<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>re:invent security</title>
		<link>https://shows.acast.com/reinvent-security</link>
		<atom:link href="https://feeds.acast.com/public/shows/65dca498fe0966001661def9" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Jeroen Prinse / Irfaan Santoe</copyright>
		<itunes:keywords>tech,Jeroen Prinse,Irfaan Santoe, AI,security,CISO,information security,artificial intelligence,reinvent security</itunes:keywords>
		<itunes:author>Jeroen Prinse / Irfaan Santoe</itunes:author>
		<itunes:subtitle>Dissecting the field of information security</itunes:subtitle>
		<itunes:summary><![CDATA[<p><strong>re:invent security</strong> is a podcast where we, on a monthly basis, learn from industry leaders how they reinvented security and how you can turn their experiences into action. Join us as we chat with inspiring information security professionals, dissecting the field of information security and its developments. Because when an episode ends, the real question begins: 'What will you do differently tomorrow?' Let's reinvent our field, one strategy at a time.</p><br><p><strong>re:invent security</strong> is hosted by Jeroen Prinse and Irfaan Santoe.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[<p><strong>re:invent security</strong> is a podcast where we, on a monthly basis, learn from industry leaders how they reinvented security and how you can turn their experiences into action. Join us as we chat with inspiring information security professionals, dissecting the field of information security and its developments. Because when an episode ends, the real question begins: 'What will you do differently tomorrow?' Let's reinvent our field, one strategy at a time.</p><br><p><strong>re:invent security</strong> is hosted by Jeroen Prinse and Irfaan Santoe.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Karel Zegers</itunes:name>
			<itunes:email>karel@newtreemedia.nl</itunes:email>
		</itunes:owner>
		<acast:showId>65dca498fe0966001661def9</acast:showId>
		<acast:showUrl>reinvent-security</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmU13c0otUap75NIyVufnZVBoBcFwz3Y0zGA/pFjpP70+3oZt3+5O3uX8mfQZWzV35Kby8OfdHfDJlQAYxij1gc0J63rxgoMm4loq58gBzd9i]]></acast:settings>
        <acast:network id="65dc6fc96f9412001656f8fa" slug="karel-zegers-65dc6fc96f9412001656f8fa"><![CDATA[New Tree Media]]></acast:network>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg</url>
				<link>https://shows.acast.com/reinvent-security</link>
				<title>re:invent security</title>
			</image>
		<item>
			<title>Kay Behnke (Genmab): “Lessons from building three global security teams”</title>
			<itunes:title>Kay Behnke (Genmab): “Lessons from building three global security teams”</itunes:title>
			<pubDate>Thu, 30 Oct 2025 05:00:00 GMT</pubDate>
			<itunes:duration>47:02</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/6900c03e91e8d679a0560443/media.mp3" length="112909582" type="audio/mpeg"/>
			<guid isPermaLink="false">6900c03e91e8d679a0560443</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/kay-behnke-genmab-lessons-from-building-three-global-securit</link>
			<acast:episodeId>6900c03e91e8d679a0560443</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>kay-behnke-genmab-lessons-from-building-three-global-securit</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOoTjxUswovElWSAwU51IpaIGPU2ipxevTi8GHkc+nppE3VLpCdP+ToMcDFlJD+R39qfwCZW8OK38q3IHcl+ns+D]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>18</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>In this episode of re:invent security, hosts Jeroen Prinse and Irfaan Santoe sit down with Kay Behnke, CISO at Genmab. Kay has built security organizations in three very different global companies: NXP, FrieslandCampina, and Genmab. Spanning tech, food, and life sciences. Drawing from more than 20 years of experience, he reflects on how building a security team has evolved over time and what’s stayed the same.</p><br><p>Together, they unpack what it really takes to design security functions that scale, how to balance culture and compliance across geographies, and the hard lessons learned from doing it three times.</p><br><p>Whether you’re starting your first security organization or rethinking a mature one, this candid conversation offers timeless insights into the craft of building teams that endure and adapt. Tune in and ask yourself: What will you do differently tomorrow?</p><br><p>Chapters:</p><p>00:00 - 00:47 - Intro snippets</p><p>00:48 - 02:59 – Introduction of the episode and Kay</p><p>03:00 - 07:38 – How has Kay seen the reinvention of security during two decades?</p><p>07:39 - 11:27 – What was it like building a security organization two decades ago?</p><p>11:28 - 14:37 – What is the difference in building security organizations in three different industries?</p><p>14:38 - 17:48 – What is one thing you would recommend doing when changing industries?</p><p>17:49 - 21:15 – How did company culture Kay’s security approach?</p><p>21:16 - 24:43 – Is local presence needed for execution on the security program?</p><p>24:44 - 30:22 – What is the first role or capability you would start with?</p><p>30:23 - 33:58 — A security leader should listen to the needs of others</p><p>33:59 - 37:53 – How did the way boards act in the last 20 years?</p><p>37:54 - 41:08 – You need to understand the business and its processes.</p><p>41:09 - 46:03 – Key takeaways Irfaan and Jeroen</p><p>46:04 - 47:03 - Outro</p><br><p>Resources &amp; Mentions:</p><p>CISO Mind Map - https://rafeeqrehman.com/wp-</p><p>content/uploads/2025/03/CISO_MindMap_2025.pdf</p><br><p>Daniel Pink 'Drive' - Dan Pink is one of my favorite authors who pushes you to look into the mirror;</p><p>this is a book that you wanted to read at the begin of your career</p><br><p>Peter Hinssen 'The Uncertainty Principle' - another favorite author of me; there are several</p><p>keynotes on YouTube (he probably holds the world record in slides per minute) and well known by</p><p>"The New Normal" this book is about the future and how we can and need to deal with uncertainty</p><p>and disruption</p><br><p>Daniel Kahneman 'Thinking Fast and Slow' - for everyone who is building a security awareness</p><p>campaign a MUST read</p><br><p>Andrej Karpathy 'Deep Dive into LLMs like ChatGPT' - if you have time then you should watch this</p><p>video since it provides you surprising insights about how LLM models work</p><br><p>Graham Cluley 'Smashing Security' - finally s.th. about information securty; the weekly podcast for</p><p>the lunch walk with your dog</p><br><p>Connect with Kay: https://www.linkedin.com/in/kbehnke/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of re:invent security, hosts Jeroen Prinse and Irfaan Santoe sit down with Kay Behnke, CISO at Genmab. Kay has built security organizations in three very different global companies: NXP, FrieslandCampina, and Genmab. Spanning tech, food, and life sciences. Drawing from more than 20 years of experience, he reflects on how building a security team has evolved over time and what’s stayed the same.</p><br><p>Together, they unpack what it really takes to design security functions that scale, how to balance culture and compliance across geographies, and the hard lessons learned from doing it three times.</p><br><p>Whether you’re starting your first security organization or rethinking a mature one, this candid conversation offers timeless insights into the craft of building teams that endure and adapt. Tune in and ask yourself: What will you do differently tomorrow?</p><br><p>Chapters:</p><p>00:00 - 00:47 - Intro snippets</p><p>00:48 - 02:59 – Introduction of the episode and Kay</p><p>03:00 - 07:38 – How has Kay seen the reinvention of security during two decades?</p><p>07:39 - 11:27 – What was it like building a security organization two decades ago?</p><p>11:28 - 14:37 – What is the difference in building security organizations in three different industries?</p><p>14:38 - 17:48 – What is one thing you would recommend doing when changing industries?</p><p>17:49 - 21:15 – How did company culture Kay’s security approach?</p><p>21:16 - 24:43 – Is local presence needed for execution on the security program?</p><p>24:44 - 30:22 – What is the first role or capability you would start with?</p><p>30:23 - 33:58 — A security leader should listen to the needs of others</p><p>33:59 - 37:53 – How did the way boards act in the last 20 years?</p><p>37:54 - 41:08 – You need to understand the business and its processes.</p><p>41:09 - 46:03 – Key takeaways Irfaan and Jeroen</p><p>46:04 - 47:03 - Outro</p><br><p>Resources &amp; Mentions:</p><p>CISO Mind Map - https://rafeeqrehman.com/wp-</p><p>content/uploads/2025/03/CISO_MindMap_2025.pdf</p><br><p>Daniel Pink 'Drive' - Dan Pink is one of my favorite authors who pushes you to look into the mirror;</p><p>this is a book that you wanted to read at the begin of your career</p><br><p>Peter Hinssen 'The Uncertainty Principle' - another favorite author of me; there are several</p><p>keynotes on YouTube (he probably holds the world record in slides per minute) and well known by</p><p>"The New Normal" this book is about the future and how we can and need to deal with uncertainty</p><p>and disruption</p><br><p>Daniel Kahneman 'Thinking Fast and Slow' - for everyone who is building a security awareness</p><p>campaign a MUST read</p><br><p>Andrej Karpathy 'Deep Dive into LLMs like ChatGPT' - if you have time then you should watch this</p><p>video since it provides you surprising insights about how LLM models work</p><br><p>Graham Cluley 'Smashing Security' - finally s.th. about information securty; the weekly podcast for</p><p>the lunch walk with your dog</p><br><p>Connect with Kay: https://www.linkedin.com/in/kbehnke/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Patric Versteeg (Heerema): Lead From Within — Personal Leadership for CISOs, Teams & Boards]]></title>
			<itunes:title><![CDATA[Patric Versteeg (Heerema): Lead From Within — Personal Leadership for CISOs, Teams & Boards]]></itunes:title>
			<pubDate>Thu, 25 Sep 2025 04:00:00 GMT</pubDate>
			<itunes:duration>52:01</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/68cc64902cc152f4ddb7e53b/media.mp3" length="124844407" type="audio/mpeg"/>
			<guid isPermaLink="false">68cc64902cc152f4ddb7e53b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/patric-versteeg-heerema-lead-from-within-personal-leadership</link>
			<acast:episodeId>68cc64902cc152f4ddb7e53b</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>patric-versteeg-heerema-lead-from-within-personal-leadership</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOrvglFljusCV6MsZ3FHTS3mh5AdFP+qYS2E7xoocoJb1ck0PUO8R+RvJeqJryh8J0WMB40CZXXg3tS7nzSPMFtL]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>17</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>In this episode of re-invent security, we sit down with Patric Versteeg, European CISO of the Year 2024, to unpack the “inner game” of cybersecurity leadership. Patric argues that real change isn’t about putting on a new mask—it’s about returning to your core values and installing “compensating controls” for your own behaviors under stress. From building mixed, high-trust teams to shaping board-level narratives that actually land, he shares pragmatic tools you can use tomorrow.</p><br><p>You’ll hear how Patric:</p><br><p>- Builds resilient teams using a diverse mix of working styles (not clones), clear outcomes over micromanagement, and a “beekeeper” approach that lets experts do their best work.</p><br><p>- Protects team energy by addressing brilliant-but-low-trust outliers—even when they’re top individual performers.</p><br><p>- Wins the boardroom without needing a board seat, by fitting the message to culture: financial exposure, reputational stakes, or license-to-operate.</p><br><p>- Quantifies risk simply (people × internal hourly rate × downtime days) to make funding decisions straightforward.</p><br><p>- Manages himself in a crisis, using quick breathing resets when meditation isn’t practical, and embracing mentors/coaches for sustained growth.</p><br><p>- Frames board reporting around three questions: Are we compliant? Are we at risk? Did we have any material breaches?—and shows risk trends visually over time.</p><br><p>Chapters:</p><p>00:00 - 02:55 Introduction </p><p>02:56 - 05:34 The "Inner Game" of Leadership</p><p>05:35 - 13:32 The Definition of Personal Leadership in Cyber Security</p><p>13:33 -15:54 Building the Right Team: Diversity is Key</p><p>15:55 - 19:05 Leadership Style: Trust and Result-Oriented</p><p>19:06 - 25:54 The "Beekeeper" Philosophy and Hiring Smarter People</p><p>25:55 - 26:56 Definition of a "High-Performance Team"</p><p>26:57 - 31:16 Boardroom Communication: From Fear-Mongering to Business Risk</p><p>31:17 - 39:51 What the Board Truly Wants to Know (3 Core Questions)</p><p>39:52 - 41:10 Cybersecurity as a Feeling: The Human Connection</p><p>41:11 - 46:20 Advice for Aspiring CISOs &amp; Leadership Development</p><p>46:21 - 52:01 Wrap-up</p><br><p>Resources &amp; Mentions:</p><p>Book: True North — Bill George https://billgeorge.org/book/true-north/</p><p>Book: Surrounded by Idiots — Thomas Erikson (red/yellow/blue/green styles)</p><p>Metaphor/Book (Dutch): De Bijherder (The Beekeeper)</p><p>Community: NextGen CISO Network (mentoring/coaching): https://nextgenciso.nl/Home/</p><p>Inspiration: Man in the Mirror — Michael Jackson (self-reflection theme)</p><p>Thinkers: Simon Sinek; Brené Brown (trust, courage, vulnerability)</p><p>Practice: Visual risk-trend infographics for board updates (quarterly)</p><br><p>Connect with Patric: https://www.linkedin.com/in/pjmversteeg/ </p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of re-invent security, we sit down with Patric Versteeg, European CISO of the Year 2024, to unpack the “inner game” of cybersecurity leadership. Patric argues that real change isn’t about putting on a new mask—it’s about returning to your core values and installing “compensating controls” for your own behaviors under stress. From building mixed, high-trust teams to shaping board-level narratives that actually land, he shares pragmatic tools you can use tomorrow.