<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/data-security-decoded" rel="self" type="application/rss+xml"/>
    <title>Data Security Decoded</title>
    <link>https://thecyberwire.com/podcasts/data-security-decoded</link>
    <language>en-us</language>
    <copyright>Copyrights © 2024 All Rights Reserved by Rubrik</copyright>
    <description>Data Security Decoded provides actionable, vendor-agnostic insights to reduce data security risk and improve resilience outcomes. Designed for cybersecurity and IT professionals who want practical insights on preparing for attacks before they happen, so they can respond effectively when they inevitably do. Episodes feature insights from researchers, crafters of public policy, and senior cybersecurity leaders, to help organizations reduce risk and improve resilience. Data Security Decoded provides practical advice, proven strategies, and in-depth discussions on the latest trends and challenges in data security, helping listeners strengthen their organizations' defenses and recovery plans.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/3d922406-b4f5-11f0-b110-ab0eaae8e9c2/image/8b80e47602758d78b7b109c5d12880e7.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Data Security Decoded</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Welcome to the Data Security Decoded podcast — your guide to navigating the complex world of data protection. Each episode breaks down key cybersecurity issues and cyber resilience strategies in clear, accessible language. We speak with business leaders and cybersecurity experts to keep you informed about the latest trends and help you future-proof your data security. Join us on this essential journey.</itunes:subtitle>
    <itunes:author>Rubrik</itunes:author>
    <itunes:summary>Data Security Decoded provides actionable, vendor-agnostic insights to reduce data security risk and improve resilience outcomes. Designed for cybersecurity and IT professionals who want practical insights on preparing for attacks before they happen, so they can respond effectively when they inevitably do. Episodes feature insights from researchers, crafters of public policy, and senior cybersecurity leaders, to help organizations reduce risk and improve resilience. Data Security Decoded provides practical advice, proven strategies, and in-depth discussions on the latest trends and challenges in data security, helping listeners strengthen their organizations' defenses and recovery plans.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>Data Security Decoded provides actionable, vendor-agnostic insights to reduce data security risk and improve resilience outcomes. Designed for cybersecurity and IT professionals who want practical insights on preparing for attacks before they happen, so they can respond effectively when they inevitably do. Episodes feature insights from researchers, crafters of public policy, and senior cybersecurity leaders, to help organizations reduce risk and improve resilience. Data Security Decoded provides practical advice, proven strategies, and in-depth discussions on the latest trends and challenges in data security, helping listeners strengthen their organizations' defenses and recovery plans.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>Caleb Tolin</itunes:name>
      <itunes:email>producer@thecyberwire.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/3d922406-b4f5-11f0-b110-ab0eaae8e9c2/image/8b80e47602758d78b7b109c5d12880e7.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Technology">
    </itunes:category>
    <itunes:category text="Business">
    </itunes:category>
    <item>
      <title>Detecting Adversary Intent: Analyzing Behavioral Tells in Admin Logs with Allison Wikoff</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/50/notes</link>
      <description>Adversaries are already logging into your network using your own admin credentials. In this episode, Caleb Tolin sits down with Allison Wikoff to move past the identity clichés and analyze the specific behavioral signals that separate routine IT maintenance from state-sponsored sabotage. They dissect why resilience is not a flash of genius during a crisis, but a mindset that organizations can adopt to stay ahead of dynamic threat actors.

The conversation explores how attackers are increasingly bypassing traditional controls like MFA and leveraging non-human identities such as service accounts, APIs, and AI agents. These identities often operate with persistent access and elevated privileges, making them highly attractive targets. As AI continues to lower the barrier to entry, adversaries are moving faster and blending more effectively into normal activity, making detection significantly more challenging.

The episode also examines how ransomware, espionage, and sabotage offer different behavioral tells, with data exfiltration now central across multiple threat types. In parallel, organizations must begin preparing for long-term risks like quantum computing, where encrypted data stolen today could be exposed in the future (i.e., “harvest now, decrypt later”_.

Throughout the discussion, practical strategies take center stage. From strengthening identity hygiene and segmentation to improving visibility across users, systems, and third parties, the fundamentals remain critical. The key takeaway is clear. While the threat landscape is evolving, organizations that focus on identity, preparedness, and resilience will be best positioned to reduce risk and recover effectively.

What You’ll Learn


  
How attackers bypass MFA and blend in using legitimate credentials



  
Which non-human identities are high-risk targets



  
How threat actors are leveraging AI to lower the barrier to entry for cybercrime



  
The difference between ransomware, espionage, and sabotage intent signals



  
What “harvest now, decrypt later” means for quantum risk



  
The three hygiene practices that still stop most attacks



Episode Highlights

[00:00:00] The Limits of MFA Why attackers are starting to work around multi-factor authentication

[00:02:00] The Explosion of Non-Human Identities Service accounts, APIs, and AI agents as new attack surfaces

[00:04:00] AI and the Speed of Threats How AI is accelerating reconnaissance and malware creation

[00:05:00] Ransomware vs. Espionage Why data exfiltration is now central to both

[00:06:00] Healthcare Under Pressure Why critical sectors face compounded cyber risk

[00:08:00] Quantum Threats Explained Understanding “harvest now, decrypt later”

[00:11:00] Identity Recovery Challenges Why restoring trust is harder than restoring systems

[00:14:00] The 3 Security Fundamentals Identity hygiene, segmentation, and visibility</description>
      <pubDate>Tue, 14 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Detecting Adversary Intent: Analyzing Behavioral Tells in Admin Logs with Allison Wikoff</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/860cc9fc-350b-11f1-adef-b73ef04c8f87/image/6e00edd2182f47c190b5cda642cf2910.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Adversaries are already logging into your network using your own admin credentials. In this episode, Caleb Tolin sits down with Allison Wikoff to move past the identity clichés and analyze the specific behavioral signals that separate routine IT maintenance from state-sponsored sabotage. They dissect why resilience is not a flash of genius during a crisis, but a mindset that organizations can adopt to stay ahead of dynamic threat actors.

The conversation explores how attackers are increasingly bypassing traditional controls like MFA and leveraging non-human identities such as service accounts, APIs, and AI agents. These identities often operate with persistent access and elevated privileges, making them highly attractive targets. As AI continues to lower the barrier to entry, adversaries are moving faster and blending more effectively into normal activity, making detection significantly more challenging.

The episode also examines how ransomware, espionage, and sabotage offer different behavioral tells, with data exfiltration now central across multiple threat types. In parallel, organizations must begin preparing for long-term risks like quantum computing, where encrypted data stolen today could be exposed in the future (i.e., “harvest now, decrypt later”_.

Throughout the discussion, practical strategies take center stage. From strengthening identity hygiene and segmentation to improving visibility across users, systems, and third parties, the fundamentals remain critical. The key takeaway is clear. While the threat landscape is evolving, organizations that focus on identity, preparedness, and resilience will be best positioned to reduce risk and recover effectively.

What You’ll Learn


  
How attackers bypass MFA and blend in using legitimate credentials



  
Which non-human identities are high-risk targets



  
How threat actors are leveraging AI to lower the barrier to entry for cybercrime



  
The difference between ransomware, espionage, and sabotage intent signals



  
What “harvest now, decrypt later” means for quantum risk



  
The three hygiene practices that still stop most attacks



Episode Highlights

[00:00:00] The Limits of MFA Why attackers are starting to work around multi-factor authentication

[00:02:00] The Explosion of Non-Human Identities Service accounts, APIs, and AI agents as new attack surfaces

[00:04:00] AI and the Speed of Threats How AI is accelerating reconnaissance and malware creation

[00:05:00] Ransomware vs. Espionage Why data exfiltration is now central to both

[00:06:00] Healthcare Under Pressure Why critical sectors face compounded cyber risk

[00:08:00] Quantum Threats Explained Understanding “harvest now, decrypt later”

[00:11:00] Identity Recovery Challenges Why restoring trust is harder than restoring systems

[00:14:00] The 3 Security Fundamentals Identity hygiene, segmentation, and visibility</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adversaries are already logging into your network using your own admin credentials. In this episode, <a href="https://www.linkedin.com/in/calebtolin/">Caleb Tolin</a> sits down with <a href="https://www.linkedin.com/in/allison-w/">Allison Wikoff</a> to move past the identity clichés and analyze the specific behavioral signals that separate routine IT maintenance from state-sponsored sabotage. They dissect why resilience is not a flash of genius during a crisis, but a mindset that organizations can adopt to stay ahead of dynamic threat actors.</p>
<p>The conversation explores how attackers are increasingly bypassing traditional controls like MFA and leveraging non-human identities such as service accounts, APIs, and AI agents. These identities often operate with persistent access and elevated privileges, making them highly attractive targets. As AI continues to lower the barrier to entry, adversaries are moving faster and blending more effectively into normal activity, making detection significantly more challenging.</p>
<p>The episode also examines how ransomware, espionage, and sabotage offer different behavioral tells, with data exfiltration now central across multiple threat types. In parallel, organizations must begin preparing for long-term risks like quantum computing, where encrypted data stolen today could be exposed in the future (i.e., “harvest now, decrypt later”_.</p>
<p>Throughout the discussion, practical strategies take center stage. From strengthening identity hygiene and segmentation to improving visibility across users, systems, and third parties, the fundamentals remain critical. The key takeaway is clear. While the threat landscape is evolving, organizations that focus on identity, preparedness, and resilience will be best positioned to reduce risk and recover effectively.</p>
<p><br><strong>What You’ll Learn</strong></p>
<ul>
  <li>
<p>How attackers bypass MFA and blend in using legitimate credentials</p>
</li>
  <li>
<p>Which non-human identities are high-risk targets</p>
</li>
  <li>
<p>How threat actors are leveraging AI to lower the barrier to entry for cybercrime</p>
</li>
  <li>
<p>The difference between ransomware, espionage, and sabotage intent signals</p>
</li>
  <li>
<p>What “harvest now, decrypt later” means for quantum risk</p>
</li>
  <li>
<p>The three hygiene practices that still stop most attacks</p>
<p><br></p>
<p><strong>Episode Highlights</strong></p>
<p><strong>[00:00:00] The Limits of MFA</strong> Why attackers are starting to work around multi-factor authentication</p>
<p><strong>[00:02:00] The Explosion of Non-Human Identities</strong> Service accounts, APIs, and AI agents as new attack surfaces</p>
<p><strong>[00:04:00] AI and the Speed of Threats</strong> How AI is accelerating reconnaissance and malware creation</p>
<p><strong>[00:05:00] Ransomware vs. Espionage</strong> Why data exfiltration is now central to both</p>
<p><strong>[00:06:00] Healthcare Under Pressure</strong> Why critical sectors face compounded cyber risk</p>
<p><strong>[00:08:00] Quantum Threats Explained</strong> Understanding “harvest now, decrypt later”</p>
<p><strong>[00:11:00] Identity Recovery Challenges</strong> Why restoring trust is harder than restoring systems</p>
<p><strong>[00:14:00] The 3 Security Fundamentals</strong> Identity hygiene, segmentation, and visibility</p>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1256</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[860cc9fc-350b-11f1-adef-b73ef04c8f87]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8271040643.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Downtime in Healthcare is Fatal: Achieving Resilience in Health &amp; Life Sciences</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/49/notes</link>
      <description>Cybersecurity in healthcare is undergoing a critical shift. What was once viewed as a back-office IT concern is now directly tied to patient safety and clinical outcomes. In this episode of Data Security Decoded, host Caleb Tolin sits down with John Fokker, Vice President of Threat Intelligence Strategy at Trellix, to explore new findings that reveal a significant increase in inpatient mortality rates following cyberattacks on hospitals, reframing cybersecurity as a life-or-death issue.

The conversation dives into how attackers infiltrate healthcare environments, often through familiar entry points like email, before moving laterally across interconnected systems. From HVAC units to supply chain logistics, even nonclinical systems can disrupt care delivery when compromised. The discussion highlights how adversaries blend into hospital networks using legitimate tools, making detection increasingly difficult.

We also examine the alarming dwell times seen in healthcare environments and what defenders can do to identify subtle anomalies before they escalate. The episode outlines practical strategies, including stronger email defenses, network segmentation, and proactive threat hunting.

Finally, we confront two uncomfortable truths: apolitical healthcare and humanitarian organizations remain prime targets, and AI introduces both powerful defenses and new risks. The takeaway is clear. Cyber resilience is not optional. It is essential to maintain trust, ensure continuity, and ultimately save lives.



What You’ll Learn


  
Why cyberattacks in healthcare directly impact patient mortality



  
How nonclinical systems can disrupt critical care delivery



  
What long dwell times reveal about attacker behavior



  
How threat actors use legitimate tools to evade detection



  
The most effective ways to reduce healthcare attack surfaces



  
Why email remains the primary entry point for attackers



  
How to reframe cybersecurity as a patient safety priority



Episode Highlights

00:00 – A Shocking Statistic A 29 percent increase in mortality reframes cyber risk

02:30 – From IT to Patient Safety Why CISOs now have a stronger voice at the board level

05:10 – The Backdoor Problem Nonclinical systems and third parties as attack vectors

09:00 – Living in the Network Understanding long dwell times and stealthy attackers

13:45 – Spotting the Signals Key behavioral indicators defenders should watch

18:20 – Three Steps to Resilience Email security, segmentation, and attack surface reduction

23:10 – Two Inconvenient Truths AI risk and the myth of healthcare immunity

27:00 – Final Takeaway Cybersecurity as operational resilience</description>
      <pubDate>Tue, 07 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Downtime in Healthcare is Fatal: Achieving Resilience in Health &amp; Life Sciences</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f78accc-b4f7-11f0-b4eb-9756cc9909fa/image/ba71451d282ac9b5d0594584ba2df7a5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Cybersecurity in healthcare is undergoing a critical shift. What was once viewed as a back-office IT concern is now directly tied to patient safety and clinical outcomes. In this episode of Data Security Decoded, host Caleb Tolin sits down with John Fokker, Vice President of Threat Intelligence Strategy at Trellix, to explore new findings that reveal a significant increase in inpatient mortality rates following cyberattacks on hospitals, reframing cybersecurity as a life-or-death issue.

The conversation dives into how attackers infiltrate healthcare environments, often through familiar entry points like email, before moving laterally across interconnected systems. From HVAC units to supply chain logistics, even nonclinical systems can disrupt care delivery when compromised. The discussion highlights how adversaries blend into hospital networks using legitimate tools, making detection increasingly difficult.

We also examine the alarming dwell times seen in healthcare environments and what defenders can do to identify subtle anomalies before they escalate. The episode outlines practical strategies, including stronger email defenses, network segmentation, and proactive threat hunting.

Finally, we confront two uncomfortable truths: apolitical healthcare and humanitarian organizations remain prime targets, and AI introduces both powerful defenses and new risks. The takeaway is clear. Cyber resilience is not optional. It is essential to maintain trust, ensure continuity, and ultimately save lives.



What You’ll Learn


  
Why cyberattacks in healthcare directly impact patient mortality



  
How nonclinical systems can disrupt critical care delivery



  
What long dwell times reveal about attacker behavior



  
How threat actors use legitimate tools to evade detection



  
The most effective ways to reduce healthcare attack surfaces



  
Why email remains the primary entry point for attackers



  
How to reframe cybersecurity as a patient safety priority



Episode Highlights

00:00 – A Shocking Statistic A 29 percent increase in mortality reframes cyber risk

02:30 – From IT to Patient Safety Why CISOs now have a stronger voice at the board level

05:10 – The Backdoor Problem Nonclinical systems and third parties as attack vectors

09:00 – Living in the Network Understanding long dwell times and stealthy attackers

13:45 – Spotting the Signals Key behavioral indicators defenders should watch

18:20 – Three Steps to Resilience Email security, segmentation, and attack surface reduction

23:10 – Two Inconvenient Truths AI risk and the myth of healthcare immunity

27:00 – Final Takeaway Cybersecurity as operational resilience</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity in healthcare is undergoing a critical shift. What was once viewed as a back-office IT concern is now directly tied to patient safety and clinical outcomes. In this episode of <em>Data Security Decoded</em>, host Caleb Tolin sits down with John Fokker, Vice President of Threat Intelligence Strategy at Trellix, to explore new findings that reveal a significant increase in inpatient mortality rates following cyberattacks on hospitals, reframing cybersecurity as a life-or-death issue.</p>
<p>The conversation dives into how attackers infiltrate healthcare environments, often through familiar entry points like email, before moving laterally across interconnected systems. From HVAC units to supply chain logistics, even nonclinical systems can disrupt care delivery when compromised. The discussion highlights how adversaries blend into hospital networks using legitimate tools, making detection increasingly difficult.</p>
<p>We also examine the alarming dwell times seen in healthcare environments and what defenders can do to identify subtle anomalies before they escalate. The episode outlines practical strategies, including stronger email defenses, network segmentation, and proactive threat hunting.</p>
<p>Finally, we confront two uncomfortable truths: apolitical healthcare and humanitarian organizations remain prime targets, and AI introduces both powerful defenses and new risks. The takeaway is clear. Cyber resilience is not optional. It is essential to maintain trust, ensure continuity, and ultimately save lives.</p>
<p><br></p>
<p><strong>What You’ll Learn</strong></p>
<ul>
  <li>
<p>Why cyberattacks in healthcare directly impact patient mortality</p>
</li>
  <li>
<p>How nonclinical systems can disrupt critical care delivery</p>
</li>
  <li>
<p>What long dwell times reveal about attacker behavior</p>
</li>
  <li>
<p>How threat actors use legitimate tools to evade detection</p>
</li>
  <li>
<p>The most effective ways to reduce healthcare attack surfaces</p>
</li>
  <li>
<p>Why email remains the primary entry point for attackers</p>
</li>
  <li>
<p>How to reframe cybersecurity as a patient safety priority</p>
<p><br></p>
<p><strong>Episode Highlights</strong></p>
<p><strong>00:00 – A Shocking Statistic</strong> A 29 percent increase in mortality reframes cyber risk</p>
<p><strong>02:30 – From IT to Patient Safety</strong> Why CISOs now have a stronger voice at the board level</p>
<p><strong>05:10 – The Backdoor Problem</strong> Nonclinical systems and third parties as attack vectors</p>
<p><strong>09:00 – Living in the Network</strong> Understanding long dwell times and stealthy attackers</p>
<p><strong>13:45 – Spotting the Signals</strong> Key behavioral indicators defenders should watch</p>
<p><strong>18:20 – Three Steps to Resilience</strong> Email security, segmentation, and attack surface reduction</p>
<p><strong>23:10 – Two Inconvenient Truths</strong> AI risk and the myth of healthcare immunity</p>
<p><strong>27:00 – Final Takeaway</strong> Cybersecurity as operational resilience</p>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1510</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f78accc-b4f7-11f0-b4eb-9756cc9909fa]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4585690843.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI Takes Over RSAC Conference (Now What?) with Dave Bittner.</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/48/notes</link>
      <description>In this RSAC Conference recap, Dave Bittner, Host of The CyberWire Daily, joins Data Security Decoded host Caleb Tolin from the guest seat to unpack the biggest theme dominating the conference: artificial intelligence, and, more specifically, agentic AI.

From wall-to-wall AI messaging across San Francisco to in-depth conversations with security leaders and analysts, one thing became clear: the industry has moved past debating whether AI will take hold. It already has. Now, the focus has shifted to making it safe.

Dave shares insights from discussions with vendors, researchers, and intelligence professionals, highlighting a growing consensus around the need for strong guardrails, identity controls, and governance frameworks. As organizations begin deploying AI agents capable of acting autonomously, concerns around misuse, manipulation, and “machine-speed” attacks are accelerating.

The conversation also explores the rise of “shadow AI,” where employees use AI tools outside official oversight, and why banning these tools may backfire. Instead, organizations must embrace visibility and collaboration to manage risk effectively.

Ultimately, this episode captures a pivotal moment for cybersecurity: a transition from experimentation to operational reality. The tools are powerful, the risks are real, and the path forward requires balancing innovation with control while, as Dave puts it, doing everything possible to “limit the blast radius.”



What You’ll Learn


  
Why AI adoption in cybersecurity has shifted from optional to inevitable



  
What “agentic AI” means and why it’s a game changer



  
How identity is becoming the core security layer for AI systems



  
Why “machine speed” is forcing defenders to rethink workflows



  
The real risks of AI misuse, including manipulation and prompt injection



  
How “shadow AI” is emerging inside organizations—and why it matters



  
Practical ways companies are thinking about AI guardrails and governance



Episode Highlights

[00:00] – Role Reversal at RSA Dave steps into the interviewee seat and kicks things off with a lighthearted karaoke discussion.

[02:15] – RSA Energy Check Why this year’s conference felt more optimistic despite industry uncertainty.

[04:10] – AI Everywhere From billboards to conversations—AI dominates RSA.

[06:00] – Agentic AI Arrives Why autonomous AI agents are no longer theoretical.

[08:30] – Guardrails &amp; Identity How security leaders are thinking about controlling AI behavior.

[11:15] – When AI Goes Wrong A real-world example of AI being manipulated—and what it reveals.

[14:00] – Machine-Speed Threats Why defenders must move faster than ever before.

[17:30] – The Big Shift AI is inevitable—now the focus is containment.

[19:30] – Shadow AI Risk Why employees using AI outside oversight is a growing concern.</description>
      <pubDate>Tue, 31 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>AI Takes Over RSAC Conference (Now What?) with Dave Bittner.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0bf424aa-2c76-11f1-ba16-c75fd6ae390d/image/800394f1ce9841084b0f3ba5f90e9a23.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this RSAC Conference recap, Dave Bittner, Host of The CyberWire Daily, joins Data Security Decoded host Caleb Tolin from the guest seat to unpack the biggest theme dominating the conference: artificial intelligence, and, more specifically, agentic AI.

From wall-to-wall AI messaging across San Francisco to in-depth conversations with security leaders and analysts, one thing became clear: the industry has moved past debating whether AI will take hold. It already has. Now, the focus has shifted to making it safe.

Dave shares insights from discussions with vendors, researchers, and intelligence professionals, highlighting a growing consensus around the need for strong guardrails, identity controls, and governance frameworks. As organizations begin deploying AI agents capable of acting autonomously, concerns around misuse, manipulation, and “machine-speed” attacks are accelerating.

The conversation also explores the rise of “shadow AI,” where employees use AI tools outside official oversight, and why banning these tools may backfire. Instead, organizations must embrace visibility and collaboration to manage risk effectively.

Ultimately, this episode captures a pivotal moment for cybersecurity: a transition from experimentation to operational reality. The tools are powerful, the risks are real, and the path forward requires balancing innovation with control while, as Dave puts it, doing everything possible to “limit the blast radius.”



What You’ll Learn


  
Why AI adoption in cybersecurity has shifted from optional to inevitable



  
What “agentic AI” means and why it’s a game changer



  
How identity is becoming the core security layer for AI systems



  
Why “machine speed” is forcing defenders to rethink workflows



  
The real risks of AI misuse, including manipulation and prompt injection



  
How “shadow AI” is emerging inside organizations—and why it matters



  
Practical ways companies are thinking about AI guardrails and governance



Episode Highlights

[00:00] – Role Reversal at RSA Dave steps into the interviewee seat and kicks things off with a lighthearted karaoke discussion.

[02:15] – RSA Energy Check Why this year’s conference felt more optimistic despite industry uncertainty.

[04:10] – AI Everywhere From billboards to conversations—AI dominates RSA.

[06:00] – Agentic AI Arrives Why autonomous AI agents are no longer theoretical.

[08:30] – Guardrails &amp; Identity How security leaders are thinking about controlling AI behavior.

[11:15] – When AI Goes Wrong A real-world example of AI being manipulated—and what it reveals.

[14:00] – Machine-Speed Threats Why defenders must move faster than ever before.

[17:30] – The Big Shift AI is inevitable—now the focus is containment.

[19:30] – Shadow AI Risk Why employees using AI outside oversight is a growing concern.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this RSAC Conference recap, Dave Bittner, Host of The CyberWire Daily, joins Data Security Decoded host Caleb Tolin from the guest seat to unpack the biggest theme dominating the conference: artificial intelligence, and, more specifically, agentic AI.</p>
<p>From wall-to-wall AI messaging across San Francisco to in-depth conversations with security leaders and analysts, one thing became clear: the industry has moved past debating whether AI will take hold. It already has. Now, the focus has shifted to making it safe.</p>
<p>Dave shares insights from discussions with vendors, researchers, and intelligence professionals, highlighting a growing consensus around the need for strong guardrails, identity controls, and governance frameworks. As organizations begin deploying AI agents capable of acting autonomously, concerns around misuse, manipulation, and “machine-speed” attacks are accelerating.</p>
<p>The conversation also explores the rise of “shadow AI,” where employees use AI tools outside official oversight, and why banning these tools may backfire. Instead, organizations must embrace visibility and collaboration to manage risk effectively.</p>
<p>Ultimately, this episode captures a pivotal moment for cybersecurity: a transition from experimentation to operational reality. The tools are powerful, the risks are real, and the path forward requires balancing innovation with control while, as Dave puts it, doing everything possible to “limit the blast radius.”</p>
<p><br></p>
<p><strong>What You’ll Learn</strong></p>
<ul>
  <li>
<p>Why AI adoption in cybersecurity has shifted from optional to inevitable</p>
</li>
  <li>
<p>What “agentic AI” means and why it’s a game changer</p>
</li>
  <li>
<p>How identity is becoming the core security layer for AI systems</p>
</li>
  <li>
<p>Why “machine speed” is forcing defenders to rethink workflows</p>
</li>
  <li>
<p>The real risks of AI misuse, including manipulation and prompt injection</p>
</li>
  <li>
<p>How “shadow AI” is emerging inside organizations—and why it matters</p>
</li>
  <li>
<p>Practical ways companies are thinking about AI guardrails and governance</p>
<p><br></p>
<p><strong>Episode Highlights</strong></p>
<p><strong>[00:00] – Role Reversal at RSA</strong> Dave steps into the interviewee seat and kicks things off with a lighthearted karaoke discussion.</p>
<p><strong>[02:15] – RSA Energy Check</strong> Why this year’s conference felt more optimistic despite industry uncertainty.</p>
<p><strong>[04:10] – AI Everywhere</strong> From billboards to conversations—AI dominates RSA.</p>
<p><strong>[06:00] – Agentic AI Arrives</strong> Why autonomous AI agents are no longer theoretical.</p>
<p><strong>[08:30] – Guardrails &amp; Identity</strong> How security leaders are thinking about controlling AI behavior.</p>
<p><strong>[11:15] – When AI Goes Wrong</strong> A real-world example of AI being manipulated—and what it reveals.</p>
<p><strong>[14:00] – Machine-Speed Threats</strong> Why defenders must move faster than ever before.</p>
<p><strong>[17:30] – The Big Shift</strong> AI is inevitable—now the focus is containment.</p>
<p><strong>[19:30] – Shadow AI Risk</strong> Why employees using AI outside oversight is a growing concern.</p>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0bf424aa-2c76-11f1-ba16-c75fd6ae390d]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6626948236.mp3?updated=1774916083" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your Backups Are Talking — Are You Listening?</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/47/notes</link>
      <description>Security teams spend enormous effort chasing the latest threats, yet often overlook one of the most revealing sources of truth already in their environment: backups. In this episode of Data Security Decoded, host Caleb Tolin sits down with Kyle Fiehler, Transformation Analyst at Rubrik Zero Labs, to explore why backup data has become a critical — and largely ignored — form of security telemetry.

Kyle explains how secure, immutable backups act as a historical record of attacks that evaded traditional detection tools, capturing digital fingerprints left behind by sophisticated adversaries. From hypervisor-level threats to long-dwell state-backed actors, backups often reveal what endpoint and network tools miss. And attackers know it. As Kyle outlines, ransomware groups like Evil Corp and Storm-0501 deliberately target backups and identity infrastructure to maximize leverage and accelerate payouts.

The conversation also challenges how organizations think about recovery and Mean Time to Response (MTTR). Rather than treating MTTR as a single metric, Kyle advocates breaking recovery into phases — scoping compromise, validating clean recovery, and restoring identity — to pinpoint where resilience actually breaks down. The result is a more actionable, operational view of cyber readiness.

This episode offers a clear message for security and IT leaders alike: resilience isn’t just about preventing attacks. It’s about using every available signal, drilling recovery before incidents occur, and recognizing that backups are no longer passive insurance — they’re active intelligence.



What You’ll Learn


  
Why secure backups function as a record of threats other tools miss



  
How ransomware groups deliberately target backups and identity systems



  
Where organizations commonly fail to extract security value from backup data



  
How to rethink MTTR by breaking recovery into measurable phases



  
Why identity infrastructure is central to modern recovery strategies



  
Three concrete steps to operationalize backup intelligence today



Episode Highlights

[00:00] Backups as Digital Fingerprints Why immutable backups reveal threats that evade traditional security tools.

[04:30] The Telemetry Everyone Ignores How organizations overlook backups as a source of threat intelligence.

[07:45] Who Owns Backup Security? The growing shift from IT ownership to security accountability.

[10:30] MTTR Is Broken Why recovery metrics fail — and how phased recovery fixes that.

[12:45] Threat Actors Targeting Backups How groups like Evil Corp and Storm-0501 maximize leverage.

[15:00] Three Actions Security Teams Can Take Today Practical steps to extract real value from backup data.</description>
      <pubDate>Tue, 17 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Your Backups Are Talking — Are You Listening?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f62a8c8-b4f7-11f0-b4eb-ff2d17643d27/image/19198ab9fbfe521e516031209c8e88f4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Security teams spend enormous effort chasing the latest threats, yet often overlook one of the most revealing sources of truth already in their environment: backups. In this episode of Data Security Decoded, host Caleb Tolin sits down with Kyle Fiehler, Transformation Analyst at Rubrik Zero Labs, to explore why backup data has become a critical — and largely ignored — form of security telemetry.

Kyle explains how secure, immutable backups act as a historical record of attacks that evaded traditional detection tools, capturing digital fingerprints left behind by sophisticated adversaries. From hypervisor-level threats to long-dwell state-backed actors, backups often reveal what endpoint and network tools miss. And attackers know it. As Kyle outlines, ransomware groups like Evil Corp and Storm-0501 deliberately target backups and identity infrastructure to maximize leverage and accelerate payouts.

The conversation also challenges how organizations think about recovery and Mean Time to Response (MTTR). Rather than treating MTTR as a single metric, Kyle advocates breaking recovery into phases — scoping compromise, validating clean recovery, and restoring identity — to pinpoint where resilience actually breaks down. The result is a more actionable, operational view of cyber readiness.

This episode offers a clear message for security and IT leaders alike: resilience isn’t just about preventing attacks. It’s about using every available signal, drilling recovery before incidents occur, and recognizing that backups are no longer passive insurance — they’re active intelligence.



What You’ll Learn


  
Why secure backups function as a record of threats other tools miss



  
How ransomware groups deliberately target backups and identity systems



  
Where organizations commonly fail to extract security value from backup data



  
How to rethink MTTR by breaking recovery into measurable phases



  
Why identity infrastructure is central to modern recovery strategies



  
Three concrete steps to operationalize backup intelligence today



Episode Highlights

[00:00] Backups as Digital Fingerprints Why immutable backups reveal threats that evade traditional security tools.

[04:30] The Telemetry Everyone Ignores How organizations overlook backups as a source of threat intelligence.

[07:45] Who Owns Backup Security? The growing shift from IT ownership to security accountability.

[10:30] MTTR Is Broken Why recovery metrics fail — and how phased recovery fixes that.

[12:45] Threat Actors Targeting Backups How groups like Evil Corp and Storm-0501 maximize leverage.

[15:00] Three Actions Security Teams Can Take Today Practical steps to extract real value from backup data.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Security teams spend enormous effort chasing the latest threats, yet often overlook one of the most revealing sources of truth already in their environment: backups. In this episode of <em>Data Security Decoded</em>, host Caleb Tolin sits down with Kyle Fiehler, Transformation Analyst at Rubrik Zero Labs, to explore why backup data has become a critical — and largely ignored — form of security telemetry.</p>
<p>Kyle explains how secure, immutable backups act as a historical record of attacks that evaded traditional detection tools, capturing digital fingerprints left behind by sophisticated adversaries. From hypervisor-level threats to long-dwell state-backed actors, backups often reveal what endpoint and network tools miss. And attackers know it. As Kyle outlines, ransomware groups like Evil Corp and Storm-0501 deliberately target backups and identity infrastructure to maximize leverage and accelerate payouts.</p>
<p>The conversation also challenges how organizations think about recovery and Mean Time to Response (MTTR). Rather than treating MTTR as a single metric, Kyle advocates breaking recovery into phases — scoping compromise, validating clean recovery, and restoring identity — to pinpoint where resilience actually breaks down. The result is a more actionable, operational view of cyber readiness.</p>
<p>This episode offers a clear message for security and IT leaders alike: resilience isn’t just about preventing attacks. It’s about using every available signal, drilling recovery before incidents occur, and recognizing that backups are no longer passive insurance — they’re active intelligence.</p>
<p><br></p>
<p><strong>What You’ll Learn</strong></p>
<ul>
  <li>
<p>Why secure backups function as a record of threats other tools miss</p>
</li>
  <li>
<p>How ransomware groups deliberately target backups and identity systems</p>
</li>
  <li>
<p>Where organizations commonly fail to extract security value from backup data</p>
</li>
  <li>
<p>How to rethink MTTR by breaking recovery into measurable phases</p>
</li>
  <li>
<p>Why identity infrastructure is central to modern recovery strategies</p>
</li>
  <li>
<p>Three concrete steps to operationalize backup intelligence today</p>
<p><br></p>
<p><strong>Episode Highlights</strong></p>
<p><strong>[00:00] Backups as Digital Fingerprints</strong> Why immutable backups reveal threats that evade traditional security tools.</p>
<p><strong>[04:30] The Telemetry Everyone Ignores</strong> How organizations overlook backups as a source of threat intelligence.</p>
<p><strong>[07:45] Who Owns Backup Security?</strong> The growing shift from IT ownership to security accountability.</p>
<p><strong>[10:30] MTTR Is Broken</strong> Why recovery metrics fail — and how phased recovery fixes that.</p>
<p><strong>[12:45] Threat Actors Targeting Backups</strong> How groups like Evil Corp and Storm-0501 maximize leverage.</p>
<p><strong>[15:00] Three Actions Security Teams Can Take Today</strong> Practical steps to extract real value from backup data.</p>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1020</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f62a8c8-b4f7-11f0-b4eb-ff2d17643d27]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9170066785.mp3?updated=1773755409" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI Moves Fast. Privacy Has to Move Faster.</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/46/notes</link>
      <description>AI promises speed, scale, and efficiency—but it also magnifies privacy risk in ways many organizations aren’t prepared for. In this episode, Caleb Tolin welcomes Ojas Rege of OneTrust for a practical, wide-ranging conversation on how data privacy and governance must evolve alongside enterprise AI adoption.

Ojas explains why AI fundamentally changes the privacy conversation: the same systems that enable organizations to move faster can also cause harm faster when guardrails aren’t in place. From agentic AI systems that dynamically repurpose data to general-purpose models that blur traditional notions of “intended use,” the challenge isn’t just compliance—it’s trust.

The discussion dives deep into purpose limitation under GDPR and the EU AI Act, clarifying where organizations commonly misunderstand consent and where AI training introduces entirely new risks. Ojas emphasizes a simple but powerful test: are you using personal data for the same purpose you originally received consent for—or has AI quietly expanded that purpose?

The conversation then shifts to cloud and data sovereignty, particularly for European organizations navigating geopolitical uncertainty. Ojas outlines why data mapping, prioritization, and software supply chain visibility matter more than ever—and why perfection is less realistic than smart prioritization.

Ultimately, this episode reframes governance as an enabler. When privacy and data governance are embedded early, organizations can innovate faster, build lasting trust, and deploy AI with confidence in an increasingly complex global environment.

What You’ll Learn


  
Why AI scales privacy risk just as fast as business value



  
How purpose limitation breaks down with general-purpose AI models



  
When AI use requires new consent—and when it doesn’t



  
Why transparency is foundational to long-term customer trust



  
How data sovereignty concerns extend beyond cloud providers



  
Where software supply chains create hidden privacy blind spots



  
How good governance can accelerate, not block, AI deployment



Episode Highlights



  
[00:02:00] AI Scales the Good—and the Bad How AI accelerates both innovation and privacy harm.



  
[00:04:00] Purpose Limitation Meets AI Reality Why general-purpose models challenge traditional consent frameworks.



  
[00:06:30] Trust as a Business Risk Why transparency matters as much as legal compliance.



  
[00:07:30] Cloud &amp; Data Sovereignty Explained What European organizations can do today to reduce risk.



  
[00:10:30] The Software Supply Chain Blind Spot Why third parties make sovereignty harder in the AI era.



  
[00:12:30] Data as Economic Power How nations now view citizen data as an AI asset.



[00:14:00] Governance That Enables Speed Why governing early helps organizations move faster later.</description>
      <pubDate>Tue, 03 Mar 2026 08:00:00 -0000</pubDate>
      <itunes:title>AI Moves Fast. Privacy Has to Move Faster.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f4cfa5a-b4f7-11f0-b4eb-e3bdd7881208/image/22738c90505098e6945a22f675a63125.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>AI promises speed, scale, and efficiency—but it also magnifies privacy risk in ways many organizations aren’t prepared for. In this episode, Caleb Tolin welcomes Ojas Rege of OneTrust for a practical, wide-ranging conversation on how data privacy and governance must evolve alongside enterprise AI adoption.

Ojas explains why AI fundamentally changes the privacy conversation: the same systems that enable organizations to move faster can also cause harm faster when guardrails aren’t in place. From agentic AI systems that dynamically repurpose data to general-purpose models that blur traditional notions of “intended use,” the challenge isn’t just compliance—it’s trust.

The discussion dives deep into purpose limitation under GDPR and the EU AI Act, clarifying where organizations commonly misunderstand consent and where AI training introduces entirely new risks. Ojas emphasizes a simple but powerful test: are you using personal data for the same purpose you originally received consent for—or has AI quietly expanded that purpose?

The conversation then shifts to cloud and data sovereignty, particularly for European organizations navigating geopolitical uncertainty. Ojas outlines why data mapping, prioritization, and software supply chain visibility matter more than ever—and why perfection is less realistic than smart prioritization.

Ultimately, this episode reframes governance as an enabler. When privacy and data governance are embedded early, organizations can innovate faster, build lasting trust, and deploy AI with confidence in an increasingly complex global environment.

What You’ll Learn


  
Why AI scales privacy risk just as fast as business value



  
How purpose limitation breaks down with general-purpose AI models



  
When AI use requires new consent—and when it doesn’t



  
Why transparency is foundational to long-term customer trust



  
How data sovereignty concerns extend beyond cloud providers



  
Where software supply chains create hidden privacy blind spots



  
How good governance can accelerate, not block, AI deployment



Episode Highlights



  
[00:02:00] AI Scales the Good—and the Bad How AI accelerates both innovation and privacy harm.



  
[00:04:00] Purpose Limitation Meets AI Reality Why general-purpose models challenge traditional consent frameworks.



  
[00:06:30] Trust as a Business Risk Why transparency matters as much as legal compliance.



  
[00:07:30] Cloud &amp; Data Sovereignty Explained What European organizations can do today to reduce risk.



  
[00:10:30] The Software Supply Chain Blind Spot Why third parties make sovereignty harder in the AI era.



  
[00:12:30] Data as Economic Power How nations now view citizen data as an AI asset.



