<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>The Core Podcast</title>
		<link>https://www.coretocloud.co.uk/the-core-podcast/</link>
		<atom:link href="https://feeds.acast.com/public/shows/6322e89b85cb8e0011f0d773" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Core To Cloud</copyright>
		<itunes:keywords>cyber security,cyber,cyber warfare,cyber security uk,core to cloud,cirencester,hackers,hacking,hacked,cyber hacked,cyber jobs</itunes:keywords>
		<itunes:author>Core To Cloud</itunes:author>
		<itunes:subtitle>Powered by Core to Cloud</itunes:subtitle>
		<itunes:summary><![CDATA[Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Core To Cloud</itunes:name>
			<itunes:email>daniel@coretocloud.co.uk</itunes:email>
		</itunes:owner>
		<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
		<acast:showUrl>the-core-podcast</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="6322e1fdc7188800136e24ac" slug="joss-henderson"><![CDATA[Joss Henderson]]></acast:network>
		<acast:importedFeed>https://anchor.fm/s/6c929b24/podcast/rss</acast:importedFeed>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg</url>
				<link>https://www.coretocloud.co.uk/the-core-podcast/</link>
				<title>The Core Podcast</title>
			</image>
			<itunes:new-feed-url>https://feeds.acast.com/public/shows/6322e89b85cb8e0011f0d773</itunes:new-feed-url>
		<item>
			<title>VPNs: Very Predictable Nightmares! </title>
			<itunes:title>VPNs: Very Predictable Nightmares! </itunes:title>
			<pubDate>Fri, 27 Sep 2024 07:30:45 GMT</pubDate>
			<itunes:duration>36:39</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/66f53dc6560950b77ab3efd2/media.mp3" length="32819258" type="audio/mpeg"/>
			<guid isPermaLink="false">66f53dc6560950b77ab3efd2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.linkedin.com/events/vpns-verypredictablenightmares-7239963874622394368/comments/</link>
			<acast:episodeId>66f53dc6560950b77ab3efd2</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>vpns-very-predictable-nightmares</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwVfZzRXpWyDMvvKcZROPw7PvLdVSXYE1cM/5pqwdOHYUSr4rpcNPNmeUY9rhv3chEjYVb01+AcaAyiLmAkrLkY]]></acast:settings>
			<itunes:subtitle><![CDATA[The cyber sector is certainly still plagued by the effects of Covid, but for us it's not the cough thats stayed with us, it's those pesky WFH VPNs!]]></itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1727347056052-18dea5eb-a3ee-46f7-a920-3f373ce86fa1.jpeg"/>
			<description><![CDATA[<p>Join Core to Cloud with Adam stepping in for Kelly this week, discussing the dawn of Work From Home and the implications it has had on the security of businesses. Joined by Simon Eappariello Senior VP at iboss who has been spearheading the move to Zero Trust Network Architecture for years. </p><br><p>What sort of security risks do legacy VPNs pose? How easy are they to break into and move laterally? Is Zero Trust Network Architecture a valid resoponse? And how on earth do we make the transition?</p><br><p>Take a listen and learn all the answers!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join Core to Cloud with Adam stepping in for Kelly this week, discussing the dawn of Work From Home and the implications it has had on the security of businesses. Joined by Simon Eappariello Senior VP at iboss who has been spearheading the move to Zero Trust Network Architecture for years. </p><br><p>What sort of security risks do legacy VPNs pose? How easy are they to break into and move laterally? Is Zero Trust Network Architecture a valid resoponse? And how on earth do we make the transition?</p><br><p>Take a listen and learn all the answers!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Invisible Emissions: The Growing Environmental Impact of Cloud Computing</title>
			<itunes:title>Invisible Emissions: The Growing Environmental Impact of Cloud Computing</itunes:title>
			<pubDate>Mon, 05 Aug 2024 10:01:16 GMT</pubDate>
			<itunes:duration>58:15</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/669fd93ab8ba2ed90824a5f6/media.mp3" length="49573841" type="audio/mpeg"/>
			<guid isPermaLink="false">669fd93ab8ba2ed90824a5f6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/the-growing-environmental-impact-of-cloud-computing</link>
			<acast:episodeId>669fd93ab8ba2ed90824a5f6</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>the-growing-environmental-impact-of-cloud-computing</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwyiMALtj3vZt6jY/6Gs6f7izNsOCpYPq3IWb6DZ2ieocfHWzvtr9Wq49G/k1pe5fbkWkSprvk0/z6YB05zS7SR]]></acast:settings>
			<itunes:subtitle>with Sophia Willows, Software Engineer at Rye</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<h4><strong>Summary</strong></h4><p><br></p><p>In this episode, Kelly sits down with Sophia Willows to explore the environmental impact of cloud computing and the wider internet. They discuss the significant energy demands of data centres, the role of network communication in energy consumption, and the tech industry’s innovative efforts to reduce its carbon footprint. Focusing on algorithmic and software improvements, sustainable development practices, and real-world examples, this episode offers valuable insights into how tech professionals can contribute to a greener future.</p><br><p>Kelly and Sophia delve into the efficiency of hardware and software in cutting carbon emissions, citing examples like upgrading to PHP 7 and optimising Uber’s garbage collector. They highlight the lack of awareness and consumer demand for climate-friendly software and underscore the need for ethical considerations in software engineering. The discussion covers the energy consumption of AI models, the importance of adopting renewable energy sources, and the necessity for companies to prioritise climate-friendly features. This episode emphasises the critical need for raising awareness and taking action to create a more sustainable digital future.</p><p><br></p><h4><strong>Connect with us and our guests:</strong></h4><p><br></p><p>Follow our main LinkedIn: /&nbsp;<a href="https://www.linkedin.com/company/core-to-cloud/" rel="noopener noreferrer" target="_blank">core-to-cloud</a></p><p>Follow our Podcast: /&nbsp;<a href="https://www.linkedin.com/showcase/the-core-cyber-podcast/" rel="noopener noreferrer" target="_blank">the-core-cyber-podcast</a></p><p>Kelly Allen: /&nbsp;<a href="https://www.linkedin.com/in/kelly-allen-394a61164/" rel="noopener noreferrer" target="_blank">Kelly Allen</a></p><p>Sophia Willows: <a href="http://www.sophiabits.com" rel="noopener noreferrer" target="_blank">Sophia Willows</a></p><p><br></p><h4><strong>Production Credits:</strong></h4><p><br></p><p>Production Manager: /&nbsp;<a href="https://www.linkedin.com/in/daniel-aldred1/" rel="noopener noreferrer" target="_blank">Daniel Aldred</a></p><p>Audio Engineering and Editing: /&nbsp;<a href="https://www.linkedin.com/in/adamtitmuss/" rel="noopener noreferrer" target="_blank">Adam Titmuss</a></p><p><br></p><h4><strong>Want to be a guest?</strong></h4><p><br></p><p><a href="https://www.coretocloud.co.uk/the-core-podcast/" rel="noopener noreferrer" target="_blank">Register here:</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<h4><strong>Summary</strong></h4><p><br></p><p>In this episode, Kelly sits down with Sophia Willows to explore the environmental impact of cloud computing and the wider internet. They discuss the significant energy demands of data centres, the role of network communication in energy consumption, and the tech industry’s innovative efforts to reduce its carbon footprint. Focusing on algorithmic and software improvements, sustainable development practices, and real-world examples, this episode offers valuable insights into how tech professionals can contribute to a greener future.</p><br><p>Kelly and Sophia delve into the efficiency of hardware and software in cutting carbon emissions, citing examples like upgrading to PHP 7 and optimising Uber’s garbage collector. They highlight the lack of awareness and consumer demand for climate-friendly software and underscore the need for ethical considerations in software engineering. The discussion covers the energy consumption of AI models, the importance of adopting renewable energy sources, and the necessity for companies to prioritise climate-friendly features. This episode emphasises the critical need for raising awareness and taking action to create a more sustainable digital future.</p><p><br></p><h4><strong>Connect with us and our guests:</strong></h4><p><br></p><p>Follow our main LinkedIn: /&nbsp;<a href="https://www.linkedin.com/company/core-to-cloud/" rel="noopener noreferrer" target="_blank">core-to-cloud</a></p><p>Follow our Podcast: /&nbsp;<a href="https://www.linkedin.com/showcase/the-core-cyber-podcast/" rel="noopener noreferrer" target="_blank">the-core-cyber-podcast</a></p><p>Kelly Allen: /&nbsp;<a href="https://www.linkedin.com/in/kelly-allen-394a61164/" rel="noopener noreferrer" target="_blank">Kelly Allen</a></p><p>Sophia Willows: <a href="http://www.sophiabits.com" rel="noopener noreferrer" target="_blank">Sophia Willows</a></p><p><br></p><h4><strong>Production Credits:</strong></h4><p><br></p><p>Production Manager: /&nbsp;<a href="https://www.linkedin.com/in/daniel-aldred1/" rel="noopener noreferrer" target="_blank">Daniel Aldred</a></p><p>Audio Engineering and Editing: /&nbsp;<a href="https://www.linkedin.com/in/adamtitmuss/" rel="noopener noreferrer" target="_blank">Adam Titmuss</a></p><p><br></p><h4><strong>Want to be a guest?</strong></h4><p><br></p><p><a href="https://www.coretocloud.co.uk/the-core-podcast/" rel="noopener noreferrer" target="_blank">Register here:</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>How AI and Deepfakes can Steal your Identity</title>
			<itunes:title>How AI and Deepfakes can Steal your Identity</itunes:title>
			<pubDate>Mon, 22 Jul 2024 13:16:18 GMT</pubDate>
			<itunes:duration>1:02:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/662f7cd6f51ce100137ad4d3/media.mp3" length="53980042" type="audio/mpeg"/>
			<guid isPermaLink="false">662f7cd6f51ce100137ad4d3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/how-ai-and-deepfakes-can-steal-your-identity</link>
			<acast:episodeId>662f7cd6f51ce100137ad4d3</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>how-ai-and-deepfakes-can-steal-your-identity</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrztjXRZhK0J88nydZ0CDeMjmVyNbdx5psarQP/uAylHinK8jkDvh2DcZHC0BBz3jEJHg1vYwLmXBnyLYpzJoDIQ]]></acast:settings>
			<itunes:subtitle>with Jake Moore</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<h3><strong>Summary</strong></h3><p><br></p><p>In this gripping episode, a Brooklyn couple receives a distressing call from the wife’s mother-in-law, demanding money for her safety. The husband, a law enforcement officer, tries to buy time by engaging the caller and following instructions to transfer money. Later, they uncover that the caller used AI to replicate their loved one’s voice.</p><br><p>As AI scams and deepfake technology become more common, new challenges arise in cybersecurity. Jake Moore shares his firsthand experience with AI voice cloning, where he successfully mimicked a CEO’s voice to convince someone within the company to transfer money to his account. This incident highlights the importance of trust and the difficulties in combating voice scams.</p><br><p>Jake and Kelly explore the broader implications of AI-generated content, discussing issues like identity theft, social media oversharing, and deepfake technology’s impact. They also cover the challenges of verifying information on platforms like TikTok and the need for robust cybersecurity measures.</p><br><p>Jake stresses the importance of educating children about AI and misinformation, while Kelly discusses AI’s implications for dating and political propaganda. This episode underscores the critical need for increased awareness and vigilance in our digital age. Join us for an insightful conversation on the risks and precautions necessary to navigate today’s cybersecurity landscape.</p><p><br></p><h3><strong>Key Takeaways:</strong></h3><p><br></p><p>1: AI-Driven Scams: Scammers are using AI to replicate voices and create convincing deepfakes, leading to increased fraud and misinformation. Individuals must stay vigilant and verify suspicious requests through multiple communication channels.</p><p>2: Importance of Trust and Verification: Trust plays a critical role in voice scams, making it essential to implement robust procedures, policies, and validation processes to prevent fraudulent activities and protect sensitive information.</p><p>3: Cybersecurity Awareness: Oversharing personal information on social media and the challenge of verifying content on platforms like TikTok underscore the need for heightened cybersecurity measures and awareness.</p><p>4: Educational Imperative: Educating adults and children about AI, deepfakes, and misinformation is crucial for safely and responsibly navigating the digital world.</p><p><br></p><h4><strong>Connect with us and our guests:</strong></h4><p><br></p><p>Follow our main LinkedIn: /&nbsp;<a href="https://www.linkedin.com/company/core-to-cloud/" rel="noopener noreferrer" target="_blank">core-to-cloud</a></p><p>Follow our Podcast: /&nbsp;<a href="https://www.linkedin.com/showcase/the-core-cyber-podcast/" rel="noopener noreferrer" target="_blank">the-core-cyber-podcast</a></p><p>Kelly Allen: /&nbsp;<a href="https://www.linkedin.com/in/kelly-allen-394a61164/" rel="noopener noreferrer" target="_blank">Kelly Allen</a></p><p>Jake Moore: /&nbsp;<a href="https://www.linkedin.com/in/jakemooreuk/" rel="noopener noreferrer" target="_blank">Jake Moore</a></p><p><br></p><h4><strong>Production Credits:</strong></h4><p><br></p><p>Production Manager: /&nbsp;<a href="https://www.linkedin.com/in/daniel-aldred1/" rel="noopener noreferrer" target="_blank">Daniel Aldred</a></p><p>Audio Engineering and Editing: /&nbsp;<a href="https://www.linkedin.com/in/adamtitmuss/" rel="noopener noreferrer" target="_blank">Adam Titmuss</a></p><p><br></p><h4><strong>Want to be a guest?</strong></h4><p><a href="https://www.coretocloud.co.uk/the-core-podcast/" rel="noopener noreferrer" target="_blank">Register here:</a></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<h3><strong>Summary</strong></h3><p><br></p><p>In this gripping episode, a Brooklyn couple receives a distressing call from the wife’s mother-in-law, demanding money for her safety. The husband, a law enforcement officer, tries to buy time by engaging the caller and following instructions to transfer money. Later, they uncover that the caller used AI to replicate their loved one’s voice.</p><br><p>As AI scams and deepfake technology become more common, new challenges arise in cybersecurity. Jake Moore shares his firsthand experience with AI voice cloning, where he successfully mimicked a CEO’s voice to convince someone within the company to transfer money to his account. This incident highlights the importance of trust and the difficulties in combating voice scams.</p><br><p>Jake and Kelly explore the broader implications of AI-generated content, discussing issues like identity theft, social media oversharing, and deepfake technology’s impact. They also cover the challenges of verifying information on platforms like TikTok and the need for robust cybersecurity measures.</p><br><p>Jake stresses the importance of educating children about AI and misinformation, while Kelly discusses AI’s implications for dating and political propaganda. This episode underscores the critical need for increased awareness and vigilance in our digital age. Join us for an insightful conversation on the risks and precautions necessary to navigate today’s cybersecurity landscape.</p><p><br></p><h3><strong>Key Takeaways:</strong></h3><p><br></p><p>1: AI-Driven Scams: Scammers are using AI to replicate voices and create convincing deepfakes, leading to increased fraud and misinformation. Individuals must stay vigilant and verify suspicious requests through multiple communication channels.</p><p>2: Importance of Trust and Verification: Trust plays a critical role in voice scams, making it essential to implement robust procedures, policies, and validation processes to prevent fraudulent activities and protect sensitive information.</p><p>3: Cybersecurity Awareness: Oversharing personal information on social media and the challenge of verifying content on platforms like TikTok underscore the need for heightened cybersecurity measures and awareness.</p><p>4: Educational Imperative: Educating adults and children about AI, deepfakes, and misinformation is crucial for safely and responsibly navigating the digital world.</p><p><br></p><h4><strong>Connect with us and our guests:</strong></h4><p><br></p><p>Follow our main LinkedIn: /&nbsp;<a href="https://www.linkedin.com/company/core-to-cloud/" rel="noopener noreferrer" target="_blank">core-to-cloud</a></p><p>Follow our Podcast: /&nbsp;<a href="https://www.linkedin.com/showcase/the-core-cyber-podcast/" rel="noopener noreferrer" target="_blank">the-core-cyber-podcast</a></p><p>Kelly Allen: /&nbsp;<a href="https://www.linkedin.com/in/kelly-allen-394a61164/" rel="noopener noreferrer" target="_blank">Kelly Allen</a></p><p>Jake Moore: /&nbsp;<a href="https://www.linkedin.com/in/jakemooreuk/" rel="noopener noreferrer" target="_blank">Jake Moore</a></p><p><br></p><h4><strong>Production Credits:</strong></h4><p><br></p><p>Production Manager: /&nbsp;<a href="https://www.linkedin.com/in/daniel-aldred1/" rel="noopener noreferrer" target="_blank">Daniel Aldred</a></p><p>Audio Engineering and Editing: /&nbsp;<a href="https://www.linkedin.com/in/adamtitmuss/" rel="noopener noreferrer" target="_blank">Adam Titmuss</a></p><p><br></p><h4><strong>Want to be a guest?</strong></h4><p><a href="https://www.coretocloud.co.uk/the-core-podcast/" rel="noopener noreferrer" target="_blank">Register here:</a></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Avoid Getting Hacked: Lessons from NASA's 1999 Cyber Attack ]]></title>
			<itunes:title><![CDATA[Avoid Getting Hacked: Lessons from NASA's 1999 Cyber Attack ]]></itunes:title>
			<pubDate>Tue, 21 May 2024 08:49:04 GMT</pubDate>
			<itunes:duration>51:16</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/664c5fe72830620012d112a9/media.mp3" length="44867875" type="audio/mpeg"/>
			<guid isPermaLink="false">664c5fe72830620012d112a9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/unveiling-the-illusion-of-security-preparedness</link>
			<acast:episodeId>664c5fe72830620012d112a9</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>unveiling-the-illusion-of-security-preparedness</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxJ7MhnPfN/tUbXqbllqMGddUka33rylLQLj7I6Z8Ez5wQbQqKg1n7HVoWte3ncgYV6kMvv3CbEfyLR5ChuocUk]]></acast:settings>
			<itunes:subtitle>with Andy Schneider, Field CISO at Lacework</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<h3>Summary</h3><p><br></p><p>In this conversation, Kelly Allen interviews Andy Schneider about the illusion of security preparedness. They discuss Andy's background in cybersecurity, the NASA cyber attack in 1999, the importance of cloud security posture, and best practices for enhancing security in the cloud. They also touch on the talent shortage in the cybersecurity industry and the need for continuous detection capabilities. Andy shares the story of the NotPetya cyber attack as an example of the impact of cybersecurity on geopolitical events. The conversation covers various topics related to cybersecurity, including the impact of cyber attacks, the evolving nature of cybersecurity, the importance of human connection, and the role of technology in defense. The guest, Andy Schneider, emphasizes the need for continuous learning in the cybersecurity field and highlights the different career opportunities available. He also provides recommendations for building a comprehensive cybersecurity tool stack and selecting the right technology partner.</p><h3><br></h3><h3>Chapters</h3><p><br></p><p>00:00: The Evolution of Cyber Warfare: From 1999 to the Present</p><p>03:56: Unveiling the Illusion of Security Preparedness: A Cybersecurity Journey</p><p>09:41: The Role of Cloud Security Posture Management in Cyber Defense</p><p>36:08: Human Connection and Trust in Cybersecurity</p><p>50:02: Continuous Learning and Adaptation in the Cybersecurity Industry</p><p><br></p><h3>Takeaways</h3><p><br></p><ul><li>The evolution of cyber warfare has led to a shift in the nature of cyber attacks and the actors involved.</li><li>The NASA cyber attack of 1999 serves as a relevant case study highlighting the impact of cyber attacks and the vulnerabilities of digital infrastructure.</li><li>Cloud security posture management (CSPM) is a crucial aspect of cybersecurity, but it is not the only defense mechanism needed to protect against cyber threats.</li><li>The cybersecurity industry faces a talent shortage, and there is a need for upskilling and adapting to the evolving landscape.</li><li>Human connection and trust play a significant role in cybersecurity, and the industry requires continuous learning and adaptation to stay ahead of cyber threats.</li></ul><p>&nbsp;</p><h3>Keywords</h3><p>security preparedness, cybersecurity, illusion, NASA cyber attack, cloud security posture, talent shortage, detection capabilities, NotPetya cyber attack, cybersecurity, cyber attacks, evolving nature, human connection, technology, defense, continuous learning, career opportunities, tool stack, technology partner</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<h3>Summary</h3><p><br></p><p>In this conversation, Kelly Allen interviews Andy Schneider about the illusion of security preparedness. They discuss Andy's background in cybersecurity, the NASA cyber attack in 1999, the importance of cloud security posture, and best practices for enhancing security in the cloud. They also touch on the talent shortage in the cybersecurity industry and the need for continuous detection capabilities. Andy shares the story of the NotPetya cyber attack as an example of the impact of cybersecurity on geopolitical events. The conversation covers various topics related to cybersecurity, including the impact of cyber attacks, the evolving nature of cybersecurity, the importance of human connection, and the role of technology in defense. The guest, Andy Schneider, emphasizes the need for continuous learning in the cybersecurity field and highlights the different career opportunities available. He also provides recommendations for building a comprehensive cybersecurity tool stack and selecting the right technology partner.</p><h3><br></h3><h3>Chapters</h3><p><br></p><p>00:00: The Evolution of Cyber Warfare: From 1999 to the Present</p><p>03:56: Unveiling the Illusion of Security Preparedness: A Cybersecurity Journey</p><p>09:41: The Role of Cloud Security Posture Management in Cyber Defense</p><p>36:08: Human Connection and Trust in Cybersecurity</p><p>50:02: Continuous Learning and Adaptation in the Cybersecurity Industry</p><p><br></p><h3>Takeaways</h3><p><br></p><ul><li>The evolution of cyber warfare has led to a shift in the nature of cyber attacks and the actors involved.</li><li>The NASA cyber attack of 1999 serves as a relevant case study highlighting the impact of cyber attacks and the vulnerabilities of digital infrastructure.</li><li>Cloud security posture management (CSPM) is a crucial aspect of cybersecurity, but it is not the only defense mechanism needed to protect against cyber threats.</li><li>The cybersecurity industry faces a talent shortage, and there is a need for upskilling and adapting to the evolving landscape.</li><li>Human connection and trust play a significant role in cybersecurity, and the industry requires continuous learning and adaptation to stay ahead of cyber threats.</li></ul><p>&nbsp;</p><h3>Keywords</h3><p>security preparedness, cybersecurity, illusion, NASA cyber attack, cloud security posture, talent shortage, detection capabilities, NotPetya cyber attack, cybersecurity, cyber attacks, evolving nature, human connection, technology, defense, continuous learning, career opportunities, tool stack, technology partner</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Exposing Insider Threats: Expert Secrets from Cyber Risk Expert</title>