</p><br><p>You’ll hear how Patric:</p><br><p>- Builds resilient teams using a diverse mix of working styles (not clones), clear outcomes over micromanagement, and a “beekeeper” approach that lets experts do their best work.</p><br><p>- Protects team energy by addressing brilliant-but-low-trust outliers—even when they’re top individual performers.</p><br><p>- Wins the boardroom without needing a board seat, by fitting the message to culture: financial exposure, reputational stakes, or license-to-operate.</p><br><p>- Quantifies risk simply (people × internal hourly rate × downtime days) to make funding decisions straightforward.</p><br><p>- Manages himself in a crisis, using quick breathing resets when meditation isn’t practical, and embracing mentors/coaches for sustained growth.</p><br><p>- Frames board reporting around three questions: Are we compliant? Are we at risk? Did we have any material breaches?—and shows risk trends visually over time.</p><br><p>Chapters:</p><p>00:00 - 02:55 Introduction </p><p>02:56 - 05:34 The "Inner Game" of Leadership</p><p>05:35 - 13:32 The Definition of Personal Leadership in Cyber Security</p><p>13:33 -15:54 Building the Right Team: Diversity is Key</p><p>15:55 - 19:05 Leadership Style: Trust and Result-Oriented</p><p>19:06 - 25:54 The "Beekeeper" Philosophy and Hiring Smarter People</p><p>25:55 - 26:56 Definition of a "High-Performance Team"</p><p>26:57 - 31:16 Boardroom Communication: From Fear-Mongering to Business Risk</p><p>31:17 - 39:51 What the Board Truly Wants to Know (3 Core Questions)</p><p>39:52 - 41:10 Cybersecurity as a Feeling: The Human Connection</p><p>41:11 - 46:20 Advice for Aspiring CISOs &amp; Leadership Development</p><p>46:21 - 52:01 Wrap-up</p><br><p>Resources &amp; Mentions:</p><p>Book: True North — Bill George https://billgeorge.org/book/true-north/</p><p>Book: Surrounded by Idiots — Thomas Erikson (red/yellow/blue/green styles)</p><p>Metaphor/Book (Dutch): De Bijherder (The Beekeeper)</p><p>Community: NextGen CISO Network (mentoring/coaching): https://nextgenciso.nl/Home/</p><p>Inspiration: Man in the Mirror — Michael Jackson (self-reflection theme)</p><p>Thinkers: Simon Sinek; Brené Brown (trust, courage, vulnerability)</p><p>Practice: Visual risk-trend infographics for board updates (quarterly)</p><br><p>Connect with Patric: https://www.linkedin.com/in/pjmversteeg/ </p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Laurens Jagt (CSD) & Medea de Jong (Sonepar): “Build cyber security teams that actually thrive”]]></title>
			<itunes:title><![CDATA[Laurens Jagt (CSD) & Medea de Jong (Sonepar): “Build cyber security teams that actually thrive”]]></itunes:title>
			<pubDate>Thu, 31 Jul 2025 04:00:00 GMT</pubDate>
			<itunes:duration>59:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/6880f14dfd9acfeba4ded51c/media.mp3" length="143430007" type="audio/mpeg"/>
			<guid isPermaLink="false">6880f14dfd9acfeba4ded51c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/laurens-jagt-csd-medea-de-jong-sonepar-build-cyber-security</link>
			<acast:episodeId>6880f14dfd9acfeba4ded51c</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>laurens-jagt-csd-medea-de-jong-sonepar-build-cyber-security</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdaJqcMnYaeXx9y/EL2+8E39LP9kUVIqwrI9ZaQWD0gFATB5P00hMccTycEBpGRwdf5lGAR+mlWQxMqAJR4l4qvDHJIOi6l9dvxOyLuQxNM71POlj5gzoEz3KZgZYeKvr0KkSHng82OSojKrxvLRkgsL6k0qGMGUt1QMbNKu8w3UIj8qKmu71GlHPdC8S9p5JncP8WT5rU+rOzfpKaFokhZmC6yNC1NFAOplG/32Ts9pIg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>16</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>In this episode of re:invent security, hosts Jeroen Prinse and Irfaan Santoe sit down with two cybersecurity leaders tackling the talent gap from opposite directions. Laurens Jagt, founder of Cyber Security District, is building one of Europe’s most vibrant security communities—mentoring and guiding professionals at every stage of their career. Medea de Jong, Global CISO at Sonepar, brings the inside view of what it takes to lead, grow, and keep effective security teams in highly regulated industries.</p><br><p>Together, they explore what’s broken in how we hire, why job descriptions miss the mark, how to spot hidden talent, and what it really takes to build security teams that stick. Whether you’re building your first team or reshaping a mature one, this candid conversation is packed with insights you can act on tomorrow.</p><br><p>Tune in and ask yourself: What will you do differently tomorrow?</p><br><p>Chapters:</p><p>00:00 - 03:33 - Introduction</p><p>03:33 - 07:09 - How do Medea and Laurens see reinventing the field?</p><p>07:10 - 08:22 - Are soft skills more important then certificates?</p><p>08:23 - 10:07 - What is more difficult: finding or retaining talent?</p><p>10:08 - 19:01 - What is the new generation looking for?</p><p>19:02 - 24:46 - Should we take more risk on new or transitioning talent?</p><p>24:45 - 31:04 - What is going wrong with our job descriptions?</p><p>31:05 - 34:49 - Should development be driven by the organization or the professional?</p><p>34:50 - 43:19 - Talking to the board on team development</p><p>43:20 - 45:21 - What’s one example of a development program that works?</p><p>45:22 - 47:52 - Are we looking for talent in the right places?</p><p>47:53 - 51:14 - What makes a transition into the cyber security field work?</p><p>51:15 - 53:56 - Building a brand new security team</p><p>53:57 - 58:09 - Key take aways Irfaan and Jeroen</p><p>58:10- 59:45 - Outro</p><br><p>Resources:</p><p>1. TierPoint – Building Your Cybersecurity Team (2025)</p><p>Link: https://www.tierpoint.com/blog/cybersecurity-team</p><br><p>A practical guide for building an effective cybersecurity team, covering roles, strategies, and policy foundations. Ideal for modern organizations aiming to be scalable and agile.</p><br><p>2. TechTarget – Maximize Business Impact with the Right Security Team</p><p>Link: https://www.techtarget.com/searchsecurity/tip/How-to-build-a-cybersecurity-team-to-maximize-business-impact</p><br><p>This article explores how the right team structure directly influences risk reduction, operational efficiency, and talent retention. Especially relevant for security leaders and HR decision-makers.</p><br><p>3. Airiam – 14 Strategies for Building Cyber-Resilient Teams</p><p>Link: https://airiam.com/blog/building-cyber-resilient-teams</p><br><p>A clear and actionable blog post offering 14 strategies to enhance team culture, training, and awareness within cybersecurity teams. Useful for leaders looking to strengthen team dynamics.</p><br><p>4. ISACA - State of Cybersecurity 2024 report</p><p>Link: https://www.isaca.org/resources/reports/state-of-cybersecurity-2024</p><br><p>Connect with Media: https://www.linkedin.com/in/medea-de-jong-aa1b771/</p><p>Connect with Laurens: https://www.linkedin.com/in/laurensjagt/</p><p> </p><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of re:invent security, hosts Jeroen Prinse and Irfaan Santoe sit down with two cybersecurity leaders tackling the talent gap from opposite directions. Laurens Jagt, founder of Cyber Security District, is building one of Europe’s most vibrant security communities—mentoring and guiding professionals at every stage of their career. Medea de Jong, Global CISO at Sonepar, brings the inside view of what it takes to lead, grow, and keep effective security teams in highly regulated industries.</p><br><p>Together, they explore what’s broken in how we hire, why job descriptions miss the mark, how to spot hidden talent, and what it really takes to build security teams that stick. Whether you’re building your first team or reshaping a mature one, this candid conversation is packed with insights you can act on tomorrow.</p><br><p>Tune in and ask yourself: What will you do differently tomorrow?</p><br><p>Chapters:</p><p>00:00 - 03:33 - Introduction</p><p>03:33 - 07:09 - How do Medea and Laurens see reinventing the field?</p><p>07:10 - 08:22 - Are soft skills more important then certificates?</p><p>08:23 - 10:07 - What is more difficult: finding or retaining talent?</p><p>10:08 - 19:01 - What is the new generation looking for?</p><p>19:02 - 24:46 - Should we take more risk on new or transitioning talent?</p><p>24:45 - 31:04 - What is going wrong with our job descriptions?</p><p>31:05 - 34:49 - Should development be driven by the organization or the professional?</p><p>34:50 - 43:19 - Talking to the board on team development</p><p>43:20 - 45:21 - What’s one example of a development program that works?</p><p>45:22 - 47:52 - Are we looking for talent in the right places?</p><p>47:53 - 51:14 - What makes a transition into the cyber security field work?</p><p>51:15 - 53:56 - Building a brand new security team</p><p>53:57 - 58:09 - Key take aways Irfaan and Jeroen</p><p>58:10- 59:45 - Outro</p><br><p>Resources:</p><p>1. TierPoint – Building Your Cybersecurity Team (2025)</p><p>Link: https://www.tierpoint.com/blog/cybersecurity-team</p><br><p>A practical guide for building an effective cybersecurity team, covering roles, strategies, and policy foundations. Ideal for modern organizations aiming to be scalable and agile.</p><br><p>2. TechTarget – Maximize Business Impact with the Right Security Team</p><p>Link: https://www.techtarget.com/searchsecurity/tip/How-to-build-a-cybersecurity-team-to-maximize-business-impact</p><br><p>This article explores how the right team structure directly influences risk reduction, operational efficiency, and talent retention. Especially relevant for security leaders and HR decision-makers.</p><br><p>3. Airiam – 14 Strategies for Building Cyber-Resilient Teams</p><p>Link: https://airiam.com/blog/building-cyber-resilient-teams</p><br><p>A clear and actionable blog post offering 14 strategies to enhance team culture, training, and awareness within cybersecurity teams. Useful for leaders looking to strengthen team dynamics.</p><br><p>4. ISACA - State of Cybersecurity 2024 report</p><p>Link: https://www.isaca.org/resources/reports/state-of-cybersecurity-2024</p><br><p>Connect with Media: https://www.linkedin.com/in/medea-de-jong-aa1b771/</p><p>Connect with Laurens: https://www.linkedin.com/in/laurensjagt/</p><p> </p><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Arnaud Wiehe (FedEx) & Tiago Teles (ABN Amro): “The Next-Gen CISO Must Stay Curious, or Fall Behind”]]></title>
			<itunes:title><![CDATA[Arnaud Wiehe (FedEx) & Tiago Teles (ABN Amro): “The Next-Gen CISO Must Stay Curious, or Fall Behind”]]></itunes:title>
			<pubDate>Thu, 26 Jun 2025 04:00:00 GMT</pubDate>
			<itunes:duration>58:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/6853c674412e0f0fbf27cf32/media.mp3" length="140506560" type="audio/mpeg"/>
			<guid isPermaLink="false">6853c674412e0f0fbf27cf32</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/arnaud-wiehe-fedex-tiago-teles-abn-amro-the-next-gen-ciso-mu</link>
			<acast:episodeId>6853c674412e0f0fbf27cf32</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>arnaud-wiehe-fedex-tiago-teles-abn-amro-the-next-gen-ciso-mu</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOqraUEom5zlXYexSdH7iE5kbSYRwBuder8sNh4M++iEoiSNQdHWxcfLzEQrPdDTSu0svnrcAgZrjXDr1TcAeGgX]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>In this episode of re:invent security, we sit down with Arnaud Wiehe (Managing Director of Information Security at FedEx) and Tiago Teles (Head of Advanced Analytics &amp; AI at ABN AMRO), co-authors of Emerging Tech, Emerging Threats, to explore what it truly means to lead in cybersecurity amid accelerating innovation.</p><br><p>From the explosive rise of GenAI and deepfakes to third-party risk at scale and secure-by-design realities—this conversation unpacks the practical and philosophical shifts modern CISOs must embrace. Arnaud and Tiago reflect on the evolving role of the security leader: no longer the “department of no,” but a proactive enabler of innovation.</p><br><p>We cover the threats shaping today’s landscape, including AI-generated phishing, insider risks, and automation-driven attacks—and how data quality, awareness, and defense-in-depth are now non-negotiable. Equally, we explore how security professionals must stay ahead not by fearing technology, but by experimenting with it—even when it might not succeed.</p><br><p>Whether you're a seasoned security executive or an aspiring leader, this is a must-listen conversation about redefining relevance, staying ahead of risk, and embracing the future before it embraces you. Tune in and ask yourself: how are you staying curious?</p><br><p>Chapters:</p><p>00:00 – 04:11 - Intro, Meet the Guests &amp; Why This Topic Matters</p><p>04:12 – 08:39 - Writing the Book: Reinvention, Mindset, and Co-Authoring</p><p>08:40 – 15:04 - The Speed of Innovation: Why CISOs Must Stay Ahead of Tech</p><p>15:05 – 22:04 - From “Department of No” to Tech Enabler</p><p>22:03 – 28:04 - AI, Data &amp; Security: Practical Use Cases that Work Today</p><p>28:05 – 33:52 - The Curious CISO: A New Model for Leadership</p><p>33:53 – 44:32 - Security by Design: The Real-World Playbook</p><p>44:33 – 53:43 - The Threats Are Here: Deepfakes, AI-Phishing &amp; What's Next</p><p>53:44 – 58:32 - Final Takeaways &amp; Challenge to Security Leaders</p><br><p>Resources:</p><p>* The Future Is Faster Than You Think: How Converging Technologies Are Disrupting Business, Industries, and Our Lives by Peter H. Diamandis, Steven Kotler, et al.