[00:14:00] Governance That Enables Speed Why governing early helps organizations move faster later.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AI promises speed, scale, and efficiency—but it also magnifies privacy risk in ways many organizations aren’t prepared for. In this episode, <a href="https://www.linkedin.com/in/calebtolin/">Caleb Tolin</a> welcomes <a href="https://www.linkedin.com/in/ojasrege/">Ojas Rege</a> of <a href="https://www.linkedin.com/company/onetrust/">OneTrust</a> for a practical, wide-ranging conversation on how data privacy and governance must evolve alongside enterprise AI adoption.</p>
<p>Ojas explains why AI fundamentally changes the privacy conversation: the same systems that enable organizations to move faster can also cause harm faster when guardrails aren’t in place. From agentic AI systems that dynamically repurpose data to general-purpose models that blur traditional notions of “intended use,” the challenge isn’t just compliance—it’s trust.</p>
<p>The discussion dives deep into purpose limitation under GDPR and the EU AI Act, clarifying where organizations commonly misunderstand consent and where AI training introduces entirely new risks. Ojas emphasizes a simple but powerful test: are you using personal data for the same purpose you originally received consent for—or has AI quietly expanded that purpose?</p>
<p>The conversation then shifts to cloud and data sovereignty, particularly for European organizations navigating geopolitical uncertainty. Ojas outlines why data mapping, prioritization, and software supply chain visibility matter more than ever—and why perfection is less realistic than smart prioritization.</p>
<p>Ultimately, this episode reframes governance as an enabler. When privacy and data governance are embedded early, organizations can innovate faster, build lasting trust, and deploy AI with confidence in an increasingly complex global environment.</p>
<p><br><strong>What You’ll Learn</strong></p>
<ul>
  <li>
<p><em>Why AI scales privacy risk just as fast as business value</em></p>
</li>
  <li>
<p><em>How purpose limitation breaks down with general-purpose AI models</em></p>
</li>
  <li>
<p><em>When AI use requires new consent—and when it doesn’t</em></p>
</li>
  <li>
<p><em>Why transparency is foundational to long-term customer trust</em></p>
</li>
  <li>
<p><em>How data sovereignty concerns extend beyond cloud providers</em></p>
</li>
  <li>
<p><em>Where software supply chains create hidden privacy blind spots</em></p>
</li>
  <li>
<p><em>How good governance can accelerate, not block, AI deployment</em></p>
<p><br></p>
<p><strong>Episode Highlights</strong></p>
</li>
  <li>
<p><strong>[00:02:00] AI Scales the Good—and the Bad</strong><em> How AI accelerates both innovation and privacy harm.</em></p>
</li>
  <li>
<p><strong>[00:04:00] Purpose Limitation Meets AI Reality</strong><em> Why general-purpose models challenge traditional consent frameworks.</em></p>
</li>
  <li>
<p><strong>[00:06:30] Trust as a Business Risk</strong><em> Why transparency matters as much as legal compliance.</em></p>
</li>
  <li>
<p><strong>[00:07:30] Cloud &amp; Data Sovereignty Explained</strong><em> What European organizations can do today to reduce risk.</em></p>
</li>
  <li>
<p><strong>[00:10:30] The Software Supply Chain Blind Spot</strong><em> Why third parties make sovereignty harder in the AI era.</em></p>
</li>
  <li>
<p><strong>[00:12:30] Data as Economic Power</strong><em> How nations now view citizen data as an AI asset.</em></p>
</li>
<p><strong>[00:14:00] Governance That Enables Speed</strong><em> Why governing early helps organizations move faster later.</em></p>
</ul>]]>
      </content:encoded>
      <itunes:duration>1519</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f4cfa5a-b4f7-11f0-b4eb-e3bdd7881208]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1392899602.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Real Risks of Agentic AI in the Enterprise</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/45/notes</link>
      <description>As enterprises race to adopt AI, many are discovering that traditional security models no longer hold. In this episode of Data Security Decoded, host Caleb Tolin is joined by Camille Stewart-Gloster, CEO of CAS Strategies and former Deputy National Cyber Director, to unpack how AI is redefining cyber risk at every layer of the organization.

Camille explains why identity-based attacks are so effective and how non-human identities (from APIs to AI agents) are quietly expanding the attack surface. She emphasized how critical MFA is for organizations to enable as they scale up AI operations., and why conditional access and governance must be foundational, not optional.

The conversation also tackles ethical AI head-on. Camille argues that AI ethics and AI security are inseparable, and that removing humans from the loop introduces both legal and operational risk. From shadow AI to agent autonomy, she offers a clear-eyed framework for deploying AI systems that augment human teams rather than replace them.

This episode is a practical guide for security leaders and learners navigating AI adoption, focused on resilience, trust, and long-term enterprise readiness.

What You’ll Learn


  
Why identity has become the dominant attack surface



  
How AI agents and non-human identities increase risk



  
Where EDR falls short in Identity-driven attacks



  
Why AI ethics is foundational to AI security



  
How governance enables secure AI deployment



  
When AI should augment—not replace—security teams



Episode Highlights

[00:03:00] Cyber offense and the evolving national strategy

[00:07:30] Identity eclipses malware as the primary threat

[00:10:00] AI systems as high-value targets

[00:12:30] Human judgment vs. automated response

[00:14:00] The ethics–security connection

[00:15:30] Why AI governance can’t be an afterthought</description>
      <pubDate>Tue, 17 Feb 2026 10:00:00 -0000</pubDate>
      <itunes:title>The Real Risks of Agentic AI in the Enterprise</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/43e3ec66-05f1-11f1-934f-2f3cc5c0b813/image/313096f1f18d058c65ea0848ca6e4e79.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As enterprises race to adopt AI, many are discovering that traditional security models no longer hold. In this episode of Data Security Decoded, host Caleb Tolin is joined by Camille Stewart-Gloster, CEO of CAS Strategies and former Deputy National Cyber Director, to unpack how AI is redefining cyber risk at every layer of the organization.

Camille explains why identity-based attacks are so effective and how non-human identities (from APIs to AI agents) are quietly expanding the attack surface. She emphasized how critical MFA is for organizations to enable as they scale up AI operations., and why conditional access and governance must be foundational, not optional.

The conversation also tackles ethical AI head-on. Camille argues that AI ethics and AI security are inseparable, and that removing humans from the loop introduces both legal and operational risk. From shadow AI to agent autonomy, she offers a clear-eyed framework for deploying AI systems that augment human teams rather than replace them.

This episode is a practical guide for security leaders and learners navigating AI adoption, focused on resilience, trust, and long-term enterprise readiness.

What You’ll Learn


  
Why identity has become the dominant attack surface



  
How AI agents and non-human identities increase risk



  
Where EDR falls short in Identity-driven attacks



  
Why AI ethics is foundational to AI security



  
How governance enables secure AI deployment



  
When AI should augment—not replace—security teams



Episode Highlights

[00:03:00] Cyber offense and the evolving national strategy

[00:07:30] Identity eclipses malware as the primary threat

[00:10:00] AI systems as high-value targets

[00:12:30] Human judgment vs. automated response

[00:14:00] The ethics–security connection

[00:15:30] Why AI governance can’t be an afterthought</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As enterprises race to adopt AI, many are discovering that traditional security models no longer hold. In this episode of <em>Data Security Decoded</em>, host <a href="https://www.linkedin.com/in/calebtolin/"><u>Caleb Tolin</u></a> is joined by <a href="https://www.linkedin.com/in/camillestewartesq/"><u>Camille Stewart-Gloster</u></a>, CEO of <a href="https://www.cas-strategies.com/"><u>CAS Strategies </u></a>and former Deputy National Cyber Director, to unpack how AI is redefining cyber risk at every layer of the organization.</p>
<p>Camille explains why identity-based attacks are so effective and how non-human identities (from APIs to AI agents) are quietly expanding the attack surface. She emphasized how critical MFA is for organizations to enable as they scale up AI operations., and why conditional access and governance must be foundational, not optional.</p>
<p>The conversation also tackles ethical AI head-on. Camille argues that AI ethics and AI security are inseparable, and that removing humans from the loop introduces both legal and operational risk. From shadow AI to agent autonomy, she offers a clear-eyed framework for deploying AI systems that augment human teams rather than replace them.</p>
<p>This episode is a practical guide for security leaders and learners navigating AI adoption, focused on resilience, trust, and long-term enterprise readiness.</p>
<p><br><strong>What You’ll Learn</strong></p>
<ul>
  <li>
<p>Why identity has become the dominant attack surface</p>
</li>
  <li>
<p>How AI agents and non-human identities increase risk</p>
</li>
  <li>
<p>Where EDR falls short in Identity-driven attacks</p>
</li>
  <li>
<p>Why AI ethics is foundational to AI security</p>
</li>
  <li>
<p>How governance enables secure AI deployment</p>
</li>
  <li>
<p>When AI should augment—not replace—security teams</p>
<p><br></p>
<p><strong>Episode Highlights</strong></p>
<p><strong>[00:03:00]</strong> Cyber offense and the evolving national strategy</p>
<p><strong>[00:07:30]</strong> Identity eclipses malware as the primary threat</p>
<p><strong>[00:10:00]</strong> AI systems as high-value targets</p>
<p><strong>[00:12:30]</strong> Human judgment vs. automated response</p>
<p><strong>[00:14:00]</strong> The ethics–security connection</p>
<p><strong>[00:15:30]</strong> Why AI governance can’t be an afterthought</p>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1640</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43e3ec66-05f1-11f1-934f-2f3cc5c0b813]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6255187015.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When Hacktivists Target Water Utilities: Inside a Russian-Aligned OT Attack </title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/44/notes</link>
      <description>Russian-aligned hacktivist groups are increasingly targeting industrial control systems and OT environments—and sometimes it’s shockingly easy. In this episode, Daniel dos Santos, VP of Research at Forescout, walks through how his team used a honeypot to observe an attack against a simulated water treatment facility. We explore attacker motivations, common entry points, and what defenders must prioritize now.



What You’ll Learn


  
How honeypots can uncover real-world hacktivist tactics and behaviors



  
Why exposed HMIs remain one of the weakest entry points in OT environments



  
How Telegram has become a primary platform for hacktivist attack claims



  
The evolving motivations behind Russian-aligned hacktivist groups



  
Why visibility across all networked devices is critical to defense



  
How opportunistic attacks differ from targeted nation-state operations



  
Practical steps to avoid becoming “easy prey” for attackers



Episode Highlights

00:02:30 – How the Attack Was Discovered Spotting the honeypot activity through Telegram claims00:04:00 – The Entry Point Explained Default credentials and exposed HMIs00:06:45 – Hacktivist Motivation Shift From activism to geopolitics and profit00:10:50 – Why OT Attacks Are Hard to Eradicate Hidden devices and lateral movement

00:14:20 – The Core Defensive Takeaway Don’t ignore opportunistic threats



Episode Resources

Forescout Research ReportsTelegram (hacktivist communications platform)Canadian Government OT Security Alert

Shodan (internet-exposed asset scanning tool)</description>
      <pubDate>Tue, 03 Feb 2026 10:00:00 -0000</pubDate>
      <itunes:title>When Hacktivists Target Water Utilities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93c907d6-fadc-11f0-8268-3708c2819521/image/3ada71220a1ceafce9f2ba5bdc364063.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle> Inside a Russian-Aligned OT Attack with Daniel dos Santos</itunes:subtitle>
      <itunes:summary>Russian-aligned hacktivist groups are increasingly targeting industrial control systems and OT environments—and sometimes it’s shockingly easy. In this episode, Daniel dos Santos, VP of Research at Forescout, walks through how his team used a honeypot to observe an attack against a simulated water treatment facility. We explore attacker motivations, common entry points, and what defenders must prioritize now.



What You’ll Learn


  
How honeypots can uncover real-world hacktivist tactics and behaviors



  
Why exposed HMIs remain one of the weakest entry points in OT environments



  
How Telegram has become a primary platform for hacktivist attack claims



  
The evolving motivations behind Russian-aligned hacktivist groups



  
Why visibility across all networked devices is critical to defense



  
How opportunistic attacks differ from targeted nation-state operations



  
Practical steps to avoid becoming “easy prey” for attackers



Episode Highlights

00:02:30 – How the Attack Was Discovered Spotting the honeypot activity through Telegram claims00:04:00 – The Entry Point Explained Default credentials and exposed HMIs00:06:45 – Hacktivist Motivation Shift From activism to geopolitics and profit00:10:50 – Why OT Attacks Are Hard to Eradicate Hidden devices and lateral movement

00:14:20 – The Core Defensive Takeaway Don’t ignore opportunistic threats



Episode Resources

Forescout Research ReportsTelegram (hacktivist communications platform)Canadian Government OT Security Alert

Shodan (internet-exposed asset scanning tool)</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian-aligned hacktivist groups are increasingly targeting industrial control systems and OT environments—and sometimes it’s shockingly easy. In this episode, <a href="https://www.linkedin.com/in/danielricardosantos/"><u>Daniel dos Santos</u></a>, VP of Research at <a href="https://www.forescout.com/"><u>Forescout</u></a>, walks through how his team used a honeypot to observe an attack against a simulated water treatment facility. We explore attacker motivations, common entry points, and what defenders must prioritize now.</p>
<p><br></p>
<p><strong>What You’ll Learn</strong></p>
<ul>
  <li>
<p>How honeypots can uncover real-world hacktivist tactics and behaviors</p>
</li>
  <li>
<p>Why exposed HMIs remain one of the weakest entry points in OT environments</p>
</li>
  <li>
<p>How Telegram has become a primary platform for hacktivist attack claims</p>
</li>
  <li>
<p>The evolving motivations behind Russian-aligned hacktivist groups</p>
</li>
  <li>
<p>Why visibility across <em>all</em> networked devices is critical to defense</p>
</li>
  <li>
<p>How opportunistic attacks differ from targeted nation-state operations</p>
</li>
  <li>
<p>Practical steps to avoid becoming “easy prey” for attackers</p>
<p><br></p>
<p><strong>Episode Highlights</strong></p>
<p><strong>00:02:30 – How the Attack Was Discovered</strong> Spotting the honeypot activity through Telegram claims<br><strong>00:04:00 – The Entry Point Explained</strong> Default credentials and exposed HMIs<br><strong>00:06:45 – Hacktivist Motivation Shift</strong> From activism to geopolitics and profit<br><strong>00:10:50 – Why OT Attacks Are Hard to Eradicate</strong> Hidden devices and lateral movement</p>
<p><strong>00:14:20 – The Core Defensive Takeaway</strong> Don’t ignore opportunistic threats</p>
<p><br></p>
<p><strong>Episode Resources</strong></p>
<p><strong></strong><a href="https://www.forescout.com/threat-briefings/"><u>Forescout Research Reports</u><br></a><a href="https://telegram.org/"><u>Telegram</u></a> (hacktivist communications platform)<br><a href="https://www.cyber.gc.ca/en"><u>Canadian Government OT Security Alert</u><br></a></p>
<p><a href="https://www.shodan.io/"><u>Shodan</u></a> (internet-exposed asset scanning tool)</p>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1187</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93c907d6-fadc-11f0-8268-3708c2819521]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9762913572.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Rubrik Zero Labs Uses LLMs to Analyze Malware at Machine Speed</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/43/notes</link>
      <description>AI is changing how malware is built—and how it’s caught. In this episode, Caleb Tolin is joined by Amit Malik, Staff Security Researcher at Rubrik Zero Labs, to unpack how large language models are transforming malware analysis, enabling defenders to sift through thousands of samples and surface truly novel threats. From Chameleon malware abusing WSL to AI-generated attack code, this conversation explores what real data resilience looks like in an AI-driven threat landscape.



What You’ll Learn

  
How LLMs help analysts move from syntax-level review to intent-based malware analysis



  
Why processing thousands of samples daily requires AI-assisted triage and clustering



  
How attackers are abusing WSL and cloud-native environments to evade detection

What AI-generated, dynamically delivered malware code means for traditional defenses



  
Where LLMs excel—and where human validation remains essential

Why resilience matters more than speed in AI-driven security operations



Episode Highlights



[00:00] AI-generated malware and shrinking attacker footprints

[03:30] Why Rubrik Zero Labs built an LLM-driven malware analysis system

[05:45] Scaling from 6,000 samples to 20 worth investigating[07:40] Extracting malware “business logic” before sending code to LLMs 

[10:05] Chameleon malware abusing Windows Subsystem for Linux

[13:00] APT-linked Linux RATs and what sophistication signals intent

[15:00] LLM hallucinations and the need for human verification



Episode Resources


  
Rubrik Zero Labs Research Reports</description>
      <pubDate>Tue, 20 Jan 2026 09:59:00 -0000</pubDate>
      <itunes:title>How Rubrik Zero Labs Uses LLMs to Analyze Malware at Machine Speed</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f0bbff4-b4f7-11f0-b4eb-6fffb8b69ea3/image/dcdfa5b47482c438ee5a8ce3c4194a3b.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>AI is changing how malware is built—and how it’s caught. In this episode, Caleb Tolin is joined by Amit Malik, Staff Security Researcher at Rubrik Zero Labs, to unpack how large language models are transforming malware analysis, enabling defenders to sift through thousands of samples and surface truly novel threats. From Chameleon malware abusing WSL to AI-generated attack code, this conversation explores what real data resilience looks like in an AI-driven threat landscape.



What You’ll Learn

  
How LLMs help analysts move from syntax-level review to intent-based malware analysis



  
Why processing thousands of samples daily requires AI-assisted triage and clustering



  
How attackers are abusing WSL and cloud-native environments to evade detection

What AI-generated, dynamically delivered malware code means for traditional defenses



  
Where LLMs excel—and where human validation remains essential

Why resilience matters more than speed in AI-driven security operations



Episode Highlights



[00:00] AI-generated malware and shrinking attacker footprints

[03:30] Why Rubrik Zero Labs built an LLM-driven malware analysis system

[05:45] Scaling from 6,000 samples to 20 worth investigating[07:40] Extracting malware “business logic” before sending code to LLMs 

[10:05] Chameleon malware abusing Windows Subsystem for Linux

[13:00] APT-linked Linux RATs and what sophistication signals intent

[15:00] LLM hallucinations and the need for human verification



Episode Resources


  
Rubrik Zero Labs Research Reports</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AI is changing how malware is built—and how it’s caught. In this episode, <a href="https://www.linkedin.com/in/calebtolin/"><u>Caleb Tolin</u></a> is joined by <a href="https://www.linkedin.com/in/doublezer0/"><u>Amit Malik</u></a>, Staff Security Researcher at <a href="https://zerolabs.rubrik.com/"><u>Rubrik Zero Labs</u></a>, to unpack how large language models are transforming malware analysis, enabling defenders to sift through thousands of samples and surface truly novel threats. From Chameleon malware abusing WSL to AI-generated attack code, this conversation explores what real data resilience looks like in an AI-driven threat landscape.</p>
<p><br></p>
<p><strong>What You’ll Learn</strong></p>
  <li>
<p>How LLMs help analysts move from syntax-level review to intent-based malware analysis</p>
</li>
  <li>
<p>Why processing thousands of samples daily requires AI-assisted triage and clustering</p>
</li>
  <li>
<p>How attackers are abusing WSL and cloud-native environments to evade detection</p>
<p>What AI-generated, dynamically delivered malware code means for traditional defenses</p>
</li>
  <li>
<p>Where LLMs excel—and where human validation remains essential</p>
<p>Why resilience matters more than speed in AI-driven security operations</p>
<p><br></p>
<p><strong>Episode Highlights</strong></p>
<p><br></p>
<p><strong>[00:00]</strong> AI-generated malware and shrinking attacker footprints</p>
<p><strong>[03:30]</strong> Why Rubrik Zero Labs built an LLM-driven malware analysis system</p>
<p><strong>[05:45]</strong> Scaling from 6,000 samples to 20 worth investigating<br><strong>[07:40]</strong> Extracting malware “business logic” before sending code to LLMs </p>
<p><strong>[10:05]</strong> Chameleon malware abusing Windows Subsystem for Linux</p>
<p><strong>[13:00]</strong> APT-linked Linux RATs and what sophistication signals intent</p>
<p><strong>[15:00]</strong> LLM hallucinations and the need for human verification</p>
<p><br></p>
<p><strong>Episode Resources</strong></p>
<ul>
  <li>
<p><a href="https://zerolabs.rubrik.com/reports"><u>Rubrik Zero Labs Research Reports</u></a></p>
</li>
</ul>
</li>]]>
      </content:encoded>
      <itunes:duration>1466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f0bbff4-b4f7-11f0-b4eb-6fffb8b69ea3]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8326560375.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Ransomware, Remote Access, and the OT Reality Check</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/42/notes</link>
      <description>In this episode of Data Security Decoded, Cybersecurity veteran Dawn Cappelli joins host Caleb Tolin to unpack the rapidly evolving threat landscape facing operational technology environments. With decades of experience spanning CERT, Rockwell Automation, and now Dragos, Dawn breaks down how geopolitical conflicts, empowered hacktivists, and ransomware are reshaping OT risk. She shares the five critical ICS controls every organization should prioritize and discusses why community-driven defense models are now essential for resilience. A must-listen for leaders responsible for critical infrastructure, manufacturing, and industrial cybersecurity.



What you'll learn:


  How global conflicts have dissolved previous norms that protected critical infrastructure from cyber retaliation.

  Why hacktivist groups are becoming more dangerous — and how state actors quietly support them.

  The five highest-impact ICS security controls and where most organizations fail.

  Why OT environments remain decades behind IT security — and what leaders must immediately address.

  How ransomware operators target manufacturing and critical infrastructure for maximum leverage.

  The risks of insecure remote access and unmanaged third-party connections.

  How OT-CERT and community defense can uplift organizations with limited resources.


Episode Highlights:

00:00 – Opening + Guest Introduction Caleb introduces Dawn and frames her decades of OT and insider threat leadership.

02:00 – Dawn’s Early Journey into OT and Security How nuclear engineering, the CDC bioterrorism portal, and 9/11 sparked her cybersecurity mission.

05:00 – Founding the CERT Insider Threat Center Inside the origin story and its impact on insider risk theory.

07:00 – Moving to Rockwell: The Hidden OT Backdoor Risk Why insider sabotage in OT environments was a turning point in her career.

08:00 – The Geopolitical Shift in OT Threats How Russia–Ukraine changed everything about attacking critical infrastructure.

10:00 – The Rise of State-Aligned Hacktivists Why groups like Cyber Avengers now have real disruption capability.

13:00 – The SANS Five ICS Controls Dawn breaks down the controls that prevent and detect most attacks.

17:00 – Ransomware Trends in OT Why manufacturing is a prime target and how attacks are evolving.

19:00 – The Promise and Peril of Agentic AI in OT Why autonomous agents could cause catastrophic outcomes.

21:00 – OT-CERT: Free Global Resources How Dragos is empowering organizations worldwide with practical support.



Episode Resources:


  Information on OT-CERT: OT-CERT


  Register for OT-CERT: Register for Dragos OT-CERT | Dragos


  Information on Community Defense Program: Community Defense Program | Dragos


  Register for Community Defense Program: Register for Dragos Community Defense Program | Dragos


  SANS Five ICS Cybersecurity Critical Controls: The Five ICS Cybersecurity Critical Controls</description>
      <pubDate>Tue, 06 Jan 2026 09:59:00 -0000</pubDate>
      <itunes:title> Ransomware, Remote Access, and the OT Reality Check</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ef56e7a-b4f7-11f0-b4eb-5b508bcc6ee3/image/693dd521b4b70a9ec30d2dea42e56956.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>In this episode of Data Security Decoded, Cybersecurity veteran Dawn Cappelli joins host Caleb Tolin to unpack the rapidly evolving threat landscape facing operational technology environments. With decades of experience spanning CERT, Rockwell Automation, and now Dragos, Dawn breaks down how geopolitical conflicts, empowered hacktivists, and ransomware are reshaping OT risk. She shares the five critical ICS controls every organization should prioritize and discusses why community-driven defense models are now essential for resilience. A must-listen for leaders responsible for critical infrastructure, manufacturing, and industrial cybersecurity.



What you'll learn:


  How global conflicts have dissolved previous norms that protected critical infrastructure from cyber retaliation.

  Why hacktivist groups are becoming more dangerous — and how state actors quietly support them.

  The five highest-impact ICS security controls and where most organizations fail.

  Why OT environments remain decades behind IT security — and what leaders must immediately address.

  How ransomware operators target manufacturing and critical infrastructure for maximum leverage.

  The risks of insecure remote access and unmanaged third-party connections.

  How OT-CERT and community defense can uplift organizations with limited resources.


Episode Highlights:

00:00 – Opening + Guest Introduction Caleb introduces Dawn and frames her decades of OT and insider threat leadership.

02:00 – Dawn’s Early Journey into OT and Security How nuclear engineering, the CDC bioterrorism portal, and 9/11 sparked her cybersecurity mission.

05:00 – Founding the CERT Insider Threat Center Inside the origin story and its impact on insider risk theory.

07:00 – Moving to Rockwell: The Hidden OT Backdoor Risk Why insider sabotage in OT environments was a turning point in her career.

08:00 – The Geopolitical Shift in OT Threats How Russia–Ukraine changed everything about attacking critical infrastructure.

10:00 – The Rise of State-Aligned Hacktivists Why groups like Cyber Avengers now have real disruption capability.

13:00 – The SANS Five ICS Controls Dawn breaks down the controls that prevent and detect most attacks.

17:00 – Ransomware Trends in OT Why manufacturing is a prime target and how attacks are evolving.

19:00 – The Promise and Peril of Agentic AI in OT Why autonomous agents could cause catastrophic outcomes.

21:00 – OT-CERT: Free Global Resources How Dragos is empowering organizations worldwide with practical support.



Episode Resources:


  Information on OT-CERT: OT-CERT


  Register for OT-CERT: Register for Dragos OT-CERT | Dragos


  Information on Community Defense Program: Community Defense Program | Dragos


  Register for Community Defense Program: Register for Dragos Community Defense Program | Dragos


  SANS Five ICS Cybersecurity Critical Controls: The Five ICS Cybersecurity Critical Controls</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Data Security Decoded</em>, Cybersecurity veteran <a href="https://www.linkedin.com/in/dawn-cappelli-cissp-a329505/">Dawn Cappelli</a> joins host <a href="https://www.linkedin.com/in/calebtolin/">Caleb Tolin</a> to unpack the rapidly evolving threat landscape facing operational technology environments. With decades of experience spanning CERT, Rockwell Automation, and now Dragos, Dawn breaks down how geopolitical conflicts, empowered hacktivists, and ransomware are reshaping OT risk. She shares the five critical ICS controls every organization should prioritize and discusses why community-driven defense models are now essential for resilience. A must-listen for leaders responsible for critical infrastructure, manufacturing, and industrial cybersecurity.</p>
<p><br></p>
<p><strong>What you'll learn:</strong></p>
<ul>
  <li>How global conflicts have dissolved previous norms that protected critical infrastructure from cyber retaliation.</li>
  <li>Why hacktivist groups are becoming more dangerous — and how state actors quietly support them.</li>
  <li>The five highest-impact ICS security controls and where most organizations fail.</li>
  <li>Why OT environments remain decades behind IT security — and what leaders must immediately address.</li>
  <li>How ransomware operators target manufacturing and critical infrastructure for maximum leverage.</li>
  <li>The risks of insecure remote access and unmanaged third-party connections.</li>
  <li>How OT-CERT and community defense can uplift organizations with limited resources.</li>
</ul>
<p><strong>Episode Highlights:</strong></p>
<p><strong>00:00 – Opening + Guest Introduction</strong> Caleb introduces Dawn and frames her decades of OT and insider threat leadership.</p>
<p><strong>02:00 – Dawn’s Early Journey into OT and Security</strong> How nuclear engineering, the CDC bioterrorism portal, and 9/11 sparked her cybersecurity mission.</p>
<p><strong>05:00 – Founding the CERT Insider Threat Center</strong> Inside the origin story and its impact on insider risk theory.</p>
<p><strong>07:00 – Moving to Rockwell: The Hidden OT Backdoor Risk</strong> Why insider sabotage in OT environments was a turning point in her career.</p>
<p><strong>08:00 – The Geopolitical Shift in OT Threats</strong> How Russia–Ukraine changed everything about attacking critical infrastructure.</p>
<p><strong>10:00 – The Rise of State-Aligned Hacktivists</strong> Why groups like Cyber Avengers now have real disruption capability.</p>
<p><strong>13:00 – The SANS Five ICS Controls</strong> Dawn breaks down the controls that prevent and detect most attacks.</p>
<p><strong>17:00 – Ransomware Trends in OT</strong> Why manufacturing is a prime target and how attacks are evolving.</p>
<p><strong>19:00 – The Promise and Peril of Agentic AI in OT</strong> Why autonomous agents could cause catastrophic outcomes.</p>
<p><strong>21:00 – OT-CERT: Free Global Resources</strong> How Dragos is empowering organizations worldwide with practical support.</p>
<p><br></p>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Information on OT-CERT: <a href="https://www.dragos.com/community/ot-cert">OT-CERT</a>
</li>
  <li>Register for OT-CERT: <a href="https://www.dragos.com/community/ot-cert/registration">Register for Dragos OT-CERT | Dragos</a>
</li>
  <li>Information on Community Defense Program: <a href="https://www.dragos.com/community/community-defense-program">Community Defense Program | Dragos</a>
</li>
  <li>Register for Community Defense Program: <a href="https://www.dragos.com/community/community-defense-program/registration">Register for Dragos Community Defense Program | Dragos</a>
</li>
  <li>SANS Five ICS Cybersecurity Critical Controls: <a href="https://www.sans.org/white-papers/five-ics-cybersecurity-critical-controls">The Five ICS Cybersecurity Critical Controls</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1666</itunes:duration>
      <guid isPermaLink="false"><![CDATA[6ef56e7a-b4f7-11f0-b4eb-5b508bcc6ee3]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW5732676097.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Hidden Risk in Your Stack</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/41/notes</link>
      <description>In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk.

What You’ll Learn 


  
How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions.



  
Why dependency chains dramatically amplify both exposure and attacker leverage.



  
How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption.



  
Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns.



  
Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture.



Episode Highlights 

00:00 — Welcome + Why Software Supply Chain Risk Matters 

02:00 — Hayden’s Non-Cyber Passion + Framing Today’s Topic 

03:00 — Why Open Source Powers Everything—and Why That Creates Exposure 

06:00 — The Real Attack Vector: Contribution as Initial Access 

08:00 — Inside the Indonesian “Fake Package” Campaign 

10:30 — How to Evaluate Code + Contributor Identity Together 

12:00 — Threat Hunting and AI-Enabled Code Interrogation 

15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components 

16:30 — How Recovery Works When Malware Is Already in Your Stack

19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security 

22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices 

24:00 — Where to Learn More About Hunted Labs



Episode Resources


  
Hunted Labs — https://huntedlabs.com



  
Hunted Labs Entercept



  
Hunted Labs “Hunting Ground” research blog



  
Open Source Malware (Paul McCarty)</description>
      <pubDate>Tue, 16 Dec 2025 10:00:00 -0000</pubDate>
      <itunes:title>The Hidden Risk in Your Stack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ee1ac78-b4f7-11f0-b4eb-df0eb934d24a/image/5f1028ae9326e13e44c1be8b0d4f87e2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle> Open Source Supply Chain Exposure</itunes:subtitle>
      <itunes:summary>In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk.

What You’ll Learn 


  
How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions.



  
Why dependency chains dramatically amplify both exposure and attacker leverage.



  
How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption.



  
Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns.



  
Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture.



Episode Highlights 

00:00 — Welcome + Why Software Supply Chain Risk Matters 

02:00 — Hayden’s Non-Cyber Passion + Framing Today’s Topic 

03:00 — Why Open Source Powers Everything—and Why That Creates Exposure 

06:00 — The Real Attack Vector: Contribution as Initial Access 

08:00 — Inside the Indonesian “Fake Package” Campaign 

10:30 — How to Evaluate Code + Contributor Identity Together 

12:00 — Threat Hunting and AI-Enabled Code Interrogation 

15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components 

16:30 — How Recovery Works When Malware Is Already in Your Stack

19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security 

22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices 

24:00 — Where to Learn More About Hunted Labs



Episode Resources


  
Hunted Labs — https://huntedlabs.com



  
Hunted Labs Entercept



  
Hunted Labs “Hunting Ground” research blog



  
Open Source Malware (Paul McCarty)</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Data Security Decoded</em>, host <a href="https://www.linkedin.com/in/calebtolin/"><u>Caleb Tolin</u></a> sits down with <a href="https://www.linkedin.com/in/hayden-smith-huntedlabs/"><u>Hayden Smith</u></a>, CEO of <a href="https://huntedlabs.com/"><u>Hunted Labs</u></a>, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk.</p>
<p><br><strong>What You’ll Learn </strong></p>
<ul>
  <li>
<p>How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions.<br></p>
</li>
  <li>
<p>Why dependency chains dramatically amplify both exposure and attacker leverage.<br></p>
</li>
  <li>
<p>How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption.<br></p>
</li>
  <li>
<p>Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns.<br></p>
</li>
  <li>
<p>Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture.</p>
<p><br></p>
<p><strong>Episode Highlights </strong></p>
<p>00:00 — Welcome + Why Software Supply Chain Risk Matters </p>
<p>02:00 — Hayden’s Non-Cyber Passion + Framing Today’s Topic </p>
<p>03:00 — Why Open Source Powers Everything—and Why That Creates Exposure </p>
<p>06:00 — The Real Attack Vector: Contribution as Initial Access </p>
<p>08:00 — Inside the Indonesian “Fake Package” Campaign </p>
<p>10:30 — How to Evaluate Code + Contributor Identity Together </p>
<p>12:00 — Threat Hunting and AI-Enabled Code Interrogation </p>
<p>15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components </p>
<p>16:30 — How Recovery Works When Malware Is Already in Your Stack</p>
<p>19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security </p>
<p>22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices </p>
<p>24:00 — Where to Learn More About Hunted Labs</p>
<p><br></p>
<p><strong>Episode Resources</strong></p>
<ul>
  <li>
<p>Hunted Labs —<a href="https://huntedlabs.com"> <u>https://huntedlabs.com</u><br></a></p>
</li>
  <li>
<p><a href="https://huntedlabs.com/container-security/?gad_source=1&amp;gad_campaignid=22446051098&amp;gbraid=0AAAAAo7VeyjhRTADzEWEi_Lnf6j82Vq-z&amp;gclid=CjwKCAiAuIDJBhBoEiwAxhgyFvvxShHuPj87SP5anXULPjuYz3p_ry5NkttAYKtqBnRqoooOaGYDcxoC5bsQAvD_BwE"><u>Hunted Labs Entercept</u><br></a></p>
</li>
  <li>
<p><a href="https://huntedlabs.com/the-hunting-ground/"><u>Hunted Labs “Hunting Ground” research blog</u><br></a></p>
</li>
  <li>
<p><a href="https://opensourcemalware.com/"><u>Open Source Malware (Paul McCarty)</u></a></p>
</li>
</ul>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1632</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ee1ac78-b4f7-11f0-b4eb-df0eb934d24a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7279424822.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Top CISO Priorities and Global Digital Trust with Morgan Adamski</title>
      <description>Welcome to Data Security Decoded. Join host Caleb Tolin in conversation with Morgan Adamski who leads Cyber, Data, and Tech Risk at PwC and is a former US national security leader who spent 16 years tracking nation-state threats inside the US government. Coming out of a career spent inside secure facilities without windows or phones and working to address China’s prepositioning in US critical infrastructure, Morgan shares a direct view of how geopolitics is now shaping cyber risk decisions in boardrooms.

What You'll Learn:


  
Why only 24% invest in proactive defense, even while 60% call cyber a top priority



  
How AI agents are cutting breach timelines to under 80 days



  
Why cyber insurance is now a hygiene scorecard, not just financial protection



  
The real reason leaders lack confidence in resilience



  
Where legacy systems and supply chain dependencies expose blind spots



  
How public–private collaboration changed the response to China’s infrastructure campaign



  
What CISOs must confront now to avoid being blindsided by the next crisis




The conversation gives security leaders and decision-makers a clear view of where current strategies fall short and the choices required to build real resilience before the next crisis forces it.

Episode Highlights:

[03:43] Why China prepositions inside US critical infrastructure to trigger disruption and panic in a crisis

[04:20] Collective defense in action: how victims and industry exposed the campaign

[09:27] The truth behind cyber budgets: only 24% invest in proactive defense

[11:57] How AI agents are shortening breach lifecycles to under 80 days

[13:07] Why cyber insurance is now a security scorecard, not a safety net

Episode Resources


  
Caleb Tolin on LinkedIn



  
Morgan Adamski on LinkedIn




PwC’s 2026 Global Digital Trust Insights report</description>
      <pubDate>Tue, 02 Dec 2025 11:00:00 -0000</pubDate>
      <itunes:title>Top CISO Priorities and Global Digital Trust with Morgan Adamski</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ecd6722-b4f7-11f0-b4eb-d7e2add5702f/image/b2f4a457036de4130ca2a82220166b8d.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome to Data Security Decoded. Join host Caleb Tolin in conversation with Morgan Adamski who leads Cyber, Data, and Tech Risk at PwC and is a former US national security leader who spent 16 years tracking nation-state threats inside the US government. Coming out of a career spent inside secure facilities without windows or phones and working to address China’s prepositioning in US critical infrastructure, Morgan shares a direct view of how geopolitics is now shaping cyber risk decisions in boardrooms.

What You'll Learn:


  
Why only 24% invest in proactive defense, even while 60% call cyber a top priority



  
How AI agents are cutting breach timelines to under 80 days



  
Why cyber insurance is now a hygiene scorecard, not just financial protection



  
The real reason leaders lack confidence in resilience



  
Where legacy systems and supply chain dependencies expose blind spots



  
How public–private collaboration changed the response to China’s infrastructure campaign



  
What CISOs must confront now to avoid being blindsided by the next crisis




The conversation gives security leaders and decision-makers a clear view of where current strategies fall short and the choices required to build real resilience before the next crisis forces it.

Episode Highlights:

[03:43] Why China prepositions inside US critical infrastructure to trigger disruption and panic in a crisis

[04:20] Collective defense in action: how victims and industry exposed the campaign

[09:27] The truth behind cyber budgets: only 24% invest in proactive defense

[11:57] How AI agents are shortening breach lifecycles to under 80 days

[13:07] Why cyber insurance is now a security scorecard, not a safety net

Episode Resources


  
Caleb Tolin on LinkedIn



  
Morgan Adamski on LinkedIn




PwC’s 2026 Global Digital Trust Insights report</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to <a href="https://zerolabs.rubrik.com/podcast"><u>Data Security Decoded</u></a>. Join host <a href="https://www.linkedin.com/in/calebtolin/"><u>Caleb Tolin</u></a> in conversation with <a href="https://www.linkedin.com/in/morgan-adamski-501094240/"><u>Morgan Adamski</u></a> who leads Cyber, Data, and Tech Risk at PwC and is a former US national security leader who spent 16 years tracking nation-state threats inside the US government. Coming out of a career spent inside secure facilities without windows or phones and working to address China’s prepositioning in US critical infrastructure, Morgan shares a direct view of how geopolitics is now shaping cyber risk decisions in boardrooms.</p>
<p>What You'll Learn:</p>
<ul>
  <li>
<p>Why only 24% invest in proactive defense, even while 60% call cyber a top priority</p>
</li>
  <li>
<p>How AI agents are cutting breach timelines to under 80 days</p>
</li>
  <li>
<p>Why cyber insurance is now a hygiene scorecard, not just financial protection</p>
</li>
  <li>
<p>The real reason leaders lack confidence in resilience</p>
</li>
  <li>
<p>Where legacy systems and supply chain dependencies expose blind spots</p>
</li>
  <li>
<p>How public–private collaboration changed the response to China’s infrastructure campaign</p>
</li>
  <li>
<p>What CISOs must confront now to avoid being blindsided by the next crisis</p>
</li>
</ul>
<p>The conversation gives security leaders and decision-makers a clear view of where current strategies fall short and the choices required to build real resilience before the next crisis forces it.</p>
<p><strong>Episode Highlights:</strong></p>
<p>[03:43] Why China prepositions inside US critical infrastructure to trigger disruption and panic in a crisis</p>
<p>[04:20] Collective defense in action: how victims and industry exposed the campaign</p>
<p>[09:27] The truth behind cyber budgets: only 24% invest in proactive defense</p>
<p>[11:57] How AI agents are shortening breach lifecycles to under 80 days</p>
<p>[13:07] Why cyber insurance is now a security scorecard, not a safety net</p>
<p><br><strong>Episode Resources</strong></p>
<ul>
  <li>
<p>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Morgan Adamski on <a href="https://www.linkedin.com/in/morgan-adamski-501094240/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>PwC’s <a href="https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/global-digital-trust-insights.html"><u>2026 Global Digital Trust Insights</u></a> report<br></p>]]>
      </content:encoded>
      <itunes:duration>1426</itunes:duration>
      <guid isPermaLink="false"><![CDATA[6ecd6722-b4f7-11f0-b4eb-d7e2add5702f]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW3658782163.mp3?updated=1764077483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Agentic AI and Identity Sprawl</title>
      <description>In this episode of Data Security Decoded, join host Caleb Tolin as he welcomes back Joe Hladik, Head of Rubrik Zero Labs, to unpack the findings from their new report, Identity Crisis: Understanding &amp; Building Resilience Against Identity-Driven Threats, Joe breaks down how the explosion of non-human identities, from API keys to AI agents, is rewriting the threat landscape and forcing security leaders to rethink the perimeter itself.

