647bac-f00e-4467-ae91-7688c288287c.jpeg"/>
			<description><![CDATA[<p>Security transformation is measured in execution, not in policies. In November 2025, Microsoft published its latest Secure Future Initiative (SFI)&nbsp;<a href="https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative/sfi-progress-report-november-2025" rel="noopener noreferrer" target="_blank">Progress Report</a>, outlining measurable progress across engineering, governance, and cultural accountability.</p><br><p>The report details 28 objectives, risk reduction efforts, and governance alignment across the company. In a recent Security Insider Conversations interview we sat down with leaders directly involved in shaping and operationalizing SFI to unpack what those numbers represent in practice.&nbsp;</p><p>Get the latest executive perspectives on the threat landscape, emerging threats, and managing cyber risks on <a href="https://www.microsoft.com/en-us/security/security-insider" rel="noopener noreferrer" target="_blank">Microsoft Security Insider</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Security transformation is measured in execution, not in policies. In November 2025, Microsoft published its latest Secure Future Initiative (SFI)&nbsp;<a href="https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative/sfi-progress-report-november-2025" rel="noopener noreferrer" target="_blank">Progress Report</a>, outlining measurable progress across engineering, governance, and cultural accountability.</p><br><p>The report details 28 objectives, risk reduction efforts, and governance alignment across the company. In a recent Security Insider Conversations interview we sat down with leaders directly involved in shaping and operationalizing SFI to unpack what those numbers represent in practice.&nbsp;</p><p>Get the latest executive perspectives on the threat landscape, emerging threats, and managing cyber risks on <a href="https://www.microsoft.com/en-us/security/security-insider" rel="noopener noreferrer" target="_blank">Microsoft Security Insider</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Secure by Design in Practice</title>
			<itunes:title>Secure by Design in Practice</itunes:title>
			<pubDate>Fri, 30 Jan 2026 16:02:33 GMT</pubDate>
			<itunes:duration>34:58</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/69792e2da40f59499ec752a3/e/697cd60b65942209535537a5/media.mp3" length="33577279" type="audio/mpeg"/>
			<guid isPermaLink="false">697cd60b65942209535537a5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.microsoft.com/en-us/security/security-insider/threat-landscape/IBM-on-secure-by-design</link>
			<acast:episodeId>697cd60b65942209535537a5</acast:episodeId>
			<acast:showId>69792e2da40f59499ec752a3</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs9pHi1cZ02TuMRePj+e6yAaAVORYqvTzOKxjq5/u16k1bisaCZV82PLn4exyhruQsUZyr2ijIbKNRjGMdvqX/YVxS42sx0prBoTeH4iaLDEGvqTXe/IoTqzPwGyBLmvUE]]></acast:settings>
			<itunes:subtitle>A conversation with IBM on risk, AI, and resilience</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1769549287777-a8647bac-f00e-4467-ae91-7688c288287c.jpeg"/>
			<description><![CDATA[<p><br></p><p>As organizations move quickly to adopt AI, security leaders are facing a familiar challenge in a new form: how to innovate at speed without increasing risk. At Microsoft Ignite, we sat down with our partners at IBM to talk candidly about what Secure by Design looks like in practice,&nbsp;and why it’s becoming a foundational expectation&nbsp;beyond its previous buzzword status.</p><br><p>This conversation&nbsp;is&nbsp;about how organizations need to change their&nbsp;mindset, culture, and the real-world tradeoffs security and business leaders are navigating as AI becomes embedded across the enterprise.&nbsp;All of which stems from IBM’s Institute for Business value’s&nbsp;most recent paper&nbsp;<a href="https://go.microsoft.com/fwlink/?linkid=2347935" rel="noopener noreferrer" target="_blank"><em>Secure by design, smarter with AI</em></a>.</p><br><p>“AI doesn’t fundamentally change the fact that security is a cat-and-mouse game,&nbsp;but it does make that game move much faster,” said&nbsp;Srini&nbsp;Tummalapenta, co-author of&nbsp;the&nbsp;new&nbsp;paper and&nbsp;Distinguished Engineer &amp; CTO IBM Security Services.</p><p>Get the latest executive perspectives on the threat landscape, emerging threats, and managing cyber risks on <a href="https://www.microsoft.com/en-us/security/security-insider" rel="noopener noreferrer" target="_blank">Microsoft Security Insider</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><br></p><p>As organizations move quickly to adopt AI, security leaders are facing a familiar challenge in a new form: how to innovate at speed without increasing risk. At Microsoft Ignite, we sat down with our partners at IBM to talk candidly about what Secure by Design looks like in practice,&nbsp;and why it’s becoming a foundational expectation&nbsp;beyond its previous buzzword status.