<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 14 Apr 2026 06:24:33 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Careers”</title>
    <link>https://securityconversations.fireside.fm/tags/careers</link>
    <pubDate>Thu, 26 Jul 2018 09:45:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Chris Castaldo, Senior Director of Cybersecurity, 2U </title>
  <link>http://securityconversations.fireside.fm/chris-castaldo-2u</link>
  <guid isPermaLink="false">a936371f-8a20-4865-9932-a916fd16a2da</guid>
  <pubDate>Thu, 26 Jul 2018 09:45:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a936371f-8a20-4865-9932-a916fd16a2da.mp3" length="37191493" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Chris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it's important to get independent third-party security assessments.</itunes:subtitle>
  <itunes:duration>39:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a936371f-8a20-4865-9932-a916fd16a2da/cover.jpg?v=5"/>
  <description>Chris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it's important to get independent third-party security assessments. 
</description>
  <itunes:keywords>cybersecurity, CISOs, bugbounty</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Chris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it&#39;s important to get independent third-party security assessments.</p><p>Links:</p><ul><li><a title="Uptycs" rel="nofollow" href="https://www.uptycs.com/technology">Uptycs</a></li><li><a title="osquery | Easily ask questions about your Linux, Windows, and macOS infrastructure" rel="nofollow" href="https://osquery.io/">osquery | Easily ask questions about your Linux, Windows, and macOS infrastructure</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Chris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it&#39;s important to get independent third-party security assessments.</p><p>Links:</p><ul><li><a title="Uptycs" rel="nofollow" href="https://www.uptycs.com/technology">Uptycs</a></li><li><a title="osquery | Easily ask questions about your Linux, Windows, and macOS infrastructure" rel="nofollow" href="https://osquery.io/">osquery | Easily ask questions about your Linux, Windows, and macOS infrastructure</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Rich Seiersen, SVP and CISO, Lending Club</title>
  <link>http://securityconversations.fireside.fm/rich-seiersen-lending-club</link>
  <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=530</guid>
  <pubDate>Mon, 18 Jun 2018 09:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cacc11a2-aec9-4926-8d62-1cd34a5befdf.mp3" length="27931750" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>SVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek's &lt;a href="https://cisoforum.com"&gt;CISO Forum&lt;/a&gt;)</itunes:subtitle>
  <itunes:duration>37:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/cacc11a2-aec9-4926-8d62-1cd34a5befdf/cover.jpg?v=4"/>
  <description>&lt;p&gt;&lt;span&gt;SVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek’s &lt;a href="https://cisoforum.com"&gt;CISO Forum&lt;/a&gt;).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;

&lt;a href="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3"&gt;https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3&lt;/a&gt;
 
</description>
  <content:encoded>
    <![CDATA[<p><span style="font-weight: 400;">SVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek&#8217;s <a href="https://cisoforum.com">CISO Forum</a>).</span></p>

<p>&nbsp;</p>

<!--[if lt IE 9]><![endif]-->

<audio class="wp-audio-shortcode" id="audio-530-1" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3?_=1" /><a href="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3">https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3</a></audio><p>Links:</p><ul><li><a title="Book: How to Measure Anything in Cybersecurity Risk" rel="nofollow" href="https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk/dp/1536669741">Book: How to Measure Anything in Cybersecurity Risk</a> &mdash; How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><span style="font-weight: 400;">SVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek&#8217;s <a href="https://cisoforum.com">CISO Forum</a>).</span></p>