			<itunes:title>Exposing Insider Threats: Expert Secrets from Cyber Risk Expert</itunes:title>
			<pubDate>Tue, 14 May 2024 09:27:28 GMT</pubDate>
			<itunes:duration>1:09:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/66432e805f684e0012ddb616/media.mp3" length="65807532" type="audio/mpeg"/>
			<guid isPermaLink="false">66432e805f684e0012ddb616</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/navigating-insider-threats-with-human-intelligence</link>
			<acast:episodeId>66432e805f684e0012ddb616</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>navigating-insider-threats-with-human-intelligence</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrzzbUCd3RzolhvPqByf5EUX1oWhRMM+Rp6xPW//DLzPGGubb2GWigQdqj6sxbeT6CT1v7Q+mR58A0QEAbQDgQ0J]]></acast:settings>
			<itunes:subtitle>with James Moncrieff, Global Cyber Risk Lead at GFK</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<h3>Summary</h3><p><br></p><p>Join Kelly as she sits down for an illuminating conversation with none other than James Moncrieff, the Global Cyber Risk Lead at GFK, who shares his journey from being a police officer to transitioning into the information security field. The two discuss James' childhood dream of becoming a firefighter and how he accidentally ended up in the police force. James also highlights his challenges in entering the cybersecurity industry and the importance of persistence and self-belief.</p><br><p>In this conversation, James discusses the importance of understanding the risk of shadow IT and the need to shift from a culture of exception to accountability in cybersecurity. He highlights the complexity of insider threats and the different types of insiders that businesses must be aware of. James also stresses the limitations of security controls and the importance of preventing small attacks from escalating. He explains the role of human intelligence in cybersecurity and the process of sanitising intelligence for protection.</p><br><p>Finally, we explore the importance of creating a culture of trust and protection and the opportunities available in cybersecurity.</p><p><br></p><h3>Chapters</h3><p><br></p><p>00:00 The Journey from Law Enforcement to Cybersecurity</p><p>16:36 The Power of Persistence and Self-Belief in Career Transition</p><p>27:07 Stepping Outside Your Lane: Understanding Security Principles</p><p>33:55 The Strategic Role of GRC in Cybersecurity</p><p>34:25 The Foundation of InfoSec: GRC Work and Risk Management</p><p>36:21 Navigating Insider Threats and Human Intelligence in Cybersecurity</p><p>01:04:09 Embracing Diversity and Unique Backgrounds in InfoSec</p><p><br></p><h3>Takeaways</h3><p><br></p><ul><li>Transitioning from law enforcement to information security can be challenging, requiring persistence and self-belief.</li><li>Diversity in problem-solving and different perspectives can lead to innovative solutions in the cybersecurity field.</li><li>Understanding security principles and stepping outside one's lane can enhance the effectiveness of security professionals.</li><li>The role of GRC (Governance, Risk, and Compliance) in cybersecurity goes beyond checklists and policies, requiring a broader understanding and strategic approach. GRC work is the foundation of InfoSec, encompassing risk management, governance, policies, and coordination of security development.</li><li>Understanding the impact of systemic issues on the business is crucial for effective risk management and security posture.</li><li>Insider threats are complex and can range from accidental to malicious, requiring a nuanced approach to detection and prevention.</li><li>Human intelligence plays a vital role in cybersecurity, and a process to protect and utilize intelligence from individuals on the ground is needed.</li><li>Diversity in InfoSec is essential, and individuals with unique backgrounds and skills bring valuable perspectives and problem-solving abilities to the industry.</li></ul><p><br></p><h3>Keywords</h3><p><br></p><ul><li>cybersecurity, career transition, police officer, persistence, self-belief, diversity, problem-solving, security principles, GRC, challenges, GRC work, risk management, governance, policies, vulnerability management, security development, SOC, insider threats, human intelligence, cybersecurity, diversity, unique backgrounds, InfoSec</li></ul><p>&nbsp;</p><p>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<h3>Summary</h3><p><br></p><p>Join Kelly as she sits down for an illuminating conversation with none other than James Moncrieff, the Global Cyber Risk Lead at GFK, who shares his journey from being a police officer to transitioning into the information security field. The two discuss James' childhood dream of becoming a firefighter and how he accidentally ended up in the police force. James also highlights his challenges in entering the cybersecurity industry and the importance of persistence and self-belief.</p><br><p>In this conversation, James discusses the importance of understanding the risk of shadow IT and the need to shift from a culture of exception to accountability in cybersecurity. He highlights the complexity of insider threats and the different types of insiders that businesses must be aware of. James also stresses the limitations of security controls and the importance of preventing small attacks from escalating. He explains the role of human intelligence in cybersecurity and the process of sanitising intelligence for protection.</p><br><p>Finally, we explore the importance of creating a culture of trust and protection and the opportunities available in cybersecurity.</p><p><br></p><h3>Chapters</h3><p><br></p><p>00:00 The Journey from Law Enforcement to Cybersecurity</p><p>16:36 The Power of Persistence and Self-Belief in Career Transition</p><p>27:07 Stepping Outside Your Lane: Understanding Security Principles</p><p>33:55 The Strategic Role of GRC in Cybersecurity</p><p>34:25 The Foundation of InfoSec: GRC Work and Risk Management</p><p>36:21 Navigating Insider Threats and Human Intelligence in Cybersecurity</p><p>01:04:09 Embracing Diversity and Unique Backgrounds in InfoSec</p><p><br></p><h3>Takeaways</h3><p><br></p><ul><li>Transitioning from law enforcement to information security can be challenging, requiring persistence and self-belief.</li><li>Diversity in problem-solving and different perspectives can lead to innovative solutions in the cybersecurity field.</li><li>Understanding security principles and stepping outside one's lane can enhance the effectiveness of security professionals.</li><li>The role of GRC (Governance, Risk, and Compliance) in cybersecurity goes beyond checklists and policies, requiring a broader understanding and strategic approach. GRC work is the foundation of InfoSec, encompassing risk management, governance, policies, and coordination of security development.</li><li>Understanding the impact of systemic issues on the business is crucial for effective risk management and security posture.</li><li>Insider threats are complex and can range from accidental to malicious, requiring a nuanced approach to detection and prevention.</li><li>Human intelligence plays a vital role in cybersecurity, and a process to protect and utilize intelligence from individuals on the ground is needed.</li><li>Diversity in InfoSec is essential, and individuals with unique backgrounds and skills bring valuable perspectives and problem-solving abilities to the industry.</li></ul><p><br></p><h3>Keywords</h3><p><br></p><ul><li>cybersecurity, career transition, police officer, persistence, self-belief, diversity, problem-solving, security principles, GRC, challenges, GRC work, risk management, governance, policies, vulnerability management, security development, SOC, insider threats, human intelligence, cybersecurity, diversity, unique backgrounds, InfoSec</li></ul><p>&nbsp;</p><p>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Jamie McAnsh Reveals the Secret:</title>
			<itunes:title>Jamie McAnsh Reveals the Secret:</itunes:title>
			<pubDate>Mon, 29 Apr 2024 12:10:23 GMT</pubDate>
			<itunes:duration>56:52</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/662f8dfae9f4880011c4503d/media.mp3" length="48853694" type="audio/mpeg"/>
			<guid isPermaLink="false">662f8dfae9f4880011c4503d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/advancing-diversity-and-inclusion-in-tech-through-ai-innovat</link>
			<acast:episodeId>662f8dfae9f4880011c4503d</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>advancing-diversity-and-inclusion-in-tech-through-ai-innovat</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrz5HWtk5k8NdjW63yrpGxFNPmkKBCcz9/jBN4N5ssMMQGnxa00D7pCh9v68mds/IFuaUUpVvi5tRfz5LkazlCqb]]></acast:settings>
			<itunes:subtitle>To Unstoppable Diversity and Inclusion!</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<h2><strong>Summary</strong></h2><p><br></p><p>In this episode, Kelly meets with Jamie McAnsh, who shares his inspiring journey from a challenging childhood to becoming a successful entrepreneur and speaker. Jamie discusses the importance of overcoming obstacles and finding purpose in life. </p><br><p>We also explore AI's potential for promoting inclusion and levelling the playing field for individuals with neurodiversity. In this conversation, Jamie discusses the use of AI in communication and writing, highlighting its benefits in improving efficiency and inclusivity. He emphasises the importance of embracing diversity in problem-solving, particularly in industries like cybersecurity. Jamie also explores the role of AI in idea generation and the potential for AI to create more opportunities for diverse talent. He addresses the challenges of ensuring ethical and unbiased AI and emphasises the need for diverse people to monitor and input non-biased information. </p><br><p>The episode concludes with Jamie's advocacy for a work environment that values and invests in its employees, promoting equity over equality.</p><p><br></p><h2><strong>Takeaways</strong></h2><p><br></p><ul><li>AI can be a valuable tool in communication and writing, improving efficiency and inclusivity.</li><li>Diversity is crucial in problem-solving, particularly in industries like cybersecurity.</li><li>AI can enhance idea generation and provide opportunities for diverse talent.</li><li>Ensuring ethical and unbiased AI requires a diverse group of people to monitor and input non-biased information.</li><li>A work environment that values and invests in its employees promotes equity and creates a better future.</li></ul><p><br></p><h3><strong>Chapters</strong></h3><p><br></p><p><strong>00:00</strong> Introduction and Background</p><p><strong>06:41</strong> Overcoming Challenges and Finding Purpose</p><p><strong>28:16</strong> The Use of AI in Communication and Writing</p><p><strong>31:12</strong> The Role of Diversity and Inclusion in Problem Solving</p><p><strong>36:11</strong> The Benefits of AI in Problem Solving and Idea Generation</p><p><strong>37:57</strong> Ensuring Ethical and Unbiased AI</p><p><strong>47:02</strong> Creating a Better Work Environment through Diversity and Equity</p><p><strong>52:51</strong> The Importance of Equity over Equality</p><p><strong>55:31</strong> The Future Outlook for Diversity and Tech</p><p><br></p><h2><br></h2><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<h2><strong>Summary</strong></h2><p><br></p><p>In this episode, Kelly meets with Jamie McAnsh, who shares his inspiring journey from a challenging childhood to becoming a successful entrepreneur and speaker. Jamie discusses the importance of overcoming obstacles and finding purpose in life. </p><br><p>We also explore AI's potential for promoting inclusion and levelling the playing field for individuals with neurodiversity. In this conversation, Jamie discusses the use of AI in communication and writing, highlighting its benefits in improving efficiency and inclusivity. He emphasises the importance of embracing diversity in problem-solving, particularly in industries like cybersecurity. Jamie also explores the role of AI in idea generation and the potential for AI to create more opportunities for diverse talent. He addresses the challenges of ensuring ethical and unbiased AI and emphasises the need for diverse people to monitor and input non-biased information. </p><br><p>The episode concludes with Jamie's advocacy for a work environment that values and invests in its employees, promoting equity over equality.</p><p><br></p><h2><strong>Takeaways</strong></h2><p><br></p><ul><li>AI can be a valuable tool in communication and writing, improving efficiency and inclusivity.</li><li>Diversity is crucial in problem-solving, particularly in industries like cybersecurity.</li><li>AI can enhance idea generation and provide opportunities for diverse talent.</li><li>Ensuring ethical and unbiased AI requires a diverse group of people to monitor and input non-biased information.</li><li>A work environment that values and invests in its employees promotes equity and creates a better future.</li></ul><p><br></p><h3><strong>Chapters</strong></h3><p><br></p><p><strong>00:00</strong> Introduction and Background</p><p><strong>06:41</strong> Overcoming Challenges and Finding Purpose</p><p><strong>28:16</strong> The Use of AI in Communication and Writing</p><p><strong>31:12</strong> The Role of Diversity and Inclusion in Problem Solving</p><p><strong>36:11</strong> The Benefits of AI in Problem Solving and Idea Generation</p><p><strong>37:57</strong> Ensuring Ethical and Unbiased AI</p><p><strong>47:02</strong> Creating a Better Work Environment through Diversity and Equity</p><p><strong>52:51</strong> The Importance of Equity over Equality</p><p><strong>55:31</strong> The Future Outlook for Diversity and Tech</p><p><br></p><h2><br></h2><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Unveiling Cybersecurity Realities: From AI Challenges to Neurodiversity Superpowers</title>
			<itunes:title>Unveiling Cybersecurity Realities: From AI Challenges to Neurodiversity Superpowers</itunes:title>
			<pubDate>Thu, 25 Apr 2024 14:20:47 GMT</pubDate>
			<itunes:duration>1:02:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/662a668b1967a00012503927/media.mp3" length="50439972" type="audio/mpeg"/>
			<guid isPermaLink="false">662a668b1967a00012503927</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/unveiling-cybersecurity-realities-from-ai-challenges-to-neur</link>
			<acast:episodeId>662a668b1967a00012503927</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>unveiling-cybersecurity-realities-from-ai-challenges-to-neur</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwtJdjfk/Ak3S0pS3yXQgP/xx9FNXNoqMREi6KV7eE9Wh2UT2qMSERPoL//xljoLg8Vifr/rLLDwITR5pQUB/kj]]></acast:settings>
			<itunes:subtitle>with Lisa Ventura</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<h1>Summary</h1><p><br></p><p>Join Lisa Ventura, founder of Cybersecurity Unity, as she takes us on a journey through the dynamic world of cybersecurity. </p><p><br></p><h2>In this episode, Lisa delves into:</h2><p><br></p><ol><li>Her personal journey into cybersecurity and the vital role of collaboration and information sharing.</li><li>The impact of generative AI on cybersecurity, focusing on the challenges of identifying phishing emails and addressing biases in AI-generated content.</li><li>The importance of early education and awareness in safeguarding individuals from cyber threats.</li><li>Addressing the gender gap in cybersecurity and advocating for inclusivity and diversity.</li><li>Lisa's insights on neurodiversity and how it can be a superpower in the cybersecurity field.</li></ol><p><br></p><p>This enlightening conversation covers a wide array of topics, including workplace challenges, managing stress, overcoming imposter syndrome, and identifying narcissistic personality traits. Tune in to gain valuable insights into creating inclusive work environments and enhancing communication in interviews.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<h1>Summary</h1><p><br></p><p>Join Lisa Ventura, founder of Cybersecurity Unity, as she takes us on a journey through the dynamic world of cybersecurity. </p><p><br></p><h2>In this episode, Lisa delves into:</h2><p><br></p><ol><li>Her personal journey into cybersecurity and the vital role of collaboration and information sharing.</li><li>The impact of generative AI on cybersecurity, focusing on the challenges of identifying phishing emails and addressing biases in AI-generated content.</li><li>The importance of early education and awareness in safeguarding individuals from cyber threats.</li><li>Addressing the gender gap in cybersecurity and advocating for inclusivity and diversity.</li><li>Lisa's insights on neurodiversity and how it can be a superpower in the cybersecurity field.</li></ol><p><br></p><p>This enlightening conversation covers a wide array of topics, including workplace challenges, managing stress, overcoming imposter syndrome, and identifying narcissistic personality traits. Tune in to gain valuable insights into creating inclusive work environments and enhancing communication in interviews.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Navigating the Frontlines of Cybersecurity:</title>
			<itunes:title>Navigating the Frontlines of Cybersecurity:</itunes:title>
			<pubDate>Tue, 16 Apr 2024 15:57:45 GMT</pubDate>
			<itunes:duration>48:31</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6615652f67103f001710442c/media.mp3" length="42024561" type="audio/mpeg"/>
			<guid isPermaLink="false">6615652f67103f001710442c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/navigating-the-frontlines-of-cybersecurity</link>
			<acast:episodeId>6615652f67103f001710442c</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>navigating-the-frontlines-of-cybersecurity</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrzxZTDdGrjyq6HlY4mS0DqHFQZ311+bb94uoTHkTQq3s78m3tWBcTOTHCildQl9+jXqTTNyUD5ZVh7THE02tZQI]]></acast:settings>
			<itunes:subtitle>A Conversation with Chris Hodson</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>Chris Hodson shares his journey into cybersecurity, driven by curiosity and a passion for understanding how things work. He emphasises the importance of gaining visibility and control in today's interconnected landscape. </p><br><p>Chris also discusses the integration of AI in cybersecurity and the need for security products to solve real problems. He highlights the significance of effective communication and the need to bridge the gap between technical jargon and business understanding. </p><br><p>The conversation covers various topics related to cybersecurity, including crisis simulation, the importance of understanding the business impact of cybersecurity, cloud security, effective communication to leadership, and the future of cybercrime. </p><br><p>The key takeaway is the need for cybersecurity professionals to focus on the 'why' of cybersecurity solutions and to effectively communicate the business risks and impact to leadership. Additionally, there is a need for scenario-oriented and frequent security education and a focus on foundational strategies for managing and monitoring the cloud.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Chris Hodson shares his journey into cybersecurity, driven by curiosity and a passion for understanding how things work. He emphasises the importance of gaining visibility and control in today's interconnected landscape. </p><br><p>Chris also discusses the integration of AI in cybersecurity and the need for security products to solve real problems. He highlights the significance of effective communication and the need to bridge the gap between technical jargon and business understanding. </p><br><p>The conversation covers various topics related to cybersecurity, including crisis simulation, the importance of understanding the business impact of cybersecurity, cloud security, effective communication to leadership, and the future of cybercrime. </p><br><p>The key takeaway is the need for cybersecurity professionals to focus on the 'why' of cybersecurity solutions and to effectively communicate the business risks and impact to leadership. Additionally, there is a need for scenario-oriented and frequent security education and a focus on foundational strategies for managing and monitoring the cloud.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Women Leading the Way in Cybersecurity</title>
			<itunes:title>Women Leading the Way in Cybersecurity</itunes:title>
			<pubDate>Wed, 10 Apr 2024 13:07:13 GMT</pubDate>
			<itunes:duration>50:58</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/66168efba9dc1e001686b391/media.mp3" length="99695639" type="audio/mpeg"/>
			<guid isPermaLink="false">66168efba9dc1e001686b391</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/women-leading-the-way-in-cybersecurity-7</link>
			<acast:episodeId>66168efba9dc1e001686b391</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>women-leading-the-way-in-cybersecurity-7</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwEy0iwn0pdCoSHIfv/BGe6tKQW/BsMl+BzvYyYjejamJxuE0CA9LGamWZbbGfCDng5eJu7Jg/gSlWaEoRlZJZP]]></acast:settings>
			<itunes:subtitle>with Gonxhe and Ilvana from Sense Cyber Research Centre</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[Gonxhe and Ilvana from Sense Cyber Research Centre share their inspiring journeys into the cybersecurity industry. They talk about the importance of having more women in cybersecurity and provide practical tips to bridge the gender gap. They also discuss the challenges women face in the industry and offer strategies to overcome barriers to entry. The conversation encourages critical thinking and inspires women to join the field.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Gonxhe and Ilvana from Sense Cyber Research Centre share their inspiring journeys into the cybersecurity industry. They talk about the importance of having more women in cybersecurity and provide practical tips to bridge the gender gap. They also discuss the challenges women face in the industry and offer strategies to overcome barriers to entry. The conversation encourages critical thinking and inspires women to join the field.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Crucial Intersection of Community and Cybersecurity</title>