He explains why identity resilience is the new foundation of cyber defense, how to prioritize recovery when every system matters, and what steps teams can take now to stay ahead of emerging agentic AI-driven attacks.

What You'll Learn:


  
Why identity has replaced the network as the modern security perimeter



  
How non-human identities outnumber humans 82 to 1, and what that means for control and monitoring



  
Practical steps to build recovery plans around dependency mapping and minimal viable operations



  
Why ransom payments remain high and how better resilience planning can reverse that trend



  
How threat actors exploit backup systems to gain total business leverage



  
What agentic AI really means for cyber defense and how to prepare for its impact




The episode offers a clear framework for leaders to transform identity resilience from a reactive measure into a proactive pillar of enterprise security.

Episode Highlights:

[05:13] The 82:1 Ratio: Why Non-Human Identities Now Define Risk

[07:03] Prioritizing Recovery: Building for Minimal Viable Operations

[10:53] Declining Recovery Confidence and the Rise of Ransom Payments

[15:46] Backups Under Attack: How Threat Actors Seize Business Control

[16:32] Agentic AI and the Shifting Nature of Cyber Threats

[25:32] What Defenders Can Do Now to Build Identity Resilience

Episode Resources

Caleb Tolin on LinkedIn

Joe Hladik on LinkedIn

Rubrik Zero Labs report, Identity Crisis: Understanding &amp; Building Resilience Against Identity-Driven Threats</description>
      <pubDate>Tue, 18 Nov 2025 13:00:00 -0000</pubDate>
      <itunes:title>Agentic AI and Identity Sprawl</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7513ce6c-c3cc-11f0-b482-93815563903d/image/014aee8f306ac2aed9eba08173ff2b07.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Convergence Redefining Cyber Risk</itunes:subtitle>
      <itunes:summary>In this episode of Data Security Decoded, join host Caleb Tolin as he welcomes back Joe Hladik, Head of Rubrik Zero Labs, to unpack the findings from their new report, Identity Crisis: Understanding &amp; Building Resilience Against Identity-Driven Threats, Joe breaks down how the explosion of non-human identities, from API keys to AI agents, is rewriting the threat landscape and forcing security leaders to rethink the perimeter itself.

He explains why identity resilience is the new foundation of cyber defense, how to prioritize recovery when every system matters, and what steps teams can take now to stay ahead of emerging agentic AI-driven attacks.

What You'll Learn:


  
Why identity has replaced the network as the modern security perimeter



  
How non-human identities outnumber humans 82 to 1, and what that means for control and monitoring



  
Practical steps to build recovery plans around dependency mapping and minimal viable operations



  
Why ransom payments remain high and how better resilience planning can reverse that trend



  
How threat actors exploit backup systems to gain total business leverage



  
What agentic AI really means for cyber defense and how to prepare for its impact




The episode offers a clear framework for leaders to transform identity resilience from a reactive measure into a proactive pillar of enterprise security.

Episode Highlights:

[05:13] The 82:1 Ratio: Why Non-Human Identities Now Define Risk

[07:03] Prioritizing Recovery: Building for Minimal Viable Operations

[10:53] Declining Recovery Confidence and the Rise of Ransom Payments

[15:46] Backups Under Attack: How Threat Actors Seize Business Control

[16:32] Agentic AI and the Shifting Nature of Cyber Threats

[25:32] What Defenders Can Do Now to Build Identity Resilience

Episode Resources

Caleb Tolin on LinkedIn

Joe Hladik on LinkedIn

Rubrik Zero Labs report, Identity Crisis: Understanding &amp; Building Resilience Against Identity-Driven Threats</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <a href="https://zerolabs.rubrik.com/podcast"><u>Data Security Decoded</u></a>, join host <a href="https://www.linkedin.com/in/calebtolin/"><u>Caleb Tolin</u></a> as he welcomes back <a href="https://www.linkedin.com/in/joseph-h-9248913/"><u>Joe Hladik</u></a>, Head of Rubrik Zero Labs, to unpack the findings from their new report, <em>Identity Crisis: Understanding &amp; Building Resilience Against Identity-Driven Threats</em>, Joe breaks down how the explosion of non-human identities, from API keys to AI agents, is rewriting the threat landscape and forcing security leaders to rethink the perimeter itself.</p>
<p>He explains why identity resilience is the new foundation of cyber defense, how to prioritize recovery when every system matters, and what steps teams can take now to stay ahead of emerging agentic AI-driven attacks.</p>
<p><br>What You'll Learn:</p>
<ul>
  <li>
<p>Why identity has replaced the network as the modern security perimeter</p>
</li>
  <li>
<p>How non-human identities outnumber humans 82 to 1, and what that means for control and monitoring</p>
</li>
  <li>
<p>Practical steps to build recovery plans around dependency mapping and minimal viable operations</p>
</li>
  <li>
<p>Why ransom payments remain high and how better resilience planning can reverse that trend</p>
</li>
  <li>
<p>How threat actors exploit backup systems to gain total business leverage</p>
</li>
  <li>
<p>What agentic AI really means for cyber defense and how to prepare for its impact</p>
</li>
</ul>
<p>The episode offers a clear framework for leaders to transform identity resilience from a reactive measure into a proactive pillar of enterprise security.</p>
<p><strong>Episode Highlights:</strong></p>
<p>[05:13] The 82:1 Ratio: Why Non-Human Identities Now Define Risk</p>
<p>[07:03] Prioritizing Recovery: Building for Minimal Viable Operations</p>
<p>[10:53] Declining Recovery Confidence and the Rise of Ransom Payments</p>
<p>[15:46] Backups Under Attack: How Threat Actors Seize Business Control</p>
<p>[16:32] Agentic AI and the Shifting Nature of Cyber Threats</p>
<p>[25:32] What Defenders Can Do Now to Build Identity Resilience</p>
<p><br><strong>Episode Resources</strong></p>
<p>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/"><u>LinkedIn</u></a></p>
<p>Joe Hladik on <a href="https://www.linkedin.com/in/joseph-h-9248913/"><u>LinkedIn</u></a></p>
<p>Rubrik Zero Labs report, <a href="https://zerolabs.rubrik.com/reports/the-identity-crisis"><em>Identity Crisis: Understanding &amp; Building Resilience Against Identity-Driven Threats</em></a><br></p>]]>
      </content:encoded>
      <itunes:duration>1478</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7513ce6c-c3cc-11f0-b482-93815563903d]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4427554821.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Secure by Design, Secure by Default, Secure by Demand</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/38/notes</link>
      <description>Welcome to Data Security Decoded. Join host Caleb Tolin in conversation with Lauren Zabierek, Senior Vice President for the Future of Digital Security at the Institute for Security and Technology. A former CISA leader and long-time national security professional, Lauren unpacks the principles of Secure by Design, Secure by Default, and Secure by Demand and how these frameworks are reshaping the software supply chain.

What You'll Learn:


  
Why security must be a business decision led by executives rather than a technical afterthought



  
How Secure by Design principles inspired more than 300 companies to eliminate entire classes of vulnerabilities



  
The economic incentives that drive insecure software and what must change to realign the market



  
How customers can evaluate vendors and ask the right questions to ensure secure authentication and transparent practices



  
The role of Secure by Demand in helping buyers assess software safety before and after adoption



  
Why initiatives like #ShareTheMicInCyber are essential for expanding diversity and innovation across cybersecurity policy




The conversation offers a practical roadmap for executives, CISOs, and technology leaders to integrate secure development practices into business strategy, turning software security from a compliance checkbox into a competitive advantage.

Episode Highlights:

[08:46] Inside CISA’s Secure by Design Pledge

[09:41] The Three Pillars: Secure by Design, Default, and Demand

[11:59] Why Security Is an Economic Issue, Not Just Technical

[15:41] How Customers Can Drive Change Through Secure by Demand

[18:23] The Story and Impact of #ShareTheMicInCyber

Quotes:


  
"Security has to be a business decision led by business leaders in the company. It should not be an afterthought. It shouldn't just be left to the security team to sort of try to convince the rest of the company that they should do this. It's the company leadership that should say, this is a priority and therefore orient the different resources and priorities around that particular topic."





  
"Having more secure software is not a technical impossibility. The companies right now are acting rationally in a misaligned market. Secure by Design, at its core, is about shifting those incentives in order to drive a change in behavior."





  
"Software is what economists would refer to as a credence good. It's very hard to assess the quality of a product or a service both before you consume it and after you consume it. We don't have the criteria or benchmarks to fully assess that, and that’s a problem."



  
"We looked at really how to provide guidance, and then we also created the Secure by Design pledge. And at the time when we launched it in 2024 at RSA, we had 68 software companies sign on… And then by the time we left, we had over 300 companies sign on. Now this pledge, you know, it addressed certain things like eliminating entire classes of vulnerability. It talked about enabling multifactor authentication by default across product lines. It talked about a vulnerability disclosure policy. Those are just a few things, but you can see that they're very concrete, measurable actions that lead to better outcomes."



Episode Resources

  


Caleb Tolin on LinkedIn



  
Lauren Zabierek on LinkedIn



  
Institute for Security and Technology (IST)



  
Secure by Demand Guide from CISA</description>
      <pubDate>Tue, 04 Nov 2025 11:00:00 -0000</pubDate>
      <itunes:title>Secure by Design, Secure by Default, Secure by Demand</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6e7f57b2-b4f7-11f0-b4eb-076163351319/image/840089cbbc3845721a7183353a9d0c9c.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Signs of a Secure Software Supply Chain</itunes:subtitle>
      <itunes:summary>Welcome to Data Security Decoded. Join host Caleb Tolin in conversation with Lauren Zabierek, Senior Vice President for the Future of Digital Security at the Institute for Security and Technology. A former CISA leader and long-time national security professional, Lauren unpacks the principles of Secure by Design, Secure by Default, and Secure by Demand and how these frameworks are reshaping the software supply chain.

What You'll Learn:


  
Why security must be a business decision led by executives rather than a technical afterthought



  
How Secure by Design principles inspired more than 300 companies to eliminate entire classes of vulnerabilities



  
The economic incentives that drive insecure software and what must change to realign the market



  
How customers can evaluate vendors and ask the right questions to ensure secure authentication and transparent practices



  
The role of Secure by Demand in helping buyers assess software safety before and after adoption



  
Why initiatives like #ShareTheMicInCyber are essential for expanding diversity and innovation across cybersecurity policy




The conversation offers a practical roadmap for executives, CISOs, and technology leaders to integrate secure development practices into business strategy, turning software security from a compliance checkbox into a competitive advantage.

Episode Highlights:

[08:46] Inside CISA’s Secure by Design Pledge

[09:41] The Three Pillars: Secure by Design, Default, and Demand

[11:59] Why Security Is an Economic Issue, Not Just Technical

[15:41] How Customers Can Drive Change Through Secure by Demand

[18:23] The Story and Impact of #ShareTheMicInCyber

Quotes:


  
"Security has to be a business decision led by business leaders in the company. It should not be an afterthought. It shouldn't just be left to the security team to sort of try to convince the rest of the company that they should do this. It's the company leadership that should say, this is a priority and therefore orient the different resources and priorities around that particular topic."





  
"Having more secure software is not a technical impossibility. The companies right now are acting rationally in a misaligned market. Secure by Design, at its core, is about shifting those incentives in order to drive a change in behavior."





  
"Software is what economists would refer to as a credence good. It's very hard to assess the quality of a product or a service both before you consume it and after you consume it. We don't have the criteria or benchmarks to fully assess that, and that’s a problem."



  
"We looked at really how to provide guidance, and then we also created the Secure by Design pledge. And at the time when we launched it in 2024 at RSA, we had 68 software companies sign on… And then by the time we left, we had over 300 companies sign on. Now this pledge, you know, it addressed certain things like eliminating entire classes of vulnerability. It talked about enabling multifactor authentication by default across product lines. It talked about a vulnerability disclosure policy. Those are just a few things, but you can see that they're very concrete, measurable actions that lead to better outcomes."



Episode Resources

  


Caleb Tolin on LinkedIn



  
Lauren Zabierek on LinkedIn



  
Institute for Security and Technology (IST)



  
Secure by Demand Guide from CISA</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to <a href="https://zerolabs.rubrik.com/podcast"><u>Data Security Decoded</u></a>. Join host <a href="https://www.linkedin.com/in/calebtolin/"><u>Caleb Tolin</u></a> in conversation with <a href="https://www.linkedin.com/in/laurenz1010/"><u>Lauren Zabierek</u></a>, Senior Vice President for the Future of Digital Security at the Institute for Security and Technology. A former CISA leader and long-time national security professional, Lauren unpacks the principles of Secure by Design, Secure by Default, and Secure by Demand and how these frameworks are reshaping the software supply chain.</p>
<p>What You'll Learn:</p>
<ul>
  <li>
<p>Why security must be a business decision led by executives rather than a technical afterthought</p>
</li>
  <li>
<p>How Secure by Design principles inspired more than 300 companies to eliminate entire classes of vulnerabilities</p>
</li>
  <li>
<p>The economic incentives that drive insecure software and what must change to realign the market</p>
</li>
  <li>
<p>How customers can evaluate vendors and ask the right questions to ensure secure authentication and transparent practices</p>
</li>
  <li>
<p>The role of Secure by Demand in helping buyers assess software safety before and after adoption</p>
</li>
  <li>
<p>Why initiatives like #ShareTheMicInCyber are essential for expanding diversity and innovation across cybersecurity policy</p>
</li>
</ul>
<p>The conversation offers a practical roadmap for executives, CISOs, and technology leaders to integrate secure development practices into business strategy, turning software security from a compliance checkbox into a competitive advantage.</p>
<p><strong>Episode Highlights:</strong></p>
<p>[08:46] Inside CISA’s Secure by Design Pledge</p>
<p>[09:41] The Three Pillars: Secure by Design, Default, and Demand</p>
<p>[11:59] Why Security Is an Economic Issue, Not Just Technical</p>
<p>[15:41] How Customers Can Drive Change Through Secure by Demand</p>
<p>[18:23] The Story and Impact of #ShareTheMicInCyber</p>
<p><br><strong>Quotes:</strong></p>
<ul>
  <li>
<p>"Security has to be a business decision led by business leaders in the company. It should not be an afterthought. It shouldn't just be left to the security team to sort of try to convince the rest of the company that they should do this. It's the company leadership that should say, this is a priority and therefore orient the different resources and priorities around that particular topic."</p>
</li>
</ul>
<ul>
  <li>
<p>"Having more secure software is not a technical impossibility. The companies right now are acting rationally in a misaligned market. Secure by Design, at its core, is about shifting those incentives in order to drive a change in behavior."</p>
</li>
</ul>
<ul>
  <li>
<p>"Software is what economists would refer to as a credence good. It's very hard to assess the quality of a product or a service both before you consume it and after you consume it. We don't have the criteria or benchmarks to fully assess that, and that’s a problem."<br></p>
</li>
  <li>
<p>"We looked at really how to provide guidance, and then we also created the Secure by Design pledge. And at the time when we launched it in 2024 at RSA, we had 68 software companies sign on… And then by the time we left, we had over 300 companies sign on. Now this pledge, you know, it addressed certain things like eliminating entire classes of vulnerability. It talked about enabling multifactor authentication by default across product lines. It talked about a vulnerability disclosure policy. Those are just a few things, but you can see that they're very concrete, measurable actions that lead to better outcomes."</p>
<p><br></p>
<p><strong>Episode Resources</strong></p>
  </li>
<li>
<p>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Lauren Zabierek on <a href="https://www.linkedin.com/in/laurenz1010/"><u>LinkedIn</u></a></p>
</li>
  <li>
<p><a href="https://securityandtechnology.org/"><u>Institute for Security and Technology (IST)</u></a></p>
</li>
  <li>
<p><a href="https://www.cisa.gov/resources-tools/resources/secure-demand-guide"><u>Secure by Demand Guide from CISA</u></a></p>
</li>
<p><br></p>

</ul>]]>
      </content:encoded>
      <itunes:duration>1582</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e7f57b2-b4f7-11f0-b4eb-076163351319]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8876340539.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Three Threats Reshaping Financial Services: Identity, Supply Chain, and AI</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/37/notes</link>
      <description>Cyber resilience in financial services is often treated as a checklist of tools and controls, rather than what it truly is: a system of people, intelligence, and collaboration working together.

In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Troy Wells⁠, Intelligence Officer at FS-ISAC and former U.S. Army intelligence officer, to explore how principles like teamwork, trust, and preparation, forged in national security, translate directly into protecting the global financial system. From using fire-safety lessons to explain prevention, detection, and response, to breaking down the difference between AI models and AI agents, Troy shares practical guidance for banks and financial institutions building resilience in the face of evolving threats.

What You’ll Learn:


  Why prevention, detection, and response are strongest when treated as a cycle, not silos

  How AI models act as “calculators” while AI agents act as “interns,” and what oversight each requires

  The guardrails that financial institutions should set before deploying AI tools at scale

  How cloud misconfigurations in even major enterprises reveal the need for security-first design

  The three threat trends that will shape financial services in the next 12–24 months: identity attacks, supply chain compromises, and AI-enabled adversaries


Episode Highlights:

[00:22] Troy’s path from Army intelligence officer to FS-ISAC[03:20] Fire-safety lessons: framing prevention, detection, and response in cybersecurity[08:15] The difference between AI models and AI agents, and how to guide each[12:22] Four principles for adopting AI securely in financial institutions[17:00] Cloud misconfigurations and why resilience must be built into architecture[21:39] The top three threats to watch in the next 12–24 months: identity, supply chain, and AI-driven attacks[27:35] Why speed and sophistication make resilience and collaboration essential

Episode Resources:


  Caleb Tolin on LinkedIn


  Troy Wells on LinkedIn</description>
      <pubDate>Tue, 14 Oct 2025 10:00:00 -0000</pubDate>
      <itunes:title>Three Threats Reshaping Financial Services: Identity, Supply Chain, and AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3f5eb524-b4f5-11f0-922b-ab7c9a71aac1/image/70b8c86423963a28188164d88425dd85.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Data Security Decoded, host Caleb Tolin speaks with Troy Wells, Intelligence Officer at FS-ISAC and former U.S. Army intelligence officer. Troy shares how financial institutions can strengthen resilience through collaboration, practical response strategies, and careful adoption of new technologies. From fire-safety lessons that bring clarity to prevention, detection, and response, to the real risks of AI and cloud missteps, Troy lays out a clear view of the threats shaping the financial sector today.

• Why prevention, detection, and response should be seen as a cycle, like fire safety drills, rather than siloed functions
• How AI models act as calculators and AI agents as interns, and why both need governance, training, and oversight to be useful
• Real examples of how cloud misconfigurations exposed sensitive data in major enterprises and what resilience planning looks like in practice
• The three threats to watch in the next 24 mont</itunes:subtitle>
      <itunes:summary>Cyber resilience in financial services is often treated as a checklist of tools and controls, rather than what it truly is: a system of people, intelligence, and collaboration working together.

In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Troy Wells⁠, Intelligence Officer at FS-ISAC and former U.S. Army intelligence officer, to explore how principles like teamwork, trust, and preparation, forged in national security, translate directly into protecting the global financial system. From using fire-safety lessons to explain prevention, detection, and response, to breaking down the difference between AI models and AI agents, Troy shares practical guidance for banks and financial institutions building resilience in the face of evolving threats.

What You’ll Learn:


  Why prevention, detection, and response are strongest when treated as a cycle, not silos

  How AI models act as “calculators” while AI agents act as “interns,” and what oversight each requires

  The guardrails that financial institutions should set before deploying AI tools at scale

  How cloud misconfigurations in even major enterprises reveal the need for security-first design

  The three threat trends that will shape financial services in the next 12–24 months: identity attacks, supply chain compromises, and AI-enabled adversaries


Episode Highlights:

[00:22] Troy’s path from Army intelligence officer to FS-ISAC[03:20] Fire-safety lessons: framing prevention, detection, and response in cybersecurity[08:15] The difference between AI models and AI agents, and how to guide each[12:22] Four principles for adopting AI securely in financial institutions[17:00] Cloud misconfigurations and why resilience must be built into architecture[21:39] The top three threats to watch in the next 12–24 months: identity, supply chain, and AI-driven attacks[27:35] Why speed and sophistication make resilience and collaboration essential

Episode Resources:


  Caleb Tolin on LinkedIn


  Troy Wells on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber resilience in financial services is often treated as a checklist of tools and controls, rather than what it truly is: a system of people, intelligence, and collaboration working together.</p>
<p>In this episode of <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a>, join <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a> as he sits down with <a href="https://www.linkedin.com/in/troy-wells-cissp/">⁠Troy Wells⁠</a>, Intelligence Officer at FS-ISAC and former U.S. Army intelligence officer, to explore how principles like teamwork, trust, and preparation, forged in national security, translate directly into protecting the global financial system. From using fire-safety lessons to explain prevention, detection, and response, to breaking down the difference between AI models and AI agents, Troy shares practical guidance for banks and financial institutions building resilience in the face of evolving threats.</p>
<p><strong>What You’ll Learn:</strong></p>
<ul>
  <li>Why prevention, detection, and response are strongest when treated as a cycle, not silos</li>
  <li>How AI models act as “calculators” while AI agents act as “interns,” and what oversight each requires</li>
  <li>The guardrails that financial institutions should set before deploying AI tools at scale</li>
  <li>How cloud misconfigurations in even major enterprises reveal the need for security-first design</li>
  <li>The three threat trends that will shape financial services in the next 12–24 months: identity attacks, supply chain compromises, and AI-enabled adversaries</li>
</ul>
<p><strong>Episode Highlights:</strong></p>
<p>[00:22] Troy’s path from Army intelligence officer to FS-ISAC[03:20] Fire-safety lessons: framing prevention, detection, and response in cybersecurity[08:15] The difference between AI models and AI agents, and how to guide each[12:22] Four principles for adopting AI securely in financial institutions[17:00] Cloud misconfigurations and why resilience must be built into architecture[21:39] The top three threats to watch in the next 12–24 months: identity, supply chain, and AI-driven attacks[27:35] Why speed and sophistication make resilience and collaboration essential</p>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Troy Wells on <a href="https://www.linkedin.com/in/troy-wells-cissp/">LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1646</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[v07rjj41]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7169692168.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scattered Spider: the Evolution of Identity-Based Ransomware</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/36/notes</link>
      <description>Identity-based ransomware is no longer a fringe tactic; it’s becoming the playbook of today’s most dangerous adversaries. Scattered Spider, a financially motivated e-crime group, has shifted the model from smash-and-grab encryption to a far more devastating combination of double extortion, social engineering, and hypervisor encryption attacks.

In this episode of Data Security Decoded, host Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, to unpack how Scattered Spider is evolving the ransomware playbook. From double extortion and identity compromise to hypervisor encryption and legacy system exploitation, Joe explains why these tactics succeed where traditional defenses fail and why building cyber resilience, not just detection and response, is the critical next step for security leaders.

What You’ll Learn:


  How Scattered Spider leverages ransomware-as-a-service and double extortion to maximize payouts

  Why identity compromise and social engineering make traditional defenses ineffective

  How “living off the land” techniques and vulnerable drivers bypass signature-based tools

  Why legacy infrastructure and outdated backup systems are prime targets for exploitation

  What cyber resilience really means and how to build recovery into your security posture


Episode Highlights: 

[00:30] Joe on Scattered Spider’s financial motivations and shift to double extortion 

[06:53] Why identity compromise and social engineering bypass traditional defenses 

[08:49] Disabling EDR with “living off the land” techniques and vulnerable drivers 

[13:06] Hypervisor encryption: how attackers can take entire backup systems offline 

[16:21] Cyber resilience as the future: assuming breach and restoring trusted systems

Episode Resources:


  Caleb Tolin on LinkedIn


  Joe Hladik on LinkedIn</description>
      <pubDate>Tue, 23 Sep 2025 10:00:00 -0000</pubDate>
      <itunes:title>Scattered Spider: the Evolution of Identity-Based Ransomware</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3fcdbfe6-b4f5-11f0-922b-3fa0f21334af/image/014aee8f306ac2aed9eba08173ff2b07.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Data Security Decoded, join Caleb Tolin as he welcomes back Joe Hladik, Head of Rubrik Zero Labs, to explore how modern adversaries like Scattered Spider are reshaping the ransomware landscape. From double extortion schemes to identity compromise and hypervisor encryption, Joe explains why these attackers succeed where traditional defenses fail and what security leaders must do to embed resilience and recovery at the core of their strategy.

• Learn how double extortion turns data theft into a two-payout playbook
• Hear why identity compromise and social engineering bypass even strong defenses
• Understand why breakout times as fast as 48 minutes change the response equation
• Get practical ways to build resilience and recovery without reintroducing attacker backdoors</itunes:subtitle>
      <itunes:summary>Identity-based ransomware is no longer a fringe tactic; it’s becoming the playbook of today’s most dangerous adversaries. Scattered Spider, a financially motivated e-crime group, has shifted the model from smash-and-grab encryption to a far more devastating combination of double extortion, social engineering, and hypervisor encryption attacks.

In this episode of Data Security Decoded, host Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, to unpack how Scattered Spider is evolving the ransomware playbook. From double extortion and identity compromise to hypervisor encryption and legacy system exploitation, Joe explains why these tactics succeed where traditional defenses fail and why building cyber resilience, not just detection and response, is the critical next step for security leaders.

What You’ll Learn:


  How Scattered Spider leverages ransomware-as-a-service and double extortion to maximize payouts

  Why identity compromise and social engineering make traditional defenses ineffective

  How “living off the land” techniques and vulnerable drivers bypass signature-based tools

  Why legacy infrastructure and outdated backup systems are prime targets for exploitation

  What cyber resilience really means and how to build recovery into your security posture


Episode Highlights: 

[00:30] Joe on Scattered Spider’s financial motivations and shift to double extortion 

[06:53] Why identity compromise and social engineering bypass traditional defenses 

[08:49] Disabling EDR with “living off the land” techniques and vulnerable drivers 

[13:06] Hypervisor encryption: how attackers can take entire backup systems offline 

[16:21] Cyber resilience as the future: assuming breach and restoring trusted systems

Episode Resources:


  Caleb Tolin on LinkedIn


  Joe Hladik on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Identity-based ransomware is no longer a fringe tactic; it’s becoming the playbook of today’s most dangerous adversaries. Scattered Spider, a financially motivated e-crime group, has shifted the model from smash-and-grab encryption to a far more devastating combination of double extortion, social engineering, and hypervisor encryption attacks.</p>
<p>In this episode of Data Security Decoded, host Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, to unpack how Scattered Spider is evolving the ransomware playbook. From double extortion and identity compromise to hypervisor encryption and legacy system exploitation, Joe explains why these tactics succeed where traditional defenses fail and why building cyber resilience, not just detection and response, is the critical next step for security leaders.</p>
<p><strong>What You’ll Learn:</strong></p>
<ul>
  <li>How Scattered Spider leverages ransomware-as-a-service and double extortion to maximize payouts</li>
  <li>Why identity compromise and social engineering make traditional defenses ineffective</li>
  <li>How “living off the land” techniques and vulnerable drivers bypass signature-based tools</li>
  <li>Why legacy infrastructure and outdated backup systems are prime targets for exploitation</li>
  <li>What cyber resilience really means and how to build recovery into your security posture</li>
</ul>
<p><strong>Episode Highlights: </strong></p>
<p>[00:30] Joe on Scattered Spider’s financial motivations and shift to double extortion </p>
<p>[06:53] Why identity compromise and social engineering bypass traditional defenses </p>
<p>[08:49] Disabling EDR with “living off the land” techniques and vulnerable drivers </p>
<p>[13:06] Hypervisor encryption: how attackers can take entire backup systems offline </p>
<p>[16:21] Cyber resilience as the future: assuming breach and restoring trusted systems</p>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Joe Hladik on<a href="https://www.linkedin.com/in/joseph-h-9248913/"> LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>824</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[703rvmq1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW5585512993.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/35/notes</link>
      <description>Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning.

In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Mei Danowski⁠, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.

What You’ll Learn:


  Why Chinese cyber operations are fragmented and decentralized, and why that matters for defenders

  How private companies in China are tied to the Communist Party and mobilized for cyber objectives

  The strategic difference between China, Russia, North Korea, and Iran in their cyber operations

  How China’s targeting priorities have shifted toward telecom, energy, water, and transport infrastructure

  Three intelligence-driven approaches defenders can use to counter Chinese operations

  What the 14th Five-Year Plan achieved in cyberspace, and what to expect in the 15th


Highlights:

[01:50] The fragmented reality of Chinese state-backed cyber operations

[05:28] How cultural and political structures shape threat actor behavior

[08:47] Comparing China’s cyber strategy to Russia, North Korea, and Iran

[12:45] Why telecom, energy, and water systems are top targets

[21:24] China’s 14th Five-Year Plan successes and projections for the 15th

Episode Resources:


  Caleb Tolin on LinkedIn


  Mei Danowski on LinkedIn


  Natto Thoughts website</description>
      <pubDate>Tue, 26 Aug 2025 10:00:00 -0000</pubDate>
      <itunes:title>Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/40d7a532-b4f5-11f0-922b-4be29a5e076a/image/aff17d4c28a7d16d3338215487bd7b4e.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore the realities of Chinese state-backed cyber operations. From the fragmented nature of China’s threat actor ecosystem to its growing focus on critical infrastructure, discover how cultural, political, and economic structures shape one of the world's most strategic cyber landscapes. Whether you’re defending critical infrastructure or shaping policy, this conversation provides clarity on China’s cyber strategy and what it means for global security.

• Learn why Chinese cyber operations are fragmented, not centrally controlled
• Explore how cultural and political structures influence Chinese threat actors
• Understand which critical infrastructure sectors are most frequently targeted and why
• See how China’s 14th Five-Year Plan shaped cyber operations and what to expect from the    15th</itunes:subtitle>
      <itunes:summary>Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning.

In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Mei Danowski⁠, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.

What You’ll Learn:


  Why Chinese cyber operations are fragmented and decentralized, and why that matters for defenders

  How private companies in China are tied to the Communist Party and mobilized for cyber objectives

  The strategic difference between China, Russia, North Korea, and Iran in their cyber operations

  How China’s targeting priorities have shifted toward telecom, energy, water, and transport infrastructure

  Three intelligence-driven approaches defenders can use to counter Chinese operations

  What the 14th Five-Year Plan achieved in cyberspace, and what to expect in the 15th


Highlights:

[01:50] The fragmented reality of Chinese state-backed cyber operations

[05:28] How cultural and political structures shape threat actor behavior

[08:47] Comparing China’s cyber strategy to Russia, North Korea, and Iran

[12:45] Why telecom, energy, and water systems are top targets

[21:24] China’s 14th Five-Year Plan successes and projections for the 15th

Episode Resources:


  Caleb Tolin on LinkedIn


  Mei Danowski on LinkedIn


  Natto Thoughts website</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning.</p>
<p>In this episode of <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a>, join <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a> as he sits down with <a href="https://www.linkedin.com/in/meidanowski/">⁠Mei Danowski⁠</a>, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.</p>
<p><strong>What You’ll Learn:</strong></p>
<ul>
  <li>Why Chinese cyber operations are fragmented and decentralized, and why that matters for defenders</li>
  <li>How private companies in China are tied to the Communist Party and mobilized for cyber objectives</li>
  <li>The strategic difference between China, Russia, North Korea, and Iran in their cyber operations</li>
  <li>How China’s targeting priorities have shifted toward telecom, energy, water, and transport infrastructure</li>
  <li>Three intelligence-driven approaches defenders can use to counter Chinese operations</li>
  <li>What the 14th Five-Year Plan achieved in cyberspace, and what to expect in the 15th</li>
</ul>
<p><strong>Highlights:</strong></p>
<p>[01:50] The fragmented reality of Chinese state-backed cyber operations</p>
<p>[05:28] How cultural and political structures shape threat actor behavior</p>
<p>[08:47] Comparing China’s cyber strategy to Russia, North Korea, and Iran</p>
<p>[12:45] Why telecom, energy, and water systems are top targets</p>
<p>[21:24] China’s 14th Five-Year Plan successes and projections for the 15th</p>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Mei Danowski on <a href="https://www.linkedin.com/in/meidanowski/">LinkedIn</a>
</li>
  <li>Natto Thoughts <a href="https://nattothoughts.substack.com/about">website</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1774</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[703rwkj1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2429078135.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking the Intelligence-Defense Divide with Scott Scher</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/34/notes</link>
      <description>Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Scott Scher⁠, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.

What You’ll Learn:


  The mindset shift from cyber threat intelligence to cyber counter-threat intelligence

  Why threat intel must not just inform, but recommend actions for defenders

  How intelligence insights serve as “cover” for defenders, offering justification and prioritization for security decisions

  Why we should think of intelligence, defenders, and policy teams as part of a formula, not opposing forces

  How Scott’s off-grid lifestyle shaped his view on resilience, preparedness, and technology dependency


Episode Highlights:

[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity

[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula

[08:19] What CTI and defenders really need to understand about each other

[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions

[17:45] How CTI helps organizations protect their most sensitive data

Episode Resources:


  Caleb Tolin on LinkedIn


  Scott Scher on LinkedIn</description>
      <pubDate>Wed, 13 Aug 2025 10:00:00 -0000</pubDate>
      <itunes:title>Breaking the Intelligence-Defense Divide with Scott Scher</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/413e3d92-b4f5-11f0-922b-d7e28a636c84/image/d8e08d83adfb6737f8e9d8f3f941d6fb.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his four years living off the grid shaped his belief that protecting technology isn’t just technical work, it’s about resilience, strategy, and thinking differently. From redefining CTI as “counter-threat intelligence” to breaking down the walls between intelligence teams, defenders, and policy leaders, Scott explains how to turn raw intel into actionable security decisions that strengthen organizations where it matters most.

• Learn why threat intelligence should be seen as cover, helping defenders justify and prioritize their actions
• Hear how Scott’s off-grid lifestyle influenced his approach to resilience and technology reliance
• Understand why “intel vs. defense” is the wrong mindset and what real collaboration looks like
• Get practical ways to transform raw threat data into clear, actionable defense strategies</itunes:subtitle>
      <itunes:summary>Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Scott Scher⁠, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.

What You’ll Learn:


  The mindset shift from cyber threat intelligence to cyber counter-threat intelligence

  Why threat intel must not just inform, but recommend actions for defenders

  How intelligence insights serve as “cover” for defenders, offering justification and prioritization for security decisions

  Why we should think of intelligence, defenders, and policy teams as part of a formula, not opposing forces

  How Scott’s off-grid lifestyle shaped his view on resilience, preparedness, and technology dependency


Episode Highlights:

[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity

[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula

[08:19] What CTI and defenders really need to understand about each other

[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions

[17:45] How CTI helps organizations protect their most sensitive data

Episode Resources:


  Caleb Tolin on LinkedIn


  Scott Scher on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a>, join <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a> as he sits down with <a href="https://www.linkedin.com/in/%F0%9F%92%BDscott-s-54900bb4">⁠Scott Scher⁠</a>, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.</p>
<p><strong>What You’ll Learn:</strong></p>
<ul>
  <li>The mindset shift from cyber threat intelligence to cyber counter-threat intelligence</li>
  <li>Why threat intel must not just inform, but recommend actions for defenders</li>
  <li>How intelligence insights serve as “cover” for defenders, offering justification and prioritization for security decisions</li>
  <li>Why we should think of intelligence, defenders, and policy teams as part of a formula, not opposing forces</li>
  <li>How Scott’s off-grid lifestyle shaped his view on resilience, preparedness, and technology dependency</li>
</ul>
<p><strong>Episode Highlights:</strong></p>
<p>[00:01] Scott’s unconventional path from off‑grid homesteading to cybersecurity</p>
<p>[03:47] Breaking the “versus” mindset: How intelligence, defenders, and policy work as a formula</p>
<p>[08:19] What CTI and defenders really need to understand about each other</p>
<p>[12:45] CTI as “cover”: Giving defenders justification and prioritization for key decisions</p>
<p>[17:45] How CTI helps organizations protect their most sensitive data</p>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Scott Scher on <a href="https://www.linkedin.com/in/%F0%9F%92%BDscott-s-54900bb4">LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1551</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[713rwzx0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1135423288.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Geopolitical Security Playbook: When Nations Clash in Cyberspace</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/33/notes</link>
      <description>In this episode of ⁠Data Security Decoded⁠, host ⁠Caleb Tolin⁠ sits down with ⁠Dustin Droullard⁠, a cyber threat intelligence expert and former Army intelligence analyst, to discuss how global conflict is increasingly playing out in cyberspace, from digital espionage to civilian-targeted cyber operations. This episode highlights why organizations must rethink their cyber risk strategies in light of modern geopolitical threats and growing digital exposure.

What You’ll Learn:


  How influence operations are used to confuse, divide, and destabilize

  Understanding your organization’s role in geopolitical conflicts

  What basic cybersecurity practice still gets overlooked

  Where small businesses can find free resources to improve security posture and resilience 

  How anthropology, business, and literature studies can power cyber careers

  The gap in current cyber education and how to fix it with critical thinking and specialization


Episode Highlights:


  [00:00:33] From Army Intelligence to Cyber Operations

  [00:02:45] Espionage vs. Effects: Cyber Tactics in Geopolitical Conflict

  [00:06:38] Influence Operations and Psychological Warfare

  [00:10:39] Why Every Business is a Target, Whether They Know It or Not

  [00:13:21] Cybersecurity on a Budget: Resources for Underserved Organizations

  [00:15:57] Anthropology in Cyber: Understanding the Human Behind the Hack

  [00:20:33] Non-Tech Majors That Thrive in Cybersecurity

  [00:23:03] What Cyber Schools Are Missing: Business, Collaboration &amp; Critical Thinking


Episode Resources:


  Caleb Tolin on LinkedIn


  Dustin Droullard on LinkedIn


  CISA – Cybersecurity and Infrastructure Security Agency</description>
      <pubDate>Thu, 31 Jul 2025 10:00:00 -0000</pubDate>
      <itunes:title>The Geopolitical Security Playbook: When Nations Clash in Cyberspace</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/41ff3a24-b4f5-11f0-922b-3f7cd1b75599/image/27205e8459773066a59504557655ae35.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Data Security Decoded, host Caleb Tolin sits down with Dustin Droullard, a cyber threat intelligence expert and former Army intelligence analyst and cyber operations officer. They explore the growing overlap between global conflict and cybersecurity, unpacking how nation-state actors use cyber-espionage, disinformation, and digital sabotage in geopolitical conflicts. Whether you're leading cybersecurity efforts or simply navigating today’s volatile digital landscape, this conversation offers valuable insights into preparing your organization for the rising tide of cyber threats driven by global conflict.

Discover how geopolitical tensions trigger cyber fallout for businesses
Learn the tactics behind influence operations and digital sabotage
Understand why anthropology and business skills matter in cyber careers
Explore what schools are still missing in cybersecurity education</itunes:subtitle>
      <itunes:summary>In this episode of ⁠Data Security Decoded⁠, host ⁠Caleb Tolin⁠ sits down with ⁠Dustin Droullard⁠, a cyber threat intelligence expert and former Army intelligence analyst, to discuss how global conflict is increasingly playing out in cyberspace, from digital espionage to civilian-targeted cyber operations. This episode highlights why organizations must rethink their cyber risk strategies in light of modern geopolitical threats and growing digital exposure.