<p>&nbsp;</p>

<!--[if lt IE 9]><![endif]-->

<audio class="wp-audio-shortcode" id="audio-530-1" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3?_=1" /><a href="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3">https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3</a></audio><p>Links:</p><ul><li><a title="Book: How to Measure Anything in Cybersecurity Risk" rel="nofollow" href="https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk/dp/1536669741">Book: How to Measure Anything in Cybersecurity Risk</a> &mdash; How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Thomas Ptacek, Founder, Latacora</title>
  <link>http://securityconversations.fireside.fm/tom-ptacek-latacora</link>
  <guid isPermaLink="false">1a12e545-c1df-485c-b38f-dacd2356366d</guid>
  <pubDate>Mon, 23 Apr 2018 15:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1a12e545-c1df-485c-b38f-dacd2356366d.mp3" length="42360848" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Latacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry.</itunes:subtitle>
  <itunes:duration>48:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1a12e545-c1df-485c-b38f-dacd2356366d/cover.jpg?v=4"/>
  <description>Latacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry. 
</description>
  <itunes:keywords>cybersecurity, CISOs, bugbounty</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Latacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry.</p><p>Links:</p><ul><li><a title="Latacora -- Security Teams For Startups" rel="nofollow" href="https://latacora.com/">Latacora -- Security Teams For Startups</a> &mdash; Latacora does just one kind of engagement: we join your engineering team virtually and run security, for about a year. Then we help you hire someone full-time to replace us.</li><li><a title="Thomas H. Ptacek on Twitter" rel="nofollow" href="https://twitter.com/tqbf">Thomas H. Ptacek on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Latacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry.</p><p>Links:</p><ul><li><a title="Latacora -- Security Teams For Startups" rel="nofollow" href="https://latacora.com/">Latacora -- Security Teams For Startups</a> &mdash; Latacora does just one kind of engagement: we join your engineering team virtually and run security, for about a year. Then we help you hire someone full-time to replace us.</li><li><a title="Thomas H. Ptacek on Twitter" rel="nofollow" href="https://twitter.com/tqbf">Thomas H. Ptacek on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Brad Arkin, Chief Security Officer, Adobe</title>
  <link>http://securityconversations.fireside.fm/brad-arkin-adobe</link>
  <guid isPermaLink="false">ab9e9c84-15c6-4f9e-b703-71dc40c23baf</guid>
  <pubDate>Fri, 23 Feb 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ab9e9c84-15c6-4f9e-b703-71dc40c23baf.mp3" length="44087043" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player.</itunes:subtitle>
  <itunes:duration>47:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/ab9e9c84-15c6-4f9e-b703-71dc40c23baf/cover.jpg?v=4"/>
  <description>Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player.</p><p>Links:</p><ul><li><a title="Brad Arkin on Twitter" rel="nofollow" href="https://twitter.com/bradarkin">Brad Arkin on Twitter</a></li><li><a title="Security at Adobe" rel="nofollow" href="https://www.adobe.com/security.html">Security at Adobe</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player.</p><p>Links:</p><ul><li><a title="Brad Arkin on Twitter" rel="nofollow" href="https://twitter.com/bradarkin">Brad Arkin on Twitter</a></li><li><a title="Security at Adobe" rel="nofollow" href="https://www.adobe.com/security.html">Security at Adobe</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Aanchal Gupta, Director of Security, Facebook</title>
  <link>http://securityconversations.fireside.fm/aanchal-gupta-facebook</link>
  <guid isPermaLink="false">a134ba7a-9727-47e7-8a46-3ba0c5d705ee</guid>
  <pubDate>Wed, 14 Feb 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a134ba7a-9727-47e7-8a46-3ba0c5d705ee.mp3" length="30922718" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Director of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles.</itunes:subtitle>
  <itunes:duration>35:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a134ba7a-9727-47e7-8a46-3ba0c5d705ee/cover.jpg?v=5"/>
  <description>Director of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Director of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles.</p><p>Links:</p><ul><li><a title="Aanchal Gupta on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/aanchalgupta/">Aanchal Gupta on LinkedIn</a></li><li><a title="Facebook Security" rel="nofollow" href="https://www.facebook.com/security/">Facebook Security</a></li><li><a title="Cybersecurity Needs Diversity" rel="nofollow" href="https://staysafeonline.org/blog/diversity-needed-cybersecurity-unique-experience-helps-protect-people/">Cybersecurity Needs Diversity</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Director of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles.</p><p>Links:</p><ul><li><a title="Aanchal Gupta on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/aanchalgupta/">Aanchal Gupta on LinkedIn</a></li><li><a title="Facebook Security" rel="nofollow" href="https://www.facebook.com/security/">Facebook Security</a></li><li><a title="Cybersecurity Needs Diversity" rel="nofollow" href="https://staysafeonline.org/blog/diversity-needed-cybersecurity-unique-experience-helps-protect-people/">Cybersecurity Needs Diversity</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Tom Conklin, Director of Security and Compliance, Vera Security</title>
  <link>http://securityconversations.fireside.fm/tom-conklin-vera-security</link>
  <guid isPermaLink="false">dcd14ec8-d9f0-4245-9324-6291ad4d10a7</guid>
  <pubDate>Thu, 08 Feb 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/dcd14ec8-d9f0-4245-9324-6291ad4d10a7.mp3" length="30629828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Senior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.</itunes:subtitle>
  <itunes:duration>33:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/dcd14ec8-d9f0-4245-9324-6291ad4d10a7/cover.jpg?v=4"/>
  <description>Senior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Senior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.</p><p>Links:</p><ul><li><a title="Vera Security" rel="nofollow" href="https://www.vera.com/">Vera Security</a></li><li><a title="Tom Conklin on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/tom-conklin-b4037713/">Tom Conklin on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Senior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.</p><p>Links:</p><ul><li><a title="Vera Security" rel="nofollow" href="https://www.vera.com/">Vera Security</a></li><li><a title="Tom Conklin on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/tom-conklin-b4037713/">Tom Conklin on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>John Terrill, CISO, Fox News, Fox Business and Fox Television</title>
  <link>http://securityconversations.fireside.fm/john-terrill-fox-news</link>
  <guid isPermaLink="false">11a6011e-7ad8-418f-a302-37a700a11d45</guid>
  <pubDate>Tue, 06 Feb 2018 14:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/11a6011e-7ad8-418f-a302-37a700a11d45.mp3" length="41862607" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative.</itunes:subtitle>
  <itunes:duration>47:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/11a6011e-7ad8-418f-a302-37a700a11d45/cover.jpg?v=4"/>
  <description>Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative.</p><p>Links:</p><ul><li><a title="John Terrill on Twitter" rel="nofollow" href="https://twitter.com/youbetyourballs">John Terrill on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative.</p><p>Links:</p><ul><li><a title="John Terrill on Twitter" rel="nofollow" href="https://twitter.com/youbetyourballs">John Terrill on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