			<itunes:title>The Crucial Intersection of Community and Cybersecurity</itunes:title>
			<pubDate>Thu, 28 Mar 2024 09:14:21 GMT</pubDate>
			<itunes:duration>48:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65e899a77fe4880016f8b36d/media.mp3" length="95289380" type="audio/mpeg"/>
			<guid isPermaLink="false">65e899a77fe4880016f8b36d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/the-crucial-intersection-of-community-and-cybersecurity</link>
			<acast:episodeId>65e899a77fe4880016f8b36d</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>the-crucial-intersection-of-community-and-cybersecurity</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxM2Y7UYWuULjn9wyGTY/L/i748WqM1dxkeOoIuJB++HX4vhDxBDXIXDeYr0qt3/eo+8jx9cqFzQvjjF2JBqI7b]]></acast:settings>
			<itunes:subtitle>with Stephen Mann</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>In this conversation, Kelly Allen and Stephen Mann discuss the importance of community in cybersecurity. They explore the challenges of building diverse and inclusive communities, the role of community in building resilience, and the benefits of sharing experiences and knowledge within a community. They also discuss the challenges of networking and vendor experiences at events and explore potential solutions to improve these interactions. In this conversation, Kelly Allen and Stephen Mann discuss various topics related to personal routines, communication, transparency in business, the future of community in cybersecurity, supporting others in the cybersecurity community, and the reasons to join the cybersecurity industry.</p><p><br></p><h2>Takeaways</h2><p><br></p><ul><li>Diversity, equity, and inclusion are important in cybersecurity, and there is a growing pool of diverse talent ready to enter the field.</li><li>Community plays a crucial role in building resilience in cybersecurity, providing support, knowledge sharing, and opportunities for growth.</li><li>In-person interactions and networking are still valuable in the digital age, as they allow for deeper connections and more meaningful conversations.</li><li>Creating inclusive and collaborative events can help overcome challenges in networking and vendor experiences, fostering a sense of community and providing value for participants. Having a consistent bedtime routine can contribute to better sleep and overall well-being.</li><li>Managing personal commitments and communication can be challenging, but setting boundaries and being transparent can help.</li><li>Transparency and honesty in business are important for building trust and maintaining strong relationships.</li><li>The future of community in cybersecurity involves providing diverse and accessible opportunities for learning and networking.</li><li>Supporting and helping others in the cybersecurity community is crucial for personal and professional growth.</li><li>The cybersecurity industry offers diverse career opportunities and the chance to make a meaningful impact in society.</li></ul><p><br></p><h2>Chapters</h2><p><br></p><p>00:00 Introduction and Background</p><p>03:09 Diversity and Inclusion in Cybersecurity</p><p>10:25 The Importance of Community in Cybersecurity</p><p>16:10 Building Resilience through Community</p><p>21:55 The Challenges of Building and Engaging Communities</p><p>28:53 Creating Inclusive and Collaborative Events</p><p>35:45 Improving Networking and Vendor Experiences</p><p>40:36 Bedtime routines and personal schedules</p><p>41:22 Managing personal commitments and communication</p><p>42:09 Transparency and honesty in business</p><p>43:34 The future of community in cybersecurity</p><p>49:49 Helping and supporting others in the cybersecurity community</p><p>53:29 Why join the cybersecurity industry</p><p>54:37 Contacting Stephen Mann</p><br><p><br></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this conversation, Kelly Allen and Stephen Mann discuss the importance of community in cybersecurity. They explore the challenges of building diverse and inclusive communities, the role of community in building resilience, and the benefits of sharing experiences and knowledge within a community. They also discuss the challenges of networking and vendor experiences at events and explore potential solutions to improve these interactions. In this conversation, Kelly Allen and Stephen Mann discuss various topics related to personal routines, communication, transparency in business, the future of community in cybersecurity, supporting others in the cybersecurity community, and the reasons to join the cybersecurity industry.</p><p><br></p><h2>Takeaways</h2><p><br></p><ul><li>Diversity, equity, and inclusion are important in cybersecurity, and there is a growing pool of diverse talent ready to enter the field.</li><li>Community plays a crucial role in building resilience in cybersecurity, providing support, knowledge sharing, and opportunities for growth.</li><li>In-person interactions and networking are still valuable in the digital age, as they allow for deeper connections and more meaningful conversations.</li><li>Creating inclusive and collaborative events can help overcome challenges in networking and vendor experiences, fostering a sense of community and providing value for participants. Having a consistent bedtime routine can contribute to better sleep and overall well-being.</li><li>Managing personal commitments and communication can be challenging, but setting boundaries and being transparent can help.</li><li>Transparency and honesty in business are important for building trust and maintaining strong relationships.</li><li>The future of community in cybersecurity involves providing diverse and accessible opportunities for learning and networking.</li><li>Supporting and helping others in the cybersecurity community is crucial for personal and professional growth.</li><li>The cybersecurity industry offers diverse career opportunities and the chance to make a meaningful impact in society.</li></ul><p><br></p><h2>Chapters</h2><p><br></p><p>00:00 Introduction and Background</p><p>03:09 Diversity and Inclusion in Cybersecurity</p><p>10:25 The Importance of Community in Cybersecurity</p><p>16:10 Building Resilience through Community</p><p>21:55 The Challenges of Building and Engaging Communities</p><p>28:53 Creating Inclusive and Collaborative Events</p><p>35:45 Improving Networking and Vendor Experiences</p><p>40:36 Bedtime routines and personal schedules</p><p>41:22 Managing personal commitments and communication</p><p>42:09 Transparency and honesty in business</p><p>43:34 The future of community in cybersecurity</p><p>49:49 Helping and supporting others in the cybersecurity community</p><p>53:29 Why join the cybersecurity industry</p><p>54:37 Contacting Stephen Mann</p><br><p><br></p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Women Leading the Way in Cybersecurity</title>
			<itunes:title>Women Leading the Way in Cybersecurity</itunes:title>
			<pubDate>Tue, 26 Mar 2024 09:21:40 GMT</pubDate>
			<itunes:duration>6:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6602922291c7c80017bcd834/media.mp3" length="3032311" type="audio/mpeg"/>
			<guid isPermaLink="false">6602922291c7c80017bcd834</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/women-leading-the-way-in-cybersecurity-6</link>
			<acast:episodeId>6602922291c7c80017bcd834</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>women-leading-the-way-in-cybersecurity-6</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryAuT6dCb9HzJshf4ljNgZrjuzmX178iSyuG1Lp7rexmNZxXZVHqSNfE6c091hNCQAQ+RX9aA4xsZKYhfnh+U0i]]></acast:settings>
			<itunes:subtitle>with Olivia Wright-Cooper</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1711444878491-8ca81efb92a670ff869dd17113b340e5.jpeg"/>
			<description><![CDATA[<p>In this conversation, Liv discusses her role at Core to Cloud and her journey from aspiring writer to marketing professional. She highlights the importance of diversity in the industry and the need for different voices and perspectives. The conversation also touches on the importance of reaching out to different audiences and making events and messaging more inclusive. Liv shares her insights on exploring marketing as a career and the exciting opportunities in the tech industry.</p><br><p><strong>Takeaways:</strong></p><ul><li>Diversity in the industry is essential to have different perspectives and voices.</li><li>Reaching out to different audiences and making events and messaging inclusive is crucial.</li><li>Marketing offers various career opportunities, including events management and partner marketing.</li><li>The tech industry is fast-growing and offers exciting and constantly evolving opportunities.</li></ul><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this conversation, Liv discusses her role at Core to Cloud and her journey from aspiring writer to marketing professional. She highlights the importance of diversity in the industry and the need for different voices and perspectives. The conversation also touches on the importance of reaching out to different audiences and making events and messaging more inclusive. Liv shares her insights on exploring marketing as a career and the exciting opportunities in the tech industry.</p><br><p><strong>Takeaways:</strong></p><ul><li>Diversity in the industry is essential to have different perspectives and voices.</li><li>Reaching out to different audiences and making events and messaging inclusive is crucial.</li><li>Marketing offers various career opportunities, including events management and partner marketing.</li><li>The tech industry is fast-growing and offers exciting and constantly evolving opportunities.</li></ul><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Women Leading the Way in Cybersecurity:</title>
			<itunes:title>Women Leading the Way in Cybersecurity:</itunes:title>
			<pubDate>Mon, 25 Mar 2024 10:21:43 GMT</pubDate>
			<itunes:duration>27:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/66015032dbbb2100165ae659/media.mp3" length="53098057" type="audio/mpeg"/>
			<guid isPermaLink="false">66015032dbbb2100165ae659</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/women-leading-the-way-in-cybersecurity-4</link>
			<acast:episodeId>66015032dbbb2100165ae659</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>women-leading-the-way-in-cybersecurity-4</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryY7Wk5jolO4i6AEaUUHSZClUmBYir4reJ9Tl9N8HzbSOgEY/B2BAKCih30l6M9ekpKo+MM8EX+INXZ1xwuEyui]]></acast:settings>
			<itunes:subtitle>The WITCH Community and the Intersection of Legal and Tech with Jess</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[In this episode, we explore the impactful role of Women in Tech Cyber Security Hub (WITCH) in bringing together women nationwide to discuss tech and cyber issues. Our guest, Jess, a solicitor specialising in technology and data law, shares insights into her career and the importance of diversity within the legal and tech realms.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this episode, we explore the impactful role of Women in Tech Cyber Security Hub (WITCH) in bringing together women nationwide to discuss tech and cyber issues. Our guest, Jess, a solicitor specialising in technology and data law, shares insights into her career and the importance of diversity within the legal and tech realms.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Women Leading the Way in Cybersecurity</title>
			<itunes:title>Women Leading the Way in Cybersecurity</itunes:title>
			<pubDate>Fri, 22 Mar 2024 10:32:45 GMT</pubDate>
			<itunes:duration>7:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65fb02261c46ed0017fb799d/media.mp3" length="3723825" type="audio/mpeg"/>
			<guid isPermaLink="false">65fb02261c46ed0017fb799d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/women-leading-the-way-in-cybersecurity-3</link>
			<acast:episodeId>65fb02261c46ed0017fb799d</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>women-leading-the-way-in-cybersecurity-3</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrzg2H97C/t+Ox+ZAOzEeuLNdK36mApitYCKHjZGcwWbY+myiK4n4eZCmZAcxyl0R0ZTf0f4xvrN/KybY1cAjWN7]]></acast:settings>
			<itunes:subtitle>with Anna Best</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1710948632317-d1935c0e02e73e96e286cf438e4e88cd.jpeg"/>
			<description><![CDATA[<p>In this conversation, Anna discusses her role as a sales development representative at Core to Cloud and her experience joining the company. She shares her journey into the cybersecurity industry and highlights the importance of career progression. Anna also discusses the presence of women in leadership positions at Core to Cloud and the value of diversity in the workplace, including cultural perspectives.</p><br><p>Takeaways:</p><br><p>Career progression is an appealing aspect of the cybersecurity industry, offering opportunities for growth and development.</p><p>Anyone can join the cybersecurity industry with a willingness to learn and put in effort.</p><p>Having women in leadership positions can provide relatability and inspiration for career aspirations.</p><p>Diversity, including cultural perspectives, brings different opinions and insights to the workplace.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this conversation, Anna discusses her role as a sales development representative at Core to Cloud and her experience joining the company. She shares her journey into the cybersecurity industry and highlights the importance of career progression. Anna also discusses the presence of women in leadership positions at Core to Cloud and the value of diversity in the workplace, including cultural perspectives.</p><br><p>Takeaways:</p><br><p>Career progression is an appealing aspect of the cybersecurity industry, offering opportunities for growth and development.</p><p>Anyone can join the cybersecurity industry with a willingness to learn and put in effort.</p><p>Having women in leadership positions can provide relatability and inspiration for career aspirations.</p><p>Diversity, including cultural perspectives, brings different opinions and insights to the workplace.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Women Leading the Way in Cybersecurity</title>
			<itunes:title>Women Leading the Way in Cybersecurity</itunes:title>
			<pubDate>Wed, 20 Mar 2024 11:25:49 GMT</pubDate>
			<itunes:duration>18:11</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65fac68e2201590017b00d89/media.mp3" length="8731185" type="audio/mpeg"/>
			<guid isPermaLink="false">65fac68e2201590017b00d89</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/women-leading-the-way-in-cybersecurity</link>
			<acast:episodeId>65fac68e2201590017b00d89</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>women-leading-the-way-in-cybersecurity</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtry8b6vvdYZQnENSy5gzGWLAb53sXX1dKJn04oq1Fnls9ZqfYzbDonDJNElhRggdWMRUSwASO63XH03u2QQDOGsc]]></acast:settings>
			<itunes:subtitle>with Lizzie Dick</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1710933930924-f6df281f43caff3663685e5d5a060e62.jpeg"/>
			<description><![CDATA[<p>Lizzie shares her journey into cybersecurity, starting with a career change from teaching. She discovered her passion for IT and cybersecurity while working at an IT distribution company. Lizzie discusses the gender diversity in the industry and the lack of female role models. She highlights role models' importance and the progress made in gender diversity. Lizzie also touches on the topic of menopause and women's health in the workplace. She emphasizes the need for a diverse and supportive team to create a successful and inclusive work environment.</p><br><p>Chapters</p><br><p>00:00 Introduction and Background</p><p>01:01 Career Change</p><p>04:20 Gender Diversity in Cybersecurity</p><p>06:14 Lack of Female Role Models</p><p>08:38 Progress in Gender Diversity</p><p>10:54 Importance of Role Models</p><p>13:17 Diversity in the Workplace</p><p>14:10 Menopause and Women's Health</p><p>16:27 Challenges for Women in Leadership</p><br><p>We hope you enjoy!</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Lizzie shares her journey into cybersecurity, starting with a career change from teaching. She discovered her passion for IT and cybersecurity while working at an IT distribution company. Lizzie discusses the gender diversity in the industry and the lack of female role models. She highlights role models' importance and the progress made in gender diversity. Lizzie also touches on the topic of menopause and women's health in the workplace. She emphasizes the need for a diverse and supportive team to create a successful and inclusive work environment.</p><br><p>Chapters</p><br><p>00:00 Introduction and Background</p><p>01:01 Career Change</p><p>04:20 Gender Diversity in Cybersecurity</p><p>06:14 Lack of Female Role Models</p><p>08:38 Progress in Gender Diversity</p><p>10:54 Importance of Role Models</p><p>13:17 Diversity in the Workplace</p><p>14:10 Menopause and Women's Health</p><p>16:27 Challenges for Women in Leadership</p><br><p>We hope you enjoy!</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Women Leading the Way in Cybersecurity</title>
			<itunes:title>Women Leading the Way in Cybersecurity</itunes:title>
			<pubDate>Sun, 10 Mar 2024 11:33:26 GMT</pubDate>
			<itunes:duration>45:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65e70301b5de0d0017e6fcd2/media.mp3" length="88787804" type="audio/mpeg"/>
			<guid isPermaLink="false">65e70301b5de0d0017e6fcd2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/women-leading-the-way-in-cybersecurity-2</link>
			<acast:episodeId>65e70301b5de0d0017e6fcd2</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>women-leading-the-way-in-cybersecurity-2</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrx9qsjB7TxJeoVckjocEi1Nb6kz+4vY6/NLPewD1sg67yEFC9wSpjA7apv9QS0yBNY/dsQjG/Ipv8Yx8hfM3juC]]></acast:settings>
			<itunes:subtitle>with Robyn MacMillan</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709639830363-d4dd72487734b73594c810bc425c1c39.jpeg"/>
			<description><![CDATA[<p>Join us for an incredible story and discussion with our technical writer, Robyn MacMillan, as part of our series "Women Leading the Way in Cybersecurity."</p><br><p>In recent years, there has been a growing recognition of the importance of diversity and inclusion in the technology industry. However, one area that still requires significant attention is the representation and participation of women, particularly in technical roles and technical writing. This podcast episode explores women's critical role in technology and why their voices are indispensable in technical writing within the industry.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join us for an incredible story and discussion with our technical writer, Robyn MacMillan, as part of our series "Women Leading the Way in Cybersecurity."</p><br><p>In recent years, there has been a growing recognition of the importance of diversity and inclusion in the technology industry. However, one area that still requires significant attention is the representation and participation of women, particularly in technical roles and technical writing. This podcast episode explores women's critical role in technology and why their voices are indispensable in technical writing within the industry.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Women Leading the Way in Cybersecurity</title>
			<itunes:title>Women Leading the Way in Cybersecurity</itunes:title>
			<pubDate>Fri, 08 Mar 2024 09:07:42 GMT</pubDate>
			<itunes:duration>59:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65df4590d88a940015955125/media.mp3" length="142326511" type="audio/mpeg"/>
			<guid isPermaLink="false">65df4590d88a940015955125</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/women-leading-the-way-in-cybersecurity-1</link>
			<acast:episodeId>65df4590d88a940015955125</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>women-leading-the-way-in-cybersecurity-1</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryqt7ZS/i1L4iWaMNp7bShBj4DnjMGfxKKahp30D6o68SAuhwIehLwNhHJywsamRPXbzIGEdnFSlRO7jfFW+72p]]></acast:settings>
			<itunes:subtitle><![CDATA[with Drenusha & Elza]]></itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>4</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709639806124-29153c6ffbcd8d83efe456eab2a25bef.jpeg"/>
			<description><![CDATA[<p>Welcome to the inaugural episode of The Core Podcast, titled "Women Leading the Way in Cybersecurity". We are celebrating International Women's Day on March 8th, 2024, and have decided to extend the celebration for the entire month of March. We firmly believe that women deserve more than just a day to be acknowledged and recognised.</p><br><p>This series we are delving into cybersecurity and exploring the critical role diversity and women play in shaping the future of this dynamic field. Your host, Kelly Allen&nbsp;unravels&nbsp;the layers of importance surrounding diversity and women in cybersecurity with two very special guests. </p><br><p>Drenusha Salihu and Elza Latifi, two very interesting women who share their experiences and thoughts working in the cybersecurity industry. </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Welcome to the inaugural episode of The Core Podcast, titled "Women Leading the Way in Cybersecurity". We are celebrating International Women's Day on March 8th, 2024, and have decided to extend the celebration for the entire month of March. We firmly believe that women deserve more than just a day to be acknowledged and recognised.</p><br><p>This series we are delving into cybersecurity and exploring the critical role diversity and women play in shaping the future of this dynamic field. Your host, Kelly Allen&nbsp;unravels&nbsp;the layers of importance surrounding diversity and women in cybersecurity with two very special guests. </p><br><p>Drenusha Salihu and Elza Latifi, two very interesting women who share their experiences and thoughts working in the cybersecurity industry. </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Navigating Cyber Security and SaaS Platforms</title>
			<itunes:title>Navigating Cyber Security and SaaS Platforms</itunes:title>
			<pubDate>Wed, 28 Feb 2024 14:36:52 GMT</pubDate>
			<itunes:duration>41:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65df44fd3ca7c9001625f2a6/media.mp3" length="60070443" type="audio/mpeg"/>
			<guid isPermaLink="false">65df44fd3ca7c9001625f2a6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/navigating-cyber-security-and-saas-platforms</link>