</p><br><p>Connect with Arnaud: https://www.linkedin.com/in/arnaudwiehe/</p><p>Connect with Tiago: https://www.linkedin.com/in/tiagoteles/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of re:invent security, we sit down with Arnaud Wiehe (Managing Director of Information Security at FedEx) and Tiago Teles (Head of Advanced Analytics &amp; AI at ABN AMRO), co-authors of Emerging Tech, Emerging Threats, to explore what it truly means to lead in cybersecurity amid accelerating innovation.</p><br><p>From the explosive rise of GenAI and deepfakes to third-party risk at scale and secure-by-design realities—this conversation unpacks the practical and philosophical shifts modern CISOs must embrace. Arnaud and Tiago reflect on the evolving role of the security leader: no longer the “department of no,” but a proactive enabler of innovation.</p><br><p>We cover the threats shaping today’s landscape, including AI-generated phishing, insider risks, and automation-driven attacks—and how data quality, awareness, and defense-in-depth are now non-negotiable. Equally, we explore how security professionals must stay ahead not by fearing technology, but by experimenting with it—even when it might not succeed.</p><br><p>Whether you're a seasoned security executive or an aspiring leader, this is a must-listen conversation about redefining relevance, staying ahead of risk, and embracing the future before it embraces you. Tune in and ask yourself: how are you staying curious?</p><br><p>Chapters:</p><p>00:00 – 04:11 - Intro, Meet the Guests &amp; Why This Topic Matters</p><p>04:12 – 08:39 - Writing the Book: Reinvention, Mindset, and Co-Authoring</p><p>08:40 – 15:04 - The Speed of Innovation: Why CISOs Must Stay Ahead of Tech</p><p>15:05 – 22:04 - From “Department of No” to Tech Enabler</p><p>22:03 – 28:04 - AI, Data &amp; Security: Practical Use Cases that Work Today</p><p>28:05 – 33:52 - The Curious CISO: A New Model for Leadership</p><p>33:53 – 44:32 - Security by Design: The Real-World Playbook</p><p>44:33 – 53:43 - The Threats Are Here: Deepfakes, AI-Phishing &amp; What's Next</p><p>53:44 – 58:32 - Final Takeaways &amp; Challenge to Security Leaders</p><br><p>Resources:</p><p>* The Future Is Faster Than You Think: How Converging Technologies Are Disrupting Business, Industries, and Our Lives by Peter H. Diamandis, Steven Kotler, et al.</p><br><p>Connect with Arnaud: https://www.linkedin.com/in/arnaudwiehe/</p><p>Connect with Tiago: https://www.linkedin.com/in/tiagoteles/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Petra Oldengarm (CVN): “Digital Sovereignty Starts With Smart Dependence, Not Full Independence”</title>
			<itunes:title>Petra Oldengarm (CVN): “Digital Sovereignty Starts With Smart Dependence, Not Full Independence”</itunes:title>
			<pubDate>Wed, 28 May 2025 04:00:00 GMT</pubDate>
			<itunes:duration>55:20</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/68348b4c57d2ddc0dbd9b493/media.mp3" length="132834240" type="audio/mpeg"/>
			<guid isPermaLink="false">68348b4c57d2ddc0dbd9b493</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/petra-oldengarm-cvn-digital-sovereignty-starts-with-smart-de</link>
			<acast:episodeId>68348b4c57d2ddc0dbd9b493</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>petra-oldengarm-cvn-digital-sovereignty-starts-with-smart-de</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdaDtzEGHqJoSmBpWFMFNjNm4MshKun4TzO4LMsn++0DUwBEBfXz8OACImkP3CV6jZt6SvpNwBZrHv7XBWbta1HnlUPsSqOhH9N7UY2B85b3dqQ1SUbKgBBhVlSTPpzeLG2YhPr0hnYrASqFfZf0Xv7JzsdPdBENZV4sIKFtZRBru+pJE9CZY/xMxS5lS5iVCyvzDGtQPTbTeFiOLF65EyGEdm9SG3RRNill1ytuPuDjRA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>In this episode of re:invent security, we sit down with Petra Oldengarm, Director of Cyberveilig Nederland (CVN), to explore the real meaning of digital sovereignty—and why it’s more than just a political slogan. Petra takes us deep into the practical challenges and strategic decisions that come with reducing digital dependencies. From procurement strategies and fallback systems to encryption standards and talent development, this conversation unpacks what sovereignty can look like—without chasing unrealistic dreams of full independence. We also tackle the CISO’s role in influencing vendor choices, the myth of total control, and how European regulation (like NIS2) might help—but won’t solve everything. Whether you're in the public sector, critical infrastructure, or private enterprise, this episode is a must-listen for security leaders trying to navigate geopolitical complexity without losing sight of operational</p><br><p>Chapters:</p><p>00:00 - 1:44 - Teasers</p><p>1:45 - 4:44 - Introduction of the episode and Petra Oldengarm</p><p>04:45 - 08:03 - Reinventing security with private public collaboration (project Melissa)</p><p>08:04 - 09:43 - What are the biggest challenges that security leaders have regarding Digital</p><p>Sovereignty?</p><p>09:44 - 10:43 - Outsourcing is a strategic choice increasing dependencies</p><p>10:44 - 12:40- How can security leaders influence outsourcing decisions?</p><p>12:41 - 15:01 - Diversifying the vendor landscape is nog a security problem but a board problem</p><p>15:02 - 18:40 - Waiting for a European solution is not a strategy</p><p>18:41 - 21:15 - European legislation to improve digital autonomy</p><p>21:16 - 25:50 - European alternatives requires a broad long term governmental strategy</p><p>25:51 - 27:30 - Strategies to increase your sovereignty today</p><p>27:31 - 31:50 - Decreased risk is your Return on Investment</p><p>31:51 - 36:57 - What is the role of the government and the European Union to make sure leaders</p><p>diversify?</p><p>36:58 - 38:00 - You need to shift business continuity to the left</p><p>38:01 - 42:36 - Encryption is part of the solution</p><p>40:52 - 45:51 - What legislation is in the pipeline? (Omwille van de lengte mag deze er uit)</p><p>42:37 - 46:20 - Addressing the talent gap is a make or break for digital sovereignty?</p><p>46:21 - 49:40 - Petra’s advice: where do leaders start?</p><p>49:41 - 55:20 - Wrapping Up + Key take aways</p><br><p>Resources &amp; Mentions:</p><p>Position Paper Cyberveilig Nederland on Digital Sovereignty: https://cyberveilignederland.nl/upload/userfiles/images/news/Position%20paper%20CVNL%20t_b_v_%20rondetafelgesprek%20Digitale%20soevereiniteit%20bij%20de%20Rijksoverheid%20d_d_%2013%20februari%202025%20(1).pdf</p><br><p>Article in the FD about dependencies in our digital autonomy: https://fd.nl/tech-en-innovatie/1549612/datacenters-worden-steeds-groter-maar-de-financiering-groeit-niet-mee</p><br><p>Connect with Petra: https://www.linkedin.com/in/petraoldengarm/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of re:invent security, we sit down with Petra Oldengarm, Director of Cyberveilig Nederland (CVN), to explore the real meaning of digital sovereignty—and why it’s more than just a political slogan. Petra takes us deep into the practical challenges and strategic decisions that come with reducing digital dependencies. From procurement strategies and fallback systems to encryption standards and talent development, this conversation unpacks what sovereignty can look like—without chasing unrealistic dreams of full independence. We also tackle the CISO’s role in influencing vendor choices, the myth of total control, and how European regulation (like NIS2) might help—but won’t solve everything. Whether you're in the public sector, critical infrastructure, or private enterprise, this episode is a must-listen for security leaders trying to navigate geopolitical complexity without losing sight of operational</p><br><p>Chapters:</p><p>00:00 - 1:44 - Teasers</p><p>1:45 - 4:44 - Introduction of the episode and Petra Oldengarm</p><p>04:45 - 08:03 - Reinventing security with private public collaboration (project Melissa)</p><p>08:04 - 09:43 - What are the biggest challenges that security leaders have regarding Digital</p><p>Sovereignty?</p><p>09:44 - 10:43 - Outsourcing is a strategic choice increasing dependencies</p><p>10:44 - 12:40- How can security leaders influence outsourcing decisions?</p><p>12:41 - 15:01 - Diversifying the vendor landscape is nog a security problem but a board problem</p><p>15:02 - 18:40 - Waiting for a European solution is not a strategy</p><p>18:41 - 21:15 - European legislation to improve digital autonomy</p><p>21:16 - 25:50 - European alternatives requires a broad long term governmental strategy</p><p>25:51 - 27:30 - Strategies to increase your sovereignty today</p><p>27:31 - 31:50 - Decreased risk is your Return on Investment</p><p>31:51 - 36:57 - What is the role of the government and the European Union to make sure leaders</p><p>diversify?</p><p>36:58 - 38:00 - You need to shift business continuity to the left</p><p>38:01 - 42:36 - Encryption is part of the solution</p><p>40:52 - 45:51 - What legislation is in the pipeline? (Omwille van de lengte mag deze er uit)</p><p>42:37 - 46:20 - Addressing the talent gap is a make or break for digital sovereignty?</p><p>46:21 - 49:40 - Petra’s advice: where do leaders start?</p><p>49:41 - 55:20 - Wrapping Up + Key take aways</p><br><p>Resources &amp; Mentions:</p><p>Position Paper Cyberveilig Nederland on Digital Sovereignty: https://cyberveilignederland.nl/upload/userfiles/images/news/Position%20paper%20CVNL%20t_b_v_%20rondetafelgesprek%20Digitale%20soevereiniteit%20bij%20de%20Rijksoverheid%20d_d_%2013%20februari%202025%20(1).pdf</p><br><p>Article in the FD about dependencies in our digital autonomy: https://fd.nl/tech-en-innovatie/1549612/datacenters-worden-steeds-groter-maar-de-financiering-groeit-niet-mee</p><br><p>Connect with Petra: https://www.linkedin.com/in/petraoldengarm/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Sri Manda (Peloton): From Gatekeeper to Innovator: How CISOs Can Harness Startup Power</title>
			<itunes:title>Sri Manda (Peloton): From Gatekeeper to Innovator: How CISOs Can Harness Startup Power</itunes:title>
			<pubDate>Thu, 24 Apr 2025 04:00:00 GMT</pubDate>
			<itunes:duration>1:13:24</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/68068af04c1756d49ce863e1/media.mp3" length="140942636" type="audio/mpeg"/>
			<guid isPermaLink="false">68068af04c1756d49ce863e1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/sri-manda-peloton-from-gatekeeper-to-innovator-how-cisos-can</link>
			<acast:episodeId>68068af04c1756d49ce863e1</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>sri-manda-peloton-from-gatekeeper-to-innovator-how-cisos-can</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOoalJihUR3gIkuOoKy+D/JDZPCu0Rh6rEHoTsDygaynquo0lp8dpgoT3m55IdH8Dh2U3cGkGuVoNluYJQr/XvfG]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>In this episode of Reinvent Security, we dive into the world of cybersecurity innovation with&nbsp;Sri Manda, the Chief Security and Trust Officer at Peloton. Sri brings a unique perspective—he’s not only a seasoned security leader in e-commerce, content creation, and IoT manufacturing, but also an active advisor to cybersecurity startups, venture capital, and private equity.</p><br><p>In our conversation, Sri shares why modern CISOs must wear multiple hats: part technologist, part risk manager, part business strategist, and part mentor. He details how he distinguishes genuine innovation from marketing hype, how to set up effective proof-of- concept criteria to evaluate emerging solutions, and why he believes in building “incubation labs” inside the enterprise.</p><br><p><strong>Key highlights include:</strong></p><p> From Reactive to Proactive: Sri’s personal stories on why cybersecurity must move beyond mere compliance toward enabling secure, fast-paced innovation.</p><p> Startup-Enterprise Partnership: Criteria and red flags for CISOs looking to leverage new market entrants, plus how entrepreneurs can refine their pitch.</p><p> Reinventing the CISO Role: The shift from gatekeeper to strategic leader—communicating in business terms, fostering a culture of collaboration, and building resilience.</p><p> Future-Facing Tech: How AI, automation, and next-gen computing are shaping tomorrow’s security tools, and what Peloton is doing to stay ahead.</p><br><p>If you’re ready to explore the cutting edge of cybersecurity—balancing bold new ideas with enterprise-grade governance—this episode is for you. Sri’s real-world experiences, from forging deeper connections with startups to bridging business objectives and risk management, offer a blueprint for CISOs everywhere.</p><br><p><strong>Chapters:</strong></p><br><p><strong>Resources &amp; Mentions:</strong></p><p> Peloton’s multifaceted business model: Content, IoT, e-commerce, and apps.</p><p> The value of an MBA for cybersecurity leaders: bridging financials and technology.</p><p> Incubation labs: a practical approach to vet, test, and adopt innovative solutions.</p><p> Book Recommendation:&nbsp;Having Effective Conversations&nbsp;(for tough stakeholder</p><p>discussions).</p><br><p>Connect with Sri: https://www.linkedin.com/in/srimanda/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of Reinvent Security, we dive into the world of cybersecurity innovation with&nbsp;Sri Manda, the Chief Security and Trust Officer at Peloton. Sri brings a unique perspective—he’s not only a seasoned security leader in e-commerce, content creation, and IoT manufacturing, but also an active advisor to cybersecurity startups, venture capital, and private equity.</p><br><p>In our conversation, Sri shares why modern CISOs must wear multiple hats: part technologist, part risk manager, part business strategist, and part mentor. He details how he distinguishes genuine innovation from marketing hype, how to set up effective proof-of- concept criteria to evaluate emerging solutions, and why he believes in building “incubation labs” inside the enterprise.</p><br><p><strong>Key highlights include:</strong></p><p> From Reactive to Proactive: Sri’s personal stories on why cybersecurity must move beyond mere compliance toward enabling secure, fast-paced innovation.</p><p> Startup-Enterprise Partnership: Criteria and red flags for CISOs looking to leverage new market entrants, plus how entrepreneurs can refine their pitch.</p><p> Reinventing the CISO Role: The shift from gatekeeper to strategic leader—communicating in business terms, fostering a culture of collaboration, and building resilience.</p><p> Future-Facing Tech: How AI, automation, and next-gen computing are shaping tomorrow’s security tools, and what Peloton is doing to stay ahead.</p><br><p>If you’re ready to explore the cutting edge of cybersecurity—balancing bold new ideas with enterprise-grade governance—this episode is for you. Sri’s real-world experiences, from forging deeper connections with startups to bridging business objectives and risk management, offer a blueprint for CISOs everywhere.</p><br><p><strong>Chapters:</strong></p><br><p><strong>Resources &amp; Mentions:</strong></p><p> Peloton’s multifaceted business model: Content, IoT, e-commerce, and apps.</p><p> The value of an MBA for cybersecurity leaders: bridging financials and technology.</p><p> Incubation labs: a practical approach to vet, test, and adopt innovative solutions.</p><p> Book Recommendation:&nbsp;Having Effective Conversations&nbsp;(for tough stakeholder</p><p>discussions).</p><br><p>Connect with Sri: https://www.linkedin.com/in/srimanda/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Esther Schagen-van Luit (Microsoft): "Security leadership requires courage and curiosity"]]></title>