What You’ll Learn:


  How influence operations are used to confuse, divide, and destabilize

  Understanding your organization’s role in geopolitical conflicts

  What basic cybersecurity practice still gets overlooked

  Where small businesses can find free resources to improve security posture and resilience 

  How anthropology, business, and literature studies can power cyber careers

  The gap in current cyber education and how to fix it with critical thinking and specialization


Episode Highlights:


  [00:00:33] From Army Intelligence to Cyber Operations

  [00:02:45] Espionage vs. Effects: Cyber Tactics in Geopolitical Conflict

  [00:06:38] Influence Operations and Psychological Warfare

  [00:10:39] Why Every Business is a Target, Whether They Know It or Not

  [00:13:21] Cybersecurity on a Budget: Resources for Underserved Organizations

  [00:15:57] Anthropology in Cyber: Understanding the Human Behind the Hack

  [00:20:33] Non-Tech Majors That Thrive in Cybersecurity

  [00:23:03] What Cyber Schools Are Missing: Business, Collaboration &amp; Critical Thinking


Episode Resources:


  Caleb Tolin on LinkedIn


  Dustin Droullard on LinkedIn


  CISA – Cybersecurity and Infrastructure Security Agency</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a>, host <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a> sits down with <a href="https://www.linkedin.com/in/dustindroullard">⁠Dustin Droullard⁠</a>, a cyber threat intelligence expert and former Army intelligence analyst, to discuss how global conflict is increasingly playing out in cyberspace, from digital espionage to civilian-targeted cyber operations. This episode highlights why organizations must rethink their cyber risk strategies in light of modern geopolitical threats and growing digital exposure.</p>
<p><strong>What You’ll Learn:</strong></p>
<ul>
  <li>How influence operations are used to confuse, divide, and destabilize</li>
  <li>Understanding your organization’s role in geopolitical conflicts</li>
  <li>What basic cybersecurity practice still gets overlooked</li>
  <li>Where small businesses can find free resources to improve security posture and resilience </li>
  <li>How anthropology, business, and literature studies can power cyber careers</li>
  <li>The gap in current cyber education and how to fix it with critical thinking and specialization</li>
</ul>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>[00:00:33] From Army Intelligence to Cyber Operations</li>
  <li>[00:02:45] Espionage vs. Effects: Cyber Tactics in Geopolitical Conflict</li>
  <li>[00:06:38] Influence Operations and Psychological Warfare</li>
  <li>[00:10:39] Why Every Business is a Target, Whether They Know It or Not</li>
  <li>[00:13:21] Cybersecurity on a Budget: Resources for Underserved Organizations</li>
  <li>[00:15:57] Anthropology in Cyber: Understanding the Human Behind the Hack</li>
  <li>[00:20:33] Non-Tech Majors That Thrive in Cybersecurity</li>
  <li>[00:23:03] What Cyber Schools Are Missing: Business, Collaboration &amp; Critical Thinking</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Dustin Droullard on <a href="https://www.linkedin.com/in/dustindroullard">LinkedIn</a>
</li>
  <li><a href="https://www.cisa.gov/">CISA – Cybersecurity and Infrastructure Security Agency</a></li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[v17r68n0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9009053389.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HIPAA 2.0, Minimum Viable Hospitals, and Strategies for Cyber Resilience within Healthcare</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/32/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠Caleb Tolin⁠, is joined by ⁠Errol Weiss⁠, Chief Security Officer at ⁠Health-ISAC⁠ and former cybersecurity leader at ⁠Citi⁠ and ⁠Bank of America⁠. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.

Errol Weiss has been a driving force in advancing cybersecurity resilience across critical sectors, beginning with his early work at the National Security Agency and later leading security programs at Citi and Bank of America. As Chief Security Officer at Health-ISAC, he built a threat operations center from the ground up, delivering original threat intelligence to healthcare organizations that often lack the resources to do it alone. With deep experience across consulting, finance, and healthcare, Errol has become a leading voice in shifting the conversation from protection to recovery, promoting a resilience-first mindset, collaborative intelligence sharing, and a human-centric security culture.

Join Caleb and Errol as they explore what makes healthcare cybersecurity unique, how to embed security into clinical culture, and why building a “human firewall” is just as critical as any technical control in today’s evolving threat landscape.

Episode Highlights:


  00:00 - Intro

  01:33 - Moving from consulting and finance to healthcare cybersecurity

  02:12 - What ISACs are and how Health-ISAC supports threat sharing

  04:39 - Building a threat operations center from scratch

  06:38 - Collaboration differences between finance and healthcare ISACs

  07:24 - Shifting from disaster recovery to cyber recovery and resilience

  09:12 - Why HIPAA 2.0 is unlikely to advance and what’s happening instead

  11:58 - How policy mandates collide with healthcare’s talent and budget challenges

  13:01 - Biking, mental clarity, and leadership outside of work

  14:26 - Embedding security into healthcare culture and creating a human firewall

  16:43 - The rise of the minimum viable hospital concept

  18:20 - Why Errol remains optimistic about AI and the future of cybersecurity


Episode Resources:


  Health-ISAC Official Site


  National Council of ISACs website 

  Rubrik Zero Labs website


  Caleb Tolin on LinkedIn


  Errol Weiss on LinkedIn</description>
      <pubDate>Tue, 15 Jul 2025 10:00:00 -0000</pubDate>
      <itunes:title>HIPAA 2.0, Minimum Viable Hospitals, and Strategies for Cyber Resilience within Healthcare</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/432915b4-b4f5-11f0-922b-7b8a3d57e948/image/88e768103b3538a420534fd4afea4be0.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, Caleb Tolin, is joined by Errol Weiss, Chief Security Officer at Health-ISAC and former cybersecurity leader at Citi and Bank of America. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠Caleb Tolin⁠, is joined by ⁠Errol Weiss⁠, Chief Security Officer at ⁠Health-ISAC⁠ and former cybersecurity leader at ⁠Citi⁠ and ⁠Bank of America⁠. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.

Errol Weiss has been a driving force in advancing cybersecurity resilience across critical sectors, beginning with his early work at the National Security Agency and later leading security programs at Citi and Bank of America. As Chief Security Officer at Health-ISAC, he built a threat operations center from the ground up, delivering original threat intelligence to healthcare organizations that often lack the resources to do it alone. With deep experience across consulting, finance, and healthcare, Errol has become a leading voice in shifting the conversation from protection to recovery, promoting a resilience-first mindset, collaborative intelligence sharing, and a human-centric security culture.

Join Caleb and Errol as they explore what makes healthcare cybersecurity unique, how to embed security into clinical culture, and why building a “human firewall” is just as critical as any technical control in today’s evolving threat landscape.

Episode Highlights:


  00:00 - Intro

  01:33 - Moving from consulting and finance to healthcare cybersecurity

  02:12 - What ISACs are and how Health-ISAC supports threat sharing

  04:39 - Building a threat operations center from scratch

  06:38 - Collaboration differences between finance and healthcare ISACs

  07:24 - Shifting from disaster recovery to cyber recovery and resilience

  09:12 - Why HIPAA 2.0 is unlikely to advance and what’s happening instead

  11:58 - How policy mandates collide with healthcare’s talent and budget challenges

  13:01 - Biking, mental clarity, and leadership outside of work

  14:26 - Embedding security into healthcare culture and creating a human firewall

  16:43 - The rise of the minimum viable hospital concept

  18:20 - Why Errol remains optimistic about AI and the future of cybersecurity


Episode Resources:


  Health-ISAC Official Site


  National Council of ISACs website 

  Rubrik Zero Labs website


  Caleb Tolin on LinkedIn


  Errol Weiss on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>In this episode, our host, <a href="https://www.linkedin.com/in/calebtolin">⁠Caleb Tolin⁠</a>, is joined by <a href="https://www.linkedin.com/in/errolweiss/">⁠Errol Weiss⁠</a>, Chief Security Officer at <a href="https://www.linkedin.com/company/health-isac">⁠Health-ISAC⁠</a> and former cybersecurity leader at <a href="https://www.linkedin.com/company/citi/">⁠Citi⁠</a> and <a href="https://www.linkedin.com/company/bank-of-america">⁠Bank of America⁠</a>. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.</p>
<p>Errol Weiss has been a driving force in advancing cybersecurity resilience across critical sectors, beginning with his early work at the National Security Agency and later leading security programs at Citi and Bank of America. As Chief Security Officer at Health-ISAC, he built a threat operations center from the ground up, delivering original threat intelligence to healthcare organizations that often lack the resources to do it alone. With deep experience across consulting, finance, and healthcare, Errol has become a leading voice in shifting the conversation from protection to recovery, promoting a resilience-first mindset, collaborative intelligence sharing, and a human-centric security culture.</p>
<p>Join Caleb and Errol as they explore what makes healthcare cybersecurity unique, how to embed security into clinical culture, and why building a “human firewall” is just as critical as any technical control in today’s evolving threat landscape.</p>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>01:33 - Moving from consulting and finance to healthcare cybersecurity</li>
  <li>02:12 - What ISACs are and how Health-ISAC supports threat sharing</li>
  <li>04:39 - Building a threat operations center from scratch</li>
  <li>06:38 - Collaboration differences between finance and healthcare ISACs</li>
  <li>07:24 - Shifting from disaster recovery to cyber recovery and resilience</li>
  <li>09:12 - Why HIPAA 2.0 is unlikely to advance and what’s happening instead</li>
  <li>11:58 - How policy mandates collide with healthcare’s talent and budget challenges</li>
  <li>13:01 - Biking, mental clarity, and leadership outside of work</li>
  <li>14:26 - Embedding security into healthcare culture and creating a human firewall</li>
  <li>16:43 - The rise of the minimum viable hospital concept</li>
  <li>18:20 - Why Errol remains optimistic about AI and the future of cybersecurity</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Health-ISAC <a href="https://health-isac.org/">Official Site</a>
</li>
  <li>National Council of ISACs <a href="https://www.nationalisacs.org/">website</a> </li>
  <li>Rubrik Zero Labs <a href="https://zerolabs.rubrik.com/">website</a>
</li>
  <li>Caleb Tolin on<a href="https://www.linkedin.com/in/calebtolin"> LinkedIn</a>
</li>
  <li>Errol Weiss on <a href="https://www.linkedin.com/in/errolweiss/">LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40pqnz71]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2027008572.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Securing the Software Supply Chain</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/31/notes</link>
      <description>Navigating Modern Cybersecurity: From Supply Chain Risks to AI Evolution. In this episode of ⁠Data Security Decoded⁠, ⁠Allison Wikoff⁠, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.

What You'll Learn:


  How to prioritize vulnerability management by focusing on critical edge devices and access points

  Why understanding your network architecture is crucial for effective threat defense

  The reality of AI in cyber attacks: current uses, limitations, and practical defense strategies

  How to build supply chain resilience through vendor assessment and backup supplier planning

  Why older vulnerabilities remain a primary attack vector and how to address them effectively

  The framework for developing an actionable threat profile tailored to your organization's needs


Key Insights:


  Threat actors increasingly target known vulnerabilities over sophisticated zero-day exploits

  Supply chain security requires understanding vendor access levels and maintaining secondary suppliers

  AI adoption in cyber attacks remains focused on basic tasks like improving phishing emails and code generation

  Organizations should prioritize patching vulnerabilities in edge devices like VPNs and WAFs

  Building an effective security strategy starts with understanding your organization's specific threat profile

  Partnering with vendors and suppliers can help smaller organizations enhance their security capabilities


Highlights:

[00:00:00] Vulnerability Exploitation Trends

Allison Wikoff reveals that vulnerability exploitation has become a dominant attack vector across both criminal and state-sponsored threat actors. The shift marks a departure from traditional assumptions that mainly espionage-focused groups leveraged vulnerabilities. 

[04:30] Supply Chain Security Essentials  

Wikoff emphasizes that modern supply chain security requires looking beyond just your own organization's defenses. Organizations must thoroughly understand their vendors' access levels and potential impact on operations. 

[07:23] AI in Cybersecurity: Reality vs Hype

Tolin shares that while AI adoption by threat actors is increasing, it hasn't revolutionized attack tactics as many feared. Current AI usage focuses mainly on improving phishing email quality and assisting with malware code generation. 

[14:08] Threat Profile Development

Tolin advocates for organizations to start by understanding what assets would interest attackers rather than chasing every new threat. The rapidly changing threat landscape makes it impossible to defend against everything, requiring a focused approach based on your specific risk profile. 

Episode Resources: 


  Caleb Tolin on LinkedIn


  Allison Wikoff on LinkedIn


  PwC website


  PwC - Year in Retrospect Report 2024


  Rubrik Zero Labs website</description>
      <pubDate>Tue, 24 Jun 2025 20:30:00 -0000</pubDate>
      <itunes:title>Securing the Software Supply Chain</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/43a2b82e-b4f5-11f0-922b-6bdf67a4ea01/image/342ec253c5625304b7c25e5373954ecc.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Data Security Decoded, Allison Wikoff, a 20-year cybersecurity veteran and threat intelligence expert, cuts through the noise and identifies some unique threats within today's security landscape. From the surprising shift toward exploiting old vulnerabilities to the reality of AI-powered attacks, discover why the fundamentals of cybersecurity matter more than ever. Whether you're a CISO navigating supply chain risks or a security analyst trying to separate hype from reality, this episode delivers practical intelligence from someone who tracks threats for a living.

• Understand why known vulnerabilities have become the dominant attack vector (even for criminal groups)
• Learn to identify and manage third-party risks before they become ransomware nightmares
• Discover the truth about AI attacks and why they're not as revolutionary as headlines suggest
• Get actionable steps to strengthen your security posture without massive budget increases</itunes:subtitle>
      <itunes:summary>Navigating Modern Cybersecurity: From Supply Chain Risks to AI Evolution. In this episode of ⁠Data Security Decoded⁠, ⁠Allison Wikoff⁠, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.

What You'll Learn:


  How to prioritize vulnerability management by focusing on critical edge devices and access points

  Why understanding your network architecture is crucial for effective threat defense

  The reality of AI in cyber attacks: current uses, limitations, and practical defense strategies

  How to build supply chain resilience through vendor assessment and backup supplier planning

  Why older vulnerabilities remain a primary attack vector and how to address them effectively

  The framework for developing an actionable threat profile tailored to your organization's needs


Key Insights:


  Threat actors increasingly target known vulnerabilities over sophisticated zero-day exploits

  Supply chain security requires understanding vendor access levels and maintaining secondary suppliers

  AI adoption in cyber attacks remains focused on basic tasks like improving phishing emails and code generation

  Organizations should prioritize patching vulnerabilities in edge devices like VPNs and WAFs

  Building an effective security strategy starts with understanding your organization's specific threat profile

  Partnering with vendors and suppliers can help smaller organizations enhance their security capabilities


Highlights:

[00:00:00] Vulnerability Exploitation Trends

Allison Wikoff reveals that vulnerability exploitation has become a dominant attack vector across both criminal and state-sponsored threat actors. The shift marks a departure from traditional assumptions that mainly espionage-focused groups leveraged vulnerabilities. 

[04:30] Supply Chain Security Essentials  

Wikoff emphasizes that modern supply chain security requires looking beyond just your own organization's defenses. Organizations must thoroughly understand their vendors' access levels and potential impact on operations. 

[07:23] AI in Cybersecurity: Reality vs Hype

Tolin shares that while AI adoption by threat actors is increasing, it hasn't revolutionized attack tactics as many feared. Current AI usage focuses mainly on improving phishing email quality and assisting with malware code generation. 

[14:08] Threat Profile Development

Tolin advocates for organizations to start by understanding what assets would interest attackers rather than chasing every new threat. The rapidly changing threat landscape makes it impossible to defend against everything, requiring a focused approach based on your specific risk profile. 

Episode Resources: 


  Caleb Tolin on LinkedIn


  Allison Wikoff on LinkedIn


  PwC website


  PwC - Year in Retrospect Report 2024


  Rubrik Zero Labs website</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Navigating Modern Cybersecurity: From Supply Chain Risks to AI Evolution. In this episode of <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a>, <a href="https://www.linkedin.com/in/allison-w/">⁠Allison Wikoff⁠</a>, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.</p>
<p><strong>What You'll Learn:</strong></p>
<ul>
  <li>How to prioritize vulnerability management by focusing on critical edge devices and access points</li>
  <li>Why understanding your network architecture is crucial for effective threat defense</li>
  <li>The reality of AI in cyber attacks: current uses, limitations, and practical defense strategies</li>
  <li>How to build supply chain resilience through vendor assessment and backup supplier planning</li>
  <li>Why older vulnerabilities remain a primary attack vector and how to address them effectively</li>
  <li>The framework for developing an actionable threat profile tailored to your organization's needs</li>
</ul>
<p><strong>Key Insights:</strong></p>
<ul>
  <li>Threat actors increasingly target known vulnerabilities over sophisticated zero-day exploits</li>
  <li>Supply chain security requires understanding vendor access levels and maintaining secondary suppliers</li>
  <li>AI adoption in cyber attacks remains focused on basic tasks like improving phishing emails and code generation</li>
  <li>Organizations should prioritize patching vulnerabilities in edge devices like VPNs and WAFs</li>
  <li>Building an effective security strategy starts with understanding your organization's specific threat profile</li>
  <li>Partnering with vendors and suppliers can help smaller organizations enhance their security capabilities</li>
</ul>
<p><strong>Highlights:</strong></p>
<p>[00:00:00] Vulnerability Exploitation Trends</p>
<p>Allison Wikoff reveals that vulnerability exploitation has become a dominant attack vector across both criminal and state-sponsored threat actors. The shift marks a departure from traditional assumptions that mainly espionage-focused groups leveraged vulnerabilities. </p>
<p>[04:30] Supply Chain Security Essentials  </p>
<p>Wikoff emphasizes that modern supply chain security requires looking beyond just your own organization's defenses. Organizations must thoroughly understand their vendors' access levels and potential impact on operations. </p>
<p>[07:23] AI in Cybersecurity: Reality vs Hype</p>
<p>Tolin shares that while AI adoption by threat actors is increasing, it hasn't revolutionized attack tactics as many feared. Current AI usage focuses mainly on improving phishing email quality and assisting with malware code generation. </p>
<p>[14:08] Threat Profile Development</p>
<p>Tolin advocates for organizations to start by understanding what assets would interest attackers rather than chasing every new threat. The rapidly changing threat landscape makes it impossible to defend against everything, requiring a focused approach based on your specific risk profile. </p>
<p><strong>Episode Resources: </strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Allison Wikoff on <a href="https://www.linkedin.com/in/allison-w/">LinkedIn</a>
</li>
  <li>PwC <a href="https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence.html">website</a>
</li>
  <li>PwC - <a href="https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect.html">Year in Retrospect Report 2024</a>
</li>
  <li>Rubrik Zero Labs <a href="https://go.rbrk.co/s2f9gk">website</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1028</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[x0l6yml0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7083972897.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI-Driven Cyber Defense in Action: How AI Agents Are Saving SOC Analysts From Burnout</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/30/notes</link>
      <description>AI-powered SOC platforms are revolutionizing cybersecurity by dramatically reducing false positives and enabling analysts to focus on high-value security work. In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Grant Oviatt⁠, Head of Security Operations at Prophet Security, to explore how AI agents are transforming security operations centers (SOCs) and reshaping the future of cyber defense.

What You'll Learn:


  How AI agents achieve a 95% reduction in false positive alerts while maintaining high investigation accuracy

  Why AI won't replace SOC analysts but will elevate their roles by eliminating tedious tasks

  The framework for building trust in AI security tools through evidence-backed investigations and transparent decision-making

  How AI is lowering barriers to entry for cybersecurity careers by focusing on analytical thinking over technical expertise

  The critical balance between AI automation and human context in security operations.

  How to evaluate and implement AI security solutions, including key criteria for testing accuracy and effectiveness


Highlights:

[02:57] Dramatic Reduction in False Positives Through AI-Driven Investigation

[07:21] AI Augmentation vs. Replacement: Elevating Security Roles

[09:34] Lowering Barriers to Entry in Cybersecurity

[17:41] Building Trust Through Transparent AI Operations

[21:58] Strategic Implementation of AI Security Solutions

Episode Resources:


  Caleb Tolin on LinkedIn


  Grant Oviatt on LinkedIn


  Prophet Security website


  Rubrik Zero Labs website</description>
      <pubDate>Wed, 04 Jun 2025 10:00:00 -0000</pubDate>
      <itunes:title>AI-Driven Cyber Defense in Action: How AI Agents Are Saving SOC Analysts From Burnout</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/454a2ad6-b4f5-11f0-922b-f386f11eb5ee/image/f9425427411719edcdda1621d2d74722.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Grant Oviatt, Head of Security Operations at Prophet Security, to explore the transformative impact of AI agents in SOC environments. From reducing false positives by 95% to dramatically improving incident response times, discover how AI is augmenting human analysts rather than replacing them. Whether you're a CISO looking to optimize your security operations or a SOC analyst concerned about AI's impact on your role, this episode offers practical insights into successfully implementing AI-driven security solutions while building trust in automated systems.

• Learn how AI agents handle tedious security tasks, freeing analysts for strategic work
• Explore real-world success stories of AI-powered threat detection and response
• Understand the critical balance between AI automation and human expertise
• Get practical steps for deploying AI agents in your SOC</itunes:subtitle>
      <itunes:summary>AI-powered SOC platforms are revolutionizing cybersecurity by dramatically reducing false positives and enabling analysts to focus on high-value security work. In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Grant Oviatt⁠, Head of Security Operations at Prophet Security, to explore how AI agents are transforming security operations centers (SOCs) and reshaping the future of cyber defense.

What You'll Learn:


  How AI agents achieve a 95% reduction in false positive alerts while maintaining high investigation accuracy

  Why AI won't replace SOC analysts but will elevate their roles by eliminating tedious tasks

  The framework for building trust in AI security tools through evidence-backed investigations and transparent decision-making

  How AI is lowering barriers to entry for cybersecurity careers by focusing on analytical thinking over technical expertise

  The critical balance between AI automation and human context in security operations.

  How to evaluate and implement AI security solutions, including key criteria for testing accuracy and effectiveness


Highlights:

[02:57] Dramatic Reduction in False Positives Through AI-Driven Investigation

[07:21] AI Augmentation vs. Replacement: Elevating Security Roles

[09:34] Lowering Barriers to Entry in Cybersecurity

[17:41] Building Trust Through Transparent AI Operations

[21:58] Strategic Implementation of AI Security Solutions

Episode Resources:


  Caleb Tolin on LinkedIn


  Grant Oviatt on LinkedIn


  Prophet Security website


  Rubrik Zero Labs website</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AI-powered SOC platforms are revolutionizing cybersecurity by dramatically reducing false positives and enabling analysts to focus on high-value security work. In this episode of <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a>, join <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a> as he sits down with <a href="https://www.linkedin.com/in/grant-oviatt-882111a0/">⁠Grant Oviatt⁠</a>, Head of Security Operations at Prophet Security, to explore how AI agents are transforming security operations centers (SOCs) and reshaping the future of cyber defense.</p>
<p><strong>What You'll Learn:</strong></p>
<ul>
  <li>How AI agents achieve a 95% reduction in false positive alerts while maintaining high investigation accuracy</li>
  <li>Why AI won't replace SOC analysts but will elevate their roles by eliminating tedious tasks</li>
  <li>The framework for building trust in AI security tools through evidence-backed investigations and transparent decision-making</li>
  <li>How AI is lowering barriers to entry for cybersecurity careers by focusing on analytical thinking over technical expertise</li>
  <li>The critical balance between AI automation and human context in security operations.</li>
  <li>How to evaluate and implement AI security solutions, including key criteria for testing accuracy and effectiveness</li>
</ul>
<p><strong>Highlights:</strong></p>
<p>[02:57] Dramatic Reduction in False Positives Through AI-Driven Investigation</p>
<p>[07:21] AI Augmentation vs. Replacement: Elevating Security Roles</p>
<p>[09:34] Lowering Barriers to Entry in Cybersecurity</p>
<p>[17:41] Building Trust Through Transparent AI Operations</p>
<p>[21:58] Strategic Implementation of AI Security Solutions</p>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Grant Oviatt on <a href="https://www.linkedin.com/in/grant-oviatt-882111a0/">LinkedIn</a>
</li>
  <li>Prophet Security <a href="https://www.prophetsecurity.ai/">website</a>
</li>
  <li>Rubrik Zero Labs <a href="https://go.rbrk.co/s2f9gk">website</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1464</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[60mk9pw0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2669725943.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Making Generative AI Transparent</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/29/notes</link>
      <description>In this episode of ⁠Data Security Decoded⁠, host ⁠Caleb Tolin⁠ sits down with ⁠Gabrielle Hibbert⁠, a social policy expert and researcher, about her innovative work developing a nutrition labeling system for generative AI tools. This framework aims to bridge the gap between complex AI technology and consumer understanding, while addressing critical transparency and data privacy concerns.

What You'll Learn:


  How nutrition labels for AI tools can make complex technology accessible to non-technical users

  Why current privacy policies fail to protect consumers, with 93% of users unable to understand them

  The three-pillar approach to AI transparency: general usage information, safety measures, and potential risks

  How companies can balance corporate sensitivity with consumer transparency in AI tool deployment

  Why Generation Z and Millennial users feel increasingly burdened by technology, and how transparency can help

  The regulatory framework needed to standardize AI tool labeling across industries

  How iterative processes and APIs can keep AI nutrition labels current with rapid technological changes

  The importance of multi-stakeholder collaboration in developing effective AI transparency standards


Episode Highlights:


  [00:00:55] Creating Consumer-Friendly AI Transparency Labels

  [04:58] Building Universal Understanding Across Technical Levels

  [22:13] Regulatory Framework Integration

  [27:21] Dynamic Updates Through API Integration


Episode Resources:


  Caleb Tolin on LinkedIn


  Gabrielle Hibbert on LinkedIn


  FCC Broadband Labeling System

  New America – Translating the Artificial Report Page

  FDA Nutrition Label Design Standards</description>
      <pubDate>Tue, 20 May 2025 11:27:00 -0000</pubDate>
      <itunes:title>Making Generative AI Transparent</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/45dc2cb0-b4f5-11f0-922b-3fc277da0044/image/d7c23fd1821dcefdf5a7bd3ecc0ad8d2.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Data Security Decoded, host Caleb Tolin sits down with Gabrielle Hibbert, a pioneering researcher developing a nutrition labeling system for generative AI tools. They explore how this innovative framework could transform transparency in AI, making complex privacy policies and data usage understandable for everyone from consumers to enterprise users. Whether you're implementing AI solutions in your organization or concerned about data privacy, this conversation offers valuable insights into creating better standards for AI transparency and user trust.

• Discover how video game design principles influence user-friendly AI documentation
• Learn why current privacy policies fail to protect consumers
• Explore the regulatory implications of standardized AI labeling
• Understand the challenges of keeping labels current with rapid AI advancement</itunes:subtitle>
      <itunes:summary>In this episode of ⁠Data Security Decoded⁠, host ⁠Caleb Tolin⁠ sits down with ⁠Gabrielle Hibbert⁠, a social policy expert and researcher, about her innovative work developing a nutrition labeling system for generative AI tools. This framework aims to bridge the gap between complex AI technology and consumer understanding, while addressing critical transparency and data privacy concerns.

What You'll Learn:


  How nutrition labels for AI tools can make complex technology accessible to non-technical users

  Why current privacy policies fail to protect consumers, with 93% of users unable to understand them

  The three-pillar approach to AI transparency: general usage information, safety measures, and potential risks

  How companies can balance corporate sensitivity with consumer transparency in AI tool deployment

  Why Generation Z and Millennial users feel increasingly burdened by technology, and how transparency can help

  The regulatory framework needed to standardize AI tool labeling across industries

  How iterative processes and APIs can keep AI nutrition labels current with rapid technological changes

  The importance of multi-stakeholder collaboration in developing effective AI transparency standards


Episode Highlights:


  [00:00:55] Creating Consumer-Friendly AI Transparency Labels

  [04:58] Building Universal Understanding Across Technical Levels

  [22:13] Regulatory Framework Integration

  [27:21] Dynamic Updates Through API Integration


Episode Resources:


  Caleb Tolin on LinkedIn


  Gabrielle Hibbert on LinkedIn


  FCC Broadband Labeling System

  New America – Translating the Artificial Report Page

  FDA Nutrition Label Design Standards</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a>, host <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a> sits down with <a href="https://www.linkedin.com/in/gabrielle-hibbert/">⁠Gabrielle Hibbert⁠</a>, a social policy expert and researcher, about her innovative work developing a nutrition labeling system for generative AI tools. This framework aims to bridge the gap between complex AI technology and consumer understanding, while addressing critical transparency and data privacy concerns.</p>
<p><strong>What You'll Learn:</strong></p>
<ul>
  <li>How nutrition labels for AI tools can make complex technology accessible to non-technical users</li>
  <li>Why current privacy policies fail to protect consumers, with 93% of users unable to understand them</li>
  <li>The three-pillar approach to AI transparency: general usage information, safety measures, and potential risks</li>
  <li>How companies can balance corporate sensitivity with consumer transparency in AI tool deployment</li>
  <li>Why Generation Z and Millennial users feel increasingly burdened by technology, and how transparency can help</li>
  <li>The regulatory framework needed to standardize AI tool labeling across industries</li>
  <li>How iterative processes and APIs can keep AI nutrition labels current with rapid technological changes</li>
  <li>The importance of multi-stakeholder collaboration in developing effective AI transparency standards</li>
</ul>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>[00:00:55] Creating Consumer-Friendly AI Transparency Labels</li>
  <li>[04:58] Building Universal Understanding Across Technical Levels</li>
  <li>[22:13] Regulatory Framework Integration</li>
  <li>[27:21] Dynamic Updates Through API Integration</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Gabrielle Hibbert on <a href="https://www.linkedin.com/in/gabrielle-hibbert/">LinkedIn</a>
</li>
  <li><a href="https://www.fcc.gov/broadbandlabels">FCC Broadband Labeling System</a></li>
  <li><a href="https://www.newamerica.org/future-security/reports/translating-the-artificial/">New America – Translating the Artificial Report Page</a></li>
  <li><a href="https://www.fda.gov/food/nutrition-education-resources-materials/nutrition-facts-label?utm_source=chatgpt.com">FDA Nutrition Label Design Standards</a></li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1934</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61mk98p1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9061607977.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The State of Data Security: A Distributed Crisis</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/28/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast by Rubrik Zero Labs. In this episode, our host ⁠Caleb Tolin⁠ speaks with ⁠Joe Hladik⁠, a veteran security expert with two decades of experience, to explore the evolving landscape of cybersecurity, incident response, and the critical challenges of data security in today's distributed environments.

What You'll Learn:


  How the cybersecurity landscape has evolved from traditional nation-state threats to modern ransomware operations

  Why data sprawl creates complex security challenges as sensitive information moves across platforms and users

  The real-world challenges organizations face when managing vulnerability patches and business continuity

  How identity management has become more complex than just "the new perimeter" in cloud environments

  Why data security posture management is crucial for protecting sensitive information across distributed systems

  The ways modern threat actors combine financial and political motivations in sophisticated attack campaigns



The conversation draws from "The State of Data Security: A Distributed Crisis," a new report from Rubrik Zero Labs, and provides practical insights into how organizations can better manage their data security posture while addressing emerging threats in an increasingly complex digital landscape.

Episode Highlights:

[20:05] Understanding Data Sprawl and Security Posture Management

[27:05] Identity Management as a Dynamic Security Challenge 

[08:40] The Evolution of Cyber Threats and Motivations

[32:28] The Future of Security Research and Response

Episode Resources:


  Caleb Tolin on LinkedIn


  Joe Hladik on LinkedIn


  
The State of Data Security: A Distributed Crisis, Rubrik Zero Labs Report</description>
      <pubDate>Tue, 22 Apr 2025 12:00:00 -0000</pubDate>
      <itunes:title>The State of Data Security: A Distributed Crisis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/46d9b13c-b4f5-11f0-922b-232d53aee409/image/12382774cbac6c75a9c32276a4fb1f65.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. Join our host Caleb Tolin  and Head of Rubrik Zero Labs Joe Hladik as they dive deep into the evolving landscape of cybersecurity, from incident response to emerging threats. Joe shares insights from two decades of experience, including his work on high-profile cases like the SolarWinds breach, and breaks down the complex relationship between nation-state actors and cybercrime. 

Learn about the challenges of data sprawl, identity management, and why treating identity as the new perimeter isn't as simple as it seems. Joe also shares insights into the new report from Rubrik Zero Labs, The State of Data Security: A Distributed Crisis. Whether you're a security practitioner or executive, this episode offers valuable perspectives on data security posture management and the future of threat detection.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast by Rubrik Zero Labs. In this episode, our host ⁠Caleb Tolin⁠ speaks with ⁠Joe Hladik⁠, a veteran security expert with two decades of experience, to explore the evolving landscape of cybersecurity, incident response, and the critical challenges of data security in today's distributed environments.

What You'll Learn:


  How the cybersecurity landscape has evolved from traditional nation-state threats to modern ransomware operations

  Why data sprawl creates complex security challenges as sensitive information moves across platforms and users

  The real-world challenges organizations face when managing vulnerability patches and business continuity

  How identity management has become more complex than just "the new perimeter" in cloud environments

  Why data security posture management is crucial for protecting sensitive information across distributed systems

  The ways modern threat actors combine financial and political motivations in sophisticated attack campaigns



The conversation draws from "The State of Data Security: A Distributed Crisis," a new report from Rubrik Zero Labs, and provides practical insights into how organizations can better manage their data security posture while addressing emerging threats in an increasingly complex digital landscape.

Episode Highlights:

[20:05] Understanding Data Sprawl and Security Posture Management

[27:05] Identity Management as a Dynamic Security Challenge 

[08:40] The Evolution of Cyber Threats and Motivations

[32:28] The Future of Security Research and Response

Episode Resources:


  Caleb Tolin on LinkedIn


  Joe Hladik on LinkedIn


  
The State of Data Security: A Distributed Crisis, Rubrik Zero Labs Report</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a> podcast by Rubrik Zero Labs. In this episode, our host <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a> speaks with <a href="https://www.linkedin.com/in/joseph-h-9248913/">⁠Joe Hladik⁠</a>, a veteran security expert with two decades of experience, to explore the evolving landscape of cybersecurity, incident response, and the critical challenges of data security in today's distributed environments.</p>
<p><strong>What You'll Learn:</strong></p>
<ul>
  <li>How the cybersecurity landscape has evolved from traditional nation-state threats to modern ransomware operations</li>
  <li>Why data sprawl creates complex security challenges as sensitive information moves across platforms and users</li>
  <li>The real-world challenges organizations face when managing vulnerability patches and business continuity</li>
  <li>How identity management has become more complex than just "the new perimeter" in cloud environments</li>
  <li>Why data security posture management is crucial for protecting sensitive information across distributed systems</li>
  <li>The ways modern threat actors combine financial and political motivations in sophisticated attack campaigns<br>
</li>
</ul>
<p>The conversation draws from "The State of Data Security: A Distributed Crisis," a new report from Rubrik Zero Labs, and provides practical insights into how organizations can better manage their data security posture while addressing emerging threats in an increasingly complex digital landscape.</p>
<p><strong>Episode Highlights:</strong></p>
<p>[20:05] Understanding Data Sprawl and Security Posture Management</p>
<p>[27:05] Identity Management as a Dynamic Security Challenge </p>
<p>[08:40] The Evolution of Cyber Threats and Motivations</p>
<p>[32:28] The Future of Security Research and Response</p>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Joe Hladik on <a href="https://www.linkedin.com/in/joseph-h-9248913/">LinkedIn</a>
</li>
  <li>
<a href="https://zerolabs.rubrik.com/reports/state-of-data-security-a-distributed-crisis">The State of Data Security: A Distributed Crisis</a>, Rubrik Zero Labs Report</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1797</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[x0ln8n60]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2412665908.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data Weaponization: How Cyber Attacks Impact the Vulnerable</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/27/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast by Rubrik Zero Labs. In this episode, our host ⁠Caleb Tolin⁠ speaks with ⁠Pavlina Pavlova⁠, a researcher and cybersecurity advocate focusing on data weaponization and its disproportionate impact on vulnerable populations.

Pavlina defines data weaponization as using data to manipulate, deceive, coerce, or attack someone to inflict harm. Her research investigates why cyber attacks and their impacts often have gendered dimensions, with certain populations experiencing more severe consequences.

The conversation explores how attacks on critical infrastructure, particularly healthcare, create immediate impacts. While cyber attacks aren't becoming more sophisticated, they're growing more vicious. Ransomware attacks against healthcare facilities disproportionately affect women, who often serve as caregivers and rely more heavily on healthcare services.

Pavlina examines the geopolitical dimensions of cybercrime, noting how certain nations harbor cybercriminals aligned with their foreign policy goals. These sanctuary jurisdictions make accountability difficult and contribute to attacks aimed at disrupting societal resilience.

Join Caleb and Pavlina as they discuss policy frameworks addressing gender dimensions of data weaponization, explore international cooperation efforts, and share practical advice for under-resourced organizations to improve their cyber resilience despite limited funding. They also examine the critical role of responsible data collection and the importance of donors specifically allocating cybersecurity funding when supporting vulnerable organizations.

Episode Highlights:


  [01:02] Defining Data Weaponization

  [04:11] Critical Infrastructure Targeting

  [09:29] Geopolitical Dimensions of Cybercrime

  [13:24] Policy Frameworks and International Cooperation

  [19:31] Resources for Under-resourced Organizations


Episode Resources:


  Caleb Tolin on LinkedIn


  Pavlina Pavlova on LinkedIn


  
New America report by Pavlina Pavlova

  Cyber Peace Institute

  United Nations Cybercrime Convention</description>
      <pubDate>Tue, 08 Apr 2025 15:42:00 -0000</pubDate>
      <itunes:title>Data Weaponization: How Cyber Attacks Impact the Vulnerable</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/47586748-b4f5-11f0-922b-97ae966af9dc/image/ef5cb2db1e27f4900a50e46466d52d37.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Pavlina Pavlova, a researcher and cybersecurity advocate focused on data weaponization and its disproportionate impact on vulnerable populations. Pavlina defines data weaponization, explains how attacks on healthcare and critical infrastructure affect different populations unequally, and discusses how current policy frameworks fail to address gender dimensions. She also shares practical advice for under-resourced organizations to improve their cyber resilience despite limited funding, emphasizing the importance of international cooperation and responsible data collection practices.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast by Rubrik Zero Labs. In this episode, our host ⁠Caleb Tolin⁠ speaks with ⁠Pavlina Pavlova⁠, a researcher and cybersecurity advocate focusing on data weaponization and its disproportionate impact on vulnerable populations.

Pavlina defines data weaponization as using data to manipulate, deceive, coerce, or attack someone to inflict harm. Her research investigates why cyber attacks and their impacts often have gendered dimensions, with certain populations experiencing more severe consequences.

The conversation explores how attacks on critical infrastructure, particularly healthcare, create immediate impacts. While cyber attacks aren't becoming more sophisticated, they're growing more vicious. Ransomware attacks against healthcare facilities disproportionately affect women, who often serve as caregivers and rely more heavily on healthcare services.

Pavlina examines the geopolitical dimensions of cybercrime, noting how certain nations harbor cybercriminals aligned with their foreign policy goals. These sanctuary jurisdictions make accountability difficult and contribute to attacks aimed at disrupting societal resilience.

Join Caleb and Pavlina as they discuss policy frameworks addressing gender dimensions of data weaponization, explore international cooperation efforts, and share practical advice for under-resourced organizations to improve their cyber resilience despite limited funding. They also examine the critical role of responsible data collection and the importance of donors specifically allocating cybersecurity funding when supporting vulnerable organizations.