			<acast:episodeId>65df44fd3ca7c9001625f2a6</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>navigating-cyber-security-and-saas-platforms</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrzC2R9G2VELbbdlZ9t56qLn0dyI+riqlbjbXt1+VatNsCYbQvy7f9cYQuueKEGGqJNrxQPihadk5mSbeuvjMGtY]]></acast:settings>
			<itunes:subtitle>with Brandon Romisher from AppOmni</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709220466427-40517586b67dd7645c3ddca4f7574f69.jpeg"/>
			<description><![CDATA[<p>Summary</p><br><p>This episode of The Core Podcast discusses the importance of securing SaaS platforms and navigating the cybersecurity challenges they present. The conversation covers the definition and evolution of SaaS platforms, the associated risks and vulnerabilities, and the need for regulations and compliance in SaaS security. The episode also highlights the role of AppOmni in providing solutions for securing SaaS platforms and offers foundational best practices for organisations to follow. Overall, the episode emphasizes the need for organisations to prioritise the security of their SaaS platforms and take proactive measures to protect sensitive data.</p><br><p>Takeaways</p><p><br></p><ul><li>SaaS platforms have become integral to modern business operations, but they also pose cybersecurity risks and vulnerabilities.</li><li>Misconfigurations and data exposures in SaaS systems are common and can lead to unauthorised access and leakage of sensitive data.</li><li>Regulations and compliance standards are emerging to address the security challenges in SaaS platforms, but organizations must take proactive measures to secure their systems.</li><li>Fourth-party risk and supply chain vulnerabilities are significant concerns in SaaS security, as interconnected systems can provide entry points for attackers.</li><li>AppOmni offers solutions for securing SaaS platforms and helps organizations automate security processes and achieve a more excellent security posture.</li></ul><p><br></p><br><p>Sound Bites</p><br><p>Chapters</p><br><p>00:00 Introduction and Importance of Securing SaaS Platforms</p><p>04:12 Definition and Evolution of SaaS Platforms</p><p>10:46 Security Challenges and Risks in SaaS Platforms</p><p>14:59 Misconfigurations and Data Exposures in SaaS Systems</p><p>23:26 Fourth Party Risk and Supply Chain Vulnerabilities</p><p>24:44 Foundational Best Practices for Securing SaaS Platforms</p><p>30:37 AppOmni's Solution and Value in SaaS Security</p><p>35:05 Conclusion and Call to Action</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Summary</p><br><p>This episode of The Core Podcast discusses the importance of securing SaaS platforms and navigating the cybersecurity challenges they present. The conversation covers the definition and evolution of SaaS platforms, the associated risks and vulnerabilities, and the need for regulations and compliance in SaaS security. The episode also highlights the role of AppOmni in providing solutions for securing SaaS platforms and offers foundational best practices for organisations to follow. Overall, the episode emphasizes the need for organisations to prioritise the security of their SaaS platforms and take proactive measures to protect sensitive data.</p><br><p>Takeaways</p><p><br></p><ul><li>SaaS platforms have become integral to modern business operations, but they also pose cybersecurity risks and vulnerabilities.</li><li>Misconfigurations and data exposures in SaaS systems are common and can lead to unauthorised access and leakage of sensitive data.</li><li>Regulations and compliance standards are emerging to address the security challenges in SaaS platforms, but organizations must take proactive measures to secure their systems.</li><li>Fourth-party risk and supply chain vulnerabilities are significant concerns in SaaS security, as interconnected systems can provide entry points for attackers.</li><li>AppOmni offers solutions for securing SaaS platforms and helps organizations automate security processes and achieve a more excellent security posture.</li></ul><p><br></p><br><p>Sound Bites</p><br><p>Chapters</p><br><p>00:00 Introduction and Importance of Securing SaaS Platforms</p><p>04:12 Definition and Evolution of SaaS Platforms</p><p>10:46 Security Challenges and Risks in SaaS Platforms</p><p>14:59 Misconfigurations and Data Exposures in SaaS Systems</p><p>23:26 Fourth Party Risk and Supply Chain Vulnerabilities</p><p>24:44 Foundational Best Practices for Securing SaaS Platforms</p><p>30:37 AppOmni's Solution and Value in SaaS Security</p><p>35:05 Conclusion and Call to Action</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Crucial Role of Full Network Visibility in Cybersecurity:</title>
			<itunes:title>The Crucial Role of Full Network Visibility in Cybersecurity:</itunes:title>
			<pubDate>Wed, 28 Feb 2024 09:28:02 GMT</pubDate>
			<itunes:duration>54:27</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65d4dce75c901e001785392f/media.mp3" length="78640202" type="audio/mpeg"/>
			<guid isPermaLink="false">65d4dce75c901e001785392f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/the-crucial-role-of-full-network-visibility-in-cybersecurity</link>
			<acast:episodeId>65d4dce75c901e001785392f</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>the-crucial-role-of-full-network-visibility-in-cybersecurity</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryLFd6NXykudJ9LOCLzS93oz3QhAomDxAcQzu6V88jJzy5tPu0TrOU+IAfvBoW/iAftDNq6R8hZSGVR75N8EAI+]]></acast:settings>
			<itunes:subtitle>with David Atkinson founder of SenseOn</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709219938150-af40e260e651876c9bca30082a65ef61.jpeg"/>
			<description><![CDATA[<p>This podcast episode delves into the critical aspect of achieving full visibility on your network and its paramount importance in enhancing cybersecurity measures. </p><br><p>David Atkinson, founder of SenseOn, sheds light on the significance of understanding every nook and cranny of your digital landscape to safeguard against evolving cyber threats effectively.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This podcast episode delves into the critical aspect of achieving full visibility on your network and its paramount importance in enhancing cybersecurity measures. </p><br><p>David Atkinson, founder of SenseOn, sheds light on the significance of understanding every nook and cranny of your digital landscape to safeguard against evolving cyber threats effectively.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>A deep dive into the world of File Transfer</title>
			<itunes:title>A deep dive into the world of File Transfer</itunes:title>
			<pubDate>Tue, 20 Feb 2024 16:00:24 GMT</pubDate>
			<itunes:duration>59:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65d4cc945c901e00178265f5/media.mp3" length="143441536" type="audio/mpeg"/>
			<guid isPermaLink="false">65d4cc945c901e00178265f5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/a-deep-dive-into-the-world-of-file-transfer</link>
			<acast:episodeId>65d4cc945c901e00178265f5</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>a-deep-dive-into-the-world-of-file-transfer</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxU918CRuqJr6c2I0PZSo006VUhwMq6CyCfzqk7FwCRzRilHmT2/9eSClqJr/KIdRbzx/7wBVQYKfFhb5Q4OX71]]></acast:settings>
			<itunes:subtitle>with Chris Payne from Pro2col</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>3</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>We're excited to announce that the focus of the latest episode of The Core Podcast is file transfer! We have two special guests joining us, Chris Payne from Pro2col and Andrew Wragg, who closely collaborates with our marketing and tech teams at Core to Cloud.</p><br><p>This episode will give you everything you need about file transfer. We will be exploring data security in file exchange technology.</p><br><p>Pro2col specialises in file transfer and automation technology. Chris Payne, our guest from Pro2col, has been working with solutions of this nature for the past 17 years. Together, we have completed over 1600 projects in 35 countries over a 20-year period.</p><br><p>Chris has significant expertise in the channel and has spent his entire career working in it. He even started his own reseller company, which he specialised in file transfer. By using marketing automation and working hard, he took his company to nearly 1 million in revenue with around 75 customers. He sold it to Pro2col in December 2021. He also spent four years in Norway and ran his company from there.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We're excited to announce that the focus of the latest episode of The Core Podcast is file transfer! We have two special guests joining us, Chris Payne from Pro2col and Andrew Wragg, who closely collaborates with our marketing and tech teams at Core to Cloud.</p><br><p>This episode will give you everything you need about file transfer. We will be exploring data security in file exchange technology.</p><br><p>Pro2col specialises in file transfer and automation technology. Chris Payne, our guest from Pro2col, has been working with solutions of this nature for the past 17 years. Together, we have completed over 1600 projects in 35 countries over a 20-year period.</p><br><p>Chris has significant expertise in the channel and has spent his entire career working in it. He even started his own reseller company, which he specialised in file transfer. By using marketing automation and working hard, he took his company to nearly 1 million in revenue with around 75 customers. He sold it to Pro2col in December 2021. He also spent four years in Norway and ran his company from there.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Securing Your Digital Ecosystem: Mastering Third-Party Risk Management</title>
			<itunes:title>Securing Your Digital Ecosystem: Mastering Third-Party Risk Management</itunes:title>
			<pubDate>Wed, 24 Jan 2024 13:43:57 GMT</pubDate>
			<itunes:duration>34:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65b1141dedacef0017741bad/media.mp3" length="49659617" type="audio/mpeg"/>
			<guid isPermaLink="false">65b1141dedacef0017741bad</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/securing-your-digital-ecosystem-mastering-third-party-risk-m</link>
			<acast:episodeId>65b1141dedacef0017741bad</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>securing-your-digital-ecosystem-mastering-third-party-risk-m</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxzNzM38paCDR70+2CV8okxZ4ExcahSRncwpg1pK4T9PQJ0EIIHx+fxC3lIQxtyjCVnK1y2tO60HCvnpmJzEhxG]]></acast:settings>
			<itunes:subtitle>with Matt Pearson from Panorays</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>42</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>Cybersecurity experts Kelly and Matt explore advanced tactics for understanding and improving cyber-risk postures in this podcast episode. The discussion emphasises the importance of strengthening relationships between companies and third parties to mitigate cybersecurity risks effectively. The episode explores practical strategies and insights for organisations seeking to elevate their cybersecurity measures beyond fundamental approaches.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Cybersecurity experts Kelly and Matt explore advanced tactics for understanding and improving cyber-risk postures in this podcast episode. The discussion emphasises the importance of strengthening relationships between companies and third parties to mitigate cybersecurity risks effectively. The episode explores practical strategies and insights for organisations seeking to elevate their cybersecurity measures beyond fundamental approaches.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>An insiders look at our proactive cybersecurity services</title>
			<itunes:title>An insiders look at our proactive cybersecurity services</itunes:title>
			<pubDate>Wed, 17 Jan 2024 10:52:24 GMT</pubDate>
			<itunes:duration>33:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6581844c2809dc0015cbc181/media.mp3" length="48289128" type="audio/mpeg"/>
			<guid isPermaLink="false">6581844c2809dc0015cbc181</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/greg-mcgrat</link>
			<acast:episodeId>6581844c2809dc0015cbc181</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>greg-mcgrat</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtry407uzS8M/jtt2FTCCUmvedK+78juvkRPmAc+wQsUwz4C6BANyvFVNJeIqlVOwhiWTErxVJYckRGYGBEjtBK+5]]></acast:settings>
			<itunes:subtitle>with Greg McGrath</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>41</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[We explore the world of cyber threat intelligence and highlight the significance of monitoring data on the dark web.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[We explore the world of cyber threat intelligence and highlight the significance of monitoring data on the dark web.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cybersecurity in the education sector</title>
			<itunes:title>Cybersecurity in the education sector</itunes:title>
			<pubDate>Wed, 10 Jan 2024 10:52:45 GMT</pubDate>
			<itunes:duration>20:55</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6581846d58e72c0016d9aa8f/media.mp3" length="30161749" type="audio/mpeg"/>
			<guid isPermaLink="false">6581846d58e72c0016d9aa8f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/amne</link>
			<acast:episodeId>6581846d58e72c0016d9aa8f</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>amne</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxn8XOFUNoW3SL1vAuTvlfjKA1mfv6OGMbtFbXeOToM/R8f+hV2iowgqR8piNTiK/xOwfnPiM/a2I20AmzSHoSR]]></acast:settings>
			<itunes:subtitle>with AMNE Group</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>40</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[with AMNE Group<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[with AMNE Group<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Space Invaders: Navigating Cybersecurity in Outer Space</title>
			<itunes:title>Space Invaders: Navigating Cybersecurity in Outer Space</itunes:title>
			<pubDate>Wed, 03 Jan 2024 10:52:02 GMT</pubDate>
			<itunes:duration>45:44</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6581841fd4c1590016e98af3/media.mp3" length="66962492" type="audio/mpeg"/>
			<guid isPermaLink="false">6581841fd4c1590016e98af3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/amanda-crossley</link>
			<acast:episodeId>6581841fd4c1590016e98af3</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>amanda-crossley</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrz1C7pjc/kHMWIlaLyKxPNWjRQqwvKRHpQpabg5PVTFX/c7+wTI3Px95kL6nR4Koqt9K7LcZakg/BbCVAgQBThs]]></acast:settings>
			<itunes:subtitle>With Amanda Crossley</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>39</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[In this episode, we discuss the fascinating and critical realm of cybersecurity in outer space! With increasing satellites orbiting the Earth, space has become a new frontier for cyber attacks. We will dive into the challenges and risks of satellite hacking and discuss the measures being taken to protect our space-based assets.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this episode, we discuss the fascinating and critical realm of cybersecurity in outer space! With increasing satellites orbiting the Earth, space has become a new frontier for cyber attacks. We will dive into the challenges and risks of satellite hacking and discuss the measures being taken to protect our space-based assets.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Guardians of Health: Personal Journeys and the NHS</title>
			<itunes:title>Guardians of Health: Personal Journeys and the NHS</itunes:title>
			<pubDate>Wed, 20 Dec 2023 11:07:57 GMT</pubDate>
			<itunes:duration>35:39</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/658184ab836ba30016b8aaf5/media.mp3" length="52304325" type="audio/mpeg"/>
			<guid isPermaLink="false">658184ab836ba30016b8aaf5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/jason-cohen</link>
			<acast:episodeId>658184ab836ba30016b8aaf5</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>jason-cohen</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxStogOu9b/L31gZoc/W7o/00AL0FJLqAP4jv96rapD2oyS2Mofq6eo7hcKhRGyUkHQwFSScGcvMrBWdxZ1zuxi]]></acast:settings>
			<itunes:subtitle>With Jason Cohen</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>38</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>Meet the newest member of our team, Jason Cohen and a special episode of our podcast that touches on the deeply personal connection between our team member Jason and the NHS (National Health Service).&nbsp;</p><br><p>In this episode, we share a personal story of our newest employee, focusing on their unique journey and how their experiences, especially with Tourette's syndrome, have shaped their dedication to protecting the NHS.</p><p>&nbsp;</p><p>This is one of our most moving podcasts to date, and it offers a great, honest view into life with Tourette's and how a diagnosis isn’t career-ending. Welcome to the Core To Cloud team.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Meet the newest member of our team, Jason Cohen and a special episode of our podcast that touches on the deeply personal connection between our team member Jason and the NHS (National Health Service).&nbsp;</p><br><p>In this episode, we share a personal story of our newest employee, focusing on their unique journey and how their experiences, especially with Tourette's syndrome, have shaped their dedication to protecting the NHS.</p><p>&nbsp;</p><p>This is one of our most moving podcasts to date, and it offers a great, honest view into life with Tourette's and how a diagnosis isn’t career-ending. Welcome to the Core To Cloud team.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Securing Your Cyber Future: Navigating Budget Challenges</title>
			<itunes:title>Securing Your Cyber Future: Navigating Budget Challenges</itunes:title>
			<pubDate>Wed, 13 Dec 2023 07:00:42 GMT</pubDate>
			<itunes:duration>43:56</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65548f503a95aa0012163ef2/media.mp3" length="63617681" type="audio/mpeg"/>
			<guid isPermaLink="false">65548f503a95aa0012163ef2</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/securing-your-cyber-future-navigating-budget-challenges</link>
			<acast:episodeId>65548f503a95aa0012163ef2</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>securing-your-cyber-future-navigating-budget-challenges</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxcdTNdNxyQAikaYVdmzPHv3FDBVhBiWAj3Tz4iKrlUAEDzXwU3IXcw5STt969TidAN0fK7Y0Nw2pFscNlKt+Y4]]></acast:settings>
			<itunes:subtitle>Cracking the Code: Getting Cybersecurity Budget in Tough Times with Lee Morton</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>37</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[Welcome to the episode of Securing Your Cyber Future, the Core podcast that provides expert insights on cybersecurity strategies, especially when facing strong economic headwinds. In today's episode, we'll discuss the art of acquiring budget for cybersecurity when the financial climate is less than favourable. Sometimes, traditional budgeting methods won't cut it. In this episode, we'll explore creative approaches and strategies to secure cybersecurity funding with our guest, Lee Morton. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Welcome to the episode of Securing Your Cyber Future, the Core podcast that provides expert insights on cybersecurity strategies, especially when facing strong economic headwinds. In today's episode, we'll discuss the art of acquiring budget for cybersecurity when the financial climate is less than favourable. Sometimes, traditional budgeting methods won't cut it. In this episode, we'll explore creative approaches and strategies to secure cybersecurity funding with our guest, Lee Morton. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Fuelling Performance: How Food Choices Impact Your Work and Life</title>
			<itunes:title>Fuelling Performance: How Food Choices Impact Your Work and Life</itunes:title>
			<pubDate>Wed, 06 Dec 2023 07:00:27 GMT</pubDate>
			<itunes:duration>47:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65548e8e88b7e70012223058/media.mp3" length="69616302" type="audio/mpeg"/>
			<guid isPermaLink="false">65548e8e88b7e70012223058</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/fuelling-performance-how-food-choices-impact-your-work-and-l</link>
			<acast:episodeId>65548e8e88b7e70012223058</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>fuelling-performance-how-food-choices-impact-your-work-and-l</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwHH1/Xkxyy8z5tVdxcIqc3nanC1o9z6c7j2kRBZe2fbD2j9fSZB4AH9Jv4sA7zX2zMzd3xltwKez6EE56bmqvW]]></acast:settings>
			<itunes:subtitle>With Caroline Peyton</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>36</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[This episode on the Core podcast delves into the relationship between food choices, productivity, energy levels, and maintaining a fulfilling work-life balance. With our guest Caroline Peyton this podcast explores practical tips, expert insights, and personal stories to help you boost workplace performance, maintain energy from morning till night, and have a rich life outside of work. Given the high level of responsibility,&nbsp;cybersecurity experts often face high job pressure and demanding work hours here is our practical take.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This episode on the Core podcast delves into the relationship between food choices, productivity, energy levels, and maintaining a fulfilling work-life balance. With our guest Caroline Peyton this podcast explores practical tips, expert insights, and personal stories to help you boost workplace performance, maintain energy from morning till night, and have a rich life outside of work. Given the high level of responsibility,&nbsp;cybersecurity experts often face high job pressure and demanding work hours here is our practical take.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Leading Women into Tech </title>
			<itunes:title>Leading Women into Tech </itunes:title>
			<pubDate>Wed, 29 Nov 2023 07:00:54 GMT</pubDate>
			<itunes:duration>43:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65548e32111653001250152a/media.mp3" length="62789162" type="audio/mpeg"/>
			<guid isPermaLink="false">65548e32111653001250152a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/leading-women-into-tech</link>
			<acast:episodeId>65548e32111653001250152a</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>leading-women-into-tech</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwLgamsCGjLJZyLEbYObvmzu24Az8zOPmAh9MOtDXHOKrNleSSn72giTb3C5e2wBImjIc72gD8afn65IAit3WN3]]></acast:settings>