			<itunes:title><![CDATA[Esther Schagen-van Luit (Microsoft): "Security leadership requires courage and curiosity"]]></itunes:title>
			<pubDate>Thu, 27 Mar 2025 05:00:00 GMT</pubDate>
			<itunes:duration>52:51</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/67e2e59b7cf166247a373bc0/media.mp3" length="126841920" type="audio/mpeg"/>
			<guid isPermaLink="false">67e2e59b7cf166247a373bc0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/esther-schagen-van-luit-microsoft-security-leadership-requir</link>
			<acast:episodeId>67e2e59b7cf166247a373bc0</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>esther-schagen-van-luit-microsoft-security-leadership-requir</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdb5BSfzYZhRhzeJf61/XCjr6zRuHAXXXVWtDMn+qojkxDd1UmFgMe8SsxdyVKjBQGUv1f5EULNkbmhPFJ0YsADGKK/zZp6ZrwdnzKm23u7LFDbtyNcMa/ds91FJidJs7VOSqPxO6S0W9CgQssqvaoslh1DzzRGGJ9YJ02gA5iq+Tq+iT9ujoYJQNwpWml9m3tOJoFKszDRkVXpsQBZAPRJf3u3N92RcxpJfBpMnaAp+qQ==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this episode of re:invent security as they sit down with Esther Schagen-van Luit to explore what it truly means to be a Strategic CISO in today’s security landscape.</p><p> </p><p>Esther is a well-known cybersecurity leader and advocate for Diversity, Equity, and Inclusion. With years of experience advising and working alongside CISOs across various sectors, she brings a sharp, candid perspective on the disconnect between tactical security operations and the strategic needs of modern organizations.</p><p> </p><p>In this episode, Esther unpacks:</p><p>• The common traps that keep CISOs stuck in operational mode</p><p>• What separates a strategic CISO from the rest—mindset, skillset, and influence</p><p>• How organizational readiness (or lack thereof) impacts a CISO’s ability to lead at the strategic level</p><p>• Why aligning security with digital transformation is non-negotiable</p><p>• And how DEI plays a real role in shaping stronger, smarter security leadership</p><p> </p><p>Esther doesn’t just talk about the role of the CISO—she challenges the assumptions around it. She shares what it takes to grow into strategic leadership, even in environments that aren’t quite ready for it, and why security professionals must be ready to challenge how value is measured and communicated.</p><p> </p><p>Known for her clear thinking and no-nonsense delivery, Esther reminds us that strategy isn’t about sitting at the executive table—it’s about speaking the language of the business and helping shape its future.</p><p> </p><p>Whether you’re a current CISO, an aspiring one, or someone who works closely with security leadership, this episode offers a grounded, honest look at the evolution of the role—and how to push it forward.</p><br><p>Chapters:</p><p>00:00 - 04:09 - Introduction of the episode and Esther Schagen van Luit </p><p>4:10 - 07:32 Reinventing security and being a driving force for good.</p><p>07:33 - 9:32 What are the key differences between an operational, tactical and strategical CISO?</p><p>09:33 - 12:15 What are operational and tactical CISO's lacking?</p><p>12:16 - 14:20 Strategic security visions requires curiosity</p><p>14:21 - 15:56 What is holding organizations back to embrace a strategical CISO?</p><p>15:57 - 19:33 - What are the most important skills to become a strategical security leader?</p><p>19:34 - 22:07 Example of a security leader who was successfull in aligning business objectives and security strategy</p><p>22:08 - 25:00 Don't sell winter coats in the summer</p><p>25:01 - 26:42 The difference between regulated and unregulated organizations</p><p>26:43 - 33:21 What are the tell tale signs that an organizations is not ready for a strategical CISO?</p><p>33:22 - 42:00 What are some practical/high impact steps to create high performing security teams?</p><p>42:01 - 43:00 What is the one piece of advise you would like to give security leaders?</p><p>43:01 - 46:28 What resources does Esther recommend to level up strategic thinking?</p><p>46:29 - 52:21 Key take aways Irfaan and Jeroen</p><br><p>Resources:</p><br><p>Connect with Esther: https://www.linkedin.com/in/estherschagenvanluit/ </p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this episode of re:invent security as they sit down with Esther Schagen-van Luit to explore what it truly means to be a Strategic CISO in today’s security landscape.</p><p> </p><p>Esther is a well-known cybersecurity leader and advocate for Diversity, Equity, and Inclusion. With years of experience advising and working alongside CISOs across various sectors, she brings a sharp, candid perspective on the disconnect between tactical security operations and the strategic needs of modern organizations.</p><p> </p><p>In this episode, Esther unpacks:</p><p>• The common traps that keep CISOs stuck in operational mode</p><p>• What separates a strategic CISO from the rest—mindset, skillset, and influence</p><p>• How organizational readiness (or lack thereof) impacts a CISO’s ability to lead at the strategic level</p><p>• Why aligning security with digital transformation is non-negotiable</p><p>• And how DEI plays a real role in shaping stronger, smarter security leadership</p><p> </p><p>Esther doesn’t just talk about the role of the CISO—she challenges the assumptions around it. She shares what it takes to grow into strategic leadership, even in environments that aren’t quite ready for it, and why security professionals must be ready to challenge how value is measured and communicated.</p><p> </p><p>Known for her clear thinking and no-nonsense delivery, Esther reminds us that strategy isn’t about sitting at the executive table—it’s about speaking the language of the business and helping shape its future.</p><p> </p><p>Whether you’re a current CISO, an aspiring one, or someone who works closely with security leadership, this episode offers a grounded, honest look at the evolution of the role—and how to push it forward.</p><br><p>Chapters:</p><p>00:00 - 04:09 - Introduction of the episode and Esther Schagen van Luit </p><p>4:10 - 07:32 Reinventing security and being a driving force for good.</p><p>07:33 - 9:32 What are the key differences between an operational, tactical and strategical CISO?</p><p>09:33 - 12:15 What are operational and tactical CISO's lacking?</p><p>12:16 - 14:20 Strategic security visions requires curiosity</p><p>14:21 - 15:56 What is holding organizations back to embrace a strategical CISO?</p><p>15:57 - 19:33 - What are the most important skills to become a strategical security leader?</p><p>19:34 - 22:07 Example of a security leader who was successfull in aligning business objectives and security strategy</p><p>22:08 - 25:00 Don't sell winter coats in the summer</p><p>25:01 - 26:42 The difference between regulated and unregulated organizations</p><p>26:43 - 33:21 What are the tell tale signs that an organizations is not ready for a strategical CISO?</p><p>33:22 - 42:00 What are some practical/high impact steps to create high performing security teams?</p><p>42:01 - 43:00 What is the one piece of advise you would like to give security leaders?</p><p>43:01 - 46:28 What resources does Esther recommend to level up strategic thinking?</p><p>46:29 - 52:21 Key take aways Irfaan and Jeroen</p><br><p>Resources:</p><br><p>Connect with Esther: https://www.linkedin.com/in/estherschagenvanluit/ </p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Carlo Alexander Schreurs (FrieslandCampina): "As a CISO, how do you lead in a Human-Centered way?"]]></title>
			<itunes:title><![CDATA[Carlo Alexander Schreurs (FrieslandCampina): "As a CISO, how do you lead in a Human-Centered way?"]]></itunes:title>
			<pubDate>Thu, 27 Feb 2025 05:00:00 GMT</pubDate>
			<itunes:duration>1:02:56</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/67bc6eb88ee8c32c7fbd8b99/media.mp3" length="151066560" type="audio/mpeg"/>
			<guid isPermaLink="false">67bc6eb88ee8c32c7fbd8b99</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/carlo-alexander-schreurs-frieslandcampina-as-a-ciso-how-do-y</link>
			<acast:episodeId>67bc6eb88ee8c32c7fbd8b99</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>carlo-alexander-schreurs-frieslandcampina-as-a-ciso-how-do-y</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOrHAUw5xzDfuL45IZbgR41fKAwlALrGSvAyy7RS/vm+BevXniglwSkH6KnUQ/iunBTLbmMP40eqPlY4mpUS99lK]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>In this episode, we talk with Carlo Alexander Schreurs, CISO of FrieslandCampina, about his journey of reinvention after surgery and his transition into a transformational CISO role. He advocates for moving from rigid "zero trust" to a more flexible "adaptive trust" model, better suited to digital transformation. Carlo emphasizes cultural shifts in cybersecurity, highlighting storytelling, collaboration, and psychological safety to build trust and resilience. He also stresses integrating cybersecurity with business goals, going beyond compliance to drive innovation. The episode wraps up with practical advice for CISOs on staying agile in a fast-changing landscape.</p><br><p>Chapters:</p><p>00:00 - 03:14 Introduction of the episode</p><p>03:15 - 06:26 Carlo reinventing himself </p><p>06:27 - 09:36 Reimagining Traditional Security</p><p>09:37 - 14:16 The Drama Triangle vs. The Winner's Triangle </p><p>14:16 - 17:41 From Zero Trust to Digital/Adaptive Trust </p><p>17:42 - 23:00 The Role of Trust and Loyalty </p><p>23:01 - 26:15 The CISO as Storyteller </p><p>26:16 - 32:55 Shifting from Risk Avoidance to Value Creation </p><p>32:56 - 43:45 Human Factors and Behavioral Insights </p><p>43:46 - 45:44 Reframing Cyber Security </p><p>45:45 - 55:34 Compliance Theater </p><p>55: 35 - 58:03 Practical Steps for Agile and Adaptable Programs</p><p>58:04 - 1:02:56 Key takeaways Jeroen &amp; Irfaan</p><br><p>Resources</p><p>Drama triangle to winner triangle:</p><p>article 1: <a href="Https://www.linkedin.com/posts/schreursc_cybersecurity-leadership-behavioralscience-activity-7269669550374244352-7U0x?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">Life threw a curveball at me - on human-centric transformations</a></p><p>article 2: Beating the drama in Cybersecurity and Technology teams: <a href="https://www.linkedin.com/posts/schreursc_cybersecurity-leadership-ciso-activity-7272164029345759232-tain?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">uncovering hidden dynamics that drain energy and prohibit growth</a></p><p>article 3:  Beating the drama in cybersecurity and IT: <a href="https://www.linkedin.com/posts/schreursc_from-drama-to-ted-in-your-teams-a-practical-activity-7275487384631205889-dQTs?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">How to shift from drama triangle to TED and build a thriving team</a></p><p>article 4: Cybersecurity Transformation: <a href="https://www.linkedin.com/pulse/cybersecurity-transformation-power-human-centered-schreurs-q2bce/?trackingId=gbREHm%2BA0TEyLzF5q3oq5w%3D%3D" rel="noopener noreferrer" target="_blank">The Power of Human-Centered Leadership</a> </p><p>Storytelling: <a href="https://www.linkedin.com/posts/schreursc_the-hidden-skill-every-ciso-or-cio-needs-activity-7294618597383950336-GGpS?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAPnsYB3g2OybDUB_DAGYJ2gaV0l888Shw" rel="noopener noreferrer" target="_blank">The Hidden Skill Every CISO or CIO Needs, But Few Use (On storytelling)</a></p><p>Other source: The Cyber Samurai—<a href="https://www.linkedin.com/pulse/cyber-samuraiforging-black-belt-digital-dojo-carlo-alexander-schreurs-zlgve/?trackingId=pXhL%2BSZL3CKzeae6Aq3Oow%3D%3D" rel="noopener noreferrer" target="_blank">Forging a Black Belt in the Digital Dojo</a></p><br><p>Connect with Carlo: https://www.linkedin.com/in/schreursc/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, we talk with Carlo Alexander Schreurs, CISO of FrieslandCampina, about his journey of reinvention after surgery and his transition into a transformational CISO role. He advocates for moving from rigid "zero trust" to a more flexible "adaptive trust" model, better suited to digital transformation. Carlo emphasizes cultural shifts in cybersecurity, highlighting storytelling, collaboration, and psychological safety to build trust and resilience. He also stresses integrating cybersecurity with business goals, going beyond compliance to drive innovation. The episode wraps up with practical advice for CISOs on staying agile in a fast-changing landscape.