Episode Highlights:


  [01:02] Defining Data Weaponization

  [04:11] Critical Infrastructure Targeting

  [09:29] Geopolitical Dimensions of Cybercrime

  [13:24] Policy Frameworks and International Cooperation

  [19:31] Resources for Under-resourced Organizations


Episode Resources:


  Caleb Tolin on LinkedIn


  Pavlina Pavlova on LinkedIn


  
New America report by Pavlina Pavlova

  Cyber Peace Institute

  United Nations Cybercrime Convention</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a> podcast by Rubrik Zero Labs. In this episode, our host <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a> speaks with <a href="https://www.linkedin.com/in/pavlpavlova/">⁠Pavlina Pavlova⁠</a>, a researcher and cybersecurity advocate focusing on data weaponization and its disproportionate impact on vulnerable populations.</p>
<p>Pavlina defines data weaponization as using data to manipulate, deceive, coerce, or attack someone to inflict harm. Her research investigates why cyber attacks and their impacts often have gendered dimensions, with certain populations experiencing more severe consequences.</p>
<p>The conversation explores how attacks on critical infrastructure, particularly healthcare, create immediate impacts. While cyber attacks aren't becoming more sophisticated, they're growing more vicious. Ransomware attacks against healthcare facilities disproportionately affect women, who often serve as caregivers and rely more heavily on healthcare services.</p>
<p>Pavlina examines the geopolitical dimensions of cybercrime, noting how certain nations harbor cybercriminals aligned with their foreign policy goals. These sanctuary jurisdictions make accountability difficult and contribute to attacks aimed at disrupting societal resilience.</p>
<p>Join Caleb and Pavlina as they discuss policy frameworks addressing gender dimensions of data weaponization, explore international cooperation efforts, and share practical advice for under-resourced organizations to improve their cyber resilience despite limited funding. They also examine the critical role of responsible data collection and the importance of donors specifically allocating cybersecurity funding when supporting vulnerable organizations.</p>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>[01:02] Defining Data Weaponization</li>
  <li>[04:11] Critical Infrastructure Targeting</li>
  <li>[09:29] Geopolitical Dimensions of Cybercrime</li>
  <li>[13:24] Policy Frameworks and International Cooperation</li>
  <li>[19:31] Resources for Under-resourced Organizations</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Pavlina Pavlova on <a href="https://www.linkedin.com/in/pavlpavlova/">LinkedIn</a>
</li>
  <li>
<a href="https://www.newamerica.org/future-security/reports/gendered-harms-of-data-weaponization/">New America report</a> by Pavlina Pavlova</li>
  <li><a href="https://cyberpeaceinstitute.org/who-we-are">Cyber Peace Institute</a></li>
  <li><a href="https://www.unodc.org/unodc/en/cybercrime/convention/home.html">United Nations Cybercrime Convention</a></li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[60m6z331]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8121970232.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Civilian Cyber Corps: Protecting Underfunded Organizations</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/26/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast by Rubrik Zero Labs. In this episode, our host, ⁠Caleb Tolin⁠, is joined by ⁠Michael Razeeq⁠, a cybersecurity policy researcher specializing in advocating for Civilian Cyber Corps (C3s). Michael shares insights into how these volunteer forces, C3s, are transforming community cyber defense, addressing workforce shortages, and providing both preventive and reactive cybersecurity services to underfunded organizations.

Michael's research provides a unique perspective on the emergence of the Civilian Cyber Corps across various models, from university cyber clinics to state-level programs. These task forces address gaps in cybersecurity defense where resource constraints leave organizations vulnerable. As a ⁠2024 #ShareTheMicInCyber Fellow at New America⁠ and 2025 Fellow at UC Berkeley ⁠CLTC⁠, he advocates for a "whole society" approach to cybersecurity, highlighting successful implementations in states like Ohio and drawing inspiration from Estonia's cyber defense unit.

Join Caleb and Michael as they explore the operational frameworks of C3s, discuss the challenges of recruiting and vetting volunteers, examine legal considerations for establishing programs, and share insights on measuring both quantitative and qualitative impacts of these initiatives. They also look at the future of C3s through increased collaboration and partnerships like the Cyber Resilience Core.

Episode Highlights:


  [01:30] The Rise of Civilian Cyber Corps (C3s)

  [13:11] Pathways to Establishing C3 Programs

  [19:47] Left of Boom vs Right of Boom Services

  [26:49] Addressing C3 Implementation Challenges


Episode Resources:


  Caleb Tolin on LinkedIn


  Michael Razeeq on LinkedIn


  
“Civilian Cyber Corps: A Model Law for States” by Michael Razeeq for New America

   New America’s #ShareTheMicInCyber Fellowship Program

  UC Berkeley Center for Long-Term Cybersecurity Program


  CISA Cybersecurity Resources for High-Risk Communities</description>
      <pubDate>Thu, 27 Mar 2025 10:00:00 -0000</pubDate>
      <itunes:title>Civilian Cyber Corps: Protecting Underfunded Organizations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/48909446-b4f5-11f0-922b-5f6310fe47e9/image/f7aadcd6151360c9575d7f0563a3d400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host, Caleb Tolin, is joined by Michael Razeeq, a cybersecurity policy researcher specializing in advocating for  Civilian Cyber Corps (C3s). Michael shares insights into how these volunteer forces, C3s, are transforming community cyber defense, addressing workforce shortages, and providing both preventive and reactive cybersecurity services to underfunded organizations.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast by Rubrik Zero Labs. In this episode, our host, ⁠Caleb Tolin⁠, is joined by ⁠Michael Razeeq⁠, a cybersecurity policy researcher specializing in advocating for Civilian Cyber Corps (C3s). Michael shares insights into how these volunteer forces, C3s, are transforming community cyber defense, addressing workforce shortages, and providing both preventive and reactive cybersecurity services to underfunded organizations.

Michael's research provides a unique perspective on the emergence of the Civilian Cyber Corps across various models, from university cyber clinics to state-level programs. These task forces address gaps in cybersecurity defense where resource constraints leave organizations vulnerable. As a ⁠2024 #ShareTheMicInCyber Fellow at New America⁠ and 2025 Fellow at UC Berkeley ⁠CLTC⁠, he advocates for a "whole society" approach to cybersecurity, highlighting successful implementations in states like Ohio and drawing inspiration from Estonia's cyber defense unit.

Join Caleb and Michael as they explore the operational frameworks of C3s, discuss the challenges of recruiting and vetting volunteers, examine legal considerations for establishing programs, and share insights on measuring both quantitative and qualitative impacts of these initiatives. They also look at the future of C3s through increased collaboration and partnerships like the Cyber Resilience Core.

Episode Highlights:


  [01:30] The Rise of Civilian Cyber Corps (C3s)

  [13:11] Pathways to Establishing C3 Programs

  [19:47] Left of Boom vs Right of Boom Services

  [26:49] Addressing C3 Implementation Challenges


Episode Resources:


  Caleb Tolin on LinkedIn


  Michael Razeeq on LinkedIn


  
“Civilian Cyber Corps: A Model Law for States” by Michael Razeeq for New America

   New America’s #ShareTheMicInCyber Fellowship Program

  UC Berkeley Center for Long-Term Cybersecurity Program


  CISA Cybersecurity Resources for High-Risk Communities</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://zerolabs.rubrik.com/podcast">⁠Data Security Decoded⁠</a> podcast by Rubrik Zero Labs. In this episode, our host, <a href="https://www.linkedin.com/in/calebtolin/">⁠Caleb Tolin⁠</a>, is joined by <a href="https://www.linkedin.com/in/michaelrazeeq">⁠Michael Razeeq⁠</a>, a cybersecurity policy researcher specializing in advocating for Civilian Cyber Corps (C3s). Michael shares insights into how these volunteer forces, C3s, are transforming community cyber defense, addressing workforce shortages, and providing both preventive and reactive cybersecurity services to underfunded organizations.</p>
<p>Michael's research provides a unique perspective on the emergence of the Civilian Cyber Corps across various models, from university cyber clinics to state-level programs. These task forces address gaps in cybersecurity defense where resource constraints leave organizations vulnerable. As a <a href="https://www.newamerica.org/our-people/michael-razeeq/">⁠2024 #ShareTheMicInCyber Fellow at New America⁠</a> and 2025 Fellow at UC Berkeley <a href="https://www.linkedin.com/company/cltcberkeley/">⁠CLTC⁠</a>, he advocates for a "whole society" approach to cybersecurity, highlighting successful implementations in states like Ohio and drawing inspiration from Estonia's cyber defense unit.</p>
<p>Join Caleb and Michael as they explore the operational frameworks of C3s, discuss the challenges of recruiting and vetting volunteers, examine legal considerations for establishing programs, and share insights on measuring both quantitative and qualitative impacts of these initiatives. They also look at the future of C3s through increased collaboration and partnerships like the Cyber Resilience Core.</p>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>[01:30] The Rise of Civilian Cyber Corps (C3s)</li>
  <li>[13:11] Pathways to Establishing C3 Programs</li>
  <li>[19:47] Left of Boom vs Right of Boom Services</li>
  <li>[26:49] Addressing C3 Implementation Challenges</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Caleb Tolin on <a href="https://www.linkedin.com/in/calebtolin/">LinkedIn</a>
</li>
  <li>Michael Razeeq on <a href="https://www.linkedin.com/in/michaelrazeeq">LinkedIn</a>
</li>
  <li>
<a href="https://www.newamerica.org/future-security/reports/civilian-cyber-corps-a-model-law-for-states/">“Civilian Cyber Corps: A Model Law for States”</a> by Michael Razeeq for New America</li>
  <li> New America’s <a href="https://www.newamerica.org/future-security/stmic-fellowship/">#ShareTheMicInCyber Fellowship</a> Program</li>
  <li>UC Berkeley <a href="https://cltc.berkeley.edu/">Center for Long-Term Cybersecurity Program</a>
</li>
  <li><a href="https://www.cisa.gov/audiences/high-risk-communities/cybersecurity-resources-high-risk-communities">CISA Cybersecurity Resources for High-Risk Communities</a></li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1899</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[713p5jq0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1137412597.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Effectively Train Your Employees on Cybersecurity</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/25/notes</link>
      <description>Welcome to the Data Security Decoded podcast. In this episode, our host, ⁠Richard Cassidy⁠, is joined by ⁠Carolin Desirée Toepfer⁠, founder of ⁠Cyttraction⁠ and CISO as a Service for multiple organizations across Europe and North America. Carolin shares her journey from building websites and online communities to becoming a cybersecurity leader, offering insights into the unique challenges of European cybersecurity, AI security frameworks, and transforming cybersecurity training into data integrity training that better aligns with business needs.

Carolin's unique position as a CISO for multiple organizations gives her exceptional perspective on cybersecurity challenges across different industries and company sizes. Her approach focuses on addressing gaps in the European cybersecurity landscape where, according to Cisco studies, only 2% of companies are well-prepared. As founder of Cyttraction, an edtech company focused on cybersecurity training, she advocates for reframing security training to emphasize data integrity and digital identity protection, making it more relevant to business stakeholders.

Join Richard and Carolin as they explore the evolution of the CISO role in Europe, discuss the global skills shortage in cybersecurity, examine cultural differences in security awareness between North America and Europe, and share insights on effective training strategies that accommodate modern attention spans and learning preferences.

Episode Highlights:


  00:02 - Introduction and CISO as a Service Role

  01:57 - European Cybersecurity Landscape and Challenges

  03:26 - Path to Becoming a CISO

  06:17 - Regional Differences in Cybersecurity Approaches

  09:53 - AI Governance and Business Impact

  14:39 - Reframing Security Training for Business Alignment

  19:20 - Measuring Training Effectiveness

  24:01 - Future Outlook for Cybersecurity


Episode Resources:


  Richard Cassidy on LinkedIn


  
Carolin Desirée Toepfer on LinkedIn


  
Cyttraction Learning Platform

  
The State of Data Security: The New Rules Breaking the Banks report from Rubrik Zero Labs</description>
      <pubDate>Tue, 18 Mar 2025 11:18:00 -0000</pubDate>
      <itunes:title>How to Effectively Train Your Employees on Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/496611a2-b4f5-11f0-922b-47d23e7cc781/image/e91b44b979f88ac7dd48e7d550c317be.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host, Richard Cassidy, is joined by Carolin Desirée Toepfer, founder of Cyttraction and CISO as a Service for multiple organizations across Europe and North America. Carolin shares her journey from building websites and online communities to becoming a cybersecurity leader, offering insights into the unique challenges of European cybersecurity, AI security frameworks, and transforming cybersecurity training into data integrity training that better aligns with business needs.</itunes:subtitle>
      <itunes:summary>Welcome to the Data Security Decoded podcast. In this episode, our host, ⁠Richard Cassidy⁠, is joined by ⁠Carolin Desirée Toepfer⁠, founder of ⁠Cyttraction⁠ and CISO as a Service for multiple organizations across Europe and North America. Carolin shares her journey from building websites and online communities to becoming a cybersecurity leader, offering insights into the unique challenges of European cybersecurity, AI security frameworks, and transforming cybersecurity training into data integrity training that better aligns with business needs.

Carolin's unique position as a CISO for multiple organizations gives her exceptional perspective on cybersecurity challenges across different industries and company sizes. Her approach focuses on addressing gaps in the European cybersecurity landscape where, according to Cisco studies, only 2% of companies are well-prepared. As founder of Cyttraction, an edtech company focused on cybersecurity training, she advocates for reframing security training to emphasize data integrity and digital identity protection, making it more relevant to business stakeholders.

Join Richard and Carolin as they explore the evolution of the CISO role in Europe, discuss the global skills shortage in cybersecurity, examine cultural differences in security awareness between North America and Europe, and share insights on effective training strategies that accommodate modern attention spans and learning preferences.

Episode Highlights:


  00:02 - Introduction and CISO as a Service Role

  01:57 - European Cybersecurity Landscape and Challenges

  03:26 - Path to Becoming a CISO

  06:17 - Regional Differences in Cybersecurity Approaches

  09:53 - AI Governance and Business Impact

  14:39 - Reframing Security Training for Business Alignment

  19:20 - Measuring Training Effectiveness

  24:01 - Future Outlook for Cybersecurity


Episode Resources:


  Richard Cassidy on LinkedIn


  
Carolin Desirée Toepfer on LinkedIn


  
Cyttraction Learning Platform

  
The State of Data Security: The New Rules Breaking the Banks report from Rubrik Zero Labs</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the Data Security Decoded podcast. In this episode, our host, <a href="https://www.linkedin.com/in/rvcassidy/">⁠Richard Cassidy⁠</a>, is joined by <a href="https://www.linkedin.com/in/cyttraction/">⁠<em>Carolin Desirée Toepfer</em>⁠</a>, founder of <a href="https://linktr.ee/cyttraction">⁠Cyttraction⁠</a> and CISO as a Service for multiple organizations across Europe and North America. Carolin shares her journey from building websites and online communities to becoming a cybersecurity leader, offering insights into the unique challenges of European cybersecurity, AI security frameworks, and transforming cybersecurity training into data integrity training that better aligns with business needs.</p>
<p>Carolin's unique position as a CISO for multiple organizations gives her exceptional perspective on cybersecurity challenges across different industries and company sizes. Her approach focuses on addressing gaps in the European cybersecurity landscape where, according to Cisco studies, only 2% of companies are well-prepared. As founder of Cyttraction, an edtech company focused on cybersecurity training, she advocates for reframing security training to emphasize data integrity and digital identity protection, making it more relevant to business stakeholders.</p>
<p>Join Richard and Carolin as they explore the evolution of the CISO role in Europe, discuss the global skills shortage in cybersecurity, examine cultural differences in security awareness between North America and Europe, and share insights on effective training strategies that accommodate modern attention spans and learning preferences.</p>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>00:02 - Introduction and CISO as a Service Role</li>
  <li>01:57 - European Cybersecurity Landscape and Challenges</li>
  <li>03:26 - Path to Becoming a CISO</li>
  <li>06:17 - Regional Differences in Cybersecurity Approaches</li>
  <li>09:53 - AI Governance and Business Impact</li>
  <li>14:39 - Reframing Security Training for Business Alignment</li>
  <li>19:20 - Measuring Training Effectiveness</li>
  <li>24:01 - Future Outlook for Cybersecurity</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Richard Cassidy on <a href="https://www.linkedin.com/in/rvcassidy/">LinkedIn</a>
</li>
  <li>
<em>Carolin Desirée Toepfer</em> on <a href="https://www.linkedin.com/in/cyttraction/">LinkedIn</a>
</li>
  <li>
<a href="https://linktr.ee/cyttraction">Cyttraction</a> Learning Platform</li>
  <li>
<a href="https://zerolabs.rubrik.com/reports/the-new-rules-of-breaking-the-banks"><em>The State of Data Security: The New Rules Breaking the Banks</em></a> report from Rubrik Zero Labs</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1743</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[m1j2n7j1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6317835127.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Regulatory Readiness and Resilience with Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/24/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠Ghazal Asif⁠, Global VP of Channels, Alliances, and Inside Sales at Rubrik, is joined by ⁠Kris Lovejoy⁠, Global Security and Resilience Practice Leader at ⁠Kyndryl⁠. With over two decades of leadership experience, Kris has built a career focused on advancing technology ecosystems that drive human progress. At Kyndryl, she leads initiatives to design, manage, and safeguard the world's most reliable technology infrastructure.

Previously, Kris served as EY’s Global Cybersecurity Leader, where she worked with diverse teams across 150+ countries to solve complex cybersecurity challenges. She has also held leadership roles at IBM, including VP of IT Risk and Chief Information Security Officer (CISO), and served as CEO of BluVector, a Comcast company. Kris also sits on the board of Dominion Energy, where she supports efforts to achieve Net Zero emissions by 2050.

Join Ghazal and Kris as they explore actionable strategies for integrating cyber resilience into business operations, the importance of regulatory readiness for global organizations navigating new compliance frameworks, and how diverse teams drive innovative problem-solving in cybersecurity.

Episode Highlights: 


  00:00 - Intro

  03:45 - Evolving Perspectives on Compliance and Regulation

  07:25 - Why Diversity in IT and Security Teams Drives Better Solutions

  09:59 - Cybersecurity vs. Cyber Resilience

  14:25 - Practical Strategies for Building Cyber Resilience

  17:40 - Communicating Security Strategies to Non-Technical Leaders

  20:25 - The Paradox of Per Capita Spend

  26:09 - Regulatory Readiness in a Complex Global Landscape

  28:09 - Preparing for Cyber Threats: The Critical Role of Basic Hygiene

  30:18 - Looking Forward: Optimism for the Future of Cybersecurity


Episode Resources


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Ghazal Asif on LinkedIn


  Kris Lovejoy on LinkedIn</description>
      <pubDate>Tue, 21 Jan 2025 10:00:00 -0000</pubDate>
      <itunes:title>Regulatory Readiness and Resilience with Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4a453526-b4f5-11f0-922b-ff28c7dc4881/image/db578b6ade8ca108e767c6b752cabda0.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and gain their insights on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, Ghazal Asif, Global VP of Channels, Alliances, and Inside Sales at Rubrik, is joined by Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl. Together, they discuss Kris’s transformative perspective on regulatory readiness for global organizations navigating new compliance frameworks and building diverse and resilient organizations.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠Ghazal Asif⁠, Global VP of Channels, Alliances, and Inside Sales at Rubrik, is joined by ⁠Kris Lovejoy⁠, Global Security and Resilience Practice Leader at ⁠Kyndryl⁠. With over two decades of leadership experience, Kris has built a career focused on advancing technology ecosystems that drive human progress. At Kyndryl, she leads initiatives to design, manage, and safeguard the world's most reliable technology infrastructure.

Previously, Kris served as EY’s Global Cybersecurity Leader, where she worked with diverse teams across 150+ countries to solve complex cybersecurity challenges. She has also held leadership roles at IBM, including VP of IT Risk and Chief Information Security Officer (CISO), and served as CEO of BluVector, a Comcast company. Kris also sits on the board of Dominion Energy, where she supports efforts to achieve Net Zero emissions by 2050.

Join Ghazal and Kris as they explore actionable strategies for integrating cyber resilience into business operations, the importance of regulatory readiness for global organizations navigating new compliance frameworks, and how diverse teams drive innovative problem-solving in cybersecurity.

Episode Highlights: 


  00:00 - Intro

  03:45 - Evolving Perspectives on Compliance and Regulation

  07:25 - Why Diversity in IT and Security Teams Drives Better Solutions

  09:59 - Cybersecurity vs. Cyber Resilience

  14:25 - Practical Strategies for Building Cyber Resilience

  17:40 - Communicating Security Strategies to Non-Technical Leaders

  20:25 - The Paradox of Per Capita Spend

  26:09 - Regulatory Readiness in a Complex Global Landscape

  28:09 - Preparing for Cyber Threats: The Critical Role of Basic Hygiene

  30:18 - Looking Forward: Optimism for the Future of Cybersecurity


Episode Resources


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Ghazal Asif on LinkedIn


  Kris Lovejoy on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each episode, we discuss cybersecurity with thought leaders and industry experts and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>In this episode, our host, <a href="https://www.linkedin.com/in/ghazalasif/">⁠Ghazal Asif⁠</a>, Global VP of Channels, Alliances, and Inside Sales at Rubrik, is joined by <a href="https://www.linkedin.com/in/klovejoy/">⁠Kris Lovejoy⁠</a>, Global Security and Resilience Practice Leader at <a href="https://www.linkedin.com/company/kyndryl/">⁠Kyndryl⁠</a>. With over two decades of leadership experience, Kris has built a career focused on advancing technology ecosystems that drive human progress. At Kyndryl, she leads initiatives to design, manage, and safeguard the world's most reliable technology infrastructure.</p>
<p>Previously, Kris served as EY’s Global Cybersecurity Leader, where she worked with diverse teams across 150+ countries to solve complex cybersecurity challenges. She has also held leadership roles at IBM, including VP of IT Risk and Chief Information Security Officer (CISO), and served as CEO of BluVector, a Comcast company. Kris also sits on the board of Dominion Energy, where she supports efforts to achieve Net Zero emissions by 2050.</p>
<p>Join Ghazal and Kris as they explore actionable strategies for integrating cyber resilience into business operations, the importance of regulatory readiness for global organizations navigating new compliance frameworks, and how diverse teams drive innovative problem-solving in cybersecurity.</p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>03:45 - Evolving Perspectives on Compliance and Regulation</li>
  <li>07:25 - Why Diversity in IT and Security Teams Drives Better Solutions</li>
  <li>09:59 - Cybersecurity vs. Cyber Resilience</li>
  <li>14:25 - Practical Strategies for Building Cyber Resilience</li>
  <li>17:40 - Communicating Security Strategies to Non-Technical Leaders</li>
  <li>20:25 - The Paradox of Per Capita Spend</li>
  <li>26:09 - Regulatory Readiness in a Complex Global Landscape</li>
  <li>28:09 - Preparing for Cyber Threats: The Critical Role of Basic Hygiene</li>
  <li>30:18 - Looking Forward: Optimism for the Future of Cybersecurity</li>
</ul>
<p><strong>Episode Resources</strong></p>
<ul>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
  <li>Ghazal Asif on <a href="https://www.linkedin.com/in/ghazalasif/">LinkedIn</a>
</li>
  <li>Kris Lovejoy on <a href="https://www.linkedin.com/in/klovejoy/">LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1975</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[m0j2j850]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7653318797.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bridging Cyber Policy Gaps for Rural and Underserved Communities with Nicole Tisdale</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/23/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠Travis Rosiek⁠, Public Sector CTO at Rubrik, is joined by ⁠Nicole Tisdale⁠, Founder of Advocacy Blueprints, former Director of Legislative Affairs for the National Security Council, and author of ⁠Right to Petition⁠. Nicole shares her journey from rural Mississippi to national security leadership, offering insights into cybersecurity equity, workforce development, and public policy's critical role in addressing underserved communities' unique challenges.

Nicole’s leadership has been instrumental in shaping transformative policies, including spearheading The White House’s advocacy that secured a $1 billion cybersecurity grant program and the nation’s first cyber incident reporting law. Representing the United States in global policy dialogues across 30 nations, she has been a prominent voice in advancing security and equity on the international stage. Now as the Founder of Advocacy Blueprints, Nicole continues to champion cybersecurity and civic engagement, equipping organizations and individuals with the tools to influence policy effectively. She is also the author of Right to Petition, a practical guide for empowering citizens in advocacy.

Join Travis and Nicole as they delve into the challenges of bridging policy gaps for underserved communities and her vision for equitable cybersecurity policies that prepare, respond, and recover in today’s digital landscape.

Episode Highlights: 


  00:00 - Intro

  02:57 - Advocacy for Underserved Communities

  06:21 - Addressing Cybersecurity Gaps in Rural and Low-Income Communities

  07:17 - Defensive vs. Offensive Cybersecurity Policy

  12:10 - The Role of Proactive Policy in Cyber Resilience

  18:35 - The Importance of Cybersecurity Workforce Development

  21:41 - Regional Nodes for Workforce Growth and Local Cybersecurity Defense

  25:48 - Connecting Workforce Development to Community Economic Stability

  30:05 - The Ripple Effects of Cyberattacks on Healthcare Systems

  34:57 - Cybersecurity as Critical Infrastructure Protection: The Rural Perspective

  38:39 - Advocacy Blueprints: Empowering Communities to Influence Policy

  45:15 - Effective Advocacy: Known Information and Resource Alignment in Cyber Policy

  48:03 - Advice for Government Leaders During Leadership Transitions

  55:59 - Optimism About Cybersecurity’s Future


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Travis Rosiek on LinkedIn


  Nicole Tisdale on LinkedIn


  
Right to Petition by Nicole Tisdale</description>
      <pubDate>Tue, 07 Jan 2025 10:00:00 -0000</pubDate>
      <itunes:title>Bridging Cyber Policy Gaps for Rural and Underserved Communities with Nicole Tisdale</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4bdf2d56-b4f5-11f0-922b-77cffc9106ed/image/1adf696c081c0a731f7281ac92caa2c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, Travis Rosiek, Public Sector CTO at Rubrik, is joined by Nicole Tisdale, Founder of Advocacy Blueprints, former Director of Legislative Affairs for the National Security Council, and author of Right to Petition. Nicole shares her journey from rural Mississippi to national security leadership, offering insights into cybersecurity equity, workforce development, and public policy's critical role in addressing underserved communities' unique challenges.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠Travis Rosiek⁠, Public Sector CTO at Rubrik, is joined by ⁠Nicole Tisdale⁠, Founder of Advocacy Blueprints, former Director of Legislative Affairs for the National Security Council, and author of ⁠Right to Petition⁠. Nicole shares her journey from rural Mississippi to national security leadership, offering insights into cybersecurity equity, workforce development, and public policy's critical role in addressing underserved communities' unique challenges.

Nicole’s leadership has been instrumental in shaping transformative policies, including spearheading The White House’s advocacy that secured a $1 billion cybersecurity grant program and the nation’s first cyber incident reporting law. Representing the United States in global policy dialogues across 30 nations, she has been a prominent voice in advancing security and equity on the international stage. Now as the Founder of Advocacy Blueprints, Nicole continues to champion cybersecurity and civic engagement, equipping organizations and individuals with the tools to influence policy effectively. She is also the author of Right to Petition, a practical guide for empowering citizens in advocacy.

Join Travis and Nicole as they delve into the challenges of bridging policy gaps for underserved communities and her vision for equitable cybersecurity policies that prepare, respond, and recover in today’s digital landscape.

Episode Highlights: 


  00:00 - Intro

  02:57 - Advocacy for Underserved Communities

  06:21 - Addressing Cybersecurity Gaps in Rural and Low-Income Communities

  07:17 - Defensive vs. Offensive Cybersecurity Policy

  12:10 - The Role of Proactive Policy in Cyber Resilience

  18:35 - The Importance of Cybersecurity Workforce Development

  21:41 - Regional Nodes for Workforce Growth and Local Cybersecurity Defense

  25:48 - Connecting Workforce Development to Community Economic Stability

  30:05 - The Ripple Effects of Cyberattacks on Healthcare Systems

  34:57 - Cybersecurity as Critical Infrastructure Protection: The Rural Perspective

  38:39 - Advocacy Blueprints: Empowering Communities to Influence Policy

  45:15 - Effective Advocacy: Known Information and Resource Alignment in Cyber Policy

  48:03 - Advice for Government Leaders During Leadership Transitions

  55:59 - Optimism About Cybersecurity’s Future


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Travis Rosiek on LinkedIn


  Nicole Tisdale on LinkedIn


  
Right to Petition by Nicole Tisdale</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">Rubrik Zero Labs⁠</a>. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>In this episode, our host, <a href="https://www.linkedin.com/in/travis-rosiek-3255b669/">⁠Travis Rosiek⁠</a>, Public Sector CTO at Rubrik, is joined by <a href="https://www.linkedin.com/in/nicoletisdale/">⁠Nicole Tisdale⁠</a>, Founder of Advocacy Blueprints, former Director of Legislative Affairs for the National Security Council, and author of <a href="https://nicoletisdale.com/author/">⁠<em>Right to Petition</em>⁠</a>. Nicole shares her journey from rural Mississippi to national security leadership, offering insights into cybersecurity equity, workforce development, and public policy's critical role in addressing underserved communities' unique challenges.</p>
<p>Nicole’s leadership has been instrumental in shaping transformative policies, including spearheading The White House’s advocacy that secured a $1 billion cybersecurity grant program and the nation’s first cyber incident reporting law. Representing the United States in global policy dialogues across 30 nations, she has been a prominent voice in advancing security and equity on the international stage. Now as the Founder of Advocacy Blueprints, Nicole continues to champion cybersecurity and civic engagement, equipping organizations and individuals with the tools to influence policy effectively. She is also the author of Right to Petition, a practical guide for empowering citizens in advocacy.</p>
<p>Join Travis and Nicole as they delve into the challenges of bridging policy gaps for underserved communities and her vision for equitable cybersecurity policies that prepare, respond, and recover in today’s digital landscape.</p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>02:57 - Advocacy for Underserved Communities</li>
  <li>06:21 - Addressing Cybersecurity Gaps in Rural and Low-Income Communities</li>
  <li>07:17 - Defensive vs. Offensive Cybersecurity Policy</li>
  <li>12:10 - The Role of Proactive Policy in Cyber Resilience</li>
  <li>18:35 - The Importance of Cybersecurity Workforce Development</li>
  <li>21:41 - Regional Nodes for Workforce Growth and Local Cybersecurity Defense</li>
  <li>25:48 - Connecting Workforce Development to Community Economic Stability</li>
  <li>30:05 - The Ripple Effects of Cyberattacks on Healthcare Systems</li>
  <li>34:57 - Cybersecurity as Critical Infrastructure Protection: The Rural Perspective</li>
  <li>38:39 - Advocacy Blueprints: Empowering Communities to Influence Policy</li>
  <li>45:15 - Effective Advocacy: Known Information and Resource Alignment in Cyber Policy</li>
  <li>48:03 - Advice for Government Leaders During Leadership Transitions</li>
  <li>55:59 - Optimism About Cybersecurity’s Future</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
  <li>Travis Rosiek on <a href="https://www.linkedin.com/in/travis-rosiek-3255b669/">LinkedIn</a>
</li>
  <li>Nicole Tisdale on <a href="https://www.linkedin.com/in/nicoletisdale/">LinkedIn</a>
</li>
  <li>
<a href="https://nicoletisdale.com/author/"><em>Right to Petition</em></a><em> </em>by Nicole Tisdale</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>3768</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[z1r3pkx0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8851160573.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bridging the Gap Between IT and Security with Marcela Escobar-Alava and Joe Stenaka, CIO and CISO of the U.S. Social Security Administration</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/22/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠Mike Tornincasa⁠, Chief Business Officer at Rubrik, is joined by ⁠Marcela Escobar-Alava⁠, CIO of the Social Security Administration⁠, and ⁠Joe Stenaka⁠, SSA’s CISO for an insightful conversation on IT and cybersecurity collaboration. Marcela Escobar-Alava is a seasoned technology executive with deep expertise in building high-performing teams and aligning technology solutions with business objectives. Known for her ability to innovate under tight deadlines, Marcela brings years of experience in managing global application development, transforming organizational operations, and driving impactful business outcomes. Her strategic leadership and problem-solving approach have made her a trusted leader in rapidly evolving environments.

Joe Stenaka, the Associate Commissioner and CISO at SSA, has spent decades protecting critical information systems across government agencies, including the Department of Veterans Affairs and the National Security Agency. With a pragmatic leadership style, Joe emphasizes collaboration and enabling secure IT solutions while minimizing risks. As an educator and industry thought leader, he is committed to fostering the next generation of cybersecurity professionals.

Together, Marcela and Joe share how their unique partnership ensures operational efficiency and robust security for one of the largest independent government agencies, serving over 64 million Americans.

Episode Highlights: 


  00:00 - Intro

  00:58 - Marcela’s role as CIO: Bridging strategic and operational objectives

  02:59 - Joe’s leadership in advancing SSA’s cybersecurity framework

  05:12 - Establishing lockstep collaboration between IT and security

  10:30 - Balancing the speed of IT innovation with robust security measures

  18:14 - Lessons from Marcela’s past: Ransomware scars and fostering vigilance

  24:15 - The rise of AI: Ethical considerations, security risks, and opportunities

  29:27 - Reflections on leadership: From cryptology to servant leadership

  32:12 - The future of cybersecurity: Opportunities and challenges


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Marcela Escobar-Alava on LinkedIn 

  Joe Stenaka on LinkedIn


  Mike Tornincasa on LinkedIn</description>
      <pubDate>Wed, 18 Dec 2024 10:00:00 -0000</pubDate>
      <itunes:title>Bridging the Gap Between IT and Security with Marcela Escobar-Alava and Joe Stenaka, CIO and CISO of the U.S. Social Security Administration</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4cba82ac-b4f5-11f0-922b-575887067c8d/image/91b4d3b00fffd212df6197cbccc1fffc.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, Mike Tornincasa, Chief Business Officer at Rubrik, is joined by Marcela Escobar-Alava, CIO of the Social Security Administration, and Joe Stenaka, SSA’s CISO. Together, they discuss their collaborative approach to balancing innovation and security, their experiences with ransomware, and how they’re leveraging AI to safeguard public services while modernizing IT infrastructure.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠Mike Tornincasa⁠, Chief Business Officer at Rubrik, is joined by ⁠Marcela Escobar-Alava⁠, CIO of the Social Security Administration⁠, and ⁠Joe Stenaka⁠, SSA’s CISO for an insightful conversation on IT and cybersecurity collaboration. Marcela Escobar-Alava is a seasoned technology executive with deep expertise in building high-performing teams and aligning technology solutions with business objectives. Known for her ability to innovate under tight deadlines, Marcela brings years of experience in managing global application development, transforming organizational operations, and driving impactful business outcomes. Her strategic leadership and problem-solving approach have made her a trusted leader in rapidly evolving environments.

Joe Stenaka, the Associate Commissioner and CISO at SSA, has spent decades protecting critical information systems across government agencies, including the Department of Veterans Affairs and the National Security Agency. With a pragmatic leadership style, Joe emphasizes collaboration and enabling secure IT solutions while minimizing risks. As an educator and industry thought leader, he is committed to fostering the next generation of cybersecurity professionals.

Together, Marcela and Joe share how their unique partnership ensures operational efficiency and robust security for one of the largest independent government agencies, serving over 64 million Americans.

Episode Highlights: 


  00:00 - Intro

  00:58 - Marcela’s role as CIO: Bridging strategic and operational objectives

  02:59 - Joe’s leadership in advancing SSA’s cybersecurity framework

  05:12 - Establishing lockstep collaboration between IT and security

  10:30 - Balancing the speed of IT innovation with robust security measures

  18:14 - Lessons from Marcela’s past: Ransomware scars and fostering vigilance

  24:15 - The rise of AI: Ethical considerations, security risks, and opportunities

  29:27 - Reflections on leadership: From cryptology to servant leadership

  32:12 - The future of cybersecurity: Opportunities and challenges


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Marcela Escobar-Alava on LinkedIn 

  Joe Stenaka on LinkedIn


  Mike Tornincasa on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>In this episode, our host, <a href="https://www.linkedin.com/in/mike-tornincasa-aa44484/">⁠Mike Tornincasa⁠</a>, Chief Business Officer at Rubrik, is joined by <a href="https://www.linkedin.com/in/marcelabailey/?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app">⁠Marcela Escobar-Alava⁠</a>, CIO of the <a href="https://www.ssa.gov/">Social Security Administration⁠</a>, and <a href="https://www.linkedin.com/in/joe-stenaka-a5530440/">⁠Joe Stenaka⁠</a>, SSA’s CISO for an insightful conversation on IT and cybersecurity collaboration. Marcela Escobar-Alava is a seasoned technology executive with deep expertise in building high-performing teams and aligning technology solutions with business objectives. Known for her ability to innovate under tight deadlines, Marcela brings years of experience in managing global application development, transforming organizational operations, and driving impactful business outcomes. Her strategic leadership and problem-solving approach have made her a trusted leader in rapidly evolving environments.</p>
<p>Joe Stenaka, the Associate Commissioner and CISO at SSA, has spent decades protecting critical information systems across government agencies, including the Department of Veterans Affairs and the National Security Agency. With a pragmatic leadership style, Joe emphasizes collaboration and enabling secure IT solutions while minimizing risks. As an educator and industry thought leader, he is committed to fostering the next generation of cybersecurity professionals.</p>
<p>Together, Marcela and Joe share how their unique partnership ensures operational efficiency and robust security for one of the largest independent government agencies, serving over 64 million Americans.</p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>00:58 - Marcela’s role as CIO: Bridging strategic and operational objectives</li>
  <li>02:59 - Joe’s leadership in advancing SSA’s cybersecurity framework</li>
  <li>05:12 - Establishing lockstep collaboration between IT and security</li>
  <li>10:30 - Balancing the speed of IT innovation with robust security measures</li>
  <li>18:14 - Lessons from Marcela’s past: Ransomware scars and fostering vigilance</li>
  <li>24:15 - The rise of AI: Ethical considerations, security risks, and opportunities</li>
  <li>29:27 - Reflections on leadership: From cryptology to servant leadership</li>
  <li>32:12 - The future of cybersecurity: Opportunities and challenges</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
  <li>Marcela Escobar-Alava on <a href="https://www.linkedin.com/in/marcelabailey/?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app">LinkedIn</a> </li>
  <li>Joe Stenaka on <a href="https://www.linkedin.com/in/joe-stenaka-a5530440/">LinkedIn</a>
</li>
  <li>Mike Tornincasa on <a href="https://www.linkedin.com/in/mike-tornincasa-aa44484/">LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>2184</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[703pmp91]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7937806928.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Navigating Cybersecurity Through Leadership Transitions with Maria Roat, Former US Deputy Federal CIO</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/21/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

In this episode, our host, ⁠Travis Rosiek⁠, Public Sector CTO at Rubrik, is joined by Maria Roat⁠, former Deputy Federal CIO of the United States, and a seasoned Information Technology and Cybersecurity Executive with over three decades of experience. Maria has led transformative initiatives across federal agencies, including launching the FedRAMP program, which standardized cloud security protocols across government, and helping government agencies remain resilient through administration changes.

Maria’s leadership during the COVID-19 pandemic was instrumental in enabling a large-scale remote workforce and deploying resilient platforms that supported the rapid distribution of $300 billion in relief funds. Her efforts modernized outdated systems, reduced technical debt, and streamlined operations across the Small Business Administration, transforming it into an agile organization prepared to address emerging challenges.

Join Travis and Maria as they explore her extraordinary journey in cybersecurity and technology leadership, the evolution of FedRAMP, and her insights on aligning innovation with mission-driven goals.

Episode Highlights: 


  00:00 - Intro

  04:00 - Navigating Large-Scale Federal Technology Transformation

  05:30 - Insights on Leadership in Technology from the Navy to Federal CIO

  10:00 - Leadership Challenges as a Woman in Tech

  18:16 - The Evolution of FedRAMP and Cloud Security Standards

  34:05 - Addressing Cyber Threats in Transition Periods

  37:19 - Building a Culture of Zero Trust and Cyber Resilience

  42:00 - Cybersecurity Lessons for Healthcare Organizations


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Travis Rosiek on LinkedIn


  Maria Roat on LinkedIn</description>
      <pubDate>Tue, 03 Dec 2024 10:00:00 -0000</pubDate>
      <itunes:title>Navigating Cybersecurity Through Leadership Transitions with Maria Roat, Former US Deputy Federal CIO</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4d403e06-b4f5-11f0-922b-0bc17df96e3f/image/f0c6fa8a94ca583b0117005a87e9f7e6.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, Travis Rosiek, Public Sector CTO at Rubrik, is joined by Maria Roat, former Deputy Federal CIO of the United States. Together, they explore Maria's cybersecurity and federal technology career, maintaining resilience through administration transitions, and her leadership insights on aligning security strategies with mission-driven initiatives.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

In this episode, our host, ⁠Travis Rosiek⁠, Public Sector CTO at Rubrik, is joined by Maria Roat⁠, former Deputy Federal CIO of the United States, and a seasoned Information Technology and Cybersecurity Executive with over three decades of experience. Maria has led transformative initiatives across federal agencies, including launching the FedRAMP program, which standardized cloud security protocols across government, and helping government agencies remain resilient through administration changes.