			<itunes:subtitle>From a finalist’s perspective with Danielle Holmes</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>35</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA["Leading Women into Tech" is a podcast dedicated to amplifying the voices and stories of women who are making a significant impact in the technology industry. The Core podcast provides a platform for accomplished women in tech to share their journeys, experiences, and insights.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA["Leading Women into Tech" is a podcast dedicated to amplifying the voices and stories of women who are making a significant impact in the technology industry. The Core podcast provides a platform for accomplished women in tech to share their journeys, experiences, and insights.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>EmpowerED: Thriving in the Cyberspace Workplace</title>
			<itunes:title>EmpowerED: Thriving in the Cyberspace Workplace</itunes:title>
			<pubDate>Wed, 22 Nov 2023 07:00:49 GMT</pubDate>
			<itunes:duration>45:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65548db611165300124fe572/media.mp3" length="66123180" type="audio/mpeg"/>
			<guid isPermaLink="false">65548db611165300124fe572</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/empowered-thriving-in-the-cyberspace-workplace</link>
			<acast:episodeId>65548db611165300124fe572</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>empowered-thriving-in-the-cyberspace-workplace</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxHL5e3cxVcN2sQ6MKs/mUpuo5OvJoJjLOBa/GW0b8Ej5WTKwcXsJih3UDqwPlo5mF4z3voOo9pX75QxcR8AQPi]]></acast:settings>
			<itunes:subtitle>With Debbie Small</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>34</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[In this podcast, we explore the critical role that collaboration and expert guidance play in protecting organisations and individuals. This episode is designed to inspire, educate, and equip individuals with the knowledge and skills to empower themselves and others in the workplace. With our guest, Debbie Small, this podcast explores personal and professional growth, leadership, diversity, inclusion, and strategies to create an empowering work environment.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this podcast, we explore the critical role that collaboration and expert guidance play in protecting organisations and individuals. This episode is designed to inspire, educate, and equip individuals with the knowledge and skills to empower themselves and others in the workplace. With our guest, Debbie Small, this podcast explores personal and professional growth, leadership, diversity, inclusion, and strategies to create an empowering work environment.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Diversifying Cybersecurity: Breaking Barriers, Building Bridges</title>
			<itunes:title>Diversifying Cybersecurity: Breaking Barriers, Building Bridges</itunes:title>
			<pubDate>Wed, 15 Nov 2023 07:00:04 GMT</pubDate>
			<itunes:duration>45:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65292eb6c0e0c90012d2b0f5/media.mp3" length="89436438" type="audio/mpeg"/>
			<guid isPermaLink="false">65292eb6c0e0c90012d2b0f5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/diversifying-cybersecurity-breaking-barriers-building-bridge</link>
			<acast:episodeId>65292eb6c0e0c90012d2b0f5</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>diversifying-cybersecurity-breaking-barriers-building-bridge</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsoxhINu4Ad7VkAnsB5MGv7a9CGjPisQfVFRov/WIP8WFrZcISrc0gvm/CINb6ptqSeoenL0hhVJP++7J4pfSlLIZNLtMjHW3aLZ3VCdBG2Nk=]]></acast:settings>
			<itunes:subtitle>Creating a More Inclusive Cybersecurity Industry with Purvi Kay</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>33</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[Today, we're diving deep into an issue that's crucial for the future of cybersecurity: diversity and inclusion. We'll discuss how to make the cybersecurity industry more diverse, with a particular focus on women joining the field and supporting neurodiversity. I am delighted to have Purvi Kay join the podcast today. Purvi is a TEDx Speaker, International Keynote Speaker, she Mentors and supports women in to tech as well as holding down her day job in Cyber Security at BAE Systems. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Today, we're diving deep into an issue that's crucial for the future of cybersecurity: diversity and inclusion. We'll discuss how to make the cybersecurity industry more diverse, with a particular focus on women joining the field and supporting neurodiversity. I am delighted to have Purvi Kay join the podcast today. Purvi is a TEDx Speaker, International Keynote Speaker, she Mentors and supports women in to tech as well as holding down her day job in Cyber Security at BAE Systems. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Human Side of Cyber Defence</title>
			<itunes:title>The Human Side of Cyber Defence</itunes:title>
			<pubDate>Wed, 08 Nov 2023 07:00:34 GMT</pubDate>
			<itunes:duration>48:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/65292e5c74eb7200122c0668/media.mp3" length="93281188" type="audio/mpeg"/>
			<guid isPermaLink="false">65292e5c74eb7200122c0668</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/the-human-side-of-cyber-defence</link>
			<acast:episodeId>65292e5c74eb7200122c0668</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>the-human-side-of-cyber-defence</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsoxhINu4Ad7VkAnsB5MGv7Trq+2CFdYt5U4j3vg0hNinn0n6gGIQMfJHXxue9doBL9Kc7fo6SMp4wdTy0I24RyMUVyokxxqo/3rm+4LoaItM=]]></acast:settings>
			<itunes:subtitle>Understanding Cyber Attackers as Humans with Robert Black</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>32</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[In this episode, we explore the intersection of cybersecurity and human behaviour. We'll discuss the importance of adopting a defensive mindset when dealing with cyber attackers. Instead of just viewing them as technically savvy adversaries, we'll delve into understanding them as humans who can make errors and be exploited. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this episode, we explore the intersection of cybersecurity and human behaviour. We'll discuss the importance of adopting a defensive mindset when dealing with cyber attackers. Instead of just viewing them as technically savvy adversaries, we'll delve into understanding them as humans who can make errors and be exploited. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cloud Migration and Cybersecurity: Navigating the Digital Frontier</title>
			<itunes:title>Cloud Migration and Cybersecurity: Navigating the Digital Frontier</itunes:title>
			<pubDate>Wed, 01 Nov 2023 07:00:52 GMT</pubDate>
			<itunes:duration>38:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6527cfcfd40c97001256decf/media.mp3" length="55503377" type="audio/mpeg"/>
			<guid isPermaLink="false">6527cfcfd40c97001256decf</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/frank-plummer</link>
			<acast:episodeId>6527cfcfd40c97001256decf</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>frank-plummer</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsoxhINu4Ad7VkAnsB5MGv7dWPvAwfov4R7XvF/0JiNXcIW+XHED+e+TGyBny1ww3Jth6MhgfhAWv/Exvm04Ej8y/rRhuZLiOEO/F6Pem+b40=]]></acast:settings>
			<itunes:subtitle>with Frank Plummer</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>31</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>Today we're diving into a topic that's reshaping the business world - moving to the cloud and as we all know it’s having a profound impact on cybersecurity with special guest Frank Plummer. </p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Today we're diving into a topic that's reshaping the business world - moving to the cloud and as we all know it’s having a profound impact on cybersecurity with special guest Frank Plummer. </p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Guide to Cyber Resilience for Health & Adult Social Care]]></title>
			<itunes:title><![CDATA[Guide to Cyber Resilience for Health & Adult Social Care]]></itunes:title>
			<pubDate>Wed, 25 Oct 2023 06:00:22 GMT</pubDate>
			<itunes:duration>29:11</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6527ce0cb774f7001164f07f/media.mp3" length="56068526" type="audio/mpeg"/>
			<guid isPermaLink="false">6527ce0cb774f7001164f07f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/the-latest-nhs-report-with-phil-howe</link>
			<acast:episodeId>6527ce0cb774f7001164f07f</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>the-latest-nhs-report-with-phil-howe</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsoxhINu4Ad7VkAnsB5MGv7YxPEN3qJARpkIIP/dzZ+Gg/ZiW3CU0YuKBsE8CutAhx7p1wfkn8Qzk7R0g0ro1cPqAzJzpUHzLzi0g2i7RJ9NM=]]></acast:settings>
			<itunes:subtitle>with Core to Cloud CTO: Phil Howe</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>30</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[In this episode, we will explore the latest government guidelines for cyber resilience in health and adult social care. Phil Howe provides suggestions and tips on how to navigate the latest guidelines.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this episode, we will explore the latest government guidelines for cyber resilience in health and adult social care. Phil Howe provides suggestions and tips on how to navigate the latest guidelines.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Reflecting on the last year at Core to Cloud</title>
			<itunes:title>Reflecting on the last year at Core to Cloud</itunes:title>
			<pubDate>Wed, 18 Oct 2023 06:00:52 GMT</pubDate>
			<itunes:duration>22:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6527c812d40c97001253c3dd/media.mp3" length="32349233" type="audio/mpeg"/>
			<guid isPermaLink="false">6527c812d40c97001253c3dd</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/core-to-cloud-co-founder-ceo-returns-james-cunningham</link>
			<acast:episodeId>6527c812d40c97001253c3dd</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>core-to-cloud-co-founder-ceo-returns-james-cunningham</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsoxhINu4Ad7VkAnsB5MGv7S1IKwsJzBtSWMh7wiKGrqHpjTRfohNtk1e90Ab3AqmnulKqzuu2Gr/6t7E9EmgebwOwiNUetMrJfLLcKLAc4HM=]]></acast:settings>
			<itunes:subtitle><![CDATA[with Core to Cloud Co-Founder & CEO: James Cunningham]]></itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>29</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[As we look back at the year that has passed, we reflect on our journey, which is a testament to our resilience, adaptability, and growth. Join Kelly and James as we take a closer look at the inner workings of Core to Cloud over the past year. You will be the first to hear some of our latest success stories, and we will discuss where the company is heading in the next financial year. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[As we look back at the year that has passed, we reflect on our journey, which is a testament to our resilience, adaptability, and growth. Join Kelly and James as we take a closer look at the inner workings of Core to Cloud over the past year. You will be the first to hear some of our latest success stories, and we will discuss where the company is heading in the next financial year. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Unlocking Network Solutions for the NHS: Simon Vosper</title>
			<itunes:title>Unlocking Network Solutions for the NHS: Simon Vosper</itunes:title>
			<pubDate>Wed, 09 Aug 2023 06:00:58 GMT</pubDate>
			<itunes:duration>36:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64c8f964c9f4850011eaf7dc/media.mp3" length="52240156" type="audio/mpeg"/>
			<guid isPermaLink="false">64c8f964c9f4850011eaf7dc</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/unlocking-network-solutions-for-the-nhs-simon-vosper</link>
			<acast:episodeId>64c8f964c9f4850011eaf7dc</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>unlocking-network-solutions-for-the-nhs-simon-vosper</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrys3HjqgX3AMkyVZGsjE8I5Ao9tuZPr/668dG9tDDxmCc2pioDaMiJfIG9TLID7AYlATKRFPnlz8iPm0XiGjkYH]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>28</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>Join us on an enlightening episode as Adam takes the reins and welcomes&nbsp;<a href="https://www.linkedin.com/in/ACoAABdIFNABuenxcdqytzqqQFca0Y-Jte-ExWE" rel="noopener noreferrer" target="_blank">Simon Vosper</a>&nbsp;from&nbsp;<a href="https://www.linkedin.com/company/extreme-networks/" rel="noopener noreferrer" target="_blank">Extreme Networks</a>.</p><br><p>Discover the pressing challenges faced by NHS trusts and hospitals in managing their networks, from visibility and device management to application performance.</p><br><p>Learn how Extreme's innovative solutions provide actionable insights and analytics to empower network administrators.</p><br><p>Stay tuned for valuable insights into optimising network infrastructure in healthcare environments.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join us on an enlightening episode as Adam takes the reins and welcomes&nbsp;<a href="https://www.linkedin.com/in/ACoAABdIFNABuenxcdqytzqqQFca0Y-Jte-ExWE" rel="noopener noreferrer" target="_blank">Simon Vosper</a>&nbsp;from&nbsp;<a href="https://www.linkedin.com/company/extreme-networks/" rel="noopener noreferrer" target="_blank">Extreme Networks</a>.</p><br><p>Discover the pressing challenges faced by NHS trusts and hospitals in managing their networks, from visibility and device management to application performance.</p><br><p>Learn how Extreme's innovative solutions provide actionable insights and analytics to empower network administrators.</p><br><p>Stay tuned for valuable insights into optimising network infrastructure in healthcare environments.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Wellness Month: Gemma James</title>
			<itunes:title>Cyber Wellness Month: Gemma James</itunes:title>
			<pubDate>Wed, 02 Aug 2023 06:00:20 GMT</pubDate>
			<itunes:duration>43:16</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64c38cd30e1a7c0011607328/media.mp3" length="62570102" type="audio/mpeg"/>
			<guid isPermaLink="false">64c38cd30e1a7c0011607328</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-wellness-month-gemma-james</link>
			<acast:episodeId>64c38cd30e1a7c0011607328</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-wellness-month-gemma-james</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryN4G7xUzGO3mrNwtUSOH6JdnAfHRXP57lrKpDA13OlHg8jyPZORZH8KB95OGgUeTWK/zpX2p0dDnEaxYkRikH1]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>27</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>In a field still dominated by 85% straight males, we recognise the challenges many talented individuals face in reaching those senior positions.</p><br><p>Our commitment is to change this narrative and create a workplace where everyone's skills and passions are valued, irrespective of gender or background.</p><br><p><a href="https://www.linkedin.com/in/ACoAAAg6Od0BnUZDlGcjBKb6NSwhXogAwHGCjSs" rel="noopener noreferrer" target="_blank">Gemma James</a>&nbsp;shares her personal journey and emphasises that cybersecurity should be accessible to everyone with the right skill set. We couldn't agree more! 🌟💻</p><br><p>Join us in this powerful conversation as we discuss the importance of diversity and the limitless potential it brings to the industry!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In a field still dominated by 85% straight males, we recognise the challenges many talented individuals face in reaching those senior positions.</p><br><p>Our commitment is to change this narrative and create a workplace where everyone's skills and passions are valued, irrespective of gender or background.</p><br><p><a href="https://www.linkedin.com/in/ACoAAAg6Od0BnUZDlGcjBKb6NSwhXogAwHGCjSs" rel="noopener noreferrer" target="_blank">Gemma James</a>&nbsp;shares her personal journey and emphasises that cybersecurity should be accessible to everyone with the right skill set. We couldn't agree more! 🌟💻</p><br><p>Join us in this powerful conversation as we discuss the importance of diversity and the limitless potential it brings to the industry!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Wellness Month: Karly Jade</title>
			<itunes:title>Cyber Wellness Month: Karly Jade</itunes:title>
			<pubDate>Wed, 26 Jul 2023 06:00:49 GMT</pubDate>
			<itunes:duration>34:41</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64707d3958889f0011d50fb1/media.mp3" length="66622079" type="audio/mpeg"/>
			<guid isPermaLink="false">64707d3958889f0011d50fb1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-wellness-month-carly-jade</link>
			<acast:episodeId>64707d3958889f0011d50fb1</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-wellness-month-carly-jade</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryTcmQeOjOQq3fBqUDcsXOPoP3UNZ3V1oEKWfynl/EmdWpoSG7sXagw7YfDTygAjPtt5XATHI90XfSUgLutkw+4]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>26</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1688641265396-ea365249477926cfc20eeac448d3bcae.jpeg"/>
			<description><![CDATA[<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Cyber Wellness Month: Jasmine & Yvonne Esenzki]]></title>
			<itunes:title><![CDATA[Cyber Wellness Month: Jasmine & Yvonne Esenzki]]></itunes:title>
			<pubDate>Wed, 19 Jul 2023 06:00:16 GMT</pubDate>
			<itunes:duration>1:05:27</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64707f77d84e2e0011039fcc/media.mp3" length="94470324" type="audio/mpeg"/>
			<guid isPermaLink="false">64707f77d84e2e0011039fcc</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-wellness-month-jasmine-yvonne-esenzki</link>
			<acast:episodeId>64707f77d84e2e0011039fcc</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-wellness-month-jasmine-yvonne-esenzki</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwAYtWeNRD2jgsQu9e04Quvq/tNCuApzmovopV8ieafn3eiWYet/RLLBQVPtbYA+ryUKu3d3RsmjkZcr30WZcSO]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>25</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1688641098305-d80fe1b18366745319e8300b487173b0.jpeg"/>
			<description><![CDATA[<p>Unleashing the Power of Senses: Join us on an incredible journey with Jasmine and Yvonne, the visionary mother-daughter duo behind our groundbreaking venture.&nbsp;</p><br><p>Together, they've fused health, tech, and cybersecurity to address the alarming levels of burnout in our fast-paced world.&nbsp;</p><br><p>Discover how they transformed a simple idea into a global phenomenon, offering physical spaces, mobile apps, and web platforms designed to optimise mood, focus, and relaxation.&nbsp;</p><br><p>Let's rewrite the narrative on work-life balance and make a positive impact.&nbsp;</p><br><p>#SensesRevolution #OptimizeYourMind</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Unleashing the Power of Senses: Join us on an incredible journey with Jasmine and Yvonne, the visionary mother-daughter duo behind our groundbreaking venture.&nbsp;</p><br><p>Together, they've fused health, tech, and cybersecurity to address the alarming levels of burnout in our fast-paced world.&nbsp;</p><br><p>Discover how they transformed a simple idea into a global phenomenon, offering physical spaces, mobile apps, and web platforms designed to optimise mood, focus, and relaxation.&nbsp;</p><br><p>Let's rewrite the narrative on work-life balance and make a positive impact.&nbsp;</p><br><p>#SensesRevolution #OptimizeYourMind</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Wellness Month: Noy Reuveni</title>
			<itunes:title>Cyber Wellness Month: Noy Reuveni</itunes:title>
			<pubDate>Wed, 12 Jul 2023 06:00:40 GMT</pubDate>
			<itunes:duration>44:06</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64707ea0511089001256c1e1/media.mp3" length="106016086" type="audio/mpeg"/>
			<guid isPermaLink="false">64707ea0511089001256c1e1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-wellness-month-noy-reuveni</link>
			<acast:episodeId>64707ea0511089001256c1e1</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-wellness-month-noy-reuveni</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrydqtju+kXjKeY/+m2Zijv6oDNr5RZFvehlqV79TOvD1l714MdHITHqoWoKoTJtPkdCxiLCKMTd/wfD7ktGqfGh]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>24</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1688641142512-934671ca2e33d198e21c15165a3581b4.jpeg"/>
			<description><![CDATA[<p>Join us on the Core Podcast, hosted by Court Cloud, as we delve into the world of cybersecurity, technology, and mental well-being.&nbsp;</p><br><p>Special guest Noy Rezvani, Director of Intelligence Operations at KELA joins us for an eye-opening discussion on industry burnout and the importance of cyber wellness.</p><br><p>Gain insights, strategies, and a fresh perspective on work-life balance in our hyperconnected world. Don't miss out!&nbsp;</p><br><p>#CorePodcast #CyberWellness #IndustryInsights</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join us on the Core Podcast, hosted by Court Cloud, as we delve into the world of cybersecurity, technology, and mental well-being.&nbsp;</p><br><p>Special guest Noy Rezvani, Director of Intelligence Operations at KELA joins us for an eye-opening discussion on industry burnout and the importance of cyber wellness.</p><br><p>Gain insights, strategies, and a fresh perspective on work-life balance in our hyperconnected world. Don't miss out!&nbsp;</p><br><p>#CorePodcast #CyberWellness #IndustryInsights</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Wellness Month: Raghu Nandakumara</title>
			<itunes:title>Cyber Wellness Month: Raghu Nandakumara</itunes:title>
			<pubDate>Wed, 05 Jul 2023 06:00:21 GMT</pubDate>
			<itunes:duration>56:35</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64707e145a40370011553818/media.mp3" length="136057472" type="audio/mpeg"/>
			<guid isPermaLink="false">64707e145a40370011553818</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-wellness-month-raghu-nandakumara</link>
			<acast:episodeId>64707e145a40370011553818</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-wellness-month-raghu-nandakumara</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrx8vVMsqkT7OqQfn8clXI95oamlBZdrrodwzJ+uR4wrC4TwLlv+8mA+hYf8rvIX1fJYjFN/t7XDRemtkjV0Mje2]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>23</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1688641350333-b8e2d4a5206d783102638e5304bdde2e.jpeg"/>
			<description><![CDATA[Unlocking the Power of Micro-Segmentation: Join Raghu in an Eye-Opening Episode as he Explores Cutting-Edge Strategies to Safeguard Against Cyber Threats. Discover the Path to Zero Trust and Risk Mitigation in this Must-Listen Podcast!<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Unlocking the Power of Micro-Segmentation: Join Raghu in an Eye-Opening Episode as he Explores Cutting-Edge Strategies to Safeguard Against Cyber Threats. Discover the Path to Zero Trust and Risk Mitigation in this Must-Listen Podcast!<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Wellness Month: Dana Chapman</title>