</p><br><p>Chapters:</p><p>00:00 - 03:14 Introduction of the episode</p><p>03:15 - 06:26 Carlo reinventing himself </p><p>06:27 - 09:36 Reimagining Traditional Security</p><p>09:37 - 14:16 The Drama Triangle vs. The Winner's Triangle </p><p>14:16 - 17:41 From Zero Trust to Digital/Adaptive Trust </p><p>17:42 - 23:00 The Role of Trust and Loyalty </p><p>23:01 - 26:15 The CISO as Storyteller </p><p>26:16 - 32:55 Shifting from Risk Avoidance to Value Creation </p><p>32:56 - 43:45 Human Factors and Behavioral Insights </p><p>43:46 - 45:44 Reframing Cyber Security </p><p>45:45 - 55:34 Compliance Theater </p><p>55: 35 - 58:03 Practical Steps for Agile and Adaptable Programs</p><p>58:04 - 1:02:56 Key takeaways Jeroen &amp; Irfaan</p><br><p>Resources</p><p>Drama triangle to winner triangle:</p><p>article 1: <a href="Https://www.linkedin.com/posts/schreursc_cybersecurity-leadership-behavioralscience-activity-7269669550374244352-7U0x?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">Life threw a curveball at me - on human-centric transformations</a></p><p>article 2: Beating the drama in Cybersecurity and Technology teams: <a href="https://www.linkedin.com/posts/schreursc_cybersecurity-leadership-ciso-activity-7272164029345759232-tain?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">uncovering hidden dynamics that drain energy and prohibit growth</a></p><p>article 3:  Beating the drama in cybersecurity and IT: <a href="https://www.linkedin.com/posts/schreursc_from-drama-to-ted-in-your-teams-a-practical-activity-7275487384631205889-dQTs?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">How to shift from drama triangle to TED and build a thriving team</a></p><p>article 4: Cybersecurity Transformation: <a href="https://www.linkedin.com/pulse/cybersecurity-transformation-power-human-centered-schreurs-q2bce/?trackingId=gbREHm%2BA0TEyLzF5q3oq5w%3D%3D" rel="noopener noreferrer" target="_blank">The Power of Human-Centered Leadership</a> </p><p>Storytelling: <a href="https://www.linkedin.com/posts/schreursc_the-hidden-skill-every-ciso-or-cio-needs-activity-7294618597383950336-GGpS?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAPnsYB3g2OybDUB_DAGYJ2gaV0l888Shw" rel="noopener noreferrer" target="_blank">The Hidden Skill Every CISO or CIO Needs, But Few Use (On storytelling)</a></p><p>Other source: The Cyber Samurai—<a href="https://www.linkedin.com/pulse/cyber-samuraiforging-black-belt-digital-dojo-carlo-alexander-schreurs-zlgve/?trackingId=pXhL%2BSZL3CKzeae6Aq3Oow%3D%3D" rel="noopener noreferrer" target="_blank">Forging a Black Belt in the Digital Dojo</a></p><br><p>Connect with Carlo: https://www.linkedin.com/in/schreursc/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Dimitri van Zantvliet (NS): “Securing Dutch Railways Amid Geopolitical Turmoil”</title>
			<itunes:title>Dimitri van Zantvliet (NS): “Securing Dutch Railways Amid Geopolitical Turmoil”</itunes:title>
			<pubDate>Thu, 30 Jan 2025 07:13:12 GMT</pubDate>
			<itunes:duration>1:06:55</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/6798d428fbf563bda1497a1a/media.mp3" length="128487212" type="audio/mpeg"/>
			<guid isPermaLink="false">6798d428fbf563bda1497a1a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/dimitri-van-zandvliet-ns-securing-dutch-railways-amid-geopol</link>
			<acast:episodeId>6798d428fbf563bda1497a1a</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>dimitri-van-zandvliet-ns-securing-dutch-railways-amid-geopol</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOrgcJ8dJAEia52mAvBkNBrh2NCdj/7rwZIGGBB2JNy9RwBbFHOI63tWbsc6DPW7DkN6Ilf6MTsrXd3Bc9LovuKu]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this episode of Reinvent Security as they sit down with Dimitri van Zantvliet as they talk about the challenges of securing critical infrastructure and OT at the Dutch Railways. Especially in time of geopolitical turmoil and hybrid warfare.</p><br><p>Dimitri van Zantvliet is an accomplished leader in information security currently serving as the CISO of Dutch Railways (Nederlandse Spoorwegen). Dimitri is at the forefront of protecting one of the Netherlands’ most vital transportation networks against an ever-evolving landscape of cyber threats.</p><br><p>His leadership has been instrumental in addressing the unique challenges of securing critical infrastructure in an era marked by hybrid warfare and complex geopolitical dynamics. Known for his bold and innovative perspectives, Dimitri emphasizes in this podcast that the “C” in CISO stands for Change—highlighting the role of security leaders as agents of transformation within organizations. He has also spoken about the disruptive potential of artificial intelligence, warning that AI is a “Weapon of Mass Disruption”.</p><br><p>Dimitri’s expertise extends beyond technology into organizational culture, promoting resilience, adaptability, and collaboration as key components of effective cybersecurity. He is a sought-after speaker and thought leader, sharing insights on topics such as hybrid warfare, OT security, and the future of cybersecurity leadership. Under his guidance, Dutch Railways is not only defending its operations from cyber threats but also setting an example for how critical infrastructure operators can adapt and thrive in a rapidly changing world.</p><br><p>Chapters:</p><p>00:00 - 08:13 Introduction of the episode and Dimitri van Zantvliet</p><p>08:14 - 17:05 The Dutch Railways, their Information Security team and team diversity</p><p>17:06 - 21:29 The unique challenges of securing OT and critical infrastructure</p><p>21:30 - 26:44 How does the threat landscape differ when securing critical infrastructure?</p><p>26:45 - 29:59 Threat actors, influence of geopolitics and hybrid (digital) warfare</p><p>30:00 - 34:10 Regulation on the security of critical infrastructure</p><p>34:11 - 38:54 What can the IT security professionals learn from the OT security professionals?</p><p>38:55 - 42:21 Supply chain security, procurement and information security</p><p>42:22 - 45:29 What is the most exciting part of the "AI revolution"?</p><p>45:30 - 50:11 Early adoption, curiosity, business enablement and innovation as security leaders</p><p>50:12 - 55:39 The development of CISO Community Nederland</p><p>55:40 - 1:01:09 The evolution of security leadership roles</p><p>1:01:10 - 1:02:16 Wrapping Up</p><p>1:02:17 - 1:06:55 Key takeaways Jeroen &amp; Irfaan</p><br><p>Resources</p><p>Werken bij de NS (https://www.werkenbijns.nl/vacatures)</p><p>Black-out (https://npo.nl/start/serie/black-out_1/seizoen-1/blackout)</p><p>CISO Community Nederland (https://www.cisocommunity.nl/)</p><br><p>Connect with Dimitri: https://www.linkedin.com/in/vanzantvliet/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this episode of Reinvent Security as they sit down with Dimitri van Zantvliet as they talk about the challenges of securing critical infrastructure and OT at the Dutch Railways. Especially in time of geopolitical turmoil and hybrid warfare.</p><br><p>Dimitri van Zantvliet is an accomplished leader in information security currently serving as the CISO of Dutch Railways (Nederlandse Spoorwegen). Dimitri is at the forefront of protecting one of the Netherlands’ most vital transportation networks against an ever-evolving landscape of cyber threats.</p><br><p>His leadership has been instrumental in addressing the unique challenges of securing critical infrastructure in an era marked by hybrid warfare and complex geopolitical dynamics. Known for his bold and innovative perspectives, Dimitri emphasizes in this podcast that the “C” in CISO stands for Change—highlighting the role of security leaders as agents of transformation within organizations. He has also spoken about the disruptive potential of artificial intelligence, warning that AI is a “Weapon of Mass Disruption”.</p><br><p>Dimitri’s expertise extends beyond technology into organizational culture, promoting resilience, adaptability, and collaboration as key components of effective cybersecurity. He is a sought-after speaker and thought leader, sharing insights on topics such as hybrid warfare, OT security, and the future of cybersecurity leadership. Under his guidance, Dutch Railways is not only defending its operations from cyber threats but also setting an example for how critical infrastructure operators can adapt and thrive in a rapidly changing world.</p><br><p>Chapters:</p><p>00:00 - 08:13 Introduction of the episode and Dimitri van Zantvliet</p><p>08:14 - 17:05 The Dutch Railways, their Information Security team and team diversity</p><p>17:06 - 21:29 The unique challenges of securing OT and critical infrastructure</p><p>21:30 - 26:44 How does the threat landscape differ when securing critical infrastructure?</p><p>26:45 - 29:59 Threat actors, influence of geopolitics and hybrid (digital) warfare</p><p>30:00 - 34:10 Regulation on the security of critical infrastructure</p><p>34:11 - 38:54 What can the IT security professionals learn from the OT security professionals?</p><p>38:55 - 42:21 Supply chain security, procurement and information security</p><p>42:22 - 45:29 What is the most exciting part of the "AI revolution"?</p><p>45:30 - 50:11 Early adoption, curiosity, business enablement and innovation as security leaders</p><p>50:12 - 55:39 The development of CISO Community Nederland</p><p>55:40 - 1:01:09 The evolution of security leadership roles</p><p>1:01:10 - 1:02:16 Wrapping Up</p><p>1:02:17 - 1:06:55 Key takeaways Jeroen &amp; Irfaan</p><br><p>Resources</p><p>Werken bij de NS (https://www.werkenbijns.nl/vacatures)</p><p>Black-out (https://npo.nl/start/serie/black-out_1/seizoen-1/blackout)</p><p>CISO Community Nederland (https://www.cisocommunity.nl/)</p><br><p>Connect with Dimitri: https://www.linkedin.com/in/vanzantvliet/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People</title>
			<itunes:title>Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People</itunes:title>
			<pubDate>Thu, 28 Nov 2024 05:00:28 GMT</pubDate>
			<itunes:duration>52:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/6744ece631b12b5319b66093/media.mp3" length="125934720" type="audio/mpeg"/>
			<guid isPermaLink="false">6744ece631b12b5319b66093</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/dr-nikki-robinson-ibm-on-effective-vulnerability-management-</link>
			<acast:episodeId>6744ece631b12b5319b66093</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>dr-nikki-robinson-ibm-on-effective-vulnerability-management-</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOq+N9f4w2LO/5oYZt/eZjUtd3lXqmU9D0v97dgBGccKt6eLkAAok2eG8co73vaimNbAqIQbhgdp3RkQDy4dDydy]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>In this episode of&nbsp;Reinvent Security, we dive deep into the world of vulnerability management with Dr. Nikki Robinson, a distinguished cybersecurity expert, author, and educator. With years of experience in IT operations and cybersecurity, Dr. Robinson brings a unique perspective to managing vulnerabilities in today’s ever-evolving threat landscape. During the episode, Dr. Robinson shares her journey from IT operations to earning a doctorate in cybersecurity, highlighting the pivotal moments that shaped her approach to vulnerability management. She emphasizes the importance of looking beyond patching to address the broader aspects of risk reduction, including human factors, automation, and AI. Whether you are a seasoned cybersecurity professional or someone looking to strengthen your organization’s approach to vulnerabilities, this episode is packed with actionable insights and strategies. As a bonus, Dr. Robinson shares her thoughts on the differences between vulnerability management practices in the U.S. and Europe, and how global frameworks like NIST are fostering consistency across borders.</p><br><p>Chapters:</p><p>0:00 Introduction</p><p>4:31 Nikki’s Journey in Cybersecurity</p><p>7:57 Defining Vulnerability Management</p><p>10:35 Key takeaways from her book on Effective Vulnerability Management</p><p>22:00 First Steps to Mature Vulnerability Management</p><p>29:10 Prioritizing Vulnerabilities Beyond CVSS Scores</p><p>32:30 Automation in Vulnerability Management</p><p>39:15 Governance and Vulnerability Management</p><p>44:20 Key Takeaways</p><br><p>Resources:</p><p>Dr. Nikki Robinson’s books:&nbsp;<em>Effective Vulnerability Management</em>&nbsp;and&nbsp;<em>Mind the Tech Gap</em></p><br><p>Security Fatigue: https://www.researchgate.net/publication/361595380_Stress_Burnout_and_Security_Fatigue_in_Cybersecurity_A_Human_Factors_Problem</p><br><p>Human Factors Security Engineering: https://www.tandfonline.com/doi/full/10.1080/07366981.2023.2211429</p><br><p>Human Factors in Cybersecurity: https://dl.acm.org/doi/abs/10.1145/3537674.3555782</p><br><p>Vulnerability Chaining Blog parts 1 and 2: https://blog.stackaware.com/p/vulnerability-chaining-part-1-a-logical </p><br><p>Connect with Nikki: https://www.linkedin.com/in/dr-nikki-robinson/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of&nbsp;Reinvent Security, we dive deep into the world of vulnerability management with Dr. Nikki Robinson, a distinguished cybersecurity expert, author, and educator. With years of experience in IT operations and cybersecurity, Dr. Robinson brings a unique perspective to managing vulnerabilities in today’s ever-evolving threat landscape. During the episode, Dr. Robinson shares her journey from IT operations to earning a doctorate in cybersecurity, highlighting the pivotal moments that shaped her approach to vulnerability management. She emphasizes the importance of looking beyond patching to address the broader aspects of risk reduction, including human factors, automation, and AI. Whether you are a seasoned cybersecurity professional or someone looking to strengthen your organization’s approach to vulnerabilities, this episode is packed with actionable insights and strategies. As a bonus, Dr. Robinson shares her thoughts on the differences between vulnerability management practices in the U.S. and Europe, and how global frameworks like NIST are fostering consistency across borders.</p><br><p>Chapters:</p><p>0:00 Introduction</p><p>4:31 Nikki’s Journey in Cybersecurity</p><p>7:57 Defining Vulnerability Management</p><p>10:35 Key takeaways from her book on Effective Vulnerability Management</p><p>22:00 First Steps to Mature Vulnerability Management</p><p>29:10 Prioritizing Vulnerabilities Beyond CVSS Scores</p><p>32:30 Automation in Vulnerability Management</p><p>39:15 Governance and Vulnerability Management</p><p>44:20 Key Takeaways</p><br><p>Resources:</p><p>Dr. Nikki Robinson’s books:&nbsp;<em>Effective Vulnerability Management</em>&nbsp;and&nbsp;<em>Mind the Tech Gap</em></p><br><p>Security Fatigue: https://www.researchgate.net/publication/361595380_Stress_Burnout_and_Security_Fatigue_in_Cybersecurity_A_Human_Factors_Problem</p><br><p>Human Factors Security Engineering: https://www.tandfonline.com/doi/full/10.1080/07366981.2023.2211429</p><br><p>Human Factors in Cybersecurity: https://dl.acm.org/doi/abs/10.1145/3537674.3555782</p><br><p>Vulnerability Chaining Blog parts 1 and 2: https://blog.stackaware.com/p/vulnerability-chaining-part-1-a-logical </p><br><p>Connect with Nikki: https://www.linkedin.com/in/dr-nikki-robinson/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Bibi van den Berg (LEI): “Why traditional risk management falls short in cyber security"]]></title>