</p><br><p>This conversation&nbsp;is&nbsp;about how organizations need to change their&nbsp;mindset, culture, and the real-world tradeoffs security and business leaders are navigating as AI becomes embedded across the enterprise.&nbsp;All of which stems from IBM’s Institute for Business value’s&nbsp;most recent paper&nbsp;<a href="https://go.microsoft.com/fwlink/?linkid=2347935" rel="noopener noreferrer" target="_blank"><em>Secure by design, smarter with AI</em></a>.</p><br><p>“AI doesn’t fundamentally change the fact that security is a cat-and-mouse game,&nbsp;but it does make that game move much faster,” said&nbsp;Srini&nbsp;Tummalapenta, co-author of&nbsp;the&nbsp;new&nbsp;paper and&nbsp;Distinguished Engineer &amp; CTO IBM Security Services.</p><p>Get the latest executive perspectives on the threat landscape, emerging threats, and managing cyber risks on <a href="https://www.microsoft.com/en-us/security/security-insider" rel="noopener noreferrer" target="_blank">Microsoft Security Insider</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The 10 Security Decisions That Matter Most in 2026</title>
			<itunes:title>The 10 Security Decisions That Matter Most in 2026</itunes:title>
			<pubDate>Tue, 27 Jan 2026 21:37:20 GMT</pubDate>
			<itunes:duration>16:09</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/69792e2da40f59499ec752a3/e/69793010a40f59499ec7e646/media.mp3" length="15509328" type="audio/mpeg"/>
			<guid isPermaLink="false">69793010a40f59499ec7e646</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.microsoft.com/en-us/security/security-insider/threat-landscape/10-essential-insights-from-the-microsoft-digital-defense-report-2025</link>
			<acast:episodeId>69793010a40f59499ec7e646</acast:episodeId>
			<acast:showId>69792e2da40f59499ec752a3</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs9pHi1cZ02TuMRePj+e6yAaAVORYqvTzOKxjq5/u16k2lvU2s2AbnRg/euMTXxwVTBrBcRHpebBawlGjKziIUbaDEuKyilc9BKNxZ1XQCNEnA/sK7tLNB6BVLotAbIjrq]]></acast:settings>
			<itunes:subtitle>Takeaways from the Digital Defense Report</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1769549287777-a8647bac-f00e-4467-ae91-7688c288287c.jpeg"/>
			<description><![CDATA[<p>Every year, the&nbsp;<a href="https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025" rel="noopener noreferrer" target="_blank">Microsoft Digital Defense Report</a>&nbsp;synthesizes signals, research, and frontline experience from across Microsoft’s global security ecosystem. Like years past, Microsoft Threat Intelligence identifies several themes that security teams should make themselves aware of, and more importantly, our recommendations on how to best address them.</p><br><p>As part of the report we sat down with Chloé Messdaghi, one of the architects behind the report, who explains not just what defenders are up against, but how leaders should respond. Below, we break down each recommendation and what it means in practice for security leaders navigating 2025.</p><br><p>To gain more insights into the threat landscape, read the full&nbsp;<a href="https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025" rel="noopener noreferrer" target="_blank">Digital Defense Report</a>&nbsp;or the&nbsp;<a href="https://go.microsoft.com/fwlink/?linkid=2339002" rel="noopener noreferrer" target="_blank">CISO executive summary</a>.</p><p>Get the latest executive perspectives on the threat landscape, emerging threats, and managing cyber risks on <a href="https://www.microsoft.com/en-us/security/security-insider" rel="noopener noreferrer" target="_blank">Microsoft Security Insider</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Every year, the&nbsp;<a href="https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025" rel="noopener noreferrer" target="_blank">Microsoft Digital Defense Report</a>&nbsp;synthesizes signals, research, and frontline experience from across Microsoft’s global security ecosystem. Like years past, Microsoft Threat Intelligence identifies several themes that security teams should make themselves aware of, and more importantly, our recommendations on how to best address them.</p><br><p>As part of the report we sat down with Chloé Messdaghi, one of the architects behind the report, who explains not just what defenders are up against, but how leaders should respond. Below, we break down each recommendation and what it means in practice for security leaders navigating 2025.</p><br><p>To gain more insights into the threat landscape, read the full&nbsp;<a href="https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025" rel="noopener noreferrer" target="_blank">Digital Defense Report</a>&nbsp;or the&nbsp;<a href="https://go.microsoft.com/fwlink/?linkid=2339002" rel="noopener noreferrer" target="_blank">CISO executive summary</a>.</p><p>Get the latest executive perspectives on the threat landscape, emerging threats, and managing cyber risks on <a href="https://www.microsoft.com/en-us/security/security-insider" rel="noopener noreferrer" target="_blank">Microsoft Security Insider</a>.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Technology"/>
    </channel>
</rss>