			<itunes:title>Cyber Wellness Month: Dana Chapman</itunes:title>
			<pubDate>Wed, 28 Jun 2023 06:00:02 GMT</pubDate>
			<itunes:duration>40:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64707dcdbc0c7d001153f4f8/media.mp3" length="97130673" type="audio/mpeg"/>
			<guid isPermaLink="false">64707dcdbc0c7d001153f4f8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-wellness-month-dana-chapman</link>
			<acast:episodeId>64707dcdbc0c7d001153f4f8</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-wellness-month-dana-chapman</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrw3IST6brXtA2/FnKX3SoP8Kq1q6dBYgHnLlpcXpWcW1mf6Nyb1qBvv2RPn+czTWglYmFsDrIvi5nELAOfEOZXe]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>22</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Wellness Month: Bec McKeown</title>
			<itunes:title>Cyber Wellness Month: Bec McKeown</itunes:title>
			<pubDate>Wed, 21 Jun 2023 06:00:48 GMT</pubDate>
			<itunes:duration>47:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64707d046f638c00112634ed/media.mp3" length="115329732" type="audio/mpeg"/>
			<guid isPermaLink="false">64707d046f638c00112634ed</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-wellness-month-rebecca-mckeown</link>
			<acast:episodeId>64707d046f638c00112634ed</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-wellness-month-rebecca-mckeown</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryiP1+efdTcZ6R5yUUXQhDAjJYbD70wHNAgQoZ8Rb/1p6uctO0D5J+DXsVhiFHc9uHS1bDS6CB1S67hCDUMW5xy]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>21</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[This podcast uncovers the impact of cybersecurity on mental health, organizational processes, and empathy within the industry. It emphasizes psychological safety, tackles stress-inducing systems, and addresses the challenges faced by professionals. Discover strategies for resilience, supportive workplaces, and engaging training. Unveil the interconnected nature of critical infrastructures and the importance of cybersecurity awareness. Tune in for a powerful exploration of this vital topic.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This podcast uncovers the impact of cybersecurity on mental health, organizational processes, and empathy within the industry. It emphasizes psychological safety, tackles stress-inducing systems, and addresses the challenges faced by professionals. Discover strategies for resilience, supportive workplaces, and engaging training. Unveil the interconnected nature of critical infrastructures and the importance of cybersecurity awareness. Tune in for a powerful exploration of this vital topic.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyberwellness Month: John Blythe</title>
			<itunes:title>Cyberwellness Month: John Blythe</itunes:title>
			<pubDate>Wed, 14 Jun 2023 06:00:08 GMT</pubDate>
			<itunes:duration>47:13</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64707bae6f638c0011260472/media.mp3" length="90697682" type="audio/mpeg"/>
			<guid isPermaLink="false">64707bae6f638c0011260472</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyberwellness-month-john-blythe</link>
			<acast:episodeId>64707bae6f638c0011260472</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyberwellness-month-john-blythe</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxw1P67OEIT+Ut6+5yqXsRSZqCGtU38wXoyrzFQox3QNXGWoycmzCropzJ79QcRBKAKKGroM4moSPoNiWPxS7PU]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>20</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>🌟 Building Confidence to Combat Phishing Attacks 💪💻</p><br><p>John sheds light on step-by-step guidance, persuasive techniques, and positive reinforcement to effectively boost employees' confidence in detecting and combating phishing attempts.</p><br><p>Stay tuned for Wednesday to gain valuable insights and become a part of a cyber-resilient community. 📚🔒</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>🌟 Building Confidence to Combat Phishing Attacks 💪💻</p><br><p>John sheds light on step-by-step guidance, persuasive techniques, and positive reinforcement to effectively boost employees' confidence in detecting and combating phishing attempts.</p><br><p>Stay tuned for Wednesday to gain valuable insights and become a part of a cyber-resilient community. 📚🔒</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Wellness Month: Frank Plummer</title>
			<itunes:title>Cyber Wellness Month: Frank Plummer</itunes:title>
			<pubDate>Wed, 07 Jun 2023 06:00:26 GMT</pubDate>
			<itunes:duration>45:14</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64707b853c7f5e001192db19/media.mp3" length="86893007" type="audio/mpeg"/>
			<guid isPermaLink="false">64707b853c7f5e001192db19</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-wellness-month-frank-plummer</link>
			<acast:episodeId>64707b853c7f5e001192db19</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-wellness-month-frank-plummer</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtry/fcm4wp5xCxXM/4J12BAaonlsO8lpFa5SccvWUl1dCfnOxnP4jYPkeCVDyUAliX7yw19Zp5mRXch4rk0HUx0z]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>19</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>Moving Beyond Information 💬💪</p><br><p>Seeking help for mental health concerns is essential, but many struggle to know what to do next. As Frank's career progressed, he faced increasing worries and anxieties, leading to burnout and personal difficulties.</p><br><p>In our latest podcast episode, Frank explores the challenges he faced after seeking professional help for his mental health, just as many find themselves uncertain about what steps to take next, leaving them unsure of how to progress.</p><br><p>Join us as we dive into this topic, aiming to bridge the gap by fostering supportive environments that go beyond mere information-sharing. 💼💙</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Moving Beyond Information 💬💪</p><br><p>Seeking help for mental health concerns is essential, but many struggle to know what to do next. As Frank's career progressed, he faced increasing worries and anxieties, leading to burnout and personal difficulties.</p><br><p>In our latest podcast episode, Frank explores the challenges he faced after seeking professional help for his mental health, just as many find themselves uncertain about what steps to take next, leaving them unsure of how to progress.</p><br><p>Join us as we dive into this topic, aiming to bridge the gap by fostering supportive environments that go beyond mere information-sharing. 💼💙</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Core to Cloud Co-Founder & CEO: James Cunningham]]></title>
			<itunes:title><![CDATA[Core to Cloud Co-Founder & CEO: James Cunningham]]></itunes:title>
			<pubDate>Thu, 01 Jun 2023 06:00:41 GMT</pubDate>
			<itunes:duration>30:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6470804342018e0011fdcac1/media.mp3" length="73058108" type="audio/mpeg"/>
			<guid isPermaLink="false">6470804342018e0011fdcac1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/core-to-cloud-co-founder-ceo-james-cunningham</link>
			<acast:episodeId>6470804342018e0011fdcac1</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>core-to-cloud-co-founder-ceo-james-cunningham</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwsl4luCY9HSXm5RL29coc4Mwtrzdru2bD7ndF0/mqMMAsWJogiUiNAkm6FcbGM8q6m6V/q3uMdv4f5/6w5uoEF]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[In this week's episode, we dive into a chat with Core to Cloud Co-Founder &amp; CEO, James Cunningham. We discuss life growing up, first jobs and how Core to Cloud began. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this week's episode, we dive into a chat with Core to Cloud Co-Founder &amp; CEO, James Cunningham. We discuss life growing up, first jobs and how Core to Cloud began. <hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyberwellness Month: Danny Matthews</title>
			<itunes:title>Cyberwellness Month: Danny Matthews</itunes:title>
			<pubDate>Wed, 31 May 2023 06:00:39 GMT</pubDate>
			<itunes:duration>53:52</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6454ef3b7a1e29001124a3de/media.mp3" length="103457647" type="audio/mpeg"/>
			<guid isPermaLink="false">6454ef3b7a1e29001124a3de</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/danny-matthews</link>
			<acast:episodeId>6454ef3b7a1e29001124a3de</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>danny-matthews</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrzSDJVqjL8NbIMai2uSymkV8mmZgDAyVY7COOD6r/lIzHa3nhF/8/gDzvPdwPHKiff5ubjtnoMOIxu+m5rfwGmq]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>18</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>🌟 Prioritising Well-being: The Hidden Toll of Overcommitment 💪💤</p><br><p>Discover the untold story of over-commitment in our latest podcast episode. Our guest, Danny, shares his journey of sacrificing sleep, neglecting health, and experiencing physical symptoms like hives and blisters.&nbsp;</p><br><p>Join us as we explore the lessons learned and the importance of finding a balance between ambition and self-care this Wednesday.🎧💼💪</p><br><p>#PodcastEpisode #WellbeingMatters #FindingBalance</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>🌟 Prioritising Well-being: The Hidden Toll of Overcommitment 💪💤</p><br><p>Discover the untold story of over-commitment in our latest podcast episode. Our guest, Danny, shares his journey of sacrificing sleep, neglecting health, and experiencing physical symptoms like hives and blisters.&nbsp;</p><br><p>Join us as we explore the lessons learned and the importance of finding a balance between ambition and self-care this Wednesday.🎧💼💪</p><br><p>#PodcastEpisode #WellbeingMatters #FindingBalance</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyberwellness Month: Steve Brigden</title>
			<itunes:title>Cyberwellness Month: Steve Brigden</itunes:title>
			<pubDate>Wed, 24 May 2023 06:00:36 GMT</pubDate>
			<itunes:duration>48:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6454f2ba7a1e290011256321/media.mp3" length="93430628" type="audio/mpeg"/>
			<guid isPermaLink="false">6454f2ba7a1e290011256321</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/steve-brigden</link>
			<acast:episodeId>6454f2ba7a1e290011256321</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>steve-brigden</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrz/p0Nkzoe2Rodh3xKRqMvMi2qxKSoF8YkD2hHA1VUQPbFYV8xv6AfKfGtf/5OGb16hTLMqJ0T295PWknp9fV4g]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>17</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>💼 Navigating The World of Sales: Targets, Self Worth, and Resilience 💪💰</p><br><p>In sales, targets play a significant role in how we perceive our own worth. Falling short can lead to self-doubt and questions about personal failure. Living in this sales-driven world requires a unique mindset and resilience. 💯💼</p><br><p>Let's remember that while targets are important, they don't define our value as individuals. Success goes beyond numbers. Embrace challenges, celebrate achievements, and learn from setbacks. Our worth extends far beyond sales figures. 💪🌟</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>💼 Navigating The World of Sales: Targets, Self Worth, and Resilience 💪💰</p><br><p>In sales, targets play a significant role in how we perceive our own worth. Falling short can lead to self-doubt and questions about personal failure. Living in this sales-driven world requires a unique mindset and resilience. 💯💼</p><br><p>Let's remember that while targets are important, they don't define our value as individuals. Success goes beyond numbers. Embrace challenges, celebrate achievements, and learn from setbacks. Our worth extends far beyond sales figures. 💪🌟</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyberwellness Month: Tim Thurston</title>
			<itunes:title>Cyberwellness Month: Tim Thurston</itunes:title>
			<pubDate>Wed, 17 May 2023 06:00:36 GMT</pubDate>
			<itunes:duration>37:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6454f4219a120f00112a04c8/media.mp3" length="71975728" type="audio/mpeg"/>
			<guid isPermaLink="false">6454f4219a120f00112a04c8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/tim-thurston</link>
			<acast:episodeId>6454f4219a120f00112a04c8</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>tim-thurston</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrzN3XbrL85AhFUnpp5YdMNrXNngsZQnWur1k5QfdHNfQFMJFlMw4bec/TNS1brqrQVQZF8jv58zAKJppw9W3CHz]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>16</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>🌟 Embracing Resilience: Thriving Amidst Uncertainty 🚀💪</p><br><p>In the unpredictable world of sports, we can't control everything—wind, opponents' skills, or refereeing decisions. The key lesson? Focus on what you can control, maintain good mental health, and respond to challenges with grace. 🌦️⚽️</p><br><p>Exeter Chiefs' wisdom: accept what you can't control, but don't overthink it. Embrace resilience, conserve energy, and channel efforts into areas where you have influence. 💪🌟</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>🌟 Embracing Resilience: Thriving Amidst Uncertainty 🚀💪</p><br><p>In the unpredictable world of sports, we can't control everything—wind, opponents' skills, or refereeing decisions. The key lesson? Focus on what you can control, maintain good mental health, and respond to challenges with grace. 🌦️⚽️</p><br><p>Exeter Chiefs' wisdom: accept what you can't control, but don't overthink it. Embrace resilience, conserve energy, and channel efforts into areas where you have influence. 💪🌟</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Wellness Month: Chris Downes</title>
			<itunes:title>Cyber Wellness Month: Chris Downes</itunes:title>
			<pubDate>Wed, 10 May 2023 06:00:16 GMT</pubDate>
			<itunes:duration>47:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6454ef666868b8001167f529/media.mp3" length="91624604" type="audio/mpeg"/>
			<guid isPermaLink="false">6454ef666868b8001167f529</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/chris-downes</link>
			<acast:episodeId>6454ef666868b8001167f529</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>chris-downes</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrysI1e7xdrvvEEt7F3lu5ErsUB8HmoY2+Eiba0taNs34uLGCHZxg486UHChTqIVLvuZfpHd6uOAESUtt4U4AKpo]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>We're excited to announce that our latest episode of the Core podcast is live, featuring our very own Chris Downes!</p><p>Chris shares his inspiring story of overcoming a life-changing experience that left him in a coma for a month. He speaks candidly about his recovery journey and the crucial role mental resilience played in it.</p><p>We hope his story will inspire others to prioritise mental health and build resilience in their own lives. You can listen now on your favourite podcast platform.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We're excited to announce that our latest episode of the Core podcast is live, featuring our very own Chris Downes!</p><p>Chris shares his inspiring story of overcoming a life-changing experience that left him in a coma for a month. He speaks candidly about his recovery journey and the crucial role mental resilience played in it.</p><p>We hope his story will inspire others to prioritise mental health and build resilience in their own lives. You can listen now on your favourite podcast platform.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Go Phish</title>
			<itunes:title>Go Phish</itunes:title>
			<pubDate>Wed, 26 Apr 2023 06:00:14 GMT</pubDate>
			<itunes:duration>47:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/644643faa189ca00110ba1d5/media.mp3" length="114777158" type="audio/mpeg"/>
			<guid isPermaLink="false">644643faa189ca00110ba1d5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/charlie-morrison</link>
			<acast:episodeId>644643faa189ca00110ba1d5</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>charlie-morrison</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwBXp7UINH9oRfzju/hQArTaYD0R4UI4dZv0OaEyEZ9xnVjizyxuRSnk5h67pqmAcF6hqsF1e9EkxidjJ1wxujS]]></acast:settings>
			<itunes:subtitle>with Charlie Morrison</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[Get ready for some cyber-security insights in our latest podcast episode! We're joined by Charlie Morrison from the City of London Police Cyber Crime Unit, and we're tackling the age-old question: Why are we still talking about phishing?<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Get ready for some cyber-security insights in our latest podcast episode! We're joined by Charlie Morrison from the City of London Police Cyber Crime Unit, and we're tackling the age-old question: Why are we still talking about phishing?<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Feeling the burn of the cyber industry? You are not alone</title>
			<itunes:title>Feeling the burn of the cyber industry? You are not alone</itunes:title>
			<pubDate>Wed, 08 Mar 2023 10:00:53 GMT</pubDate>
			<itunes:duration>51:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64060f3a52deee0011170d6c/media.mp3" length="123335632" type="audio/mpeg"/>
			<guid isPermaLink="false">64060f3a52deee0011170d6c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/kiki-stanton</link>
			<acast:episodeId>64060f3a52deee0011170d6c</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>kiki-stanton</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrzmyWXWiWJYnJh0XSh85lH+n1veGfu8m9v0KNUOQcyFRaUQr1HOLW6R9bYbxuxuVmjIyDvpmpdD16X/afOlO3se]]></acast:settings>
			<itunes:subtitle>with Life Coach Kiki Kirby</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>Join us for a relaxed and insightful discussion with life coach Kiki Kirby, as we get into the realities of burnouts, real life experiences and methods we can use to overcome. Tech and Cyber Security are industries with incredibly high burnout rates amongst staff, so what do we think the causes are? Whatever the conclusion, lets learn together how we can support ourselves and our teams. </p><br><p><a href="https://www.coretocloud.co.uk/" rel="noopener noreferrer" target="_blank"><strong>https://www.coretocloud.co.uk/</strong></a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Join us for a relaxed and insightful discussion with life coach Kiki Kirby, as we get into the realities of burnouts, real life experiences and methods we can use to overcome. Tech and Cyber Security are industries with incredibly high burnout rates amongst staff, so what do we think the causes are? Whatever the conclusion, lets learn together how we can support ourselves and our teams. </p><br><p><a href="https://www.coretocloud.co.uk/" rel="noopener noreferrer" target="_blank"><strong>https://www.coretocloud.co.uk/</strong></a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Mental Health Special: It’s definitely not just in your head</title>
			<itunes:title>Mental Health Special: It’s definitely not just in your head</itunes:title>
			<pubDate>Wed, 08 Mar 2023 10:00:17 GMT</pubDate>
			<itunes:duration>40:40</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/64060f8333893a0011644467/media.mp3" length="97655102" type="audio/mpeg"/>
			<guid isPermaLink="false">64060f8333893a0011644467</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/louise-mcmilan</link>
			<acast:episodeId>64060f8333893a0011644467</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>louise-mcmilan</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwQJK6kDA+4FMdoS8KI8LIS5yrXMP/zz9NT27ZG+w7QDGwCOBaPjsPLNx5TOQOYrb+iJjkFREwlFxMXj7lVt5ML]]></acast:settings>
			<itunes:subtitle>with Personal Development Coach Louise McMilan</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>Every aspect of our lives, especially our careers are effected by the quality of our mental health. Listen in for a Core to Cloud mental health special where we dive into the toughest questions surrounding cancer, pressure, emotional stability and what we can do to improve and prioritise our wellbeing. With expert advice from Personal Development Coach Louise McMilan.</p><br><p><a href="https://www.coretocloud.co.uk/" rel="noopener noreferrer" target="_blank"><strong>https://www.coretocloud.co.uk/</strong></a> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Every aspect of our lives, especially our careers are effected by the quality of our mental health. Listen in for a Core to Cloud mental health special where we dive into the toughest questions surrounding cancer, pressure, emotional stability and what we can do to improve and prioritise our wellbeing. With expert advice from Personal Development Coach Louise McMilan.</p><br><p><a href="https://www.coretocloud.co.uk/" rel="noopener noreferrer" target="_blank"><strong>https://www.coretocloud.co.uk/</strong></a> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyber Workforce Resilience - A business is a people not a place</title>
			<itunes:title>Cyber Workforce Resilience - A business is a people not a place</itunes:title>
			<pubDate>Mon, 06 Feb 2023 17:03:09 GMT</pubDate>
			<itunes:duration>36:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/63e132cd436c360011e75561/media.mp3" length="87347349" type="audio/mpeg"/>
			<guid isPermaLink="false">63e132cd436c360011e75561</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/cyber-workforce-resilience-a-business-is-a-people-not-a-plac</link>
			<acast:episodeId>63e132cd436c360011e75561</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>cyber-workforce-resilience-a-business-is-a-people-not-a-plac</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxE12PBJ4nOJ0syShamZcqQopSCTAzdbhpKOep9CLeL6d/8B2TB8KTm7MYv2tkaX0n5W5e5CLap83XCorqrzqiw]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>SCOM Special | Tom Bunce</title>
			<itunes:title>SCOM Special | Tom Bunce</itunes:title>
			<pubDate>Thu, 22 Dec 2022 05:30:08 GMT</pubDate>
			<itunes:duration>6:16</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6390cbcc1a77090011a3c01e/media.mp3" length="15065732" type="audio/mpeg"/>
			<guid isPermaLink="false">6390cbcc1a77090011a3c01e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/tom-bunce-on-the-core-scom-special</link>