			<itunes:title><![CDATA[Bibi van den Berg (LEI): “Why traditional risk management falls short in cyber security"]]></itunes:title>
			<pubDate>Thu, 31 Oct 2024 04:00:07 GMT</pubDate>
			<itunes:duration>55:04</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/671fbccf9b2f915baeafaf2b/media.mp3" length="132176640" type="audio/mpeg"/>
			<guid isPermaLink="false">671fbccf9b2f915baeafaf2b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/bibi-van-den-berg-lei-why-traditional-risk-management-falls-</link>
			<acast:episodeId>671fbccf9b2f915baeafaf2b</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>bibi-van-den-berg-lei-why-traditional-risk-management-falls-</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOqefSV88BAI6d5AIyJLV3UCMmo0QU41BFaNGZOyJ7uxeEizOvEHu1BrcaPkGzqJeitWwkBTx5lIUIzsfg6omxwO]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this thought-provoking episode of Reinvent Security as they sit down with Prof. Dr. Bibi van den Berg, a renowned expert in cybersecurity governance. Bibi shares her unique perspective on the limitations of traditional risk management approaches in the rapidly evolving cyber landscape. She introduces the concept of value-driven decision-making, emphasizing the need to align security practices with organizational values, not just numbers. Discover how human behavior, technology, and regulations intertwine in cybersecurity, why data limitations pose significant challenges, and how organizations can rethink their approach to managing cyber risk. Whether you’re a seasoned security professional or new to the field, this episode offers fresh insights and practical advice to help you navigate the complexities of today’s cybersecurity challenges.</p><br><p>Chapters:</p><p>00:00 - 03:04 Introduction of the episode and Prof.dr. Bibi van den Berg</p><p>03:44 - 06:03 How is Bibi contributing to reinventing security?</p><p>06:04 - 08:05 Safety Science vs. Cyber Risk Management</p><p>08:06 -  09:47 What inspired Bib to focus on Value Driven Decision Making?</p><p>09:48 -  21:19 What would be the main limitations of traditional risk management?</p><p>21:20 - 25:47 How does value driven decision making for risk differ?</p><p>25:48 - 28:52 Asset prioritization and value driven decision making</p><p>28:53 - 32:42 The challenge with board and the need to quantify</p><p>32:43 - 43:32 How can organizations define their core values?</p><p>43:33 - 48:49 Common challenges for organizations in transition to a more value based decision making approach</p><p>48:50 - 55:04 Key takeaways Jeroen &amp; Irfaan</p><br><p>Connect with Bibi: https://www.linkedin.com/in/bibivandenberg/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this thought-provoking episode of Reinvent Security as they sit down with Prof. Dr. Bibi van den Berg, a renowned expert in cybersecurity governance. Bibi shares her unique perspective on the limitations of traditional risk management approaches in the rapidly evolving cyber landscape. She introduces the concept of value-driven decision-making, emphasizing the need to align security practices with organizational values, not just numbers. Discover how human behavior, technology, and regulations intertwine in cybersecurity, why data limitations pose significant challenges, and how organizations can rethink their approach to managing cyber risk. Whether you’re a seasoned security professional or new to the field, this episode offers fresh insights and practical advice to help you navigate the complexities of today’s cybersecurity challenges.</p><br><p>Chapters:</p><p>00:00 - 03:04 Introduction of the episode and Prof.dr. Bibi van den Berg</p><p>03:44 - 06:03 How is Bibi contributing to reinventing security?</p><p>06:04 - 08:05 Safety Science vs. Cyber Risk Management</p><p>08:06 -  09:47 What inspired Bib to focus on Value Driven Decision Making?</p><p>09:48 -  21:19 What would be the main limitations of traditional risk management?</p><p>21:20 - 25:47 How does value driven decision making for risk differ?</p><p>25:48 - 28:52 Asset prioritization and value driven decision making</p><p>28:53 - 32:42 The challenge with board and the need to quantify</p><p>32:43 - 43:32 How can organizations define their core values?</p><p>43:33 - 48:49 Common challenges for organizations in transition to a more value based decision making approach</p><p>48:50 - 55:04 Key takeaways Jeroen &amp; Irfaan</p><br><p>Connect with Bibi: https://www.linkedin.com/in/bibivandenberg/</p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Sander Zwiebel (NN Group) on DORA: "The Final Countdown"]]></title>
			<itunes:title><![CDATA[Sander Zwiebel (NN Group) on DORA: "The Final Countdown"]]></itunes:title>
			<pubDate>Thu, 26 Sep 2024 03:00:41 GMT</pubDate>
			<itunes:duration>58:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/66ed35410807ffb4e8a03df6/media.mp3" length="140751360" type="audio/mpeg"/>
			<guid isPermaLink="false">66ed35410807ffb4e8a03df6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/sander-zwiebel-nn-on-dora-the-final-countdown</link>
			<acast:episodeId>66ed35410807ffb4e8a03df6</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>sander-zwiebel-nn-on-dora-the-final-countdown</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOpoTulGX5nj/gdoD23X5R4qLbE98qLYpF3Zv3tc8e9/0lDXdRuHQM2Fj4grEyAjQSW+mvcFwWlz9xQRvDRLIhhH]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe as they dive in the world of DORA, together with Sander Zwiebel (NN). During this episode we discuss what DORA is, why it came to existence, the scope of DORA and challenges and solutions directions for getting DORA implemented. It is the FINAL COUNT DOWN because organizations in scope for DORA have to comply by January 2025.</p><br><p>Chapters:</p><p>0:00 Introduction to DORA</p><p>01:02 Introduction of the episode and Sander Zwiebel</p><p>09:01 Introduction of DORA</p><p>13:06 DORA's Impact on Security</p><p>17:39 DORA's Impact on Financial Industry and Third-Party Management</p><p>28:59 Implementation Challenges Ahead</p><p>35:55 Tips for Successful DORA Implementation</p><p>40:55 Future of Regulatory Landscape</p><p>45:47 Closing Thoughts on Compliance and Security</p><p>52:50 Conclusion and Next Steps</p><br><p>Resources:</p><p>DORA formal law Digital Operational Resilience Act: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022R2554&amp;qid=1727030708806</p><br><p>DORA regulatory technical standards or RTS: https://www.eiopa.europa.eu/publications/second-batch-policy-products-under-dora_en</p><br><p>DORA Questions and answers, joinedly done by the ESA’s (Eiopa, EBA, ESMA): https://www.eiopa.europa.eu/about/governance-structure/joint-committee/joint-qas_en</p><br><p>ESA link to a dry run exercise on the information register, in order to learn as supervisor and supervisee how the information register is going to work on both sides: https://www.eiopa.europa.eu/esas-publish-templates-and-tools-voluntary-dry-run-exercise-support-dora-implementation-2024-05-30_en</p><br><p>Dutch National Bank (DNB) link to DORA: https://www.google.com/url?q=https://www.dnb.nl/en/sector-information/open-book-supervision/laws-and-eu-regulations/dora/&amp;source=gmail&amp;ust=1727370130061000&amp;usg=AOvVaw3GieR7OhPwfIElBvDRye_m</p><br><p>Connect with Sander: <a href="https://www.linkedin.com/in/sander-zwiebel-241a16" rel="noopener noreferrer" target="_blank">linkedin.com/in/sander-zwiebel-241a16</a></p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe as they dive in the world of DORA, together with Sander Zwiebel (NN). During this episode we discuss what DORA is, why it came to existence, the scope of DORA and challenges and solutions directions for getting DORA implemented. It is the FINAL COUNT DOWN because organizations in scope for DORA have to comply by January 2025.</p><br><p>Chapters:</p><p>0:00 Introduction to DORA</p><p>01:02 Introduction of the episode and Sander Zwiebel</p><p>09:01 Introduction of DORA</p><p>13:06 DORA's Impact on Security</p><p>17:39 DORA's Impact on Financial Industry and Third-Party Management</p><p>28:59 Implementation Challenges Ahead</p><p>35:55 Tips for Successful DORA Implementation</p><p>40:55 Future of Regulatory Landscape</p><p>45:47 Closing Thoughts on Compliance and Security</p><p>52:50 Conclusion and Next Steps</p><br><p>Resources:</p><p>DORA formal law Digital Operational Resilience Act: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022R2554&amp;qid=1727030708806</p><br><p>DORA regulatory technical standards or RTS: https://www.eiopa.europa.eu/publications/second-batch-policy-products-under-dora_en</p><br><p>DORA Questions and answers, joinedly done by the ESA’s (Eiopa, EBA, ESMA): https://www.eiopa.europa.eu/about/governance-structure/joint-committee/joint-qas_en</p><br><p>ESA link to a dry run exercise on the information register, in order to learn as supervisor and supervisee how the information register is going to work on both sides: https://www.eiopa.europa.eu/esas-publish-templates-and-tools-voluntary-dry-run-exercise-support-dora-implementation-2024-05-30_en</p><br><p>Dutch National Bank (DNB) link to DORA: https://www.google.com/url?q=https://www.dnb.nl/en/sector-information/open-book-supervision/laws-and-eu-regulations/dora/&amp;source=gmail&amp;ust=1727370130061000&amp;usg=AOvVaw3GieR7OhPwfIElBvDRye_m</p><br><p>Connect with Sander: <a href="https://www.linkedin.com/in/sander-zwiebel-241a16" rel="noopener noreferrer" target="_blank">linkedin.com/in/sander-zwiebel-241a16</a></p><br><p>Subscribe to this channel to find all new episodes:</p><p>https://youtube.com/@reinventsecurity?feature=shared</p><br><p>Listen on:</p><p>Spotify: https://ap.lc/SzTrY</p><p>Apple Podcasts: https://ap.lc/HmXhf</p><br><p>FOLLOW ►</p><p>Jeroen Prinse</p><p>LinkedIn: https://www.linkedin.com/in/jprinse/</p><br><p>Irfaan Santoe:</p><p>LinkedIn: https://www.linkedin.com/in/irfaansantoe/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Steve Hollands (BQCM): "The future of security is quantum-proof: Start preparing today!"]]></title>
			<itunes:title><![CDATA[Steve Hollands (BQCM): "The future of security is quantum-proof: Start preparing today!"]]></itunes:title>
			<pubDate>Thu, 29 Aug 2024 03:00:22 GMT</pubDate>
			<itunes:duration>50:33</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/66cdf0ad407cbc46095dfa18/media.mp3" length="121325760" type="audio/mpeg"/>
			<guid isPermaLink="false">66cdf0ad407cbc46095dfa18</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/steve-hollands-bqcm-the-future-of-security-is-quantum-proof-</link>
			<acast:episodeId>66cdf0ad407cbc46095dfa18</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>steve-hollands-bqcm-the-future-of-security-is-quantum-proof-</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOpUFUnwZ0dAFHpVZr1qltskLx23un3XlM6rNO1opCrSNqMoThUCfXRuiHz4Y8zI19UmGMJnZFZrVZZ/ztcC3R0k]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this thought-provoking episode of Reinvent Security as they welcome quantum computing and security expert Steve Hollands, Chair of the Board at Blackhills Quantum Computing. Steve dives deep into the fascinating and complex world of quantum computing, discussing its far-reaching implications for the future of cybersecurity. From the looming threat of quantum computers breaking traditional encryption to the opportunities quantum key distribution offers, this episode covers the cutting-edge advancements that could revolutionize security as we know it. Discover how AI and quantum computing could drastically shorten the timeline for encryption vulnerabilities, why businesses need to start preparing today, and the importance of crypto agility in a post-quantum world. Whether you're an IT professional, a cybersecurity enthusiast, or just curious about the future of technology, this episode delivers expert insights and actionable advice to help you stay ahead of the curve in the quantum era.</p><br><p>Chapters:</p><p>00:00 Welcome to the podcast</p><p>00:35 Introduction of the episode and Steve Hollands</p><p>02:53 How is Steve contributing to Quantum proof security?</p><p>04:49 How does quantum computing differ from traditional silicon based computing?</p><p>08:53 How does quantum computing impact the field of information security?</p><p>12:16 What is the timeframe of quantum computing threats and opportunities?</p><p>15:26 What is quantum safe cryptography and what are researchers doing?</p><p>16:37 Crypto agility is a key security principle in any security strategy</p><p>18:27 Are actors using quantum capabilities everybody's problem?</p><p>20:54 How a Quantum Readiness Framework can help organizations towards a post quantum security strategy?