Maria’s leadership during the COVID-19 pandemic was instrumental in enabling a large-scale remote workforce and deploying resilient platforms that supported the rapid distribution of $300 billion in relief funds. Her efforts modernized outdated systems, reduced technical debt, and streamlined operations across the Small Business Administration, transforming it into an agile organization prepared to address emerging challenges.

Join Travis and Maria as they explore her extraordinary journey in cybersecurity and technology leadership, the evolution of FedRAMP, and her insights on aligning innovation with mission-driven goals.

Episode Highlights: 


  00:00 - Intro

  04:00 - Navigating Large-Scale Federal Technology Transformation

  05:30 - Insights on Leadership in Technology from the Navy to Federal CIO

  10:00 - Leadership Challenges as a Woman in Tech

  18:16 - The Evolution of FedRAMP and Cloud Security Standards

  34:05 - Addressing Cyber Threats in Transition Periods

  37:19 - Building a Culture of Zero Trust and Cyber Resilience

  42:00 - Cybersecurity Lessons for Healthcare Organizations


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Travis Rosiek on LinkedIn


  Maria Roat on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.</p>
<p>In this episode, our host, <a href="https://www.linkedin.com/in/travis-rosiek-3255b669/">⁠Travis Rosiek⁠</a>, Public Sector CTO at Rubrik, is joined by <a href="https://www.linkedin.com/in/mariaroat/">Maria Roat⁠</a>, former Deputy Federal CIO of the United States, and a seasoned Information Technology and Cybersecurity Executive with over three decades of experience. Maria has led transformative initiatives across federal agencies, including launching the FedRAMP program, which standardized cloud security protocols across government, and helping government agencies remain resilient through administration changes.</p>
<p>Maria’s leadership during the COVID-19 pandemic was instrumental in enabling a large-scale remote workforce and deploying resilient platforms that supported the rapid distribution of $300 billion in relief funds. Her efforts modernized outdated systems, reduced technical debt, and streamlined operations across the Small Business Administration, transforming it into an agile organization prepared to address emerging challenges.</p>
<p>Join Travis and Maria as they explore her extraordinary journey in cybersecurity and technology leadership, the evolution of FedRAMP, and her insights on aligning innovation with mission-driven goals.</p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>04:00 - Navigating Large-Scale Federal Technology Transformation</li>
  <li>05:30 - Insights on Leadership in Technology from the Navy to Federal CIO</li>
  <li>10:00 - Leadership Challenges as a Woman in Tech</li>
  <li>18:16 - The Evolution of FedRAMP and Cloud Security Standards</li>
  <li>34:05 - Addressing Cyber Threats in Transition Periods</li>
  <li>37:19 - Building a Culture of Zero Trust and Cyber Resilience</li>
  <li>42:00 - Cybersecurity Lessons for Healthcare Organizations</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
  <li>Travis Rosiek on <a href="https://www.linkedin.com/in/travis-rosiek-3255b669/">LinkedIn</a>
</li>
  <li>Maria Roat on <a href="https://www.linkedin.com/in/mariaroat/">LinkedIn</a><br>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>3009</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[v07vyx91]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW3520628166.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Embracing Conscious Leadership and AI Integration with Aysha Khan, CIO and CISO at Treasure Data</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/20/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠John Murphy⁠, Global Field Chief Security Officer at Rubrik, is joined by ⁠Aysha Khan⁠, CIO and CISO at ⁠Treasure Data⁠, a customer data platform (CDP) that combines batch and real-time data to personalize journeys with Al. She has over 20 years of experience managing Information Technology and Security at Fortune 500 companies. She is passionate about aligning strategy with agile execution to drive business results and customer satisfaction. She has successfully built and led technology, security, compliance, risk, and operations functions from scratch, as well as transformed disjointed organizations into cohesive and collaborative teams.

Aysha is also an advisor with Silicon Valley CISOs Investments, a Clear Ventures CXO council member, an investor in many early-stage startups, a DEIB (diversity, equity, inclusion, and belonging) executive, a speaker, and a life coach who strongly believes in connecting people, purpose, and performance to bring the best out of others and achieve sustained and predictable results.

Join John and Aysha as they discuss the dual challenges of enabling innovation while maintaining security and navigating the rapidly evolving landscape of AI.

Episode Highlights: 


  00:00 - Intro

  00:20 - Integrating Conscious Leadership into Cybersecurity Strategy

  05:19 - Navigating AI Integration and Innovation

  08:05 - Understanding Organizational Context and Building Relationships

  21:25 - Balancing Business Risks and IT Security Alignment

  29:54 - Developing Security Practices in SaaS Organizations

  32:19 - Building Teams and Fostering Growth Mindsets

  35:58 - Empowering Business Leaders to Be the Example

  38:17 - Optimistic Outlook on the Future of AI and Cybersecurity


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Aysha Khan on LinkedIn 

  John Murphy on LinkedIn</description>
      <pubDate>Tue, 26 Nov 2024 10:00:00 -0000</pubDate>
      <itunes:title>Embracing Conscious Leadership and AI Integration with Aysha Khan, CIO and CISO at Treasure Data</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4e62cf88-b4f5-11f0-922b-67d623d0f3cf/image/c21b61c3b2ff2e118a4c1d71ec96af2f.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, John Murphy, Global Field Chief Security Officer at Rubrik, is joined by Aysha Khan, CIO and CISO at Treasure Data. Join them as they discuss the integration of conscious leadership within cybersecurity frameworks, the challenges and opportunities presented by AI, and how organizational alignment can drive innovation and security simultaneously.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠John Murphy⁠, Global Field Chief Security Officer at Rubrik, is joined by ⁠Aysha Khan⁠, CIO and CISO at ⁠Treasure Data⁠, a customer data platform (CDP) that combines batch and real-time data to personalize journeys with Al. She has over 20 years of experience managing Information Technology and Security at Fortune 500 companies. She is passionate about aligning strategy with agile execution to drive business results and customer satisfaction. She has successfully built and led technology, security, compliance, risk, and operations functions from scratch, as well as transformed disjointed organizations into cohesive and collaborative teams.

Aysha is also an advisor with Silicon Valley CISOs Investments, a Clear Ventures CXO council member, an investor in many early-stage startups, a DEIB (diversity, equity, inclusion, and belonging) executive, a speaker, and a life coach who strongly believes in connecting people, purpose, and performance to bring the best out of others and achieve sustained and predictable results.

Join John and Aysha as they discuss the dual challenges of enabling innovation while maintaining security and navigating the rapidly evolving landscape of AI.

Episode Highlights: 


  00:00 - Intro

  00:20 - Integrating Conscious Leadership into Cybersecurity Strategy

  05:19 - Navigating AI Integration and Innovation

  08:05 - Understanding Organizational Context and Building Relationships

  21:25 - Balancing Business Risks and IT Security Alignment

  29:54 - Developing Security Practices in SaaS Organizations

  32:19 - Building Teams and Fostering Growth Mindsets

  35:58 - Empowering Business Leaders to Be the Example

  38:17 - Optimistic Outlook on the Future of AI and Cybersecurity


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Aysha Khan on LinkedIn 

  John Murphy on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>In this episode, our host, <a href="https://www.linkedin.com/in/johnmurphyphd/">⁠John Murphy⁠</a>, Global Field Chief Security Officer at Rubrik, is joined by <a href="https://www.linkedin.com/in/aysha-khan-77ba9014/">⁠Aysha Khan⁠</a>, CIO and CISO at <a href="https://www.treasuredata.com/">⁠Treasure Data⁠</a>, a customer data platform (CDP) that combines batch and real-time data to personalize journeys with Al. She has over 20 years of experience managing Information Technology and Security at Fortune 500 companies. She is passionate about aligning strategy with agile execution to drive business results and customer satisfaction. She has successfully built and led technology, security, compliance, risk, and operations functions from scratch, as well as transformed disjointed organizations into cohesive and collaborative teams.</p>
<p>Aysha is also an advisor with Silicon Valley CISOs Investments, a Clear Ventures CXO council member, an investor in many early-stage startups, a DEIB (diversity, equity, inclusion, and belonging) executive, a speaker, and a life coach who strongly believes in connecting people, purpose, and performance to bring the best out of others and achieve sustained and predictable results.</p>
<p>Join John and Aysha as they discuss the dual challenges of enabling innovation while maintaining security and navigating the rapidly evolving landscape of AI.</p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>00:20 - Integrating Conscious Leadership into Cybersecurity Strategy</li>
  <li>05:19 - Navigating AI Integration and Innovation</li>
  <li>08:05 - Understanding Organizational Context and Building Relationships</li>
  <li>21:25 - Balancing Business Risks and IT Security Alignment</li>
  <li>29:54 - Developing Security Practices in SaaS Organizations</li>
  <li>32:19 - Building Teams and Fostering Growth Mindsets</li>
  <li>35:58 - Empowering Business Leaders to Be the Example</li>
  <li>38:17 - Optimistic Outlook on the Future of AI and Cybersecurity</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
  <li>Aysha Khan on <a href="https://www.linkedin.com/in/aysha-khan-77ba9014/">LinkedIn</a> </li>
  <li>John Murphy on <a href="https://www.linkedin.com/in/johnmurphyphd/">LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>2498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[x16l7xp1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9373566556.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cultivating a Year-Round Cybersecurity Culture:  Data Security Decoded Greatest Hits</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/19/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts to get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this special episode, we wrap up Cybersecurity Awareness Month and look back on some of the most illuminating conversations from previous episodes. Tune in to hear ⁠Candy Alexander⁠, CISO &amp; Security Practice Lead at ⁠NeuEon⁠, on navigating the complexities of data governance, and ⁠Sue Bergamo⁠, CISO and CIO at ⁠BTE Partners⁠, delve into the world of senior leadership in global cybersecurity. ⁠Renata Spinks⁠, Former SES - Deputy CIO IC4, US Marine Corps, and current CEO at CyberSec International explores the major changes in cyber threats over the last 20 years, while ⁠Anahi Santiago⁠, Chief Information Security Officer at ⁠ChristianaCare⁠, highlights the challenges facing healthcare cybersecurity, and ⁠Wendi Whitmore⁠, Senior Vice President, Unit 42 at ⁠Palo Alto Networks⁠, considers various types of cyber threats, including ransomware, cryptocurrency theft, and underreported nation-state attacks. Additionally, ⁠Sandra Joyce⁠, VP of Google Threat Intelligence at Google, discusses the importance of well-being among cybersecurity professionals, and ⁠Marene Allison⁠, former CISO at Johnson &amp; Johnson, notes the tendency for organizations to overqualify candidates, highlighting the value of giving individuals a chance to grow into their roles. 

Episode Highlights: 


  00:00 - Intro 

  06:32 - Marene Allison on hiring for potential, not perfection

  07:26 - Wendi Whitmore on overcoming institutional challenges 

  08:09 - Renata Spinks on diversity in the workplace

  08:32 - Sandra Joyce on why ‘crew rest’ is essential for mission-driven professionals

  08:57 - Sue Bergamo on balancing operational needs of IT and the demands of cybersecurity

  11:41 - Anahi Santiago on fostering a culture of cybersecurity awareness in healthcare organizations 

  14:39 - Candy Alexander on why security is everyone’s responsibility 

  20:32 - Candy Alexander on advice for organizations 


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Candy Alexander on LinkedIn 

  Sue Bergamo on LinkedIn


  Renata Spinks on LinkedIn


  Anahi Santiago on LinkedIn


  Wendi Whitmore on LinkedIn


  Marene Allison on LinkedIn


  Sandra Joyce on LinkedIn</description>
      <pubDate>Thu, 07 Nov 2024 10:00:00 -0000</pubDate>
      <itunes:title>Cultivating a Year-Round Cybersecurity Culture:  Data Security Decoded Greatest Hits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4f8b394a-b4f5-11f0-922b-93bc35b32f31/image/0d03adb2feebcf9f9e1547468ed8ae58.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs, where we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this special episode, we wrap up Cybersecurity Awareness Month and look back on some of the most illuminating conversations from previous episodes. Tune in to hear Candy Alexander, CISO &amp; Security Practice Lead at NeuEon, on navigating the complexities of data governance, and Sue Bergamo, CISO and CIO at BTE Partners, delve into the world of senior leadership in global cybersecurity. Renata Spinks, Former SES - Deputy CIO IC4, US Marine Corps, and current CEO at CyberSec International explores the major changes in cyber threats over the last 20 years, while Anahi Santiago, Chief Information Security Officer at ChristianaCare, highlights the challenges facing healthcare cybersecurity, and Wendi Whitmore, Senior Vice President, Unit 42 at Palo Alto Networks, considers various types of cyber threats, including ransomware, cryptocurrency theft, and underreported nation-state attacks. Additionally, Sandra Joyce, VP of Google Threat Intelligence at Google, discusses the importance of well-being among cybersecurity professionals, and Marene Allison, once CISO at Johnson &amp; Johnson, shares her thoughts on the tendency for organizations to overqualify candidates, emphasizing the value of allowing individuals to grow into their roles. 

Remember that, while Cybersecurity Awareness Month is limited to October, fostering awareness and vigilance should be a year-round priority.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts to get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this special episode, we wrap up Cybersecurity Awareness Month and look back on some of the most illuminating conversations from previous episodes. Tune in to hear ⁠Candy Alexander⁠, CISO &amp; Security Practice Lead at ⁠NeuEon⁠, on navigating the complexities of data governance, and ⁠Sue Bergamo⁠, CISO and CIO at ⁠BTE Partners⁠, delve into the world of senior leadership in global cybersecurity. ⁠Renata Spinks⁠, Former SES - Deputy CIO IC4, US Marine Corps, and current CEO at CyberSec International explores the major changes in cyber threats over the last 20 years, while ⁠Anahi Santiago⁠, Chief Information Security Officer at ⁠ChristianaCare⁠, highlights the challenges facing healthcare cybersecurity, and ⁠Wendi Whitmore⁠, Senior Vice President, Unit 42 at ⁠Palo Alto Networks⁠, considers various types of cyber threats, including ransomware, cryptocurrency theft, and underreported nation-state attacks. Additionally, ⁠Sandra Joyce⁠, VP of Google Threat Intelligence at Google, discusses the importance of well-being among cybersecurity professionals, and ⁠Marene Allison⁠, former CISO at Johnson &amp; Johnson, notes the tendency for organizations to overqualify candidates, highlighting the value of giving individuals a chance to grow into their roles. 

Episode Highlights: 


  00:00 - Intro 

  06:32 - Marene Allison on hiring for potential, not perfection

  07:26 - Wendi Whitmore on overcoming institutional challenges 

  08:09 - Renata Spinks on diversity in the workplace

  08:32 - Sandra Joyce on why ‘crew rest’ is essential for mission-driven professionals

  08:57 - Sue Bergamo on balancing operational needs of IT and the demands of cybersecurity

  11:41 - Anahi Santiago on fostering a culture of cybersecurity awareness in healthcare organizations 

  14:39 - Candy Alexander on why security is everyone’s responsibility 

  20:32 - Candy Alexander on advice for organizations 


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Candy Alexander on LinkedIn 

  Sue Bergamo on LinkedIn


  Renata Spinks on LinkedIn


  Anahi Santiago on LinkedIn


  Wendi Whitmore on LinkedIn


  Marene Allison on LinkedIn


  Sandra Joyce on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each installment, we discuss cybersecurity with thought leaders and industry experts to get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>In this special episode, we wrap up Cybersecurity Awareness Month and look back on some of the most illuminating conversations from previous episodes. Tune in to hear <a href="https://www.linkedin.com/in/candyalexander/">⁠Candy Alexander⁠</a>, CISO &amp; Security Practice Lead at <a href="https://www.neueon.com/">⁠NeuEon⁠</a>, on navigating the complexities of data governance, and <a href="https://www.linkedin.com/in/suebergamo/">⁠Sue Bergamo⁠</a>, CISO and CIO at <a href="https://www.btepartners.com/">⁠BTE Partners⁠</a>, delve into the world of senior leadership in global cybersecurity. <a href="https://www.linkedin.com/in/rcs21/">⁠Renata Spinks⁠</a>, Former SES - Deputy CIO IC4, US Marine Corps, and current CEO at CyberSec International explores the major changes in cyber threats over the last 20 years, while <a href="https://www.linkedin.com/in/anahi-santiago/">⁠Anahi Santiago⁠</a>, Chief Information Security Officer at <a href="https://christianacare.org/us/en">⁠ChristianaCare⁠</a>, highlights the challenges facing healthcare cybersecurity, and <a href="https://www.linkedin.com/in/wendiwhitmore2/">⁠Wendi Whitmore⁠</a>, Senior Vice President, Unit 42 at <a href="https://www.paloaltonetworks.com/">⁠Palo Alto Networks⁠</a>, considers various types of cyber threats, including ransomware, cryptocurrency theft, and underreported nation-state attacks. Additionally, <a href="https://www.linkedin.com/in/sandrajoyce/">⁠Sandra Joyce⁠</a>, VP of Google Threat Intelligence at Google, discusses the importance of well-being among cybersecurity professionals, and <a href="https://www.linkedin.com/in/marene-allison-9508611/">⁠Marene Allison⁠</a>, former CISO at Johnson &amp; Johnson, notes the tendency for organizations to overqualify candidates, highlighting the value of giving individuals a chance to grow into their roles. </p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro </li>
  <li>06:32 - Marene Allison on hiring for potential, not perfection</li>
  <li>07:26 - Wendi Whitmore on overcoming institutional challenges </li>
  <li>08:09 - Renata Spinks on diversity in the workplace</li>
  <li>08:32 - Sandra Joyce on why ‘crew rest’ is essential for mission-driven professionals</li>
  <li>08:57 - Sue Bergamo on balancing operational needs of IT and the demands of cybersecurity</li>
  <li>11:41 - Anahi Santiago on fostering a culture of cybersecurity awareness in healthcare organizations </li>
  <li>14:39 - Candy Alexander on why security is everyone’s responsibility </li>
  <li>20:32 - Candy Alexander on advice for organizations </li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
  <li>Candy Alexander on <a href="https://www.linkedin.com/in/candyalexander/">LinkedIn</a> </li>
  <li>Sue Bergamo on <a href="https://www.linkedin.com/in/suebergamo/">LinkedIn</a>
</li>
  <li>Renata Spinks on <a href="https://www.linkedin.com/in/rcs21/">LinkedIn</a>
</li>
  <li>Anahi Santiago on <a href="https://www.linkedin.com/in/anahi-santiago/">LinkedIn</a>
</li>
  <li>Wendi Whitmore on <a href="https://www.linkedin.com/in/wendiwhitmore2/">LinkedIn</a>
</li>
  <li>Marene Allison on <a href="https://www.linkedin.com/in/marene-allison-9508611/">LinkedIn</a>
</li>
  <li>Sandra Joyce on <a href="https://www.linkedin.com/in/sandrajoyce/">LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>680</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[p0kpnw81]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7220925681.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Navigating Data Governance and Compliance Challenges with Candy Alexander, CISO &amp; Security Practice Lead at NeuEon</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/18/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠John Murphy⁠, Global Field Chief Security Officer at Rubrik, is joined by ⁠Candy Alexander⁠, CISO &amp; Security Practice Lead at NeuEon⁠, a strategic technology advisor. Candy leads NeuEon's Cyber Risk Practice to provide executive-level cyber risk and security services, guiding clients through the process of protecting their environments and meeting regulatory requirements based on specific business needs. 

Join John and Candy as they discuss navigating the complexities of data governance, the impact of AI on business security, and the importance of aligning IT initiatives with organizational goals.

Episode Highlights: 


  00:00 - Intro 

  05:59 - Evolving Strategic Leadership

  16:37 - Aligning IT with Business Strategy for Optimal Impact

  18:01 - Broadening Skill Sets to Increase Value

  21:39 - The Importance of Networking 

  30:26 - Taming Data Storage Risks in Finance and Tech

  32:56 - Navigating AI Data Challenges

  38:59 - AI Adoption Pitfalls for Organizations

  42:23 - Tailoring Security Conversations for Business Leaders

  46:48 - Operational Mindset for Tech Leaders

  51:20 - Regulatory Challenges in Cybersecurity

  56:43 - Optimistic and Pessimistic Views on Cybersecurity

  58:20 - Proactive Approach Towards AI and New Technologies


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Candy Alexander on LinkedIn 

  John Murphy on LinkedIn</description>
      <pubDate>Tue, 15 Oct 2024 09:00:00 -0000</pubDate>
      <itunes:title>Navigating Data Governance and Compliance Challenges with Candy Alexander, CISO &amp; Security Practice Lead at NeuEon</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4ffb9e1a-b4f5-11f0-922b-fb766e2b1eb8/image/02a402e4e915b6c3700f0d0699374ea5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, John Murphy, Global Field Chief Security Officer at Rubrik, is joined by Candy Alexander, CISO &amp; Security Practice Lead at NeuEon. Join them as they discuss navigating the complexities of data governance, the impact of AI on business security, and the importance of aligning IT initiatives with organizational goals.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our host, ⁠John Murphy⁠, Global Field Chief Security Officer at Rubrik, is joined by ⁠Candy Alexander⁠, CISO &amp; Security Practice Lead at NeuEon⁠, a strategic technology advisor. Candy leads NeuEon's Cyber Risk Practice to provide executive-level cyber risk and security services, guiding clients through the process of protecting their environments and meeting regulatory requirements based on specific business needs. 

Join John and Candy as they discuss navigating the complexities of data governance, the impact of AI on business security, and the importance of aligning IT initiatives with organizational goals.

Episode Highlights: 


  00:00 - Intro 

  05:59 - Evolving Strategic Leadership

  16:37 - Aligning IT with Business Strategy for Optimal Impact

  18:01 - Broadening Skill Sets to Increase Value

  21:39 - The Importance of Networking 

  30:26 - Taming Data Storage Risks in Finance and Tech

  32:56 - Navigating AI Data Challenges

  38:59 - AI Adoption Pitfalls for Organizations

  42:23 - Tailoring Security Conversations for Business Leaders

  46:48 - Operational Mindset for Tech Leaders

  51:20 - Regulatory Challenges in Cybersecurity

  56:43 - Optimistic and Pessimistic Views on Cybersecurity

  58:20 - Proactive Approach Towards AI and New Technologies


Episode Resources:


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report


  Candy Alexander on LinkedIn 

  John Murphy on LinkedIn</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>In this episode, our host, <a href="https://www.linkedin.com/in/johnmurphyphd/">⁠John Murphy⁠</a>, Global Field Chief Security Officer at Rubrik, is joined by <a href="https://www.linkedin.com/in/candyalexander/">⁠Candy Alexander⁠</a>, CISO &amp; Security Practice Lead at <a href="https://www.neueon.com/">NeuEon⁠</a>, a strategic technology advisor. Candy leads NeuEon's Cyber Risk Practice to provide executive-level cyber risk and security services, guiding clients through the process of protecting their environments and meeting regulatory requirements based on specific business needs. </p>
<p>Join John and Candy as they discuss navigating the complexities of data governance, the impact of AI on business security, and the importance of aligning IT initiatives with organizational goals.</p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro </li>
  <li>05:59 - Evolving Strategic Leadership</li>
  <li>16:37 - Aligning IT with Business Strategy for Optimal Impact</li>
  <li>18:01 - Broadening Skill Sets to Increase Value</li>
  <li>21:39 - The Importance of Networking </li>
  <li>30:26 - Taming Data Storage Risks in Finance and Tech</li>
  <li>32:56 - Navigating AI Data Challenges</li>
  <li>38:59 - AI Adoption Pitfalls for Organizations</li>
  <li>42:23 - Tailoring Security Conversations for Business Leaders</li>
  <li>46:48 - Operational Mindset for Tech Leaders</li>
  <li>51:20 - Regulatory Challenges in Cybersecurity</li>
  <li>56:43 - Optimistic and Pessimistic Views on Cybersecurity</li>
  <li>58:20 - Proactive Approach Towards AI and New Technologies</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
  <li>Candy Alexander on <a href="https://www.linkedin.com/in/candyalexander/">LinkedIn</a> </li>
  <li>John Murphy on <a href="https://www.linkedin.com/in/johnmurphyphd/">LinkedIn</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>3446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[x0ln6wq0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6960268657.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building a Cyber Resilient Healthcare System with Anahi Santiago, Chief Information Security Officer at ChristianaCare</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/17/notes</link>
      <description>Welcome to the Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our guest host, ⁠Rick Bryant⁠, Field CTO for Healthcare at Rubrik, is joined by ⁠Anahi Santiago⁠, Chief Information Security Officer at ⁠ChristianaCare⁠, a healthcare organization centered on improving health outcomes, making high-quality care more accessible, and lowering health care costs. She is also a Member Board of Directors at Health-ISAC (Health Information Sharing and Analysis Center), a global, non-profit, member-driven organization where health sector stakeholders coordinate, collaborate and share vital physical and cyber threat intelligence and best practices with each other. Anahi serves as an Advisory Council Member at CISO ExecNet, a peer-to-peer learning community for Chief Information Security Officers.

Join Rick and Anahi as they explore the challenges facing healthcare cybersecurity, the need for regulatory frameworks, and the role of information sharing in improving security measures.

Episode Highlights: 


  00:00 - Intro 

  02:13 - Anahi’s introduction to cybersecurity 

  04:11 - The most pressing issues facing healthcare systems 

  05:47 - Risk management 

  07:41 - Managing data growth 

  11:21 - Fostering a culture of cybersecurity awareness

  14:47 - Organizational resiliency 

  19:28 - The next five years

  24:47 - More regulations vs better enforcement of existing regulations 


Episode Resources:


  Anahi Santiago on LinkedIn 

  Rick Bryant on LinkedIn


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report</description>
      <pubDate>Tue, 01 Oct 2024 09:00:00 -0000</pubDate>
      <itunes:title>Building a Cyber Resilient Healthcare System with Anahi Santiago, Chief Information Security Officer at ChristianaCare</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/516c6b4e-b4f5-11f0-922b-cb6ec0194e3d/image/986eaf12f9b7d171c934ddabf5ddfa01.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our guest host, Rick Bryant, Field CTO for Healthcare at Rubrik,  is joined by Anahi Santiago, Chief Information Security Officer at ChristianaCare, a healthcare organization centered on improving health outcomes, making high-quality care more accessible, and lowering health care costs. She is also a Member Board of Directors at Health-ISAC (Health Information Sharing and Analysis Center), a global, non-profit, member-driven organization where health sector stakeholders coordinate, collaborate and share vital physical and cyber threat intelligence and best practices with each other. Anahi serves as an Advisory Council Member at CISO ExecNet, a peer-to-peer learning community for Chief Information Security Officers.
Join Rick and Anahi as they explore the challenges facing healthcare cybersecurity, the need for regulatory frameworks, and the role of information sharing in improving security measures.

Episode Highlights: 
00:00 - Intro 
02:13 - Anahi’s introduction to cybersecurity 
04:11 - The most pressing issues facing healthcare systems 
05:47 - Risk management 
07:41 - Managing data growth 
11:21 - Fostering a culture of cybersecurity awareness
14:47 - Organizational resiliency 
19:28 - The next five years
24:47 - More regulations vs better enforcement of existing regulations</itunes:subtitle>
      <itunes:summary>Welcome to the Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

In this episode, our guest host, ⁠Rick Bryant⁠, Field CTO for Healthcare at Rubrik, is joined by ⁠Anahi Santiago⁠, Chief Information Security Officer at ⁠ChristianaCare⁠, a healthcare organization centered on improving health outcomes, making high-quality care more accessible, and lowering health care costs. She is also a Member Board of Directors at Health-ISAC (Health Information Sharing and Analysis Center), a global, non-profit, member-driven organization where health sector stakeholders coordinate, collaborate and share vital physical and cyber threat intelligence and best practices with each other. Anahi serves as an Advisory Council Member at CISO ExecNet, a peer-to-peer learning community for Chief Information Security Officers.

Join Rick and Anahi as they explore the challenges facing healthcare cybersecurity, the need for regulatory frameworks, and the role of information sharing in improving security measures.

Episode Highlights: 


  00:00 - Intro 

  02:13 - Anahi’s introduction to cybersecurity 

  04:11 - The most pressing issues facing healthcare systems 

  05:47 - Risk management 

  07:41 - Managing data growth 

  11:21 - Fostering a culture of cybersecurity awareness

  14:47 - Organizational resiliency 

  19:28 - The next five years

  24:47 - More regulations vs better enforcement of existing regulations 


Episode Resources:


  Anahi Santiago on LinkedIn 

  Rick Bryant on LinkedIn


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>In this episode, our guest host, <a href="https://www.linkedin.com/in/rick-bryant-8a663a1">⁠Rick Bryant⁠</a>, Field CTO for Healthcare at Rubrik, is joined by <a href="https://www.linkedin.com/in/anahi-santiago/">⁠Anahi Santiago⁠</a>, Chief Information Security Officer at <a href="https://christianacare.org/us/en">⁠ChristianaCare⁠</a>, a healthcare organization centered on improving health outcomes, making high-quality care more accessible, and lowering health care costs. She is also a Member Board of Directors at Health-ISAC (Health Information Sharing and Analysis Center), a global, non-profit, member-driven organization where health sector stakeholders coordinate, collaborate and share vital physical and cyber threat intelligence and best practices with each other. Anahi serves as an Advisory Council Member at CISO ExecNet, a peer-to-peer learning community for Chief Information Security Officers.</p>
<p>Join Rick and Anahi as they explore the challenges facing healthcare cybersecurity, the need for regulatory frameworks, and the role of information sharing in improving security measures.</p>
<p>Episode Highlights: </p>
<ul>
  <li>00:00 - Intro </li>
  <li>02:13 - Anahi’s introduction to cybersecurity </li>
  <li>04:11 - The most pressing issues facing healthcare systems </li>
  <li>05:47 - Risk management </li>
  <li>07:41 - Managing data growth </li>
  <li>11:21 - Fostering a culture of cybersecurity awareness</li>
  <li>14:47 - Organizational resiliency </li>
  <li>19:28 - The next five years</li>
  <li>24:47 - More regulations vs better enforcement of existing regulations </li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Anahi Santiago on <a href="https://www.linkedin.com/in/anahi-santiago/">LinkedIn</a> </li>
  <li>Rick Bryant on <a href="https://www.linkedin.com/in/rick-bryant-8a663a1/">LinkedIn</a>
</li>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>2097</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[219qq8j1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9605244597.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Measuring Your Data’s Risk Exposure with Bipul Sinha, CEO, Chairman, and Co-Founder of Rubrik</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/16/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

We're excited to continue with our series of special episodes featuring highlights from the recent ⁠Rubrik Zero Labs Virtual Summit⁠. This series offers a unique look into the critical conversations happening around data security. ⁠Steve Stone⁠ is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.

In the third episode, we’re diving deep into data security strategy. Steve is joined by Bipul Sinha, CEO of Rubrik. Join them as they explore how organizations can effectively navigate the reset phase after a crisis event and create cyber resilience, valuable insights into the unique challenges faced by the healthcare industry, and the technological advancements that can enhance data security. 

About Bipul Sinha:

Bipul Sinha is an entrepreneur, engineer and venture capitalist. He is the CEO, Chairman and Co-founder of Rubrik, Inc., a comprehensive data security platform. Bipul is also a Venture Partner at Lightspeed Venture Partners, a multi-stage venture capital firm. Before Lightspeed, Bipul worked at Blumberg Capital, where he was the founding investor and board member of Nutanix and Hootsuite. 

Episode Highlights: 


  00:00 - Intro

  01:46 - Importance of risk

  03:26 - Risk and CEO engagement

  04:52 - Challenges in risk reset

  06:07 - Cybersecurity resilience

  09:25 - Post-attack planning and resilience

  12:20 - Data realities in healthcare

  15:01 - Technological maturity


Episode Resources:


  Bipul Sinha on LinkedIn 

  Steve Stone on LinkedIn


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report</description>
      <pubDate>Tue, 17 Sep 2024 09:32:00 -0000</pubDate>
      <itunes:title>Measuring Your Data’s Risk Exposure with Bipul Sinha, CEO, Chairman, and Co-Founder of Rubrik</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/51eb1a66-b4f5-11f0-922b-f7c7b16d688e/image/0481c08bbc815bf9bf86035b8d14f74b.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

We're excited to continue with our series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security.
Steve Stone is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.

In the third episode, we’re diving deep into data security strategy. Steve is joined by Bipul Sinha, CEO, Chairman, and Co-Founder of Rubrik. Join them as they explore how organizations can effectively navigate the reset phase after a crisis event and create cyber resilience, valuable insights into the unique challenges faced by the healthcare industry, and the technological advancements that can enhance data security.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

We're excited to continue with our series of special episodes featuring highlights from the recent ⁠Rubrik Zero Labs Virtual Summit⁠. This series offers a unique look into the critical conversations happening around data security. ⁠Steve Stone⁠ is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.

In the third episode, we’re diving deep into data security strategy. Steve is joined by Bipul Sinha, CEO of Rubrik. Join them as they explore how organizations can effectively navigate the reset phase after a crisis event and create cyber resilience, valuable insights into the unique challenges faced by the healthcare industry, and the technological advancements that can enhance data security. 

About Bipul Sinha:

Bipul Sinha is an entrepreneur, engineer and venture capitalist. He is the CEO, Chairman and Co-founder of Rubrik, Inc., a comprehensive data security platform. Bipul is also a Venture Partner at Lightspeed Venture Partners, a multi-stage venture capital firm. Before Lightspeed, Bipul worked at Blumberg Capital, where he was the founding investor and board member of Nutanix and Hootsuite. 

Episode Highlights: 


  00:00 - Intro

  01:46 - Importance of risk

  03:26 - Risk and CEO engagement

  04:52 - Challenges in risk reset

  06:07 - Cybersecurity resilience

  09:25 - Post-attack planning and resilience

  12:20 - Data realities in healthcare

  15:01 - Technological maturity


Episode Resources:


  Bipul Sinha on LinkedIn 

  Steve Stone on LinkedIn


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>We're excited to continue with our series of special episodes featuring highlights from the recent <a href="https://rbrk.co/3z9rEVP">⁠Rubrik Zero Labs Virtual Summit⁠</a>. This series offers a unique look into the critical conversations happening around data security. <a href="https://www.linkedin.com/in/stevenstone618/">⁠Steve Stone⁠</a> is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.</p>
<p>In the third episode, we’re diving deep into data security strategy. Steve is joined by Bipul Sinha, CEO of Rubrik. Join them as they explore how organizations can effectively navigate the reset phase after a crisis event and create cyber resilience, valuable insights into the unique challenges faced by the healthcare industry, and the technological advancements that can enhance data security. </p>
<p><strong>About Bipul Sinha:</strong></p>
<p>Bipul Sinha is an entrepreneur, engineer and venture capitalist. He is the CEO, Chairman and Co-founder of Rubrik, Inc., a comprehensive data security platform. Bipul is also a Venture Partner at Lightspeed Venture Partners, a multi-stage venture capital firm. Before Lightspeed, Bipul worked at Blumberg Capital, where he was the founding investor and board member of Nutanix and Hootsuite. </p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>01:46 - Importance of risk</li>
  <li>03:26 - Risk and CEO engagement</li>
  <li>04:52 - Challenges in risk reset</li>
  <li>06:07 - Cybersecurity resilience</li>
  <li>09:25 - Post-attack planning and resilience</li>
  <li>12:20 - Data realities in healthcare</li>
  <li>15:01 -<strong> </strong>Technological maturity</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Bipul Sinha on <a href="https://www.linkedin.com/in/bipulsinha">LinkedIn</a> </li>
  <li>Steve Stone on <a href="https://www.linkedin.com/in/stevenstone618/">LinkedIn</a>
</li>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1121</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[81566jk0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1602039934.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Preparing for Breaches: the Importance of Incident Response Plans and Exercises</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/15/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

We're excited to continue with our series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security. ⁠Steve Stone⁠ is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.

In the second episode, we’re exploring the cost of unpreparedness to businesses in the face of ransomware attacks. Steve is joined by Heather Hughes, the Vice President of Engagement Management at Aon Cyber Solutions. Join them as they discuss misconceptions surrounding breaches, the need for tools such as multi-factor authentication and endpoint detection and response, as well as reliable and recoverable backups, and the importance of proactive measures and investment in cybersecurity. 

About Heather Hughes:

Heather brings over twenty-five years experience in privacy, data security and cyber security to her role as Vice President of Engagement Management at Aon Cyber Solutions. She is also a frequent speaker and author on HIPAA privacy and security, ransomware and cyber best practices.

Episode Highlights: 


  00:00 - Intro

  01:55 - Ransomware attack recovery: lengthy, intense, and resource-heavy

  04:31 - Outside counsel in managing the impacts of cyber attacks

  10:54 - The importance of backups 

  15:11 - What catches organizations off-guard

  19:31 - How to maximize preparedness


Episode Resources:


  Heather Hughes on LinkedIn 

  Steve Stone on LinkedIn


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report</description>
      <pubDate>Tue, 10 Sep 2024 13:33:00 -0000</pubDate>
      <itunes:title>Preparing for Breaches: the Importance of Incident Response Plans and Exercises</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/52b87830-b4f5-11f0-922b-c351d5dec7d0/image/46a9ea2f8303dea497e819d5cd70215e.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 
We're excited to continue with our series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security.
Steve Stone is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.
In the second episode, we’re exploring the cost of unpreparedness to businesses in the face of ransomware attacks. Steve is joined by Heather Hughes, the Vice President of Engagement Management at Aon Cyber Solutions. Join them as they discuss misconceptions surrounding breaches, the need for tools such as multi-factor authentication and endpoint detection and response, as well as reliable and recoverable backups, and the importance of proactive measures and investment in cybersecurity.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 

We're excited to continue with our series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security. ⁠Steve Stone⁠ is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.

In the second episode, we’re exploring the cost of unpreparedness to businesses in the face of ransomware attacks. Steve is joined by Heather Hughes, the Vice President of Engagement Management at Aon Cyber Solutions. Join them as they discuss misconceptions surrounding breaches, the need for tools such as multi-factor authentication and endpoint detection and response, as well as reliable and recoverable backups, and the importance of proactive measures and investment in cybersecurity. 

About Heather Hughes:

Heather brings over twenty-five years experience in privacy, data security and cyber security to her role as Vice President of Engagement Management at Aon Cyber Solutions. She is also a frequent speaker and author on HIPAA privacy and security, ransomware and cyber best practices.

Episode Highlights: 


  00:00 - Intro

  01:55 - Ransomware attack recovery: lengthy, intense, and resource-heavy

  04:31 - Outside counsel in managing the impacts of cyber attacks

  10:54 - The importance of backups 

  15:11 - What catches organizations off-guard

  19:31 - How to maximize preparedness


Episode Resources:


  Heather Hughes on LinkedIn 

  Steve Stone on LinkedIn


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. </p>
<p>We're excited to continue with our series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security. <a href="https://www.linkedin.com/in/stevenstone618/">⁠Steve Stone⁠</a> is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.</p>
<p>In the second episode, we’re exploring the cost of unpreparedness to businesses in the face of ransomware attacks. Steve is joined by Heather Hughes, the Vice President of Engagement Management at Aon Cyber Solutions. Join them as they discuss misconceptions surrounding breaches, the need for tools such as multi-factor authentication and endpoint detection and response, as well as reliable and recoverable backups, and the importance of proactive measures and investment in cybersecurity. </p>
<p><strong>About Heather Hughes:</strong></p>
<p>Heather brings over twenty-five years experience in privacy, data security and cyber security to her role as Vice President of Engagement Management at Aon Cyber Solutions. She is also a frequent speaker and author on HIPAA privacy and security, ransomware and cyber best practices.</p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>01:55 - Ransomware attack recovery: lengthy, intense, and resource-heavy</li>
  <li>04:31 - Outside counsel in managing the impacts of cyber attacks</li>
  <li>10:54 - The importance of backups </li>
  <li>15:11 - What catches organizations off-guard</li>
  <li>19:31 - How to maximize preparedness</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Heather Hughes on <a href="https://www.linkedin.com/in/heather-hughes-j-d-chpc-hcispp/">LinkedIn</a> </li>
  <li>Steve Stone on <a href="https://www.linkedin.com/in/stevenstone618/">LinkedIn</a>
</li>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[219qqmn1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1528738530.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Impact of Cyber Events on Patient Care</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/14/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for organizations and individuals looking to secure their data and achieve cyber resilience. 