			<acast:episodeId>6390cbcc1a77090011a3c01e</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>tom-bunce-on-the-core-scom-special</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryO4EMCskTy7g9ikQ1y9m8gFebd3ZWTbFQVHqK9Feep2B6c1yH17DyKqhCm8AVxMrLqipOVQWqX2pbgpZuXadTs]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>Channel Development Manager of Immersive Labs Tom Bunce joins Adam in the studio for some quick fire questions. </p><br><p>He works with security professionals to equip, exercise, and evidence their team’s capabilities. Providing a unified picture of the human cyber capability throughout your organisation.</p><br><p>Tom informs cyber strategy for companies interested in:</p><p>• Modernising their traditional or outdated development methods</p><p>• Keeping up to date against an evolving threat landscape</p><p>• Understanding the capability or their organisation against cyber threats </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Channel Development Manager of Immersive Labs Tom Bunce joins Adam in the studio for some quick fire questions. </p><br><p>He works with security professionals to equip, exercise, and evidence their team’s capabilities. Providing a unified picture of the human cyber capability throughout your organisation.</p><br><p>Tom informs cyber strategy for companies interested in:</p><p>• Modernising their traditional or outdated development methods</p><p>• Keeping up to date against an evolving threat landscape</p><p>• Understanding the capability or their organisation against cyber threats </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>SCOM Special | Amar Singh</title>
			<itunes:title>SCOM Special | Amar Singh</itunes:title>
			<pubDate>Thu, 15 Dec 2022 05:30:08 GMT</pubDate>
			<itunes:duration>5:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6390cb8aa409f7001118b2f7/media.mp3" length="14138354" type="audio/mpeg"/>
			<guid isPermaLink="false">6390cb8aa409f7001118b2f7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/amar-singh-on-the-core-scom-special</link>
			<acast:episodeId>6390cb8aa409f7001118b2f7</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>amar-singh-on-the-core-scom-special</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrw+fcHTH0T1h1J+x8eO8R5uvtTCQfMul0h1v0VM8WOZwBKkIuWGEKEqG1+qH4SDKoeLLPK+zVWASXrxUxZPC405]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>CISO Amar Singh joins Adam in the studio for some quick-fire questions. </p><br><p>Amar is an industry acknowledged expert and public speaker and is regularly invited to speak and share his insights by some of the largest and most respected organisations in the world including The BBC, The Economist’s Intelligence Unit, The Financial Times, SC Magazine, InfoSec Magazine, Computer Weekly, The Register and the Al-Jazeera English Channel </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>CISO Amar Singh joins Adam in the studio for some quick-fire questions. </p><br><p>Amar is an industry acknowledged expert and public speaker and is regularly invited to speak and share his insights by some of the largest and most respected organisations in the world including The BBC, The Economist’s Intelligence Unit, The Financial Times, SC Magazine, InfoSec Magazine, Computer Weekly, The Register and the Al-Jazeera English Channel </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>SCOM Special | Jamie Bartlett</title>
			<itunes:title>SCOM Special | Jamie Bartlett</itunes:title>
			<pubDate>Thu, 08 Dec 2022 05:30:00 GMT</pubDate>
			<itunes:duration>8:20</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6390cb4e1a77090011a3a63e/media.mp3" length="20041037" type="audio/mpeg"/>
			<guid isPermaLink="false">6390cb4e1a77090011a3a63e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/jamie-bartlett-on-the-core-scom-special</link>
			<acast:episodeId>6390cb4e1a77090011a3a63e</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>jamie-bartlett-on-the-core-scom-special</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryqylwdBqggCsQPudiuuVGJjcjrIBggya94PWmx7Ai/+ajz9Fodh7lD/eh8kNaWvp17/sp9VdzvVEjerStrtigx]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1663234493645-26e14913b6abdc7135d9a19aeaa24a02.jpeg"/>
			<description><![CDATA[<p>Tech Journalist Jamie Bartlett joins Adam in the studio for some quick fire questions. </p><br><p>Author of The Dark Net: Inside the Digital Underworld, Jamie Bartlett is a specialist in online culture and technology, and Director of the Centre for the Analysis of Social Media at the think-tank Demos. As an engaging keynote speaker, Jamie unveils a shadowy world of Internet cultures and shares insights into key topics of our time such as cyber security, the impact of social media, and the evolution of new political movements.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Tech Journalist Jamie Bartlett joins Adam in the studio for some quick fire questions. </p><br><p>Author of The Dark Net: Inside the Digital Underworld, Jamie Bartlett is a specialist in online culture and technology, and Director of the Centre for the Analysis of Social Media at the think-tank Demos. As an engaging keynote speaker, Jamie unveils a shadowy world of Internet cultures and shares insights into key topics of our time such as cyber security, the impact of social media, and the evolution of new political movements.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Influential Women in Tech Special | Irina Nesterovsky from Kela</title>
			<itunes:title>Influential Women in Tech Special | Irina Nesterovsky from Kela</itunes:title>
			<pubDate>Wed, 02 Nov 2022 11:08:30 GMT</pubDate>
			<itunes:duration>35:49</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/63624fae6db23500121e8733/media.mp3" length="86073343" type="audio/mpeg"/>
			<guid isPermaLink="false">63624fae6db23500121e8733</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/influential-women-in-tech-special-irina-nesterovsky-from-kel</link>
			<acast:episodeId>63624fae6db23500121e8733</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>influential-women-in-tech-special-irina-nesterovsky-from-kel</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwzb3hTdzAXeBYlJG9jI7wWVq2xELqYz//nKT6kndfS2oc+SIXn9bkgLbZykO35tKFLAK3TAqzSJ/dLMhHL7PP3]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1667387302737-5dc7c849c4680c253f8d86b2dbea3422.jpeg"/>
			<description><![CDATA[<p>This week, we talk to Irina Nesterovsky the chief research officer at Kela. Kela are a cybercrime intelligence company. They collect information, data, intelligence and research in their Industry-Leading Cybercrime Intelligence Platform. </p><br><p>Irina is the Chief Research Officer at KELA. She oversees all operations designed to create the&nbsp;best and most actionable research products for KELA's clients and for the world to see. Having&nbsp;served in one of IDF’s elite intelligence units, Irina has an extensive background in research&nbsp;and intelligence gathering. Irina completed her B.Sc. in Neuroscience and M.A in Learning&nbsp;Disabilities at Tel Aviv University.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>This week, we talk to Irina Nesterovsky the chief research officer at Kela. Kela are a cybercrime intelligence company. They collect information, data, intelligence and research in their Industry-Leading Cybercrime Intelligence Platform. </p><br><p>Irina is the Chief Research Officer at KELA. She oversees all operations designed to create the&nbsp;best and most actionable research products for KELA's clients and for the world to see. Having&nbsp;served in one of IDF’s elite intelligence units, Irina has an extensive background in research&nbsp;and intelligence gathering. Irina completed her B.Sc. in Neuroscience and M.A in Learning&nbsp;Disabilities at Tel Aviv University.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Influential Women in Tech Special | Dhivya Poole from Willis Towers Watson</title>
			<itunes:title>Influential Women in Tech Special | Dhivya Poole from Willis Towers Watson</itunes:title>
			<pubDate>Fri, 28 Oct 2022 07:00:16 GMT</pubDate>
			<itunes:duration>33:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6336de17fbe8100012a2d638/media.mp3" length="80148755" type="audio/mpeg"/>
			<guid isPermaLink="false">6336de17fbe8100012a2d638</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/influential-women-in-tech-special-dhivya-poole-from-willis-t</link>
			<acast:episodeId>6336de17fbe8100012a2d638</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>influential-women-in-tech-special-dhivya-poole-from-willis-t</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtryMwS6n0ymeoH1alJazdTF7KtZ776tRCFURcAHrPDtAmZZ7TIaeVlcxXSk0iFtsANx6gsAmpXqYBMq9EiXbT0S1]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1664540064158-f50a0f5f0f46fb733831e0bc2d7195b6.jpeg"/>
			<description><![CDATA[<p>In this episode, we speak to Dhivya Poole, penetration test manager at Willis Towers Watson.</p><br><p>Dhivya is passionate about cybersecurity and has worked hard to get where she is today. She was personally introduced into going into cybersecurity by actually having her own phishing attack.</p><br><p>This episode shows why she's really excited to be in the industry and gives you five top tips for anyone thinking of getting into the field. It's a really great chat that shows her passion and enthusiasm for all things cyber!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, we speak to Dhivya Poole, penetration test manager at Willis Towers Watson.</p><br><p>Dhivya is passionate about cybersecurity and has worked hard to get where she is today. She was personally introduced into going into cybersecurity by actually having her own phishing attack.</p><br><p>This episode shows why she's really excited to be in the industry and gives you five top tips for anyone thinking of getting into the field. It's a really great chat that shows her passion and enthusiasm for all things cyber!</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Influential Women in Tech Special | Jessica Kingham from Barracuda</title>
			<itunes:title>Influential Women in Tech Special | Jessica Kingham from Barracuda</itunes:title>
			<pubDate>Mon, 24 Oct 2022 07:00:39 GMT</pubDate>
			<itunes:duration>32:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6336db5fa2612700129714e9/media.mp3" length="78311960" type="audio/mpeg"/>
			<guid isPermaLink="false">6336db5fa2612700129714e9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/influential-women-in-tech-special-jessica-kingham-from-barra</link>
			<acast:episodeId>6336db5fa2612700129714e9</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>influential-women-in-tech-special-jessica-kingham-from-barra</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrwxQjnJM98XaDo4WtnWv/DvLOmXfIld8BtRUestsX48dyP89vwcGxOqW4eiYwvQb4lPwV1+HSD8DoVIGFZ72QOX]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1664538582427-b576f5fb4d86f35268a30c8adbe7d250.jpeg"/>
			<description><![CDATA[This week on the Influential Women in Tech podcast, we speak to Jessica Kingham, Director of Channel Alliances at Barracuda Networks. She's been in the industry for 8 years, having started out in retail before moving into insurance broking and real estate. Jessica has made her stamp in the Cyber world with her work at Barracuda and other companies, and she's here today to tell us how she got there.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[This week on the Influential Women in Tech podcast, we speak to Jessica Kingham, Director of Channel Alliances at Barracuda Networks. She's been in the industry for 8 years, having started out in retail before moving into insurance broking and real estate. Jessica has made her stamp in the Cyber world with her work at Barracuda and other companies, and she's here today to tell us how she got there.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Influential Women in Tech Special | Vanessa Cardwell from Bite IT Marketing</title>
			<itunes:title>Influential Women in Tech Special | Vanessa Cardwell from Bite IT Marketing</itunes:title>
			<pubDate>Wed, 19 Oct 2022 07:00:33 GMT</pubDate>
			<itunes:duration>43:48</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6336d75c88c51f0012349085/media.mp3" length="105161425" type="audio/mpeg"/>
			<guid isPermaLink="false">6336d75c88c51f0012349085</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/influential-women-in-tech-special-vanessa-cardwell-from-bite</link>
			<acast:episodeId>6336d75c88c51f0012349085</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>influential-women-in-tech-special-vanessa-cardwell-from-bite</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxaeyQd+yIogJQ3RZWwDO/srjonNucEB2U+pGiIH91SMqMYqwb91oTWasTz0tKA2WNcsOx4FNpwgKHkTHuNdA0K]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1664537746553-4180d69c326ae383c2daf7f019327e39.jpeg"/>
			<description><![CDATA[<p>On this episode of the Influential Women in Tech podcast we have Vanessa Cardwell.</p><br><p>Vanessa has a background in marketing and technology. She worked at the BBC in a variety of roles, including running their broadcast site and working on post-production. Vanessa is now the managing director of Byte IT Marketing, a B2B technology marketing agency. We talk about the role in which social media plays on the children of today, and the effects it has, as well as many other fascinating topics&nbsp;&nbsp;</p><br><p>So lock in and enjoy.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>On this episode of the Influential Women in Tech podcast we have Vanessa Cardwell.</p><br><p>Vanessa has a background in marketing and technology. She worked at the BBC in a variety of roles, including running their broadcast site and working on post-production. Vanessa is now the managing director of Byte IT Marketing, a B2B technology marketing agency. We talk about the role in which social media plays on the children of today, and the effects it has, as well as many other fascinating topics&nbsp;&nbsp;</p><br><p>So lock in and enjoy.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Influential Women in Tech Special | Anna Collard from KnowBe4</title>
			<itunes:title>Influential Women in Tech Special | Anna Collard from KnowBe4</itunes:title>
			<pubDate>Mon, 17 Oct 2022 07:00:09 GMT</pubDate>
			<itunes:duration>43:33</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6336d4733823e20012490235/media.mp3" length="104587000" type="audio/mpeg"/>
			<guid isPermaLink="false">6336d4733823e20012490235</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/influential-women-in-tech-special-anna-collard-from-knowbe4</link>
			<acast:episodeId>6336d4733823e20012490235</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>influential-women-in-tech-special-anna-collard-from-knowbe4</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrzj5oKwVJFKKAEqVCKZrgKoWTb8nn9Cuuz5WRGM19sHQw/glud5lTC2OVj8Kiosr8J0CH8+psqe/5PJHolnw/iU]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1664537610943-7638786cde8f99d271279754122b2c57.jpeg"/>
			<description><![CDATA[<p>We're back with another episode of our podcast!</p><br><p>In this one, we talk to Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4 Anna shares her story about overcoming imposter syndrome and how she's built a career working in cybersecurity.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We're back with another episode of our podcast!</p><br><p>In this one, we talk to Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4 Anna shares her story about overcoming imposter syndrome and how she's built a career working in cybersecurity.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Influential Women in Tech Special | Kate Baker from Immersive Labs </title>
			<itunes:title>Influential Women in Tech Special | Kate Baker from Immersive Labs </itunes:title>
			<pubDate>Tue, 11 Oct 2022 07:00:40 GMT</pubDate>
			<itunes:duration>24:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6336d3ff6203c00012ae616f/media.mp3" length="58660085" type="audio/mpeg"/>
			<guid isPermaLink="false">6336d3ff6203c00012ae616f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/influential-women-in-tech-special-kate-baker-from-immersive-</link>
			<acast:episodeId>6336d3ff6203c00012ae616f</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>influential-women-in-tech-special-kate-baker-from-immersive-</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrxsXDjogtZXuwE+mIex1yrCV8Gl+6GD1rbi2DPon7zSaTD9q03qqseUR3WA69LpVe1jPO8H1oJZyV1MOkPAatAU]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1664537502627-5550c2ef8b61a2556c4b7444053eb42e.jpeg"/>
			<description><![CDATA[<p>We're back with another episode in our Influential Women In Tech campaign! This time we bring you Kate Baker, a Channel Manager EMEA at Immersive Labs</p><br><p>Starting in English Literature, to HR and owning her own Interior Design studio Kate took an exciting path into Cyber Security.&nbsp;</p><br><p>"Don't be afraid to step outside of your comfort zone. Don't be afraid to put yourself out there. You might get some rejections and make mistakes, but you learn through everything you take on board."</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We're back with another episode in our Influential Women In Tech campaign! This time we bring you Kate Baker, a Channel Manager EMEA at Immersive Labs</p><br><p>Starting in English Literature, to HR and owning her own Interior Design studio Kate took an exciting path into Cyber Security.&nbsp;</p><br><p>"Don't be afraid to step outside of your comfort zone. Don't be afraid to put yourself out there. You might get some rejections and make mistakes, but you learn through everything you take on board."</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Influential Women in Tech Special | Stevie Dennis from Abnormal </title>
			<itunes:title>Influential Women in Tech Special | Stevie Dennis from Abnormal </itunes:title>
			<pubDate>Mon, 03 Oct 2022 07:00:36 GMT</pubDate>
			<itunes:duration>30:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/6336d369fbe8100012a2c584/media.mp3" length="73229300" type="audio/mpeg"/>
			<guid isPermaLink="false">6336d369fbe8100012a2c584</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/the-core-podcast/episodes/influential-women-in-tech-special-stevie-dennis-from-abnorma</link>
			<acast:episodeId>6336d369fbe8100012a2c584</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:episodeUrl>influential-women-in-tech-special-stevie-dennis-from-abnorma</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs/5Ci22dvFhTcX/zJQ4jSy09n2MNjRSpRrHx6RHlBtrx6ZxnCKwNTDEtkhJAQiet/EOeaG6GnrwgP0gXMwdM7XlqrbaxJL3IHBeEmrcUT2pJcZGzN6gx2qp+wI5V0YWbD]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1664537425987-a70a998119fd250abbbdfadf6c661d56.jpeg"/>
			<description><![CDATA[<p>Introducing our first episode of our Influential Women in Tech podcast, featuring none other than Stevie Dennis from&nbsp;Abnormal. </p><p>We talk about her career moves into Cyber as well as some of the highs and lows of being a female in the tech world.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Introducing our first episode of our Influential Women in Tech podcast, featuring none other than Stevie Dennis from&nbsp;Abnormal. </p><p>We talk about her career moves into Cyber as well as some of the highs and lows of being a female in the tech world.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Take the headache away from Cloud and Wireless Technology</title>
			<itunes:title>Take the headache away from Cloud and Wireless Technology</itunes:title>
			<pubDate>Sun, 24 Jul 2022 05:00:46 GMT</pubDate>
			<itunes:duration>42:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/b829fe6d-cde7-4bb0-a379-5824779b786b/media.mp3" length="40696266" type="audio/mpeg"/>
			<guid isPermaLink="false">b829fe6d-cde7-4bb0-a379-5824779b786b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Take-the-headache-away-from-Cloud-and-Wireless-Technology-e1kvcck</link>
			<acast:episodeId>6322e8a1bf5677001204e5cd</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrelnMicC5U3dYjZuVQ5Cm5i+]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg"/>
			<description><![CDATA[<p>In this episode, we are talking all about your network whether it is on prem or in the cloud. There’s no denying that cloud-managed network services have seen rapid growth in the past year alone. As we move into a future of remote and flexible working, cloud and wireless technology are absolutely essential for the long-term survival of organisations.</p><p><strong>Key Discussion Points:</strong></p><ul> <li>Introduction to Extreme Networks– company background</li> <li>Moving from traditional IT to the cloud is no mean feat. – common barriers?</li>  <li>What are the key problems you are finding your customers are coming to you with?</li>  <li>Network security</li>  <li>How is Extreme Networks Different?</li>  <li>Your product portfolio</li>  <li>Where do you store customers data?</li>  <li>How are your customers using wifi to empower their business</li>  <li>How is the analytics tool empowering businesses not just within their IT teams</li></ul><p>Host: Phil Howe &amp; Kelly Allen</p><p>Guest Speaker:</p><p>Sponsor: Extreme Networks&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, we are talking all about your network whether it is on prem or in the cloud. There’s no denying that cloud-managed network services have seen rapid growth in the past year alone. As we move into a future of remote and flexible working, cloud and wireless technology are absolutely essential for the long-term survival of organisations.</p><p><strong>Key Discussion Points:</strong></p><ul> <li>Introduction to Extreme Networks– company background</li> <li>Moving from traditional IT to the cloud is no mean feat. – common barriers?</li>  <li>What are the key problems you are finding your customers are coming to you with?</li>  <li>Network security</li>  <li>How is Extreme Networks Different?</li>  <li>Your product portfolio</li>  <li>Where do you store customers data?</li>  <li>How are your customers using wifi to empower their business</li>  <li>How is the analytics tool empowering businesses not just within their IT teams</li></ul><p>Host: Phil Howe &amp; Kelly Allen</p><p>Guest Speaker:</p><p>Sponsor: Extreme Networks&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Should we be worried about state – sponsored cyber – attacks against hospitals?</title>
			<itunes:title>Should we be worried about state – sponsored cyber – attacks against hospitals?</itunes:title>
			<pubDate>Mon, 18 Jul 2022 05:30:44 GMT</pubDate>
			<itunes:duration>34:04</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/4e42274a-30ff-4001-8099-04e4d716b45e/media.mp3" length="32705723" type="audio/mpeg"/>
			<guid isPermaLink="false">4e42274a-30ff-4001-8099-04e4d716b45e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Should-we-be-worried-about-state--sponsored-cyber--attacks-against-hospitals-e1kvc7s</link>
			<acast:episodeId>6322e8a1bf5677001204e5ce</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrekTamkiVHXLBxICthzabww6]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5ce.jpg"/>
			<description><![CDATA[In this episode, we will&nbsp;be talking to Richard Staynings and his thoughts on sponsored Cyber Attacks. In just the past year these attacks have included a long list of crippling ransomware campaigns that have disabled almost the entirety of national health systems, to the near bankrupting of several large private US health systems, to causing small medical and dental practices to have to close up shop.&nbsp; This has denied critical medical services to thousands of patients and contributed to increases in patient morbidity and mortality. Lets learn more on this very important topic.&nbsp;<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this episode, we will&nbsp;be talking to Richard Staynings and his thoughts on sponsored Cyber Attacks. In just the past year these attacks have included a long list of crippling ransomware campaigns that have disabled almost the entirety of national health systems, to the near bankrupting of several large private US health systems, to causing small medical and dental practices to have to close up shop.&nbsp; This has denied critical medical services to thousands of patients and contributed to increases in patient morbidity and mortality. Lets learn more on this very important topic.&nbsp;<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Prevent the Attacks That Matter Most</title>