</p><p>24:06 What steps should organizations be taking now to prepare for the future impact of quantum computing on their security infrastructure?</p><p>29:46 How to create a Quantum Secure Defense in Depth Strategy?</p><p>34:57 What other steps should organizations take to prepare for the future impact of quantum computing on their security infrastructure?</p><p>36:24 What are the regulatory and ethical considerations that come with the rise of quantum computing in information security?</p><p>37:09 Resources for your journey into quantum and security</p><p>38:26 Which board member is driving the change towards a post quantum organization?</p><p>41:38 Can we make quantum secure cryptography a service for the organization?</p><p>44:03 Wrap Up</p><br><p>Resources:</p><p>Forbes: https://www.forbes.com/sites/adrianbridgwater/2018/01/03/neuromorphic-computing-will-build-human-like-machine-brains/</p><p>Nature: https://www.nature.com/articles/s41928-021-00646-1</p><p>McKinsey, timeline for Q-Day: https://www.linkedin.com/posts/activity-7229084010952478720-9nku</p><p>Blackhills new website: https://www.blackhillsquantum.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this thought-provoking episode of Reinvent Security as they welcome quantum computing and security expert Steve Hollands, Chair of the Board at Blackhills Quantum Computing. Steve dives deep into the fascinating and complex world of quantum computing, discussing its far-reaching implications for the future of cybersecurity. From the looming threat of quantum computers breaking traditional encryption to the opportunities quantum key distribution offers, this episode covers the cutting-edge advancements that could revolutionize security as we know it. Discover how AI and quantum computing could drastically shorten the timeline for encryption vulnerabilities, why businesses need to start preparing today, and the importance of crypto agility in a post-quantum world. Whether you're an IT professional, a cybersecurity enthusiast, or just curious about the future of technology, this episode delivers expert insights and actionable advice to help you stay ahead of the curve in the quantum era.</p><br><p>Chapters:</p><p>00:00 Welcome to the podcast</p><p>00:35 Introduction of the episode and Steve Hollands</p><p>02:53 How is Steve contributing to Quantum proof security?</p><p>04:49 How does quantum computing differ from traditional silicon based computing?</p><p>08:53 How does quantum computing impact the field of information security?</p><p>12:16 What is the timeframe of quantum computing threats and opportunities?</p><p>15:26 What is quantum safe cryptography and what are researchers doing?</p><p>16:37 Crypto agility is a key security principle in any security strategy</p><p>18:27 Are actors using quantum capabilities everybody's problem?</p><p>20:54 How a Quantum Readiness Framework can help organizations towards a post quantum security strategy?</p><p>24:06 What steps should organizations be taking now to prepare for the future impact of quantum computing on their security infrastructure?</p><p>29:46 How to create a Quantum Secure Defense in Depth Strategy?</p><p>34:57 What other steps should organizations take to prepare for the future impact of quantum computing on their security infrastructure?</p><p>36:24 What are the regulatory and ethical considerations that come with the rise of quantum computing in information security?</p><p>37:09 Resources for your journey into quantum and security</p><p>38:26 Which board member is driving the change towards a post quantum organization?</p><p>41:38 Can we make quantum secure cryptography a service for the organization?</p><p>44:03 Wrap Up</p><br><p>Resources:</p><p>Forbes: https://www.forbes.com/sites/adrianbridgwater/2018/01/03/neuromorphic-computing-will-build-human-like-machine-brains/</p><p>Nature: https://www.nature.com/articles/s41928-021-00646-1</p><p>McKinsey, timeline for Q-Day: https://www.linkedin.com/posts/activity-7229084010952478720-9nku</p><p>Blackhills new website: https://www.blackhillsquantum.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Ashish Rajan (Kaizenteq): "Data Sovereignty Will Define the Future of Cloud Security and Compliance"]]></title>
			<itunes:title><![CDATA[Ashish Rajan (Kaizenteq): "Data Sovereignty Will Define the Future of Cloud Security and Compliance"]]></itunes:title>
			<pubDate>Thu, 25 Jul 2024 03:00:04 GMT</pubDate>
			<itunes:duration>50:26</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/66a0084cd539da6f0989aa7e/media.mp3" length="121076160" type="audio/mpeg"/>
			<guid isPermaLink="false">66a0084cd539da6f0989aa7e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/ashish-rajan-kaizenteq-data-sovereignty-will-define-the-futu</link>
			<acast:episodeId>66a0084cd539da6f0989aa7e</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>ashish-rajan-kaizenteq-data-sovereignty-will-define-the-futu</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOqV8/GSDys41UD2kEI47FwRYMILRz/QBAOMQs4e392wXvDKigFtKu9Xddb6JbRHZM9uXwG0/fLpm68yRmt/b8Dc]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this enlightening episode of Reinvent Security as they sit down with cloud security expert Ashish Rajan, founder of Kaizenteq and host of the Cloud Security Podcast. With 250+ cloud security podcasts to his name Ashish shares invaluable insights into the evolving landscape of cloud security, discussing key challenges, best practices, and future trends. Discover the importance of identity and access management, strategies to prevent misconfigurations, and how to balance data sovereignty with cloud service capabilities. Learn why incident response in the cloud needs more focus and how to strategically select the right tools for your cloud security needs. Whether you're a seasoned professional or new to cloud security, this episode offers actionable advice and deep expertise to help you navigate the complexities of securing your cloud environments.</p><br><p>Chapters:</p><p>0:35 introduction</p><p>4:11 How is Ashish contributing to Cloud Security and AI?</p><p>08:30 Primary Cloud Security Challenge</p><p>13:22 Cloud Security Best Practices</p><p>23:10 The latest exciting trends in Cloud Security</p><p>29:18 How is data sovereignty impacting Cloud Security strategies?</p><p>34:30 Emerging threats and opportunities</p><p>37:20 Top 3 things to focus on starting tomorrow</p><p>40:11 Resources for your Cloud Security journey</p><p>44:05 Wrap up</p><br><p>Resources:</p><p>- Cloud Security Podcast - www.cloudsecuritypodcast.tv</p><p>- Cloud Security Bootcamp - www.cloudsecuritybootcamp.com</p><p>- Cloud Security Newsletter - www.cloudsecuritynewsletter.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe in this enlightening episode of Reinvent Security as they sit down with cloud security expert Ashish Rajan, founder of Kaizenteq and host of the Cloud Security Podcast. With 250+ cloud security podcasts to his name Ashish shares invaluable insights into the evolving landscape of cloud security, discussing key challenges, best practices, and future trends. Discover the importance of identity and access management, strategies to prevent misconfigurations, and how to balance data sovereignty with cloud service capabilities. Learn why incident response in the cloud needs more focus and how to strategically select the right tools for your cloud security needs. Whether you're a seasoned professional or new to cloud security, this episode offers actionable advice and deep expertise to help you navigate the complexities of securing your cloud environments.</p><br><p>Chapters:</p><p>0:35 introduction</p><p>4:11 How is Ashish contributing to Cloud Security and AI?</p><p>08:30 Primary Cloud Security Challenge</p><p>13:22 Cloud Security Best Practices</p><p>23:10 The latest exciting trends in Cloud Security</p><p>29:18 How is data sovereignty impacting Cloud Security strategies?</p><p>34:30 Emerging threats and opportunities</p><p>37:20 Top 3 things to focus on starting tomorrow</p><p>40:11 Resources for your Cloud Security journey</p><p>44:05 Wrap up</p><br><p>Resources:</p><p>- Cloud Security Podcast - www.cloudsecuritypodcast.tv</p><p>- Cloud Security Bootcamp - www.cloudsecuritybootcamp.com</p><p>- Cloud Security Newsletter - www.cloudsecuritynewsletter.com</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Paul Watts (ISF): “Here is what it takes to be a NextGen CISO!”</title>
			<itunes:title>Paul Watts (ISF): “Here is what it takes to be a NextGen CISO!”</itunes:title>
			<pubDate>Thu, 27 Jun 2024 10:08:20 GMT</pubDate>
			<itunes:duration>1:01:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/667aa97f54d76294c6795877/media.mp3" length="148768320" type="audio/mpeg"/>
			<guid isPermaLink="false">667aa97f54d76294c6795877</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/paul-watts-isf-here-is-what-it-takes-to-be-a-nextgen-ciso</link>
			<acast:episodeId>667aa97f54d76294c6795877</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>paul-watts-isf-here-is-what-it-takes-to-be-a-nextgen-ciso</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOpj6nrH2+zRPKk3xsX9fdJQVGSFbUXjWahIizLEPeUufFiOa2SPMYirRu80h9uf4OWlvYDfjgCqsXXmciqtRYJM]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>This episode of re:invent security shares what it takes to be the next generation (NextGen) CISO. Our guest Paul Watts, a multiple times CISOs at companies like Kantar, Domino’s Pizza UK &amp; Ireland, Network Rail, clarifies what it takes to be the NextGen CISO. Key questions discussed are: “What are the expectations from Business/IT leaders hiring these NextGen CISOs?”, “What transformation should CISOs explicitly consider staying relevant as CISO?”, “What is most important AND challenging for the NextGen CISOs to fulfill these expectations and how can they go about it?”. Dive into the conversation with Paul, someone that has been there, done that, now sharing this!</p><br><p>Resources:</p><p>Paper 1 - Unlocking the business value of security -&nbsp;<a href="https://www.securityforum.org/solutions-and-insights/leadership-insights-unlocking-the-business-value-of-security/" rel="noopener noreferrer" target="_blank">Leadership Insights: Unlocking the business value of security - Information Security Forum</a></p><br><p>Paper 2 - Exploring the role of the BISO -&nbsp;<a href="https://www.securityforum.org/solutions-and-insights/leadership-insights-exploring-the-role-of-the-business-information-security-officer-biso/" rel="noopener noreferrer" target="_blank">Leadership Insights: Exploring the role of the Business Information Security Officer (BISO) - Information Security Forum</a></p><br><p>Paper 3 - Looking to the future - is yet to be published publicly&nbsp;(link will be added later).</p><br><p>Paper&nbsp;4&nbsp;- Modelling the security leader - to be published to ISF Members on July 1st.&nbsp;Synopsis ...</p><p><em>The definition of a security leader continues to suffer from ambiguity, with misaligned expectations between business and incumbent a principal cause of stress and – somewhat inevitably – short tenures and disappointment for both employee&nbsp;and employer. We describe how the role could be better modelled, qualifying its fundamental criteria and providing some guidance on what qualities to look for, and what to not over-rely upon.</em></p><br><p>Paper 5 - <a href="https://www.nominet.uk/nominet-ciso-stress-report-one-year-on/" rel="noopener noreferrer" target="_blank">Nominet CISO Stress Report: businesses get £23k ($30k) ‘free’ CISO time while impact of stress on mental health doubles in 2020 - Nominet</a></p><br><p>Other interview with Paul:&nbsp;<a href="https://www.inforisktoday.com/new-security-leader-less-techy-more-business-savvy-a-25534?utm_source=LinkedIn&amp;utm_medium=ISMGSM&amp;utm_campaign=Editorial" rel="noopener noreferrer" target="_blank">The New Security Leader: Less Techie, More Business Savvy (inforisktoday.com)</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This episode of re:invent security shares what it takes to be the next generation (NextGen) CISO. Our guest Paul Watts, a multiple times CISOs at companies like Kantar, Domino’s Pizza UK &amp; Ireland, Network Rail, clarifies what it takes to be the NextGen CISO. Key questions discussed are: “What are the expectations from Business/IT leaders hiring these NextGen CISOs?”, “What transformation should CISOs explicitly consider staying relevant as CISO?”, “What is most important AND challenging for the NextGen CISOs to fulfill these expectations and how can they go about it?”. Dive into the conversation with Paul, someone that has been there, done that, now sharing this!</p><br><p>Resources:</p><p>Paper 1 - Unlocking the business value of security -&nbsp;<a href="https://www.securityforum.org/solutions-and-insights/leadership-insights-unlocking-the-business-value-of-security/" rel="noopener noreferrer" target="_blank">Leadership Insights: Unlocking the business value of security - Information Security Forum</a></p><br><p>Paper 2 - Exploring the role of the BISO -&nbsp;<a href="https://www.securityforum.org/solutions-and-insights/leadership-insights-exploring-the-role-of-the-business-information-security-officer-biso/" rel="noopener noreferrer" target="_blank">Leadership Insights: Exploring the role of the Business Information Security Officer (BISO) - Information Security Forum</a></p><br><p>Paper 3 - Looking to the future - is yet to be published publicly&nbsp;(link will be added later).</p><br><p>Paper&nbsp;4&nbsp;- Modelling the security leader - to be published to ISF Members on July 1st.&nbsp;Synopsis ...</p><p><em>The definition of a security leader continues to suffer from ambiguity, with misaligned expectations between business and incumbent a principal cause of stress and – somewhat inevitably – short tenures and disappointment for both employee&nbsp;and employer. We describe how the role could be better modelled, qualifying its fundamental criteria and providing some guidance on what qualities to look for, and what to not over-rely upon.</em></p><br><p>Paper 5 - <a href="https://www.nominet.uk/nominet-ciso-stress-report-one-year-on/" rel="noopener noreferrer" target="_blank">Nominet CISO Stress Report: businesses get £23k ($30k) ‘free’ CISO time while impact of stress on mental health doubles in 2020 - Nominet</a></p><br><p>Other interview with Paul:&nbsp;<a href="https://www.inforisktoday.com/new-security-leader-less-techy-more-business-savvy-a-25534?utm_source=LinkedIn&amp;utm_medium=ISMGSM&amp;utm_campaign=Editorial" rel="noopener noreferrer" target="_blank">The New Security Leader: Less Techie, More Business Savvy (inforisktoday.com)</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Toon Segers (Roseman Labs): "Multi-Party Computation for Secure, Private Data Collaboration"]]></title>