We're excited to kick off a series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security. ⁠Steve Stone⁠ is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.

In this first special episode, we're focusing on data security in healthcare. Steve sits down with ⁠Rick Bryant⁠, Rubrik's healthcare CTO, who brings over three decades of experience in healthcare technology to the table. Join them as they discuss the findings from the Zero Labs report on securing healthcare and minimizing risk, exploring the challenges of securing healthcare data, the misconceptions surrounding healthcare data security, and the need for increased investment in cybersecurity in the healthcare industry.

They also highlight the growing amount of sensitive data in healthcare and the impact of cyber events on patient care. 

RIck is an IT leader with over thirty years of healthcare experience. He is currently the Healthcare Chief Technical Officer at Rubrik, an American cloud data management and data security company. 

Before working at Rubrik, Rick served as Healthcare Chief Technical Officer at Veritas Technologies, and Chief Information Officer at Texas Children’s Hospital. He also created and managed all client IT services for First Data Corporation.

Episode Highlights: 


  00:00 - Intro

  02:21 - Ransomware attack recovery: lengthy, intense, and resource-heavy

  05:00 - Outside counsel in managing the impacts of cyber attacks

  11:27 - The importance of backups 

  15:47 - What catches organizations off-guard

  20:09 - How to maximize preparedness


Episode Resources:


  Rick Bryant on LinkedIn 

  Steve Stone on LinkedIn


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report</description>
      <pubDate>Fri, 30 Aug 2024 10:00:00 -0000</pubDate>
      <itunes:title>The Impact of Cyber Events on Patient Care</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5334ec6c-b4f5-11f0-922b-2ba98aaba3e7/image/ea163b79ea493bd7cc911bdd6ead022f.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. 
We're excited to kick off a series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security.
Steve Stone is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.
In this first special episode, we're focusing on data security in healthcare. Steve sits down with  Rick Bryant, Rubrik's healthcare CTO, who brings over three decades of experience in healthcare technology to the table. Join them as they discuss the findings from the Zero Labs report on securing healthcare and minimizing risk, exploring the challenges of securing healthcare data, the misconceptions surrounding healthcare data security, and the need for increased investment in cybersecurity in the healthcare industry.
They also highlight the growing amount of sensitive data in healthcare and the impact of cyber events on patient care.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for organizations and individuals looking to secure their data and achieve cyber resilience. 

We're excited to kick off a series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security. ⁠Steve Stone⁠ is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.

In this first special episode, we're focusing on data security in healthcare. Steve sits down with ⁠Rick Bryant⁠, Rubrik's healthcare CTO, who brings over three decades of experience in healthcare technology to the table. Join them as they discuss the findings from the Zero Labs report on securing healthcare and minimizing risk, exploring the challenges of securing healthcare data, the misconceptions surrounding healthcare data security, and the need for increased investment in cybersecurity in the healthcare industry.

They also highlight the growing amount of sensitive data in healthcare and the impact of cyber events on patient care. 

RIck is an IT leader with over thirty years of healthcare experience. He is currently the Healthcare Chief Technical Officer at Rubrik, an American cloud data management and data security company. 

Before working at Rubrik, Rick served as Healthcare Chief Technical Officer at Veritas Technologies, and Chief Information Officer at Texas Children’s Hospital. He also created and managed all client IT services for First Data Corporation.

Episode Highlights: 


  00:00 - Intro

  02:21 - Ransomware attack recovery: lengthy, intense, and resource-heavy

  05:00 - Outside counsel in managing the impacts of cyber attacks

  11:27 - The importance of backups 

  15:47 - What catches organizations off-guard

  20:09 - How to maximize preparedness


Episode Resources:


  Rick Bryant on LinkedIn 

  Steve Stone on LinkedIn


  Rubrik Zero Labs The State of Data Security: Measuring Your Data's Risk report</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for organizations and individuals looking to secure their data and achieve cyber resilience. </p>
<p>We're excited to kick off a series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security. <a href="https://www.linkedin.com/in/stevenstone618/">⁠Steve Stone⁠</a> is taking on a different role in these special episodes. Instead of guiding us through our usual discussions, he'll be leading in-depth conversations with industry experts.</p>
<p>In this first special episode, we're focusing on data security in healthcare. Steve sits down with <a href="https://www.linkedin.com/in/rick-bryant-8a663a1/">⁠Rick Bryant⁠</a>, Rubrik's healthcare CTO, who brings over three decades of experience in healthcare technology to the table. Join them as they discuss the findings from the Zero Labs report on securing healthcare and minimizing risk, exploring the challenges of securing healthcare data, the misconceptions surrounding healthcare data security, and the need for increased investment in cybersecurity in the healthcare industry.</p>
<p>They also highlight the growing amount of sensitive data in healthcare and the impact of cyber events on patient care. </p>
<p>RIck is an IT leader with over thirty years of healthcare experience. He is currently the Healthcare Chief Technical Officer at Rubrik, an American cloud data management and data security company. </p>
<p>Before working at Rubrik, Rick served as Healthcare Chief Technical Officer at Veritas Technologies, and Chief Information Officer at Texas Children’s Hospital. He also created and managed all client IT services for First Data Corporation.</p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>00:00 - Intro</li>
  <li>02:21 - Ransomware attack recovery: lengthy, intense, and resource-heavy</li>
  <li>05:00 - Outside counsel in managing the impacts of cyber attacks</li>
  <li>11:27 - The importance of backups </li>
  <li>15:47 - What catches organizations off-guard</li>
  <li>20:09 - How to maximize preparedness</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Rick Bryant on <a href="https://www.linkedin.com/in/rick-bryant-8a663a1/">LinkedIn</a> </li>
  <li>Steve Stone on <a href="https://www.linkedin.com/in/stevenstone618/">LinkedIn</a>
</li>
  <li>Rubrik Zero Labs <a href="https://rbrk.co/4b2ErHc">The State of Data Security: Measuring Your Data's Risk report</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8156znw0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1700563276.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What CISOs Must Consider During a Breach with Amy Bogac, CISO at Elevate Textiles</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/13/notes</link>
      <description>Welcome to the Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. 

In this episode, your host, ⁠Steve Stone⁠, is joined by ⁠Amy Bogac⁠, CISO at Elevate Textiles and a member of the Technical Advisory Board at Radiant Security. Join us as we discuss the importance of backups and data recovery, the collaboration between IT and OT, the role of AI in the SOC, and Amy's experiences as a leader during breaches.

We also explore the complexities of modern environments, the challenges of implementing change in the aftermath of a crisis and sharing knowledge with others to proactively address vulnerabilities.⁠

Amy Bogac⁠ is a security leader with over twenty years of experience in information security, IT governance, and compliance. She is currently CISO at Elevate Textiles and a member of the Technical Advisory Board at Radiant Security, an “AI-powered SOC co-pilot that boosts SOC analyst productivity, detects real attacks, &amp; improves response times.”

She holds an MBA from Lake Forest Graduate School of Management and a CISSP certification from ISC2. Before working at Radiant Security, Amy was Chief Information Security Officer at The Clorox Company and Head of Information Security at CF Industries. 

Episode Highlights: 


  [10:04] Data recovery and backups

  [17:19] IT and OT teamwork

  [20:47] AI and SOC

  [25:59] Being in charge during breaches

  [30:39] Implementing change after a crisis

  [45:04] Working with underrepresented communities


Episode Resources:


  Amy Bogac on LinkedIn


  Elevate Textiles Website


  Radiant Security Website


  Steve Stone on LinkedIn


  Rubrik, Inc Website</description>
      <pubDate>Tue, 06 Aug 2024 09:00:00 -0000</pubDate>
      <itunes:title>What CISOs Must Consider During a Breach with Amy Bogac, CISO at Elevate Textiles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/53fa0196-b4f5-11f0-922b-536529c4f4d7/image/33b170b2f322121f356eabe0f1be42df.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>From Rubrik Zero Labs, welcome to the Data Security Decoded podcast, where we sit down with senior cybersecurity luminaries who have distinct viewpoints on the state of data security. We examine emerging themes and trends in cybersecurity and explain what they entail for businesses trying to secure their data and build cyber resilience.
In this episode, your host, Steve Stone, is joined by Amy Bogac, CISO at Elevate Textiles and a member of the Technical Advisory Board at Radiant Security. Join us as we discuss the importance of comprehensive cyber recovery, the collaboration between IT and OT, the role of AI in the SOC, and Amy's experiences as a leader during breaches.
We also explore the complexities of modern environments, the challenges of implementing change in the aftermath of a crisis and sharing knowledge with others to proactively address vulnerabilities.</itunes:subtitle>
      <itunes:summary>Welcome to the Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. 

In this episode, your host, ⁠Steve Stone⁠, is joined by ⁠Amy Bogac⁠, CISO at Elevate Textiles and a member of the Technical Advisory Board at Radiant Security. Join us as we discuss the importance of backups and data recovery, the collaboration between IT and OT, the role of AI in the SOC, and Amy's experiences as a leader during breaches.

We also explore the complexities of modern environments, the challenges of implementing change in the aftermath of a crisis and sharing knowledge with others to proactively address vulnerabilities.⁠

Amy Bogac⁠ is a security leader with over twenty years of experience in information security, IT governance, and compliance. She is currently CISO at Elevate Textiles and a member of the Technical Advisory Board at Radiant Security, an “AI-powered SOC co-pilot that boosts SOC analyst productivity, detects real attacks, &amp; improves response times.”

She holds an MBA from Lake Forest Graduate School of Management and a CISSP certification from ISC2. Before working at Radiant Security, Amy was Chief Information Security Officer at The Clorox Company and Head of Information Security at CF Industries. 

Episode Highlights: 


  [10:04] Data recovery and backups

  [17:19] IT and OT teamwork

  [20:47] AI and SOC

  [25:59] Being in charge during breaches

  [30:39] Implementing change after a crisis

  [45:04] Working with underrepresented communities


Episode Resources:


  Amy Bogac on LinkedIn


  Elevate Textiles Website


  Radiant Security Website


  Steve Stone on LinkedIn


  Rubrik, Inc Website</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">Data Security Decoded⁠</a> podcast, brought to you by <a href="https://rbrk.co/4b2ErHc">⁠Rubrik Zero Labs⁠</a>. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. </p>
<p>In this episode, your host, <a href="https://www.linkedin.com/in/stevenstone618/">⁠Steve Stone⁠</a>, is joined by <a href="https://www.linkedin.com/in/abogac/">⁠Amy Bogac⁠</a>, CISO at Elevate Textiles and a member of the Technical Advisory Board at Radiant Security. Join us as we discuss the importance of backups and data recovery, the collaboration between IT and OT, the role of AI in the SOC, and Amy's experiences as a leader during breaches.</p>
<p>We also explore the complexities of modern environments, the challenges of implementing change in the aftermath of a crisis and sharing knowledge with others to proactively address vulnerabilities.<a href="https://www.linkedin.com/in/abogac/">⁠</a></p>
<p><a href="https://www.linkedin.com/in/abogac/">Amy Bogac⁠</a> is a security leader with over twenty years of experience in information security, IT governance, and compliance. She is currently CISO at Elevate Textiles and a member of the Technical Advisory Board at Radiant Security, an “AI-powered SOC co-pilot that boosts SOC analyst productivity, detects real attacks, &amp; improves response times.”</p>
<p>She holds an MBA from Lake Forest Graduate School of Management and a CISSP certification from ISC2. Before working at Radiant Security, Amy was Chief Information Security Officer at The Clorox Company and Head of Information Security at CF Industries. </p>
<p><strong>Episode Highlights: </strong></p>
<ul>
  <li>[10:04] Data recovery and backups</li>
  <li>[17:19] IT and OT teamwork</li>
  <li>[20:47] AI and SOC</li>
  <li>[25:59] Being in charge during breaches</li>
  <li>[30:39] Implementing change after a crisis</li>
  <li>[45:04] Working with underrepresented communities</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Amy Bogac on <a href="https://www.linkedin.com/in/abogac/">LinkedIn</a>
</li>
  <li>Elevate Textiles <a href="https://www.elevatetextiles.com/">Website</a>
</li>
  <li>Radiant Security <a href="https://radiantsecurity.ai/">Website</a>
</li>
  <li>Steve Stone on <a href="https://www.linkedin.com/in/stevenstone618/">LinkedIn</a>
</li>
  <li>Rubrik, Inc <a href="https://rbrk.co/4b2ErHc">Website</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>3593</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[81qqy4r1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7145550343.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware: A Major Threat to Data Security with Renata Spinks of CyberSec International</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/12/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. 

In this episode, your host, ⁠Steve Stone⁠, is joined by⁠Renata Spinks⁠, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the second of two episodes, Steve and Renata highlight the importance of understanding an organization's data assets and utilizing them properly, and discuss the value of continuous training, collaboration with industry partners, and staying proactive in the face of evolving threats. 

They also explore the talent shortage in cybersecurity, and why organizations need to have the vision to tap into underrepresented and under-resourced areas. 

Renata has over twenty-five years of experience in cybersecurity, program management, and public service. She is currently the CEO of CyberSec International, a global leader in providing cutting-edge solutions and services to protect and enhance their clients’ and partners’ cyber resilience. 

Before starting CyberSec International, Renata served as the Acting Senior Information Security Officer and Cyber Technology Officer (CTO) for the U.S. Marine Corps. She also has a Master of Science in Information Technology, a Certificate in Information Technology Project Management, and multiple awards and honors for her achievements and contributions to the field.

Episode Highlights:


  00:39 - Defending against ransomware

  07:21 - The talent shortage in cybersecurity

  15:40 - Bringing underrepresented communities into prominent, visible roles

  25:49 - Reflecting on the past and anticipating the future of cybersecurity 


Episode Resources:


  Renata Spinks on LinkedIn


  Renata Spinks Website


  CyberSec International Website


  Steve Stone on LinkedIn


  Rubrik, Inc Website</description>
      <pubDate>Tue, 23 Jul 2024 11:55:00 -0000</pubDate>
      <itunes:title>Ransomware: A Major Threat to Data Security with Renata Spinks of CyberSec International</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/554b28b8-b4f5-11f0-922b-1f8f4898056f/image/36acf8c2e2c4eeefcba89a55b5c6ed55.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for organizations and individuals looking to secure their data and achieve cyber resilience. 
In this episode, your host, Steve Stone, is joined by Renata Spinks, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the second of two episodes, Steve and Renata highlight the importance of understanding an organization's data assets and utilizing them properly, and discuss the value of continuous training, collaboration with industry partners, and staying proactive in the face of evolving threats. 
They also explore the discussion of the talent shortage in cybersecurity, and why organizations need to have the vision to tap into underrepresented and under-resourced areas.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. 

In this episode, your host, ⁠Steve Stone⁠, is joined by⁠Renata Spinks⁠, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the second of two episodes, Steve and Renata highlight the importance of understanding an organization's data assets and utilizing them properly, and discuss the value of continuous training, collaboration with industry partners, and staying proactive in the face of evolving threats. 

They also explore the talent shortage in cybersecurity, and why organizations need to have the vision to tap into underrepresented and under-resourced areas. 

Renata has over twenty-five years of experience in cybersecurity, program management, and public service. She is currently the CEO of CyberSec International, a global leader in providing cutting-edge solutions and services to protect and enhance their clients’ and partners’ cyber resilience. 

Before starting CyberSec International, Renata served as the Acting Senior Information Security Officer and Cyber Technology Officer (CTO) for the U.S. Marine Corps. She also has a Master of Science in Information Technology, a Certificate in Information Technology Project Management, and multiple awards and honors for her achievements and contributions to the field.

Episode Highlights:


  00:39 - Defending against ransomware

  07:21 - The talent shortage in cybersecurity

  15:40 - Bringing underrepresented communities into prominent, visible roles

  25:49 - Reflecting on the past and anticipating the future of cybersecurity 


Episode Resources:


  Renata Spinks on LinkedIn


  Renata Spinks Website


  CyberSec International Website


  Steve Stone on LinkedIn


  Rubrik, Inc Website</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">⁠Rubrik Zero Labs⁠</a>. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. </p>
<p>In this episode, your host, <a href="https://www.linkedin.com/in/stevenstone618/">⁠Steve Stone⁠</a>, is joined by<a href="https://www.linkedin.com/in/rcs21/">⁠Renata Spinks⁠</a>, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the second of two episodes, Steve and Renata highlight the importance of understanding an organization's data assets and utilizing them properly, and discuss the value of continuous training, collaboration with industry partners, and staying proactive in the face of evolving threats. </p>
<p>They also explore the talent shortage in cybersecurity, and why organizations need to have the vision to tap into underrepresented and under-resourced areas. </p>
<p>Renata has over twenty-five years of experience in cybersecurity, program management, and public service. She is currently the CEO of CyberSec International, a global leader in providing cutting-edge solutions and services to protect and enhance their clients’ and partners’ cyber resilience. </p>
<p>Before starting CyberSec International, Renata served as the Acting Senior Information Security Officer and Cyber Technology Officer (CTO) for the U.S. Marine Corps. She also has a Master of Science in Information Technology, a Certificate in Information Technology Project Management, and multiple awards and honors for her achievements and contributions to the field.</p>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>00:39 - Defending against ransomware</li>
  <li>07:21 - The talent shortage in cybersecurity</li>
  <li>15:40 - Bringing underrepresented communities into prominent, visible roles</li>
  <li>25:49 - Reflecting on the past and anticipating the future of cybersecurity </li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Renata Spinks on <a href="https://www.linkedin.com/in/rcs21/">LinkedIn</a>
</li>
  <li>Renata Spinks <a href="https://renataspinks.com/">Website</a>
</li>
  <li>CyberSec International <a href="https://cysec-intl.com/">Website</a>
</li>
  <li>Steve Stone on <a href="https://www.linkedin.com/in/stevenstone618/">LinkedIn</a>
</li>
  <li>Rubrik, Inc <a href="https://www.rubrik.com/zero-labs?utm_source=youtube-organic&amp;utm_medium=organic-social&amp;utm_campaign=7016f000002BQx4&amp;utm_content=180424&amp;gh_src=f3c1a9b71us">Website</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1922</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71w7n6k1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1295771856.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>War Fighting in Cybersecurity: Lessons from the Military with Renata Spinks, Former SES - Deputy CIO IC4, US Marine Corp</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/11/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience.

In this episode, your host, ⁠Steve Stone⁠, is joined by ⁠Renata Spinks⁠, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the first of two episodes, join us as we explore why all individuals in an organization need to have a proactive mindset towards cyber threats, the importance of being adaptable, flexible, and open-minded in the field of cybersecurity, and the major changes to threats over the last 20 years.

We also discuss building a security culture, and some advice for new security leaders. 

Renata has over twenty-five years of experience in cybersecurity, program management, and public service. She is currently the CEO of CyberSec International, a global leader in providing cutting-edge solutions and services to protect and enhance their clients' and partners’ cyber resilience. 

Before working for CyberSec International, Renata served as the Acting Senior Information Security Officer and Cyber Technology Officer (CTO) for the U.S. Marine Corps. She also has a Master of Science in Information Technology, a Certificate in Information Technology Project Management, and multiple awards and honors for her achievements and contributions to the field.

Episode Highlights :


  Renata’s path towards cybersecurity 

  Why cybersecurity is a collective effort

  The value of extensive training and remaining flexible

  Major changes in threats over the last twenty years

  Building a security culture


Episode Resources:


  Renata Spinks on LinkedIn


  Renata Spinks Website


  CyberSec International Website


  Steve Stone on LinkedIn


  Rubrik, Inc Website</description>
      <pubDate>Tue, 09 Jul 2024 09:00:00 -0000</pubDate>
      <itunes:title>War Fighting in Cybersecurity: Lessons from the Military with Renata Spinks, Former SES - Deputy CIO IC4, US Marine Corp</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/56700b6e-b4f5-11f0-922b-bbedcfbf9dd8/image/36acf8c2e2c4eeefcba89a55b5c6ed55.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. 
In this episode, your host, Steve Stone, is joined by Renata Spinks, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the first of two episodes, join us as we explore why all individuals in an organization need to have a proactive mindset towards cyber threats, the importance of being adaptable, flexible, and open-minded in the field of cybersecurity, and the major changes to threats over the last 20 years. We also discuss building a security culture and some advice for new security leaders.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience.

In this episode, your host, ⁠Steve Stone⁠, is joined by ⁠Renata Spinks⁠, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the first of two episodes, join us as we explore why all individuals in an organization need to have a proactive mindset towards cyber threats, the importance of being adaptable, flexible, and open-minded in the field of cybersecurity, and the major changes to threats over the last 20 years.

We also discuss building a security culture, and some advice for new security leaders. 

Renata has over twenty-five years of experience in cybersecurity, program management, and public service. She is currently the CEO of CyberSec International, a global leader in providing cutting-edge solutions and services to protect and enhance their clients' and partners’ cyber resilience. 

Before working for CyberSec International, Renata served as the Acting Senior Information Security Officer and Cyber Technology Officer (CTO) for the U.S. Marine Corps. She also has a Master of Science in Information Technology, a Certificate in Information Technology Project Management, and multiple awards and honors for her achievements and contributions to the field.

Episode Highlights :


  Renata’s path towards cybersecurity 

  Why cybersecurity is a collective effort

  The value of extensive training and remaining flexible

  Major changes in threats over the last twenty years

  Building a security culture


Episode Resources:


  Renata Spinks on LinkedIn


  Renata Spinks Website


  CyberSec International Website


  Steve Stone on LinkedIn


  Rubrik, Inc Website</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://rbrk.co/4b2ErHc">⁠Rubrik Zero Labs⁠</a>. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience.</p>
<p>In this episode, your host, <a href="https://www.linkedin.com/in/stevenstone618/">⁠Steve Stone⁠</a>, is joined by <a href="https://www.linkedin.com/in/rcs21/">⁠Renata Spinks⁠</a>, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the first of two episodes, join us as we explore why all individuals in an organization need to have a proactive mindset towards cyber threats, the importance of being adaptable, flexible, and open-minded in the field of cybersecurity, and the major changes to threats over the last 20 years.</p>
<p>We also discuss building a security culture, and some advice for new security leaders. </p>
<p>Renata has over twenty-five years of experience in cybersecurity, program management, and public service. She is currently the CEO of CyberSec International, a global leader in providing cutting-edge solutions and services to protect and enhance their clients' and partners’ cyber resilience. </p>
<p>Before working for CyberSec International, Renata served as the Acting Senior Information Security Officer and Cyber Technology Officer (CTO) for the U.S. Marine Corps. She also has a Master of Science in Information Technology, a Certificate in Information Technology Project Management, and multiple awards and honors for her achievements and contributions to the field.</p>
<p><strong>Episode Highlights :</strong></p>
<ul>
  <li>Renata’s path towards cybersecurity </li>
  <li>Why cybersecurity is a collective effort</li>
  <li>The value of extensive training and remaining flexible</li>
  <li>Major changes in threats over the last twenty years</li>
  <li>Building a security culture</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Renata Spinks on <a href="https://www.linkedin.com/in/rcs21/">LinkedIn</a>
</li>
  <li>Renata Spinks <a href="https://renataspinks.com/">Website</a>
</li>
  <li>CyberSec International <a href="https://cysec-intl.com/">Website</a>
</li>
  <li>Steve Stone on <a href="https://www.linkedin.com/in/stevenstone618/">LinkedIn</a>
</li>
  <li>Rubrik, Inc <a href="https://rbrk.co/4b2ErHc">Website</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1676</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70y7r6q0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9029370094.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Driving Strategic Excellence in Cybersecurity: Insights from Sue Bergamo, CISO and CIO at BTE Partners</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/10/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. Come and join us on this journey.

In this episode, your host, ⁠Steve Stone⁠, is joined by ⁠Sue Bergamo⁠, CISO and CIO at ⁠BTE Partners⁠. Join us as we delve into the world of senior leadership in cybersecurity. Sue shares her journey from system administrator to CIO and CISO at BTE Partners while emphasizing the need for strategic excellence in defending against cyber threats on a global scale. 

We also discuss the challenges of managing at a global level, the evolving role of the CISO, and the impact of new SEC regulations. Sue also explores the importance of mentorship and diversity in the cybersecurity industry. Don't miss out on this insightful conversation!

Sue is an experienced global executive who is passionate about connecting people and helping companies build innovative and secure technologies. Her proven track record speaks to the resilience needed to effectively transform people, processes, and technology to meet business resilience needs. 

Her expertise includes Cybersecurity Strategy, Assessment, Implementation, Operations, Compliance, Risk Management and Certifications. She is a Board Member at BTE Partners and an advisor on Strategic Planning, Transformation, and organizational change. Sue is a best-selling author and blogger and a sought-after keynote speaker. 

Episode Highlights:


  Introduction to Sue Bergamo's journey in cybersecurity and technology

  Challenges of leading and managing cybersecurity at a global level

  Balancing the operational needs of IT and cybersecurity

  The evolving role of the CISO and its challenges

  Challenges posed by compliance and regulatory initiatives

  Importance of mentorship and diversity in the cybersecurity industry

  Future of cybersecurity and optimism about combating cybercrime


Episode Resources:


  Sue Bergamo on LinkedIn


  BTE Partners Website


  Steve Stone on LinkedIn


  Rubrik, Inc Website</description>
      <pubDate>Tue, 21 May 2024 12:54:00 -0000</pubDate>
      <itunes:title>Driving Strategic Excellence in Cybersecurity: Insights from Sue Bergamo, CISO and CIO at BTE Partners</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5732dfa4-b4f5-11f0-922b-afe8f741b6bd/image/d454bc0dca73f35a778463d4e22340b2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. Come and join us on this journey.
In this episode, your host, Steve Stone, is joined by Sue Bergamo, CISO and CIO at BTE Partners. Join us as we delve into the world of senior leadership in global cybersecurity. Sue shares her journey from system administrator to the C-Suite while emphasizing the need for strategic excellence in defending against cyber threats on a global scale. 
We also discuss the challenges of managing at a global level, the evolving role of the CISO, and the impact of new SEC regulations. Sue also explores the importance of mentorship and diversity in the cybersecurity industry. Don't miss out on this insightful conversation!</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. Come and join us on this journey.

In this episode, your host, ⁠Steve Stone⁠, is joined by ⁠Sue Bergamo⁠, CISO and CIO at ⁠BTE Partners⁠. Join us as we delve into the world of senior leadership in cybersecurity. Sue shares her journey from system administrator to CIO and CISO at BTE Partners while emphasizing the need for strategic excellence in defending against cyber threats on a global scale. 

We also discuss the challenges of managing at a global level, the evolving role of the CISO, and the impact of new SEC regulations. Sue also explores the importance of mentorship and diversity in the cybersecurity industry. Don't miss out on this insightful conversation!

Sue is an experienced global executive who is passionate about connecting people and helping companies build innovative and secure technologies. Her proven track record speaks to the resilience needed to effectively transform people, processes, and technology to meet business resilience needs. 

Her expertise includes Cybersecurity Strategy, Assessment, Implementation, Operations, Compliance, Risk Management and Certifications. She is a Board Member at BTE Partners and an advisor on Strategic Planning, Transformation, and organizational change. Sue is a best-selling author and blogger and a sought-after keynote speaker. 

Episode Highlights:


  Introduction to Sue Bergamo's journey in cybersecurity and technology

  Challenges of leading and managing cybersecurity at a global level

  Balancing the operational needs of IT and cybersecurity

  The evolving role of the CISO and its challenges

  Challenges posed by compliance and regulatory initiatives

  Importance of mentorship and diversity in the cybersecurity industry

  Future of cybersecurity and optimism about combating cybercrime


Episode Resources:


  Sue Bergamo on LinkedIn


  BTE Partners Website


  Steve Stone on LinkedIn


  Rubrik, Inc Website</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://rbrk.co/4b2ErHc">⁠Rubrik Zero Labs⁠</a>. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. Come and join us on this journey.</p>
<p>In this episode, your host, <a href="https://www.linkedin.com/in/stevenstone618/">⁠Steve Stone⁠</a>, is joined by <a href="https://www.linkedin.com/in/suebergamo/">⁠Sue Bergamo⁠</a>, CISO and CIO at <a href="https://www.btepartners.com/">⁠BTE Partners⁠</a>. Join us as we delve into the world of senior leadership in cybersecurity. Sue shares her journey from system administrator to CIO and CISO at BTE Partners while emphasizing the need for strategic excellence in defending against cyber threats on a global scale. </p>
<p>We also discuss the challenges of managing at a global level, the evolving role of the CISO, and the impact of new SEC regulations. Sue also explores the importance of mentorship and diversity in the cybersecurity industry. Don't miss out on this insightful conversation!</p>
<p>Sue is an experienced global executive who is passionate about connecting people and helping companies build innovative and secure technologies. Her proven track record speaks to the resilience needed to effectively transform people, processes, and technology to meet business resilience needs. </p>
<p>Her expertise includes Cybersecurity Strategy, Assessment, Implementation, Operations, Compliance, Risk Management and Certifications. She is a Board Member at BTE Partners and an advisor on Strategic Planning, Transformation, and organizational change. Sue is a best-selling author and blogger and a sought-after keynote speaker. </p>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>Introduction to Sue Bergamo's journey in cybersecurity and technology</li>
  <li>Challenges of leading and managing cybersecurity at a global level</li>
  <li>Balancing the operational needs of IT and cybersecurity</li>
  <li>The evolving role of the CISO and its challenges</li>
  <li>Challenges posed by compliance and regulatory initiatives</li>
  <li>Importance of mentorship and diversity in the cybersecurity industry</li>
  <li>Future of cybersecurity and optimism about combating cybercrime</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Sue Bergamo on <a href="https://www.linkedin.com/in/suebergamo?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_contact_details%3BzuQmh%2FNHS%2B2xg%2FcqiIeUZA%3D%3D">LinkedIn</a>
</li>
  <li>BTE Partners <a href="https://www.btepartners.com/">Website</a>
</li>
  <li>Steve Stone on <a href="https://www.linkedin.com/in/stevenstone618/">LinkedIn</a>
</li>
  <li>Rubrik, Inc <a href="https://rbrk.co/4b2ErHc">Website</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>2688</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[z1r38540]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2545918444.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Impact of Ransomware on Hospitals and Patient Care with Hannah Neprash, PhD of the University of Minnesota, School of Public Health</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/9/notes</link>
      <description>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode of the podcast features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. Come and join us on this journey.

In this episode, your host and Head of Rubrik Zero Labs, ⁠Steve Stone⁠, is joined by Hannah Neprash, PhD, Assistant Professor at the ⁠University of Minnesota School of Public Health⁠. Join them as they discuss the impact of ransomware attacks on hospitals and patient care, highlighting the severe consequences when these organizations lose sensitive patient data records and their access to systems. They emphasize the importance of collaboration between healthcare and cybersecurity professionals to align on a clear path forward and the need for clear policy solutions. This conversation provides valuable insights into the intersection of healthcare and cybersecurity.

Hannah has done her doctoral studies in health policy with an economic track from Harvard University. She is focused on how healthcare organizations respond to financial and non-financial incentives. Her research uses novel sources of data to examine how physician decision-making drives utilization, spending, access, and quality in healthcare. She is particularly interested in research questions that will inform evidence-based policy during a time of rapid transformation in healthcare payment and delivery systems. 

In addition to her academic career, she has experience in federal and state health policy – including time at the Medicare Payment Advisory Commission (MedPAC), the Health Subcommittee of the U.S. House of Representatives Ways &amp; Means Committee, and the Massachusetts Health Policy Commission. 

Episode Highlights:


  Introduction to the intersection of healthcare and cybersecurity

  Hannah's interest in health economics and ransomware attacks

  Creating a comprehensive dataset of ransomware attacks on healthcare organizations

  Findings on the impact of ransomware attacks targeting sensitive patient data

  Implications of the research for future healthcare policies

  Challenges in the cybersecurity and data security industries

  Data security maturity across healthcare

  Importance of collaboration and awareness in healthcare cybersecurity


Episode Resources:


  Hannah Neprash on LinkedIn


  University of Minnesota, School of Public Health Website


  Steve Stone on LinkedIn


  Rubrick, Inc Website</description>
      <pubDate>Fri, 03 May 2024 17:43:00 -0000</pubDate>
      <itunes:title>The Impact of Ransomware on Hospitals and Patient Care with Hannah Neprash, PhD of the University of Minnesota, School of Public Health</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/57ab736a-b4f5-11f0-922b-2f2bb92abb07/image/6d9cd94f05895b81b68ca86aca395da6.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NEWS: Cyber Security Decoded is now Data Security Decoded!

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. Each episode of the podcast features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. Come and join us on this journey.

In this episode, your host and Head of Rubrik Zero Labs, Steve Stone, is joined by Hannah Neprash, PhD, Assistant Professor at the University of Minnesota School of Public Health. Join them as they discuss the impact of ransomware attacks on hospitals and patient care, highlighting the severe consequences when these organizations lose sensitive patient data records and their access to systems. They emphasize the importance of collaboration between healthcare and cybersecurity professionals to align on a clear path forward and the need for clear policy solutions. This conversation provides valuable insights into the intersection of healthcare and cybersecurity.</itunes:subtitle>
      <itunes:summary>Welcome to the ⁠Data Security Decoded⁠ podcast, brought to you by ⁠Rubrik Zero Labs⁠. Each episode of the podcast features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. Come and join us on this journey.

In this episode, your host and Head of Rubrik Zero Labs, ⁠Steve Stone⁠, is joined by Hannah Neprash, PhD, Assistant Professor at the ⁠University of Minnesota School of Public Health⁠. Join them as they discuss the impact of ransomware attacks on hospitals and patient care, highlighting the severe consequences when these organizations lose sensitive patient data records and their access to systems. They emphasize the importance of collaboration between healthcare and cybersecurity professionals to align on a clear path forward and the need for clear policy solutions. This conversation provides valuable insights into the intersection of healthcare and cybersecurity.

Hannah has done her doctoral studies in health policy with an economic track from Harvard University. She is focused on how healthcare organizations respond to financial and non-financial incentives. Her research uses novel sources of data to examine how physician decision-making drives utilization, spending, access, and quality in healthcare. She is particularly interested in research questions that will inform evidence-based policy during a time of rapid transformation in healthcare payment and delivery systems. 

In addition to her academic career, she has experience in federal and state health policy – including time at the Medicare Payment Advisory Commission (MedPAC), the Health Subcommittee of the U.S. House of Representatives Ways &amp; Means Committee, and the Massachusetts Health Policy Commission. 

Episode Highlights:


  Introduction to the intersection of healthcare and cybersecurity

  Hannah's interest in health economics and ransomware attacks

  Creating a comprehensive dataset of ransomware attacks on healthcare organizations

  Findings on the impact of ransomware attacks targeting sensitive patient data

  Implications of the research for future healthcare policies

  Challenges in the cybersecurity and data security industries

  Data security maturity across healthcare

  Importance of collaboration and awareness in healthcare cybersecurity


Episode Resources:


  Hannah Neprash on LinkedIn


  University of Minnesota, School of Public Health Website


  Steve Stone on LinkedIn


  Rubrick, Inc Website</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://podcasts.apple.com/us/podcast/data-security-decoded/id1738264274">⁠Data Security Decoded⁠</a> podcast, brought to you by <a href="https://www.rubrik.com/zero-labs">⁠Rubrik Zero Labs⁠</a>. Each episode of the podcast features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience. Come and join us on this journey.</p>
<p>In this episode, your host and Head of Rubrik Zero Labs, <a href="https://www.linkedin.com/in/stevenstone618/">⁠Steve Stone⁠</a>, is joined by Hannah Neprash, PhD, Assistant Professor at the <a href="https://twin-cities.umn.edu/health-sciences">⁠University of Minnesota School of Public Health⁠</a>. Join them as they discuss the impact of ransomware attacks on hospitals and patient care, highlighting the severe consequences when these organizations lose sensitive patient data records and their access to systems. They emphasize the importance of collaboration between healthcare and cybersecurity professionals to align on a clear path forward and the need for clear policy solutions. This conversation provides valuable insights into the intersection of healthcare and cybersecurity.</p>
<p>Hannah has done her doctoral studies in health policy with an economic track from Harvard University. She is focused on how healthcare organizations respond to financial and non-financial incentives. Her research uses novel sources of data to examine how physician decision-making drives utilization, spending, access, and quality in healthcare. She is particularly interested in research questions that will inform evidence-based policy during a time of rapid transformation in healthcare payment and delivery systems. </p>
<p>In addition to her academic career, she has experience in federal and state health policy – including time at the Medicare Payment Advisory Commission (MedPAC), the Health Subcommittee of the U.S. House of Representatives Ways &amp; Means Committee, and the Massachusetts Health Policy Commission. </p>
<p><strong>Episode Highlights:</strong></p>
<ul>
  <li>Introduction to the intersection of healthcare and cybersecurity</li>
  <li>Hannah's interest in health economics and ransomware attacks</li>
  <li>Creating a comprehensive dataset of ransomware attacks on healthcare organizations</li>
  <li>Findings on the impact of ransomware attacks targeting sensitive patient data</li>
  <li>Implications of the research for future healthcare policies</li>
  <li>Challenges in the cybersecurity and data security industries</li>
  <li>Data security maturity across healthcare</li>
  <li>Importance of collaboration and awareness in healthcare cybersecurity</li>
</ul>
<p><strong>Episode Resources:</strong></p>
<ul>
  <li>Hannah Neprash on <a href="https://www.linkedin.com/in/hannah-neprash-09443416/">LinkedIn</a>
</li>
  <li>University of Minnesota, School of Public Health <a href="https://twin-cities.umn.edu/health-sciences">Website</a>
</li>
  <li>Steve Stone on <a href="https://www.linkedin.com/in/stevenstone618/">LinkedIn</a>
</li>
  <li>Rubrick, Inc <a href="https://www.rubrik.com/zero-labs">Website</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>2359</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70vlyk30]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1466156962.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Communicating Cyber Risk to Executives and Boards with Shamane Tan</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/8/notes</link>
      <description>In this episode of Cyber Security Decoded from Rubrik Zero Labs, host Steve Stone is joined by Chief Growth Officer at Sekuro and Best-Selling Author Shamane Tan to discuss differences in the cybersecurity landscape between the US and APAC, communication strategies for CISOs, building trust for better cybersecurity outcomes, improving organizational resilience, and diversity in the cybersecurity field.

For more information on the State of Data Security from Rubrik Zero Labs, read the report here: https://rbrk.co/47rYcWH</description>
      <pubDate>Thu, 29 Feb 2024 16:44:00 -0000</pubDate>
      <itunes:title>Communicating Cyber Risk to Executives and Boards with Shamane Tan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/58752e9e-b4f5-11f0-922b-c7982c3720e5/image/02f8e3a3dfc036371e11e74e1da55e25.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Cyber Security Decoded from Rubrik Zero Labs, host Steve Stone is joined by Chief Growth Officer at Sekuro and Best-Selling Author Shamane Tan to discuss differences in the cybersecurity landscape between the US and APAC, communication strategies for CISOs, building trust for better cybersecurity outcomes, improving organizational resilience, and diversity in the cybersecurity field.

For more information on the State of Data Security from Rubrik Zero Labs, read the report here: https://rbrk.co/47rYcWH</itunes:subtitle>
      <itunes:summary>In this episode of Cyber Security Decoded from Rubrik Zero Labs, host Steve Stone is joined by Chief Growth Officer at Sekuro and Best-Selling Author Shamane Tan to discuss differences in the cybersecurity landscape between the US and APAC, communication strategies for CISOs, building trust for better cybersecurity outcomes, improving organizational resilience, and diversity in the cybersecurity field.