			<itunes:title>Prevent the Attacks That Matter Most</itunes:title>
			<pubDate>Mon, 11 Jul 2022 05:00:15 GMT</pubDate>
			<itunes:duration>31:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/74e41a06-91f3-4020-bb92-49fdd244148a/media.mp3" length="29884916" type="audio/mpeg"/>
			<guid isPermaLink="false">74e41a06-91f3-4020-bb92-49fdd244148a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Prevent-the-Attacks-That-Matter-Most-e1kppr2</link>
			<acast:episodeId>6322e8a1bf5677001204e5cf</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyremsC8QkSoqF6VMw4hObB3Fl]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5cf.jpg"/>
			<description><![CDATA[<p><strong>Episode Summary:</strong></p><p>In this episode, we will&nbsp;be talking all things email&nbsp;and more specifically the API Approach and data science is the future of email security. Whilst introducing the latest technology to break out of America and why we at Core to Cloud are so excited to be working with them.</p><p><strong>Key Discussion Points:</strong></p><ul> <li>Introduction to Abnormal – company background</li> <li>What is social engineering and why should we be concerned about it?</li> <li>Why are we very excited at CTC about this product?</li> <li>The old approach -</li>  <li>SEGs will never stop all phishing emails</li>  <li>SEGs have very limited post-email delivery detection &amp; response</li>  <li>Scans for known bad what does this mean?</li>  <li>New Approach - What is the future of Email Security?</li>  <li>What is an API approach?</li>  <li>What is a known good?</li>  <li>Scenarios on how you can use Abnormal</li>  <li>What is Abnormal detecting</li>  <li>What have we seen in CTC customers POVs</li>  <li>What does the product include?</li>  <li>What one top tip would you pass on to anyone worried about email security today&gt;</li></ul><p>Host: Phil Howe &amp; Kelly Allen</p><p>Guest Speaker: Chris Martin</p><p>Sponsor: Abnormal</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Episode Summary:</strong></p><p>In this episode, we will&nbsp;be talking all things email&nbsp;and more specifically the API Approach and data science is the future of email security. Whilst introducing the latest technology to break out of America and why we at Core to Cloud are so excited to be working with them.</p><p><strong>Key Discussion Points:</strong></p><ul> <li>Introduction to Abnormal – company background</li> <li>What is social engineering and why should we be concerned about it?</li> <li>Why are we very excited at CTC about this product?</li> <li>The old approach -</li>  <li>SEGs will never stop all phishing emails</li>  <li>SEGs have very limited post-email delivery detection &amp; response</li>  <li>Scans for known bad what does this mean?</li>  <li>New Approach - What is the future of Email Security?</li>  <li>What is an API approach?</li>  <li>What is a known good?</li>  <li>Scenarios on how you can use Abnormal</li>  <li>What is Abnormal detecting</li>  <li>What have we seen in CTC customers POVs</li>  <li>What does the product include?</li>  <li>What one top tip would you pass on to anyone worried about email security today&gt;</li></ul><p>Host: Phil Howe &amp; Kelly Allen</p><p>Guest Speaker: Chris Martin</p><p>Sponsor: Abnormal</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Why is it important to have strategies to protect your businesses information?</title>
			<itunes:title>Why is it important to have strategies to protect your businesses information?</itunes:title>
			<pubDate>Thu, 21 Apr 2022 07:00:00 GMT</pubDate>
			<itunes:duration>32:18</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/1e29fb69-b234-486f-bb32-8b5ccf7a0721/media.mp3" length="61987945" type="audio/mpeg"/>
			<guid isPermaLink="false">1e29fb69-b234-486f-bb32-8b5ccf7a0721</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Why-is-it-important-to-have-strategies-to-protect-your-businesses-information-e1hdrm5</link>
			<acast:episodeId>6322e8a1bf5677001204e5d0</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrekeE25QRPt21L204jiPDUIz]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d0.jpg"/>
			<description><![CDATA[<p><strong>Episode Summary:</strong></p><p>Backup strategy isn’t something to focus on just&nbsp;one day of the year. It should be a part of your cyber hygiene. Microsoft recommends you use a third-party backup for your Office 365 data. Here our top tips to protect your businesses data.</p><p><strong>Key discussion points:</strong></p><ul> <li>What is the importance of a data backup?</li> <li>What data should we be backing up?</li> <li>What are best practises when it comes to back up?</li> <li>Where have our customers had challenges?<br>Why is ease of use so important?</li> <li>What areas of office 365 do we need to be backing up?</li> <li>When considering a back solution cloud native is essential?</li>  <li>In the current landscape why is flexibility and email protection important?</li>  <li>How can we better be protecting our data going into 2022?</li></ul><p>Host: Phil Howe &amp; Kelly Allen</p><p>Guest Speaker: Charles Smith from Barracuda&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Episode Summary:</strong></p><p>Backup strategy isn’t something to focus on just&nbsp;one day of the year. It should be a part of your cyber hygiene. Microsoft recommends you use a third-party backup for your Office 365 data. Here our top tips to protect your businesses data.</p><p><strong>Key discussion points:</strong></p><ul> <li>What is the importance of a data backup?</li> <li>What data should we be backing up?</li> <li>What are best practises when it comes to back up?</li> <li>Where have our customers had challenges?<br>Why is ease of use so important?</li> <li>What areas of office 365 do we need to be backing up?</li> <li>When considering a back solution cloud native is essential?</li>  <li>In the current landscape why is flexibility and email protection important?</li>  <li>How can we better be protecting our data going into 2022?</li></ul><p>Host: Phil Howe &amp; Kelly Allen</p><p>Guest Speaker: Charles Smith from Barracuda&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Test and then test some more: Security Validation</title>
			<itunes:title>Test and then test some more: Security Validation</itunes:title>
			<pubDate>Thu, 31 Mar 2022 06:00:00 GMT</pubDate>
			<itunes:duration>19:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/738080df-3b3c-4af1-88ca-85b170d7a97b/media.mp3" length="37232983" type="audio/mpeg"/>
			<guid isPermaLink="false">738080df-3b3c-4af1-88ca-85b170d7a97b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Test-and-then-test-some-more-Security-Validation-e1gc5du</link>
			<acast:episodeId>6322e8a1bf5677001204e5d1</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrem2blSxZC0ymJZEKjGfx49z]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d1.jpg"/>
			<description><![CDATA[<p>In this episode, we are delighted that Shak has returned to our podcast but this time we are not in the castle. Shak will be discussing on why automating security validation is so important in 2022 and why his favourite word when hosting an event with us is TEST!</p><p><strong>Key Discussion Points:</strong></p><ul> <li>Welcome Shak back to the podcast</li> <li>Since we saw him last was at our Ransomware Event – Key theme validation</li>  <li>Problems with lag and backlog of manual tasks</li>  <li>Threats are increasing but the resources and teams have constraints</li>  <li>How can automation help this</li>  <li>How can validation support business cases and identifying the gaps clearly</li>  <li>Risks can no longer be prioritised on just a CVSS score</li>  <li>How Pentera is now looking outside the core and out at the surface</li>  <li>How has the attack landscape evolved</li>  <li>How is Pentera evolving to support their customers</li></ul><p>Host: Phil Howe &amp; Kelly Allen</p><p>Guest Speaker: Shak Ahmed</p><p>Sponsor: Pentera</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, we are delighted that Shak has returned to our podcast but this time we are not in the castle. Shak will be discussing on why automating security validation is so important in 2022 and why his favourite word when hosting an event with us is TEST!</p><p><strong>Key Discussion Points:</strong></p><ul> <li>Welcome Shak back to the podcast</li> <li>Since we saw him last was at our Ransomware Event – Key theme validation</li>  <li>Problems with lag and backlog of manual tasks</li>  <li>Threats are increasing but the resources and teams have constraints</li>  <li>How can automation help this</li>  <li>How can validation support business cases and identifying the gaps clearly</li>  <li>Risks can no longer be prioritised on just a CVSS score</li>  <li>How Pentera is now looking outside the core and out at the surface</li>  <li>How has the attack landscape evolved</li>  <li>How is Pentera evolving to support their customers</li></ul><p>Host: Phil Howe &amp; Kelly Allen</p><p>Guest Speaker: Shak Ahmed</p><p>Sponsor: Pentera</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Proactive and evidence-based cybersecurity strategy</title>
			<itunes:title>Proactive and evidence-based cybersecurity strategy</itunes:title>
			<pubDate>Mon, 21 Feb 2022 07:00:00 GMT</pubDate>
			<itunes:duration>36:27</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/12598f22-d34f-485e-9d98-ffc01bda709b/media.mp3" length="69941247" type="audio/mpeg"/>
			<guid isPermaLink="false">12598f22-d34f-485e-9d98-ffc01bda709b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Proactive-and-evidence-based-cybersecurity-strategy-e1e43f6</link>
			<acast:episodeId>6322e8a1bf5677001204e5d2</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrelw/O8X+LXy+jB5qONfbs+s]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d2.jpg"/>
			<description><![CDATA[<ul> <li>Key Discussion Points:</li> <li>Sandwell ad West Birmingham and an understanding of their environment</li> <li>Focuses and key challenges</li> <li>Expanding and improving their VPN</li>  <li>Validating their environment and technical stack</li>  <li>Weaknesses they identified</li>  <li>Benchmark for acceptable cybersecurity practices</li></ul><p>Hosts: Kelly and Phil<br>Guest Speaker: Craig Bromage - Llwellyn<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<ul> <li>Key Discussion Points:</li> <li>Sandwell ad West Birmingham and an understanding of their environment</li> <li>Focuses and key challenges</li> <li>Expanding and improving their VPN</li>  <li>Validating their environment and technical stack</li>  <li>Weaknesses they identified</li>  <li>Benchmark for acceptable cybersecurity practices</li></ul><p>Hosts: Kelly and Phil<br>Guest Speaker: Craig Bromage - Llwellyn<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>What is effective governance? How do you protect your organisation’s most sensitive data?</title>
			<itunes:title>What is effective governance? How do you protect your organisation’s most sensitive data?</itunes:title>
			<pubDate>Mon, 07 Feb 2022 15:00:00 GMT</pubDate>
			<itunes:duration>30:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/d3df5470-176e-4143-b97a-33de7679c18e/media.mp3" length="58465532" type="audio/mpeg"/>
			<guid isPermaLink="false">d3df5470-176e-4143-b97a-33de7679c18e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/What-is-effective-governance--How-do-you-protect-your-organisations-most-sensitive-data-e1e275o</link>
			<acast:episodeId>6322e8a1bf5677001204e5d3</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrekYK75RBTH7/CqV1acvLPsn]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d3.jpg"/>
			<description><![CDATA[<p>Kelly &amp; Phil sit down with Martin Cannard from Stealthbits, now part of Netwrix.&nbsp;</p><p><br></p><p>Governance and control is another layer of risk management. It ensures that there’s a solid framework in place for your cybersecurity, including institutional policy, legal compliance, and individual responsibility.</p><p>Stay tuned for because in this episode we are discussing what is effective governance and how we have found the solution to not only protects an organisation’s sensitive data, but the credentials used to access that data.&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Kelly &amp; Phil sit down with Martin Cannard from Stealthbits, now part of Netwrix.&nbsp;</p><p><br></p><p>Governance and control is another layer of risk management. It ensures that there’s a solid framework in place for your cybersecurity, including institutional policy, legal compliance, and individual responsibility.</p><p>Stay tuned for because in this episode we are discussing what is effective governance and how we have found the solution to not only protects an organisation’s sensitive data, but the credentials used to access that data.&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Importance of Protecting Your Entire IT Ecosystem – what does that really mean?</title>
			<itunes:title>The Importance of Protecting Your Entire IT Ecosystem – what does that really mean?</itunes:title>
			<pubDate>Mon, 24 Jan 2022 08:00:00 GMT</pubDate>
			<itunes:duration>28:58</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/09d03a4d-29a7-4482-99e8-1d9c5f2e2ff8/media.mp3" length="55599161" type="audio/mpeg"/>
			<guid isPermaLink="false">09d03a4d-29a7-4482-99e8-1d9c5f2e2ff8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/The-Importance-of-Protecting-Your-Entire-IT-Ecosystem--what-does-that-really-mean-e1c3dml</link>
			<acast:episodeId>6322e8a1bf5677001204e5d4</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrek+DsM2DJsZJZzDOk30kXeh]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d4.jpg"/>
			<description><![CDATA[CyCognito shows you your entire attack surface, including previously unknown assets across your entire network, both internally and externally. Most security teams look at security from the inside, out. In this episode we discuss why it is important to view security as a hacker: from an external perspective, only looking for the exploitable footholds?<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[CyCognito shows you your entire attack surface, including previously unknown assets across your entire network, both internally and externally. Most security teams look at security from the inside, out. In this episode we discuss why it is important to view security as a hacker: from an external perspective, only looking for the exploitable footholds?<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Do you have full visibility of what is on your network, right now?</title>
			<itunes:title>Do you have full visibility of what is on your network, right now?</itunes:title>
			<pubDate>Mon, 10 Jan 2022 08:00:00 GMT</pubDate>
			<itunes:duration>40:13</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/1a5ef43a-0da8-4168-840c-02e0bfdd5199/media.mp3" length="77165512" type="audio/mpeg"/>
			<guid isPermaLink="false">1a5ef43a-0da8-4168-840c-02e0bfdd5199</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Do-you-have-full-visibility-of-what-is-on-your-network--right-now-e1c3dg5</link>
			<acast:episodeId>6322e8a1bf5677001204e5d5</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrenEM+EBoAUOwhEzELzys5Ib]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d5.jpg"/>
			<description><![CDATA[<p>In this episode, we are discussing how in cybersecurity, seeing is protecting. To assess the cyber risks of your organisation, you have to know what those risks are.</p><p>As IT environments become more complex, with mounting volumes of data and countless devices accessing a network, companies must know what their security weaknesses are.</p><p>The problem? It can be difficult to pinpoint these vulnerabilities or even understand their implications.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, we are discussing how in cybersecurity, seeing is protecting. To assess the cyber risks of your organisation, you have to know what those risks are.</p><p>As IT environments become more complex, with mounting volumes of data and countless devices accessing a network, companies must know what their security weaknesses are.</p><p>The problem? It can be difficult to pinpoint these vulnerabilities or even understand their implications.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Passive classroom-based training: Is it fit for purpose when it comes to Cybersecurity?</title>
			<itunes:title>Passive classroom-based training: Is it fit for purpose when it comes to Cybersecurity?</itunes:title>
			<pubDate>Mon, 27 Dec 2021 08:00:00 GMT</pubDate>
			<itunes:duration>26:02</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/defc35e2-6b4d-401f-99cc-b364c3d6d6fd/media.mp3" length="49983745" type="audio/mpeg"/>
			<guid isPermaLink="false">defc35e2-6b4d-401f-99cc-b364c3d6d6fd</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Passive-classroom-based-training-Is-it-fit-for-purpose-when-it-comes-to-Cybersecurity-e1c3db8</link>
			<acast:episodeId>6322e8a1bf5677001204e5d6</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyremiaX2klF5AlPw0Raki5Yg+]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d6.jpg"/>
			<description><![CDATA[<p>In this episode, we are discussing how can we keep training from becoming outdated and interesting?&nbsp;How can we as professionals continuously hone our skills, get to grips with new threats, and become familiar with the latest tools and techniques?</p><p>In short, how can we practically keep up with training, do our day job and still stay one step ahead of the attackers?</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, we are discussing how can we keep training from becoming outdated and interesting?&nbsp;How can we as professionals continuously hone our skills, get to grips with new threats, and become familiar with the latest tools and techniques?</p><p>In short, how can we practically keep up with training, do our day job and still stay one step ahead of the attackers?</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Take Control of Patient Data: Protecting Medical Devices</title>
			<itunes:title>Take Control of Patient Data: Protecting Medical Devices</itunes:title>
			<pubDate>Thu, 18 Nov 2021 08:00:00 GMT</pubDate>
			<itunes:duration>46:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/fed3a4ba-bd01-471f-a8db-d16be423eee5/media.mp3" length="89975595" type="audio/mpeg"/>
			<guid isPermaLink="false">fed3a4ba-bd01-471f-a8db-d16be423eee5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Take-Control-of-Patient-Data-Protecting-Medical-Devices-e183tbm</link>
			<acast:episodeId>6322e8a1bf5677001204e5d7</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrel+yAcFCdvY9ZuIl8IOsLmv]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d7.jpg"/>
			<description><![CDATA[<p><strong>A podcast with Brett from Bolton Hospital.&nbsp;</strong></p><p>Hosted by:</p><p>Kelly Allen</p><p>Phil Howe</p><p>Brett Walmsley</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>A podcast with Brett from Bolton Hospital.&nbsp;</strong></p><p>Hosted by:</p><p>Kelly Allen</p><p>Phil Howe</p><p>Brett Walmsley</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Take Control of Social Media: Protecting Your Brand</title>
			<itunes:title>Take Control of Social Media: Protecting Your Brand</itunes:title>
			<pubDate>Thu, 04 Nov 2021 08:00:00 GMT</pubDate>
			<itunes:duration>40:24</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/581d357f-07f9-45ea-8ba9-848ab6c7e017/media.mp3" length="77515718" type="audio/mpeg"/>
			<guid isPermaLink="false">581d357f-07f9-45ea-8ba9-848ab6c7e017</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Take-Control-of-Social-Media-Protecting-Your-Brand-e183tge</link>
			<acast:episodeId>6322e8a1bf5677001204e5d8</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyren3ZkF+ti9gUMGg/LyUb/gw]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d8.jpg"/>
			<description><![CDATA[<p>A podcast with Zerofox.</p><p>Hosted by:</p><p>Kelly Allen<br>Josh Duce<br>Matt&nbsp;Chimnery</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>A podcast with Zerofox.</p><p>Hosted by:</p><p>Kelly Allen<br>Josh Duce<br>Matt&nbsp;Chimnery</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Take Control ISO, Phil Howes Top Tips</title>
			<itunes:title>Take Control ISO, Phil Howes Top Tips</itunes:title>
			<pubDate>Thu, 21 Oct 2021 07:00:00 GMT</pubDate>
			<itunes:duration>25:55</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/fe4577dc-43d2-46e4-9dee-666515ea1e98/media.mp3" length="49732778" type="audio/mpeg"/>
			<guid isPermaLink="false">fe4577dc-43d2-46e4-9dee-666515ea1e98</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Take-Control-ISO--Phil-Howes-Top-Tips-e183tk5</link>
			<acast:episodeId>6322e8a1bf5677001204e5d9</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrelgSxEKZwP8HvaoqMXCxKxS]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5d9.jpg"/>
			<description><![CDATA[<p>A podcast with Kelly and Phil from Core to Cloud.</p><p>Kelly Allen<br>Phil Howe</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>A podcast with Kelly and Phil from Core to Cloud.</p><p>Kelly Allen<br>Phil Howe</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Take control of time, not just a snapshot</title>
			<itunes:title>Take control of time, not just a snapshot</itunes:title>
			<pubDate>Thu, 07 Oct 2021 07:00:00 GMT</pubDate>
			<itunes:duration>45:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/6322e89b85cb8e0011f0d773/e/33947a39-1189-43ec-9fd6-e41624f2cdb6/media.mp3" length="87087973" type="audio/mpeg"/>
			<guid isPermaLink="false">33947a39-1189-43ec-9fd6-e41624f2cdb6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/coretocloud/episodes/Take-control-of-time--not-just-a-snapshot-e183t41</link>
			<acast:episodeId>6322e8a1bf5677001204e5da</acast:episodeId>
			<acast:showId>6322e89b85cb8e0011f0d773</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrlWsxgO9s52UFh7+xc9vmJS3NUKixNP+YZQU3JNIxJBQuMJflJGr75i21jeitWyrekHb8jHRg4eJdpuxQaYDZUO]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/6322e8a1bf5677001204e5da.jpg"/>
			<description><![CDATA[<p><strong>A podcast with Pentera.&nbsp;</strong></p><p>Hosted by:&nbsp;</p><p>Kelly Allen<br>Phil Howe<br>Shak Ahmed<br>Jo Holliday</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>A podcast with Pentera.&nbsp;</strong></p><p>Hosted by:&nbsp;</p><p>Kelly Allen<br>Phil Howe<br>Shak Ahmed<br>Jo Holliday</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Technology"/>
    </channel>
</rss>
