<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 03 May 2026 14:43:27 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Zero Trust”</title>
    <link>https://securityconversations.fireside.fm/tags/zero-trust</link>
    <pubDate>Wed, 26 May 2021 16:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Google's Heather Adkins on defenders playing the long game</title>
  <link>http://securityconversations.fireside.fm/heather-adkins-google-security</link>
  <guid isPermaLink="false">97a0eeb7-c6f6-4757-9cf5-bbd21380223f</guid>
  <pubDate>Wed, 26 May 2021 16:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97a0eeb7-c6f6-4757-9cf5-bbd21380223f.mp3" length="32532700" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</itunes:subtitle>
  <itunes:duration>38:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97a0eeb7-c6f6-4757-9cf5-bbd21380223f/cover.jpg?v=1"/>
  <description>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.
Sponsored by Eclypsium:
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  Request a demo at Eclypsium.com (https://eclypsium.com).
</description>
  <itunes:keywords>google, zero-trust, chrome</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Jason Chan, VP, Information Security, Netflix</title>
  <link>http://securityconversations.fireside.fm/jason-chan-netflix</link>
  <guid isPermaLink="false">c238448d-c5c4-411a-b256-d6afae1ec31b</guid>
  <pubDate>Tue, 18 Aug 2020 16:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c238448d-c5c4-411a-b256-d6afae1ec31b.mp3" length="22390072" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Netflix security leader Jason Chan talks about the connections between ultra-marathons and running a robust security program, his view of the defender's top priorities, the talent shortage in cybersecurity, and the shifting patterns that drive secure code delivery.</itunes:subtitle>
  <itunes:duration>31:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c238448d-c5c4-411a-b256-d6afae1ec31b/cover.jpg?v=3"/>
  <description>Netflix security leader Jason Chan talks about the connections between ultra-marathons and running a robust security program, his view of the defender's top priorities, the talent shortage in cybersecurity, and the shifting patterns that drive secure code delivery. 
</description>
  <itunes:keywords>leadership, zero-trust, serverless, CISO</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Netflix security leader Jason Chan talks about the connections between ultra-marathons and running a robust security program, his view of the defender&#39;s top priorities, the talent shortage in cybersecurity, and the shifting patterns that drive secure code delivery.</p><p>Links:</p><ul><li><a title="Jason&#39;s ultra-marathon photos" rel="nofollow" href="https://run200photos.com/jason/hB7475CBB#hb7475cbb">Jason's ultra-marathon photos</a></li><li><a title="Keynote: Keeping Developers and Security Teams Happy" rel="nofollow" href="https://www.youtube.com/watch?v=WGkAf4x94rQ">Keynote: Keeping Developers and Security Teams Happy</a></li><li><a title="Developer Empathy with Jason Chan of Netflix (Podcast)" rel="nofollow" href="https://www.heavybit.com/library/podcasts/the-secure-developer/ep-28-developer-empathy-with-jason-chan-of-netflix/">Developer Empathy with Jason Chan of Netflix (Podcast)</a></li><li><a title="Hacktivity 2014:  Jason Chan -- Building a Glass House" rel="nofollow" href="https://www.youtube.com/watch?v=wH-8610xh6s">Hacktivity 2014:  Jason Chan -- Building a Glass House</a></li><li><a title="I Want Your Job: Jason Chan, Netflix" rel="nofollow" href="https://today.cofc.edu/2019/04/03/jason-chan-vice-president-of-information-security-netflix/">I Want Your Job: Jason Chan, Netflix</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Netflix security leader Jason Chan talks about the connections between ultra-marathons and running a robust security program, his view of the defender&#39;s top priorities, the talent shortage in cybersecurity, and the shifting patterns that drive secure code delivery.</p><p>Links:</p><ul><li><a title="Jason&#39;s ultra-marathon photos" rel="nofollow" href="https://run200photos.com/jason/hB7475CBB#hb7475cbb">Jason's ultra-marathon photos</a></li><li><a title="Keynote: Keeping Developers and Security Teams Happy" rel="nofollow" href="https://www.youtube.com/watch?v=WGkAf4x94rQ">Keynote: Keeping Developers and Security Teams Happy</a></li><li><a title="Developer Empathy with Jason Chan of Netflix (Podcast)" rel="nofollow" href="https://www.heavybit.com/library/podcasts/the-secure-developer/ep-28-developer-empathy-with-jason-chan-of-netflix/">Developer Empathy with Jason Chan of Netflix (Podcast)</a></li><li><a title="Hacktivity 2014:  Jason Chan -- Building a Glass House" rel="nofollow" href="https://www.youtube.com/watch?v=wH-8610xh6s">Hacktivity 2014:  Jason Chan -- Building a Glass House</a></li><li><a title="I Want Your Job: Jason Chan, Netflix" rel="nofollow" href="https://today.cofc.edu/2019/04/03/jason-chan-vice-president-of-information-security-netflix/">I Want Your Job: Jason Chan, Netflix</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