For more information on the State of Data Security from Rubrik Zero Labs, read the report here: https://rbrk.co/47rYcWH</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of Cyber Security Decoded from Rubrik Zero Labs, host Steve Stone is joined by Chief Growth Officer at Sekuro and Best-Selling Author Shamane Tan to discuss differences in the cybersecurity landscape between the US and APAC, communication strategies for CISOs, building trust for better cybersecurity outcomes, improving organizational resilience, and diversity in the cybersecurity field.

For more information on the State of Data Security from Rubrik Zero Labs, read the report here: <a href="https://rbrk.co/47rYcWH">https://rbrk.co/47rYcWH</a></p>]]>
      </content:encoded>
      <itunes:duration>2062</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[x1l7pq50]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW5735276970.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Generative AI Will Accelerate Cybersecurity with Sherrod DeGrippo</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/7/notes</link>
      <description>In this episode of Cyber Security Decoded, host Steve Stone, Head of Rubrik Zero Labs, is joined by Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft to discuss the cyber threat landscape. In this episode, you'll hear insights on:

- How AI will act as a catalyst and accelerate everything security and IT teams are doing
- The (debatable) value of Threat Models
- If threat intelligence teams will realistically be able to join forces to fight the true adversaries

Rubrik Zero Labs' “The State of Data Security: The Journey to Secure an Uncertain Future" report provides a timely view into the increasingly commonplace problem of cyber risks and the challenge to secure data across an organization’s expanding surface area. See the report here: https://rbrk.co/47rYcWH</description>
      <pubDate>Wed, 10 Jan 2024 22:04:00 -0000</pubDate>
      <itunes:title>How Generative AI Will Accelerate Cybersecurity with Sherrod DeGrippo</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/58e8f298-b4f5-11f0-922b-13aec074a7f2/image/b2667bdf9d823d57891522a2f6dceaa0.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Cyber Security Decoded, host Steve Stone, Head of Rubrik Zero Labs, is joined by Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft to discuss the cyber threat landscape. In this episode, you&amp;#39;ll hear insights on:

- How AI will act as a catalyst and accelerate everything security and IT teams are doing
- The (debatable) value of Threat Models
- If threat intelligence teams will realistically be able to join forces to fight the true adversaries

Rubrik Zero Labs&amp;#39; “The State of Data Security: The Journey to Secure an Uncertain Future&amp;quot; report provides a timely view into the increasingly commonplace problem of cyber risks and the challenge to secure data across an organization’s expanding surface area. See the report here: https://rbrk.co/47rYcWH</itunes:subtitle>
      <itunes:summary>In this episode of Cyber Security Decoded, host Steve Stone, Head of Rubrik Zero Labs, is joined by Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft to discuss the cyber threat landscape. In this episode, you'll hear insights on:

- How AI will act as a catalyst and accelerate everything security and IT teams are doing
- The (debatable) value of Threat Models
- If threat intelligence teams will realistically be able to join forces to fight the true adversaries

Rubrik Zero Labs' “The State of Data Security: The Journey to Secure an Uncertain Future" report provides a timely view into the increasingly commonplace problem of cyber risks and the challenge to secure data across an organization’s expanding surface area. See the report here: https://rbrk.co/47rYcWH</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of Cyber Security Decoded, host Steve Stone, Head of Rubrik Zero Labs, is joined by Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft to discuss the cyber threat landscape. In this episode, you'll hear insights on:

- How AI will act as a catalyst and accelerate everything security and IT teams are doing
- The (debatable) value of Threat Models
- If threat intelligence teams will realistically be able to join forces to fight the true adversaries

Rubrik Zero Labs' “The State of Data Security: The Journey to Secure an Uncertain Future" report provides a timely view into the increasingly commonplace problem of cyber risks and the challenge to secure data across an organization’s expanding surface area. See the report here: <a href="https://rbrk.co/47rYcWH">https://rbrk.co/47rYcWH</a></p>]]>
      </content:encoded>
      <itunes:duration>1904</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71y6yrj0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6053903684.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Evolving Role of the CISO and the Language of Resilience with Marene Allison</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/6/notes</link>
      <description>In this episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by a former CISO at Johnson &amp; Johnson to discuss the ever-evolving role of the CISO. They discuss what she has learned from the biggest threat intrusions in her career, how the role of the CISO is evolving to adapt to new cyber threats, and what we can tactically do to empower more professionals from different backgrounds to pursue a career in cybersecurity.

About Marene Allison:Marene Allison is the former CISO for Johnson &amp; Johnson where she was responsible for protecting the company’s information technology systems and business data worldwide. Prior to Johnson &amp; Johnson, she served as an FBI Special Agent and in the US Army and graduated from West Point in the first class to include women. Allison also currently sits on the board of West Point Women.

What you'll learn in this episode:– Misconceptions emerging security and IT leaders have about the role of the CISO– How the cyber threat landscape has evolved over the past several decades– The questions CISOs need to think about in terms of cyber resilience and posture If you're a CISO, security leader, or anyone interested in the future of cybersecurity, this episode is a must-listen.

Call to action:1. Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.2. Learn more about our findings in the State of Data Security report here: https://rbrk.co/3GrzWsu</description>
      <pubDate>Tue, 31 Oct 2023 13:45:00 -0000</pubDate>
      <itunes:title>The Evolving Role of the CISO and the Language of Resilience with Marene Allison</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5a45c4d6-b4f5-11f0-922b-abf130532da9/image/29e1bf393cf825212c953ce609cd4432.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by a former CISO at Johnson &amp;amp; Johnson to discuss the ever-evolving role of the CISO. They discuss what she has learned from the biggest threat intrusions in her career, how the role of the CISO is evolving to adapt to new cyber threats, and what we can tactically do to empower more professionals from different backgrounds to pursue a career in cybersecurity.About Marene Allison:Marene Allison is the former CISO for Johnson &amp;amp; Johnson where she was responsible for protecting the company’s information technology systems and business data worldwide. Prior to Johnson &amp;amp; Johnson, she served as an FBI Special Agent and in the US Army and graduated from West Point in the first class to include women. Allison also currently sits on the board of West Point Women.What you&amp;#39;ll learn in this episode:– Misconceptions emerging security and IT leaders have about the role of the CISO– How the cyber threat landscape has evolved over the past several decades– The questions CISOs need to think about in terms of cyber resilience and posture If you&amp;#39;re a CISO, security leader, or anyone interested in the future of cybersecurity, this episode is a must-listen.Call to action:1. Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.2. Learn more about our findings in the State of Data Security report here: https://rbrk.co/3GrzWsuKeywords: data security, cybersecurity, ransomware, cyber attack, malware, cybercrime, zero trust, cyber resilience, CISA, cyber threat intelligence, information security, CISO</itunes:subtitle>
      <itunes:summary>In this episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by a former CISO at Johnson &amp; Johnson to discuss the ever-evolving role of the CISO. They discuss what she has learned from the biggest threat intrusions in her career, how the role of the CISO is evolving to adapt to new cyber threats, and what we can tactically do to empower more professionals from different backgrounds to pursue a career in cybersecurity.

About Marene Allison:Marene Allison is the former CISO for Johnson &amp; Johnson where she was responsible for protecting the company’s information technology systems and business data worldwide. Prior to Johnson &amp; Johnson, she served as an FBI Special Agent and in the US Army and graduated from West Point in the first class to include women. Allison also currently sits on the board of West Point Women.

What you'll learn in this episode:– Misconceptions emerging security and IT leaders have about the role of the CISO– How the cyber threat landscape has evolved over the past several decades– The questions CISOs need to think about in terms of cyber resilience and posture If you're a CISO, security leader, or anyone interested in the future of cybersecurity, this episode is a must-listen.

Call to action:1. Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.2. Learn more about our findings in the State of Data Security report here: https://rbrk.co/3GrzWsu</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by a former CISO at Johnson &amp; Johnson to discuss the ever-evolving role of the CISO. They discuss what she has learned from the biggest threat intrusions in her career, how the role of the CISO is evolving to adapt to new cyber threats, and what we can tactically do to empower more professionals from different backgrounds to pursue a career in cybersecurity.</p>
<p><br><strong>About Marene Allison:</strong><br>Marene Allison is the former CISO for Johnson &amp; Johnson where she was responsible for protecting the company’s information technology systems and business data worldwide. Prior to Johnson &amp; Johnson, she served as an FBI Special Agent and in the US Army and graduated from West Point in the first class to include women. Allison also currently sits on the board of West Point Women.<br></p>
<p><strong>What you'll learn in this episode:</strong><br>– Misconceptions emerging security and IT leaders have about the role of the CISO<br>– How the cyber threat landscape has evolved over the past several decades<br>– The questions CISOs need to think about in terms of cyber resilience and posture <br>If you're a CISO, security leader, or anyone interested in the future of cybersecurity, this episode is a must-listen.<br></p>
<p><strong>Call to action:</strong><br>1. Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.<br>2. Learn more about our findings in the State of Data Security report here: <a href="https://rbrk.co/3GrzWsu">https://rbrk.co/3GrzWsu</a><br></p>]]>
      </content:encoded>
      <itunes:duration>2123</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[209zk6p1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2852680592.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Manipulating Science for the Greater Good with Kavitha Mariappan</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/5/notes</link>
      <description>Hear from Steve Stone, Head of Rubrik Zero Labs, and Kavitha Mariappan, EVP of Customer Experience and Transformation at Zscaler, as they discuss the cybersecurity landscape, Rubrik and Zscaler's partnership and integration, and what security transformation has looked like over recent years for various organizations.

In this episode, you'll learn about:


  The latest threats and trends in cybersecurity

  How Rubrik and Zscaler are working together to help organizations protect their data

  Case studies of how organizations have successfully transformed their security posture

  Tips for leaders on how to start their own security transformation journey


If you're interested in learning more about how to protect your organization from cyber threats, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Learn more about our findings in the State of Data Security report here: https://rbrk.co/3GrzWsu</description>
      <pubDate>Wed, 20 Sep 2023 14:30:00 -0000</pubDate>
      <itunes:title>Manipulating Science for the Greater Good with Kavitha Mariappan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b3b8146-b4f5-11f0-922b-6baf9e92c204/image/96a3362121a97f8c2719810ed2aaaef7.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hear from Steve Stone, Head of Rubrik Zero Labs, and Kavitha Mariappan, EVP of Customer Experience and Transformation at Zscaler, as they discuss the cybersecurity landscape, Rubrik and Zscaler&amp;#39;s partnership and integration, and what security transformation has looked like over recent years for various organizations.
In this episode, you&amp;#39;ll learn about:

 The latest threats and trends in cybersecurity
 How Rubrik and Zscaler are working together to help organizations protect their data
 Case studies of how organizations have successfully transformed their security posture
 Tips for leaders on how to start their own security transformation journey

If you&amp;#39;re interested in learning more about how to protect your organization from cyber threats, this episode is a must-listen.
Call to action:

 Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.
 Learn more about our findings in the State of Data Security report here: https://rbrk.co/3GrzWsu
</itunes:subtitle>
      <itunes:summary>Hear from Steve Stone, Head of Rubrik Zero Labs, and Kavitha Mariappan, EVP of Customer Experience and Transformation at Zscaler, as they discuss the cybersecurity landscape, Rubrik and Zscaler's partnership and integration, and what security transformation has looked like over recent years for various organizations.

In this episode, you'll learn about:


  The latest threats and trends in cybersecurity

  How Rubrik and Zscaler are working together to help organizations protect their data

  Case studies of how organizations have successfully transformed their security posture

  Tips for leaders on how to start their own security transformation journey


If you're interested in learning more about how to protect your organization from cyber threats, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Learn more about our findings in the State of Data Security report here: https://rbrk.co/3GrzWsu</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hear from Steve Stone, Head of Rubrik Zero Labs, and Kavitha Mariappan, EVP of Customer Experience and Transformation at Zscaler, as they discuss the cybersecurity landscape, Rubrik and Zscaler's partnership and integration, and what security transformation has looked like over recent years for various organizations.</p>
<p><strong>In this episode, you'll learn about:</strong></p>
<ul>
  <li>The latest threats and trends in cybersecurity</li>
  <li>How Rubrik and Zscaler are working together to help organizations protect their data</li>
  <li>Case studies of how organizations have successfully transformed their security posture</li>
  <li>Tips for leaders on how to start their own security transformation journey</li>
</ul>
<p>If you're interested in learning more about how to protect your organization from cyber threats, this episode is a must-listen.</p>
<p><strong>Call to action:</strong></p>
<ol>
  <li>Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.</li>
  <li>Learn more about our findings in the State of Data Security report here: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbE90aW1VWGtEN1RkLTF6UWVybUdmUVFaa1FjZ3xBQ3Jtc0ttRW1BTVlqemhVeE1DeUQ2RUJjVkxkYkFlSmxPSC00ZVUxd2J5VzVxSHRLWjUwM1hEZnZBcHlWT1lrN3hSZ2RvM29rbXNoTUdMZS1nakpMZmJ4VEFSLVAydGgxa0hfOEoxZ09VaVROS1U5QWE0RTBGcw&amp;q=https%3A%2F%2Frbrk.co%2F3GrzWsu&amp;v=Lhkd3zLIPE0">https://rbrk.co/3GrzWsu</a>
</li>
</ol>]]>
      </content:encoded>
      <itunes:duration>1961</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[815z2jl0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8858073049.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Hard Truths of Data Security with Wendi Whitmore</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/4/notes</link>
      <description>Hear from Steve Stone, Head of Rubrik Zero Labs, and Wendi Whitmore, SVP of Unit 42 at Palo Alto Networks, as they discuss the cyber threat landscape, what security and IT teams must prioritize to build cyber resilient organizations, and how important it is to bring awareness to cybersecurity as a career option to diversify and expand the security workforce.

In this episode, you'll learn about:


  The latest threats and trends in cybersecurity

  How to build a cyber-resilient organization

  The importance of diversity and inclusion in the cybersecurity workforce

  How to inspire younger generations to work towards a career in cybersecurity


If you're interested in learning more about how to protect your organization from cyber threats and build a strong security team, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Dive into the latest report from Rubrik Zero Labs, outlining the hard truths of data security, here: https://rbrk.co/3zEz3sY</description>
      <pubDate>Mon, 05 Jun 2023 14:57:00 -0000</pubDate>
      <itunes:title>The Hard Truths of Data Security with Wendi Whitmore</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c11a564-b4f5-11f0-922b-db49c8a8b2d4/image/b981a94591f3b74e6ee2adcc0964f505.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hear from Steve Stone, Head of Rubrik Zero Labs, and Wendi Whitmore, SVP of Unit 42 at Palo Alto Networks, as they discuss the cyber threat landscape, what security and IT teams must prioritize to build cyber resilient organizations, and how important it is to bring awareness to cybersecurity as a career option to diversify and expand the security workforce.
In this episode, you&amp;#39;ll learn about:

 The latest threats and trends in cybersecurity
 How to build a cyber-resilient organization
  The importance of diversity and inclusion in the cybersecurity workforce
  How to inspire younger generations to work towards a career in cybersecurity

If you&amp;#39;re interested in learning more about how to protect your organization from cyber threats and build a strong security team, this episode is a must-listen.
Call to action:

  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.
  Dive into the latest report from Rubrik Zero Labs, outlining the hard truths of data security, here: https://rbrk.co/3zEz3sY

Keywords: data security, cybersecurity, ransomware, cyber attack, malware, cybercrime, zero trust, cyber resilience</itunes:subtitle>
      <itunes:summary>Hear from Steve Stone, Head of Rubrik Zero Labs, and Wendi Whitmore, SVP of Unit 42 at Palo Alto Networks, as they discuss the cyber threat landscape, what security and IT teams must prioritize to build cyber resilient organizations, and how important it is to bring awareness to cybersecurity as a career option to diversify and expand the security workforce.

In this episode, you'll learn about:


  The latest threats and trends in cybersecurity

  How to build a cyber-resilient organization

  The importance of diversity and inclusion in the cybersecurity workforce

  How to inspire younger generations to work towards a career in cybersecurity


If you're interested in learning more about how to protect your organization from cyber threats and build a strong security team, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Dive into the latest report from Rubrik Zero Labs, outlining the hard truths of data security, here: https://rbrk.co/3zEz3sY</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hear from Steve Stone, Head of Rubrik Zero Labs, and Wendi Whitmore, SVP of Unit 42 at Palo Alto Networks, as they discuss the cyber threat landscape, what security and IT teams must prioritize to build cyber resilient organizations, and how important it is to bring awareness to cybersecurity as a career option to diversify and expand the security workforce.</p>
<p><strong>In this episode, you'll learn about:</strong></p>
<ul>
  <li>The latest threats and trends in cybersecurity</li>
  <li>How to build a cyber-resilient organization</li>
  <li>The importance of diversity and inclusion in the cybersecurity workforce</li>
  <li>How to inspire younger generations to work towards a career in cybersecurity</li>
</ul>
<p>If you're interested in learning more about how to protect your organization from cyber threats and build a strong security team, this episode is a must-listen.</p>
<p><strong>Call to action:</strong></p>
<ol>
  <li>Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.</li>
  <li>Dive into the latest report from Rubrik Zero Labs, outlining the hard truths of data security, here: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbTFxUFZ4WVVYeEhodndPMkY0QURJRUZkblJpUXxBQ3Jtc0tsVjlMMUtZR3pHeFlncFBibU5QM0ZTTkwxMm9oRExzUVczMmFfd0dhc2ZGY0RJVFM0NVRaZDVoYWtPWjQ5ZkU5YmZocmcwV0QyNmIyemdONFFEalZzMHVudlZRVVlMVUZReXJySDFEdUpCYlZJc3JLOA&amp;q=https%3A%2F%2Frbrk.co%2F3zEz3sY&amp;v=Qvic2VDhGPk">https://rbrk.co/3zEz3sY</a>
</li>
</ol>]]>
      </content:encoded>
      <itunes:duration>1906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[m1j7jq80]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6749537202.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leading A Cybersecurity Organization Through Periods of Burnout with Sandra Joyce</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/3/notes</link>
      <description>Steve Stone, Head of Rubrik Zero Labs, is joined by Sandra Joyce, VP of Mandiant Intelligence at Google Cloud, to discuss leading mission-driven teams through periods of burnout, the gaps private sector cybersecurity teams experience in partnering with the public sector, information sharing on cyberattacks, and more.

About Sandra Joyce:

Sandra Joyce is a cybersecurity leader and has been head of Mandiant Intelligence since 2017. She oversees threat research activities and operations of the Mandiant Intelligence organization and joined Google in 2022, following Google’s acquisition of Mandiant.

Joyce is a highly accomplished and respected cybersecurity professional with over 20 years of experience in the field. She has held senior leadership positions at Mandiant, FireEye, and the U.S. Air Force. Joyce is also a member of the Aspen Institute Cybersecurity Working Group, sits on the strategic council of the 
Silverado Policy Accelerator, and is a member of the Institute for Security and Technology’s Ransomware Task Force Steering Committee. She is regularly featured in international print and broadcast media including CNN, NBC, Bloomberg, BBC World, Today Show, NPR, Wall Street Journal, Deutsche Welle, and others.

What you'll learn in this episode:


  How to lead mission-driven teams through periods of burnout

  The challenges of partnering between the private and public sectors in cybersecurity

  The importance of information sharing in the fight against cyberattacks

  And more!


If you're interested in learning more about how to lead a cybersecurity organization through burnout, the gaps between the private and public sectors in cybersecurity, and the importance of information sharing, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Gain more valuable insights on the hard truths of data security here: https://rbrk.co/3zEz3sY</description>
      <pubDate>Fri, 07 Apr 2023 16:00:00 -0000</pubDate>
      <itunes:title>Leading A Cybersecurity Organization Through Periods of Burnout with Sandra Joyce</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d38ab72-b4f5-11f0-922b-376d38816284/image/ad47b3d07384a3828f211d60aae8c04b.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Steve Stone, Head of Rubrik Zero Labs, is joined by Sandra Joyce, VP of Mandiant Intelligence at Google Cloud, to discuss leading mission-driven teams through periods of burnout, the gaps private sector cybersecurity teams experience in partnering with the public sector, information sharing on cyberattacks, and more.
About Sandra Joyce:
Sandra Joyce is a cybersecurity leader and has been head of Mandiant Intelligence since 2017. She oversees threat research activities and operations of the Mandiant Intelligence organization and joined Google in 2022, following Google’s acquisition of Mandiant.
Joyce is a highly accomplished and respected cybersecurity professional with over 20 years of experience in the field. She has held senior leadership positions at Mandiant, FireEye, and the U.S. Air Force. Joyce is also a member of the Aspen Institute Cybersecurity Working Group, sits on the strategic council of the 
Silverado Policy Accelerator, and is a member of the Institute for Security and Technology’s Ransomware Task Force Steering Committee. She is regularly featured in international print and broadcast media including CNN, NBC, Bloomberg, BBC World, Today Show, NPR, Wall Street Journal, Deutsche Welle, and others.
What you&amp;#39;ll learn in this episode:

 How to lead mission-driven teams through periods of burnout
 The challenges of partnering between the private and public sectors in cybersecurity
  The importance of information sharing in the fight against cyberattacks
  And more!

If you&amp;#39;re interested in learning more about how to lead a cybersecurity organization through burnout, the gaps between the private and public sectors in cybersecurity, and the importance of information sharing, this episode is a must-listen.
Call to action:

  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.
  Gain more valuable insights on the hard truths of data security here: https://rbrk.co/3zEz3sY

Keywords: data security, cybersecurity, ransomware, cyber attack, malware, cybercrime, zero trust, cyber resilience, CISA, cyber threat intelligence, information security, burnout, public-private partnerships</itunes:subtitle>
      <itunes:summary>Steve Stone, Head of Rubrik Zero Labs, is joined by Sandra Joyce, VP of Mandiant Intelligence at Google Cloud, to discuss leading mission-driven teams through periods of burnout, the gaps private sector cybersecurity teams experience in partnering with the public sector, information sharing on cyberattacks, and more.

About Sandra Joyce:

Sandra Joyce is a cybersecurity leader and has been head of Mandiant Intelligence since 2017. She oversees threat research activities and operations of the Mandiant Intelligence organization and joined Google in 2022, following Google’s acquisition of Mandiant.

Joyce is a highly accomplished and respected cybersecurity professional with over 20 years of experience in the field. She has held senior leadership positions at Mandiant, FireEye, and the U.S. Air Force. Joyce is also a member of the Aspen Institute Cybersecurity Working Group, sits on the strategic council of the 
Silverado Policy Accelerator, and is a member of the Institute for Security and Technology’s Ransomware Task Force Steering Committee. She is regularly featured in international print and broadcast media including CNN, NBC, Bloomberg, BBC World, Today Show, NPR, Wall Street Journal, Deutsche Welle, and others.

What you'll learn in this episode:


  How to lead mission-driven teams through periods of burnout

  The challenges of partnering between the private and public sectors in cybersecurity

  The importance of information sharing in the fight against cyberattacks

  And more!


If you're interested in learning more about how to lead a cybersecurity organization through burnout, the gaps between the private and public sectors in cybersecurity, and the importance of information sharing, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Gain more valuable insights on the hard truths of data security here: https://rbrk.co/3zEz3sY</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Steve Stone, Head of Rubrik Zero Labs, is joined by Sandra Joyce, VP of Mandiant Intelligence at Google Cloud, to discuss leading mission-driven teams through periods of burnout, the gaps private sector cybersecurity teams experience in partnering with the public sector, information sharing on cyberattacks, and more.</p>
<p><strong>About Sandra Joyce:</strong></p>
<p>Sandra Joyce is a cybersecurity leader and has been head of Mandiant Intelligence since 2017. She oversees threat research activities and operations of the Mandiant Intelligence organization and joined Google in 2022, following Google’s acquisition of Mandiant.</p>
<p>Joyce is a highly accomplished and respected cybersecurity professional with over 20 years of experience in the field. She has held senior leadership positions at Mandiant, FireEye, and the U.S. Air Force. Joyce is also a member of the Aspen Institute Cybersecurity Working Group, sits on the strategic council of the 
Silverado Policy Accelerator, and is a member of the Institute for Security and Technology’s Ransomware Task Force Steering Committee. She is regularly featured in international print and broadcast media including CNN, NBC, Bloomberg, BBC World, Today Show, NPR, Wall Street Journal, Deutsche Welle, and others.</p>
<p><strong>What you'll learn in this episode:</strong></p>
<ul>
  <li>How to lead mission-driven teams through periods of burnout</li>
  <li>The challenges of partnering between the private and public sectors in cybersecurity</li>
  <li>The importance of information sharing in the fight against cyberattacks</li>
  <li>And more!</li>
</ul>
<p>If you're interested in learning more about how to lead a cybersecurity organization through burnout, the gaps between the private and public sectors in cybersecurity, and the importance of information sharing, this episode is a must-listen.</p>
<p><strong>Call to action:</strong></p>
<ol>
  <li>Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.</li>
  <li>Gain more valuable insights on the hard truths of data security here: <a href="https://rbrk.co/3zEz3sY">https://rbrk.co/3zEz3sY</a><strong></strong>
</li>
</ol>]]>
      </content:encoded>
      <itunes:duration>1605</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[j02z9lx0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4474388924.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Making Cyber Resilience Accessible to Every Organization with Suzette Kent</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/2/notes</link>
      <description>In this episode, Steve Stone, Head of Rubrik Zero Labs, is joined by Suzette Kent, former Federal CIO and current Partner at McKinsey &amp; Company, to discuss private sector and public sector cybersecurity partnerships, the transformation over the past decade on security and IT priorities, key considerations for CIOs and CISOs to help their organizations achieve cyber resilience, and more.

About Suzette Kent:

Suzette Kent is a global business transformation executive. She served as the Federal Chief Information Officer for the United States from 2018 until July 2020. Kent’s career has included leadership roles ranging from partner at Accenture and EY to managing director at JP Morgan. She currently leads her own advisory business through which she continues strategic transformation work with clients around the world, across industries, and in the public and private sectors. Throughout her career, her focus has always centered on technology transformation, cybersecurity, digital enablement, workforce development, and ways that technology can be leveraged to solve challenges. Suzette is a strategic advisor to organizations, including serving on the Boards of a bank, and a public university, and works with many companies on their Advisory Boards and as a subject matter senior advisor. 

What you'll learn in this episode:


  The importance of private sector and public sector cybersecurity partnerships

  How security and IT priorities have transformed over the past decade

  Key considerations for CIOs and CISOs to help their organizations achieve cyber resilience

  And more!


If you're interested in learning more about how to improve cybersecurity collaboration between the private and public sectors, the latest trends in security and IT priorities, and how to achieve cyber resilience, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Read about the State of Data Security here: https://rbrk.co/3sZOR6q</description>
      <pubDate>Wed, 08 Feb 2023 15:10:00 -0000</pubDate>
      <itunes:title>Making Cyber Resilience Accessible to Every Organization with Suzette Kent</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e063d58-b4f5-11f0-922b-9b870bcd69bd/image/cbad6542771f7a569199ede3f22cffe6.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode, Steve Stone, Head of Rubrik Zero Labs, is joined by Suzette Kent, former Federal CIO and current Partner at McKinsey &amp;amp; Company, to discuss private sector and public sector cybersecurity partnerships, the transformation over the past decade on security and IT priorities, key considerations for CIOs and CISOs to help their organizations achieve cyber resilience, and more.
About Suzette Kent:
Suzette Kent is a global business transformation executive. She served as the Federal Chief Information Officer for the United States from 2018 until July 2020. Kent’s career has included leadership roles ranging from partner at Accenture and EY to managing director at JP Morgan. She currently leads her own advisory business through which she continues strategic transformation work with clients around the world, across industries, and in the public and private sectors. Throughout her career, her focus has always centered on technology transformation, cybersecurity, digital enablement, workforce development, and ways that technology can be leveraged to solve challenges. Suzette is a strategic advisor to organizations, including serving on the Boards of a bank, and a public university, and works with many companies on their Advisory Boards and as a subject matter senior advisor. 
What you&amp;#39;ll learn in this episode:

 The importance of private sector and public sector cybersecurity partnerships
  How security and IT priorities have transformed over the past decade
  Key considerations for CIOs and CISOs to help their organizations achieve cyber resilience
  And more!

If you&amp;#39;re interested in learning more about how to improve cybersecurity collaboration between the private and public sectors, the latest trends in security and IT priorities, and how to achieve cyber resilience, this episode is a must-listen.
Call to action:

  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.
  Read about the State of Data Security here: https://rbrk.co/3sZOR6q

Keywords: data security, cybersecurity, ransomware, cyber attack, malware, cybercrime, zero trust, cyber resilience, CISA, cyber threat intelligence, information security, public-private partnerships, IT priorities</itunes:subtitle>
      <itunes:summary>In this episode, Steve Stone, Head of Rubrik Zero Labs, is joined by Suzette Kent, former Federal CIO and current Partner at McKinsey &amp; Company, to discuss private sector and public sector cybersecurity partnerships, the transformation over the past decade on security and IT priorities, key considerations for CIOs and CISOs to help their organizations achieve cyber resilience, and more.

About Suzette Kent:

Suzette Kent is a global business transformation executive. She served as the Federal Chief Information Officer for the United States from 2018 until July 2020. Kent’s career has included leadership roles ranging from partner at Accenture and EY to managing director at JP Morgan. She currently leads her own advisory business through which she continues strategic transformation work with clients around the world, across industries, and in the public and private sectors. Throughout her career, her focus has always centered on technology transformation, cybersecurity, digital enablement, workforce development, and ways that technology can be leveraged to solve challenges. Suzette is a strategic advisor to organizations, including serving on the Boards of a bank, and a public university, and works with many companies on their Advisory Boards and as a subject matter senior advisor. 

What you'll learn in this episode:


  The importance of private sector and public sector cybersecurity partnerships

  How security and IT priorities have transformed over the past decade

  Key considerations for CIOs and CISOs to help their organizations achieve cyber resilience

  And more!


If you're interested in learning more about how to improve cybersecurity collaboration between the private and public sectors, the latest trends in security and IT priorities, and how to achieve cyber resilience, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Read about the State of Data Security here: https://rbrk.co/3sZOR6q</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Steve Stone, Head of Rubrik Zero Labs, is joined by Suzette Kent, former Federal CIO and current Partner at McKinsey &amp; Company, to discuss private sector and public sector cybersecurity partnerships, the transformation over the past decade on security and IT priorities, key considerations for CIOs and CISOs to help their organizations achieve cyber resilience, and more.</p>
<p><strong>About Suzette Kent:</strong></p>
<p>Suzette Kent is a global business transformation executive. She served as the Federal Chief Information Officer for the United States from 2018 until July 2020. Kent’s career has included leadership roles ranging from partner at Accenture and EY to managing director at JP Morgan. She currently leads her own advisory business through which she continues strategic transformation work with clients around the world, across industries, and in the public and private sectors. Throughout her career, her focus has always centered on technology transformation, cybersecurity, digital enablement, workforce development, and ways that technology can be leveraged to solve challenges. Suzette is a strategic advisor to organizations, including serving on the Boards of a bank, and a public university, and works with many companies on their Advisory Boards and as a subject matter senior advisor. </p>
<p><strong>What you'll learn in this episode:</strong></p>
<ul>
  <li>The importance of private sector and public sector cybersecurity partnerships</li>
  <li>How security and IT priorities have transformed over the past decade</li>
  <li>Key considerations for CIOs and CISOs to help their organizations achieve cyber resilience</li>
  <li>And more!</li>
</ul>
<p>If you're interested in learning more about how to improve cybersecurity collaboration between the private and public sectors, the latest trends in security and IT priorities, and how to achieve cyber resilience, this episode is a must-listen.</p>
<p><strong>Call to action:</strong></p>
<ol>
  <li>Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.</li>
  <li>Read about the State of Data Security here: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXlRNDVSVm1mcFQ2VzdxcEZEbFdma1V1N0g1d3xBQ3Jtc0trYWt3OUFqWFQxb3JVeG9jR0ZfM1VpQkZ1M1ZGRDRmckltaEZuMXk3NC1Gblg0U3g0UE9NY0tZZGpWdnlMT3p3RXpFLTI0d1pXTzZXMk1hc1A4S1ZhY0Vfa3hNa0M0UktrT1BJblVQTG45TGp2WDJ4QQ&amp;q=https%3A%2F%2Frbrk.co%2F3sZOR6q&amp;v=WC3vNAGuYvY">https://rbrk.co/3sZOR6q</a>
</li>
</ol>]]>
      </content:encoded>
      <itunes:duration>1314</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[41p7vx60]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8291292427.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dissecting The Human Impact of Cybercrime with Wendi Whitmore</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/1/notes</link>
      <description>In this inaugural episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by Wendi Whitmore, SVP of Unit 42 at Palo Alto Networks. In this episode, Steve and Wendi discuss the findings in Rubrik Zero Labs' very first State of Data Security report, the cybersecurity implications of conflicts like the war in Ukraine, the need for information sharing between threat intelligence agencies, and much more.

About Wendi Whitmore:

Wendi Whitmore serves as senior vice president for Unit 42 at Palo Alto Networks. She is a globally recognized cybersecurity leader, with two decades of experience building incident response and threat intelligence teams that have helped clients solve some of the world’s largest breaches. Wendi leads Unit 42, a team of elite incident responders and world-renowned threat researchers. The combined team helps organizations tackle the most complex cyber threats — from ransomware to state-sponsored espionage.

She began her career as a Special Agent conducting computer crime investigations with the Air Force Office of Special Investigations. Wendi regularly meets with executive leadership teams and boards to advise them on strengthening their security programs to address their most pressing threats. She is a frequent speaker at high-profile technical conferences and has taught graduate-level computer science and cybersecurity courses at Carnegie Mellon University and The George Washington University.

What you'll learn in this episode:


  The key findings in the State of Data Security report from Rubrik Zero Labs

  The cybersecurity implications of conflicts like the war in Ukraine 

  The importance of information sharing between threat intelligence agencies

  And more!


If you're interested in learning more about the latest trends in data security, the cybersecurity implications of global conflicts, and the importance of information sharing, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Read about the State of Data Security here: https://rbrk.co/3sZOR6q</description>
      <pubDate>Tue, 20 Dec 2022 17:00:00 -0000</pubDate>
      <itunes:title>Dissecting The Human Impact of Cybercrime with Wendi Whitmore</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Rubrik</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e76b1aa-b4f5-11f0-922b-b77a16ff6ddd/image/461c9c30dae264eae993cd04ccd2e53f.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this inaugural episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by Wendi Whitmore, SVP of Unit 42 at Palo Alto Networks. In this episode, Steve and Wendi discuss the findings in Rubrik Zero Labs&amp;#39; very first State of Data Security report, the cybersecurity implications of conflicts like the war in Ukraine, the need for information sharing between threat intelligence agencies, and much more.
About Wendi Whitmore:
Wendi Whitmore serves as senior vice president for Unit 42 at Palo Alto Networks. She is a globally recognized cybersecurity leader, with two decades of experience building incident response and threat intelligence teams that have helped clients solve some of the world’s largest breaches. Wendi leads Unit 42, a team of elite incident responders and world-renowned threat researchers. The combined team helps organizations tackle the most complex cyber threats — from ransomware to state-sponsored espionage.
She began her career as a Special Agent conducting computer crime investigations with the Air Force Office of Special Investigations. Wendi regularly meets with executive leadership teams and boards to advise them on strengthening their security programs to address their most pressing threats. She is a frequent speaker at high-profile technical conferences and has taught graduate-level computer science and cybersecurity courses at Carnegie Mellon University and The George Washington University.
What you&amp;#39;ll learn in this episode:

 The key findings in the State of Data Security report from Rubrik Zero Labs
 The cybersecurity implications of conflicts like the war in Ukraine 
  The importance of information sharing between threat intelligence agencies
  And more!

If you&amp;#39;re interested in learning more about the latest trends in data security, the cybersecurity implications of global conflicts, and the importance of information sharing, this episode is a must-listen.
Call to action:

  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.
  Read about the State of Data Security here: https://rbrk.co/3sZOR6q

Keywords: data security, cybersecurity, ransomware, cyber attack, malware, cybercrime, zero trust, cyber resilience, CISA, cyber threat intelligence, information security, infosec</itunes:subtitle>
      <itunes:summary>In this inaugural episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by Wendi Whitmore, SVP of Unit 42 at Palo Alto Networks. In this episode, Steve and Wendi discuss the findings in Rubrik Zero Labs' very first State of Data Security report, the cybersecurity implications of conflicts like the war in Ukraine, the need for information sharing between threat intelligence agencies, and much more.

About Wendi Whitmore:

Wendi Whitmore serves as senior vice president for Unit 42 at Palo Alto Networks. She is a globally recognized cybersecurity leader, with two decades of experience building incident response and threat intelligence teams that have helped clients solve some of the world’s largest breaches. Wendi leads Unit 42, a team of elite incident responders and world-renowned threat researchers. The combined team helps organizations tackle the most complex cyber threats — from ransomware to state-sponsored espionage.

She began her career as a Special Agent conducting computer crime investigations with the Air Force Office of Special Investigations. Wendi regularly meets with executive leadership teams and boards to advise them on strengthening their security programs to address their most pressing threats. She is a frequent speaker at high-profile technical conferences and has taught graduate-level computer science and cybersecurity courses at Carnegie Mellon University and The George Washington University.

What you'll learn in this episode:


  The key findings in the State of Data Security report from Rubrik Zero Labs

  The cybersecurity implications of conflicts like the war in Ukraine 

  The importance of information sharing between threat intelligence agencies

  And more!


If you're interested in learning more about the latest trends in data security, the cybersecurity implications of global conflicts, and the importance of information sharing, this episode is a must-listen.

Call to action:


  Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.

  Read about the State of Data Security here: https://rbrk.co/3sZOR6q</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this inaugural episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by Wendi Whitmore, SVP of Unit 42 at Palo Alto Networks. In this episode, Steve and Wendi discuss the findings in Rubrik Zero Labs' very first State of Data Security report, the cybersecurity implications of conflicts like the war in Ukraine, the need for information sharing between threat intelligence agencies, and much more.</p>
<p><strong>About Wendi Whitmore:</strong></p>
<p>Wendi Whitmore serves as senior vice president for Unit 42 at Palo Alto Networks. She is a globally recognized cybersecurity leader, with two decades of experience building incident response and threat intelligence teams that have helped clients solve some of the world’s largest breaches.<em> </em>Wendi leads Unit 42, a team of elite incident responders and world-renowned threat researchers. The combined team helps organizations tackle the most complex cyber threats — from ransomware to state-sponsored espionage.</p>
<p>She began her career as a Special Agent conducting computer crime investigations with the Air Force Office of Special Investigations. Wendi regularly meets with executive leadership teams and boards to advise them on strengthening their security programs to address their most pressing threats. She is a frequent speaker at high-profile technical conferences and has taught graduate-level computer science and cybersecurity courses at Carnegie Mellon University and The George Washington University.</p>
<p><strong>What you'll learn in this episode:</strong></p>
<ul>
  <li>The key findings in the State of Data Security report from Rubrik Zero Labs</li>
  <li>The cybersecurity implications of conflicts like the war in Ukraine </li>
  <li>The importance of information sharing between threat intelligence agencies</li>
  <li>And more!</li>
</ul>
<p>If you're interested in learning more about the latest trends in data security, the cybersecurity implications of global conflicts, and the importance of information sharing, this episode is a must-listen.</p>
<p><strong>Call to action:</strong></p>
<ol>
  <li>Subscribe to the podcast to stay up-to-date on the latest cybersecurity trends and insights.</li>
  <li>Read about the State of Data Security here: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbHEtR0dXdk9CVm1obmxhLTRMM1JGRnVsWkwwUXxBQ3Jtc0ttelBCQkFlSHY2RlRoZVlmS0tlNDc3LVlkMm5yaTg5LVJYTmN1N2xwSWE1LVJySGljalZzdTJxcnQ3SFFoQUZQZlp1VENydXZCdjgzVGFTS3RlQW9Yd24tanZLTXh1UlhST1J3U01oNXBPUTE4M2I4Zw&amp;q=https%3A%2F%2Frbrk.co%2F3sZOR6q&amp;v=Gt-RdqXld6Q">https://rbrk.co/3sZOR6q</a><strong></strong>
</li>
</ol>]]>
      </content:encoded>
      <itunes:duration>998</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[80n76qj1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4059271013.mp3" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