			<itunes:title><![CDATA[Toon Segers (Roseman Labs): "Multi-Party Computation for Secure, Private Data Collaboration"]]></itunes:title>
			<pubDate>Thu, 30 May 2024 03:00:08 GMT</pubDate>
			<itunes:duration>53:20</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/665651a21eb8ac001117ef91/media.mp3" length="128016960" type="audio/mpeg"/>
			<guid isPermaLink="false">665651a21eb8ac001117ef91</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/toon-segers-roseman-labs-multi-party-computation-for-secure-</link>
			<acast:episodeId>665651a21eb8ac001117ef91</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>toon-segers-roseman-labs-multi-party-computation-for-secure-</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOqCudLrxO6JLFUxK9O+nFLchQQscbtv8i9oSoqJftxUQ8donJCNwu7sRmXaRbEqzvFb+g6+EcZ604TqtGbzj18T]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe as they dive into the world of multi-party computation with expert Toon Segers. In this episode, they explore how multi-party computation keeps data secure when collaborating, sharing and analyzing the data with partners, without exposing sensitive information. Toon Segers, co-founder of Roseman Labs and PhD candidate in mathematics and cryptography, explains the revolutionary changes this technology brings to data security and privacy of individuals, offering a promising solution to prevent data breaches and maintain confidentiality and privacy. Discover the future of data security and privacy and learn how multi-party computation is re:inventing the landscape of information security.</p><br><p><strong>Resources</strong></p><p>Multi Party Computation Wikipedia page: https://en.wikipedia.org/wiki/Secure_multi-party_computation</p><p>MPyC framework from TU Eindhoven: https://github.com/lschoe/mpyc</p><p>The Whitehouse on advancing Privacy-Enhancing Technologies: https://www.whitehouse.gov/ostp/news-updates/2022/06/28/advancing-a-vision-for-privacy-enhancing-technologies/</p><p>Roseman Labs website: https://rosemanlabs.com/en/</p><p>Collaborative Computing Slack community :  https://collabcomputing.slack.com/</p><br><p>A correction: at 31:55 Toon states that the large Intel server has 192 CPUs, which should instead be 192 cores.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join hosts Jeroen Prinse and Irfaan Santoe as they dive into the world of multi-party computation with expert Toon Segers. In this episode, they explore how multi-party computation keeps data secure when collaborating, sharing and analyzing the data with partners, without exposing sensitive information. Toon Segers, co-founder of Roseman Labs and PhD candidate in mathematics and cryptography, explains the revolutionary changes this technology brings to data security and privacy of individuals, offering a promising solution to prevent data breaches and maintain confidentiality and privacy. Discover the future of data security and privacy and learn how multi-party computation is re:inventing the landscape of information security.</p><br><p><strong>Resources</strong></p><p>Multi Party Computation Wikipedia page: https://en.wikipedia.org/wiki/Secure_multi-party_computation</p><p>MPyC framework from TU Eindhoven: https://github.com/lschoe/mpyc</p><p>The Whitehouse on advancing Privacy-Enhancing Technologies: https://www.whitehouse.gov/ostp/news-updates/2022/06/28/advancing-a-vision-for-privacy-enhancing-technologies/</p><p>Roseman Labs website: https://rosemanlabs.com/en/</p><p>Collaborative Computing Slack community :  https://collabcomputing.slack.com/</p><br><p>A correction: at 31:55 Toon states that the large Intel server has 192 CPUs, which should instead be 192 cores.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Sunette Runhaar (Uber): "Why managing Insider Threat is so challenging, and how to start"  ]]></title>
			<itunes:title><![CDATA[Sunette Runhaar (Uber): "Why managing Insider Threat is so challenging, and how to start"  ]]></itunes:title>
			<pubDate>Thu, 25 Apr 2024 03:00:23 GMT</pubDate>
			<itunes:duration>53:49</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/6629149f178a94001289adbb/media.mp3" length="129167040" type="audio/mpeg"/>
			<guid isPermaLink="false">6629149f178a94001289adbb</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/sunette-runhaar-uber-on-managing-insider-threat</link>
			<acast:episodeId>6629149f178a94001289adbb</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>sunette-runhaar-uber-on-managing-insider-threat</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOoRv8GwFTSI+JjdF1H8PwCTRnMNXdApTkQM6JExg31vOGWyuGnjBxXu0sve/tS2t85+JJTMy7hLsmS4Vc4qlVkA]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>Insider Threat deals with the fact that every employee in the organization is a potential threat. How does one identify the actual threats and how to act and respond to them? What are the good practices to scale mitigation of the Insider Threat? What are the differences in Insider Threat Programs across different regions like the US and EU? All these questions are addressed by Sunette Runhaar from Uber.</p><br><p>Resources:</p><p><br></p><ul><li>'<a href="https://a.co/d/iFOUuds" rel="noopener noreferrer" target="_blank">Never split the difference: Negotiating as if your life depended on it</a>' - Chriss Voss and Tahl Raz. This is essential reading to help manage tricky stakeholder relationships, but really helps understand the mindset of what motivates people in daily life.&nbsp;</li><li>'<a href="https://a.co/d/c6ykcE3" rel="noopener noreferrer" target="_blank">The Culture Map: Breaking the Through the Invisible Boundaries of Global Business</a>' - Erin Meyer. Great reading to understand how different business cultures affect perceptions in the workplace and interpersonal relationships.&nbsp;</li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Insider Threat deals with the fact that every employee in the organization is a potential threat. How does one identify the actual threats and how to act and respond to them? What are the good practices to scale mitigation of the Insider Threat? What are the differences in Insider Threat Programs across different regions like the US and EU? All these questions are addressed by Sunette Runhaar from Uber.</p><br><p>Resources:</p><p><br></p><ul><li>'<a href="https://a.co/d/iFOUuds" rel="noopener noreferrer" target="_blank">Never split the difference: Negotiating as if your life depended on it</a>' - Chriss Voss and Tahl Raz. This is essential reading to help manage tricky stakeholder relationships, but really helps understand the mindset of what motivates people in daily life.&nbsp;</li><li>'<a href="https://a.co/d/c6ykcE3" rel="noopener noreferrer" target="_blank">The Culture Map: Breaking the Through the Invisible Boundaries of Global Business</a>' - Erin Meyer. Great reading to understand how different business cultures affect perceptions in the workplace and interpersonal relationships.&nbsp;</li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[ Rob van der Veer: "Treat Artificial Intelligence as Software Initiatives"]]></title>
			<itunes:title><![CDATA[ Rob van der Veer: "Treat Artificial Intelligence as Software Initiatives"]]></itunes:title>
			<pubDate>Thu, 28 Mar 2024 04:30:28 GMT</pubDate>
			<itunes:duration>51:01</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/65eebea9c2dc6500175eda35/media.mp3" length="122472960" type="audio/mpeg"/>
			<guid isPermaLink="false">65eebea9c2dc6500175eda35</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/robvanderveer</link>
			<acast:episodeId>65eebea9c2dc6500175eda35</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>robvanderveer</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmfwL2jaMW9OfVjpl1A481t14TmPPNBt/QBdFV0cjQSq6O95gGg1G5VX1qUALnMwOy84DIRWdD816dQkEuoT9tdZcw4nzNpKy8paE/xxSv+Wno2nHPLxOmQS3m1107wgqT/3i1Jw7AG8hePpITcYM4L2ZciR06TWBgPXnx1O/pIe5/1SI6cam31MGLuHT5Bt1rCwqFHyBDuxuDhXqrcIVxOrENyzgTEfdrx+IL3yq0RzCzmnJ4v8TCxszbS3NUroH5sq9F/4YhZVhXIabsrI7h0JyECl/Sqv3XCQNVqMPxTEV]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[<p>What is the relationship between AI and Security? Learn from world industry expert Rob van der Veer what to consider when securing AI. This episode goes into detail about the security risks of developing AI and sheds light on how to start tomorrow with securing AI. We also discuss the upward risk of AI, what benefits will AI have and is having on doing security better!</p><br><p><strong>Resources:</strong></p><ul><li><a href="Opencre.org" rel="noopener noreferrer" target="_blank">OpenCRE</a></li><li><a href="Opencre.org/chatbot" rel="noopener noreferrer" target="_blank">OpenCRE chat</a></li><li><a href="owaspai.org" rel="noopener noreferrer" target="_blank">OWASP AI Exchange</a></li><li><a href="https://www.softwareimprovementgroup.com/iso-5338-get-to-know-the-global-standard-on-ai-systems/" rel="noopener noreferrer" target="_blank">5338 blog</a></li><li><a href="https://www.iec.ch/blog/improving-processes-developing-ai-systems" rel="noopener noreferrer" target="_blank">IEC on 5338</a></li><li><a href="https://owaspsamm.org/guidance/agile/" rel="noopener noreferrer" target="_blank">SAMM Agile guidance</a></li><li><a href="https://www.softwareimprovementgroup.com/averting-a-major-ai-crisis-we-need-to-fix-the-big-quality-gap-in-ai-systems/" rel="noopener noreferrer" target="_blank">AI software quality gap research</a></li><li><a href="https://www.youtube.com/watch?v=bk-nQ7HF6k4" rel="noopener noreferrer" target="_blank">Diary of CEO podcast met Mo Gawdat</a></li><li><a href="https://www.bol.com/nl/nl/f/scary-smart/9300000028854483/" rel="noopener noreferrer" target="_blank">Mo Gawdat - Scary Smart</a></li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>What is the relationship between AI and Security? Learn from world industry expert Rob van der Veer what to consider when securing AI. This episode goes into detail about the security risks of developing AI and sheds light on how to start tomorrow with securing AI. We also discuss the upward risk of AI, what benefits will AI have and is having on doing security better!</p><br><p><strong>Resources:</strong></p><ul><li><a href="Opencre.org" rel="noopener noreferrer" target="_blank">OpenCRE</a></li><li><a href="Opencre.org/chatbot" rel="noopener noreferrer" target="_blank">OpenCRE chat</a></li><li><a href="owaspai.org" rel="noopener noreferrer" target="_blank">OWASP AI Exchange</a></li><li><a href="https://www.softwareimprovementgroup.com/iso-5338-get-to-know-the-global-standard-on-ai-systems/" rel="noopener noreferrer" target="_blank">5338 blog</a></li><li><a href="https://www.iec.ch/blog/improving-processes-developing-ai-systems" rel="noopener noreferrer" target="_blank">IEC on 5338</a></li><li><a href="https://owaspsamm.org/guidance/agile/" rel="noopener noreferrer" target="_blank">SAMM Agile guidance</a></li><li><a href="https://www.softwareimprovementgroup.com/averting-a-major-ai-crisis-we-need-to-fix-the-big-quality-gap-in-ai-systems/" rel="noopener noreferrer" target="_blank">AI software quality gap research</a></li><li><a href="https://www.youtube.com/watch?v=bk-nQ7HF6k4" rel="noopener noreferrer" target="_blank">Diary of CEO podcast met Mo Gawdat</a></li><li><a href="https://www.bol.com/nl/nl/f/scary-smart/9300000028854483/" rel="noopener noreferrer" target="_blank">Mo Gawdat - Scary Smart</a></li></ul><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Welcome to re:invent security</title>
			<itunes:title>Welcome to re:invent security</itunes:title>
			<pubDate>Wed, 27 Mar 2024 14:48:47 GMT</pubDate>
			<itunes:duration>1:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/65dca498fe0966001661def9/e/6602c76572a01e001631e170/media.mp3" length="3101760" type="audio/mpeg"/>
			<guid isPermaLink="false">6602c76572a01e001631e170</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/reinvent-security/episodes/welcome-to-reinvent-security</link>
			<acast:episodeId>6602c76572a01e001631e170</acast:episodeId>
			<acast:showId>65dca498fe0966001661def9</acast:showId>
			<acast:episodeUrl>welcome-to-reinvent-security</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs6BGSAuCZcFG8VqTyenQHypRlwqAvnsKz2kSxkloecd1KaGZEFZ7Idj0TsDxRg0qjYkY9u+suPMGBTe5gQFbWLZwaLsDr+t/VJToou9UHb2s0YT6hR9mb88mARzDQ7sWu]]></acast:settings>
			<itunes:episodeType>trailer</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/cover/1708958849679-ddf75f81adb0c3812b0a8d398e1d5a94.jpeg"/>
			<description><![CDATA[Welcome to <strong>re:invent security</strong>, the podcast where we look at ways to reinvent information security together with industry leaders.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Welcome to <strong>re:invent security</strong>, the podcast where we look at ways to reinvent information security together with industry leaders.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Technology"/>
		<itunes:category text="Education">
			<itunes:category text="Self-Improvement"/>
		</itunes:category>
    	<itunes:category text="Business"/>
    </channel>
</rss>
