<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:spotify="http://www.spotify.com/ns/rss">
    <channel>
        <title>KBKAST</title>
        <generator>Castos</generator>
        <atom:link href="https://feeds.castos.com/02w3" rel="self" type="application/rss+xml" />
        <link>https://kbi.media/kbi.fm/kbkast/</link>
        <description>Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. 
The Voice of Cyber® - In Partnership with Vanta</description>
        <lastBuildDate>Wed, 13 May 2026 03:27:40 +0000</lastBuildDate>
        <language>en-au</language>
        <copyright>© 2025 KBI.Media</copyright>
        
        <spotify:limit recentCount="999" />
        
        <spotify:countryOfOrigin>
            AU US GB
        </spotify:countryOfOrigin>
                    <image>
                <url>https://episodes.castos.com/kbkast/images/podcast/covers/c1a-5k0v-dmzvvqwwi6rj-7xy2lr.jpg</url>
                <title>KBKAST</title>
                <link>https://kbi.media/kbi.fm/kbkast/</link>
            </image>
                <itunes:subtitle>Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. 
The Voice of Cyber® - In Partnership with Vanta</itunes:subtitle>
        <itunes:author>KBI.Media</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:summary>Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. 
The Voice of Cyber® - In Partnership with Vanta</itunes:summary>
        <itunes:owner>
            <itunes:name>KBI.Media</itunes:name>
            <itunes:email>admin@stilt.agency</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
                    <itunes:image href="https://episodes.castos.com/kbkast/images/podcast/covers/c1a-5k0v-dmzvvqwwi6rj-7xy2lr.jpg"></itunes:image>
        
                                    <itunes:category text="Technology" />
                                                <itunes:category text="News">
                                            <itunes:category text="Tech News" />
                                    </itunes:category>
                                                <itunes:category text="Business" />
                    
                    <itunes:new-feed-url>https://feeds.castos.com/02w3</itunes:new-feed-url>
                
        
        <podcast:locked>yes</podcast:locked>
                                    <item>
                <title>
                    <![CDATA[Episode 367 Deep Dive: John Hines | The AI Readiness Gap]]>
                </title>
                <pubDate>Wed, 13 May 2026 03:27:40 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2461335</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-367-deep-dive-john-hines-the-ai-readiness-gap</link>
                                <description>
                                            <![CDATA[<p>John Hines is the Senior Director of Enterprise Business for the Asia-Pacific and Japan region at Lumen Technologies.</p>
<p>With more than 25 years of leadership experience in IT solutions and cybersecurity, John has led and grown businesses across diverse global markets. His expertise spans cybersecurity, risk management, network and cloud solutions, consulting services, and new market acquisitions, serving industries such as manufacturing, government, healthcare, transportation, financial services, energy, and retail.</p>
<p>At Lumen, John is responsible for driving enterprise growth by delivering secure, agile, and innovative technology solutions that help customers connect people, data, and applications seamlessly. He is a proven leader in building high-performance teams, modernising operating models, and executing strategic programs that deliver measurable business outcomes.</p>
<p>His work has included partnering with global law enforcement on cyber threat takedowns through Lumen’s Black Lotus Labs, underscoring his commitment to safeguarding the digital ecosystem.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[John Hines is the Senior Director of Enterprise Business for the Asia-Pacific and Japan region at Lumen Technologies.
With more than 25 years of leadership experience in IT solutions and cybersecurity, John has led and grown businesses across diverse global markets. His expertise spans cybersecurity, risk management, network and cloud solutions, consulting services, and new market acquisitions, serving industries such as manufacturing, government, healthcare, transportation, financial services, energy, and retail.
At Lumen, John is responsible for driving enterprise growth by delivering secure, agile, and innovative technology solutions that help customers connect people, data, and applications seamlessly. He is a proven leader in building high-performance teams, modernising operating models, and executing strategic programs that deliver measurable business outcomes.
His work has included partnering with global law enforcement on cyber threat takedowns through Lumen’s Black Lotus Labs, underscoring his commitment to safeguarding the digital ecosystem.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 367 Deep Dive: John Hines | The AI Readiness Gap]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>John Hines is the Senior Director of Enterprise Business for the Asia-Pacific and Japan region at Lumen Technologies.</p>
<p>With more than 25 years of leadership experience in IT solutions and cybersecurity, John has led and grown businesses across diverse global markets. His expertise spans cybersecurity, risk management, network and cloud solutions, consulting services, and new market acquisitions, serving industries such as manufacturing, government, healthcare, transportation, financial services, energy, and retail.</p>
<p>At Lumen, John is responsible for driving enterprise growth by delivering secure, agile, and innovative technology solutions that help customers connect people, data, and applications seamlessly. He is a proven leader in building high-performance teams, modernising operating models, and executing strategic programs that deliver measurable business outcomes.</p>
<p>His work has included partnering with global law enforcement on cyber threat takedowns through Lumen’s Black Lotus Labs, underscoring his commitment to safeguarding the digital ecosystem.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2461335/c1e-gkvqbr0gwoh249gq-1p2xgnp5u6dv-f4x8pg.mp3" length="34451164"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[John Hines is the Senior Director of Enterprise Business for the Asia-Pacific and Japan region at Lumen Technologies.
With more than 25 years of leadership experience in IT solutions and cybersecurity, John has led and grown businesses across diverse global markets. His expertise spans cybersecurity, risk management, network and cloud solutions, consulting services, and new market acquisitions, serving industries such as manufacturing, government, healthcare, transportation, financial services, energy, and retail.
At Lumen, John is responsible for driving enterprise growth by delivering secure, agile, and innovative technology solutions that help customers connect people, data, and applications seamlessly. He is a proven leader in building high-performance teams, modernising operating models, and executing strategic programs that deliver measurable business outcomes.
His work has included partnering with global law enforcement on cyber threat takedowns through Lumen’s Black Lotus Labs, underscoring his commitment to safeguarding the digital ecosystem.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2461335/c1a-5k0v-z31o53m1a4x9-z59fiw.png"></itunes:image>
                                                                            <itunes:duration>00:35:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 366 Deep Dive: Davyn Baumann | A New Surge - Threat Intelligence]]>
                </title>
                <pubDate>Wed, 06 May 2026 06:40:23 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2455100</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-366-deep-dive-davyn-baumann-a-new-surge-threat-intelligence</link>
                                <description>
                                            <![CDATA[<p>Davyn Baumann has been in the threat intelligence industry for over 10 years, and in that time has helped uplift cyber awareness by providing comprehensive strategic level intelligence for Australian government and critical industry organisations. Davyn currently is a member of the Custom Intelligence Team at Mandiant, part of Google Cloud.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Davyn Baumann has been in the threat intelligence industry for over 10 years, and in that time has helped uplift cyber awareness by providing comprehensive strategic level intelligence for Australian government and critical industry organisations. Davyn currently is a member of the Custom Intelligence Team at Mandiant, part of Google Cloud.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 366 Deep Dive: Davyn Baumann | A New Surge - Threat Intelligence]]>
                </itunes:title>
                                    <itunes:episode>366</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Davyn Baumann has been in the threat intelligence industry for over 10 years, and in that time has helped uplift cyber awareness by providing comprehensive strategic level intelligence for Australian government and critical industry organisations. Davyn currently is a member of the Custom Intelligence Team at Mandiant, part of Google Cloud.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2455100/c1e-89g7fvzwv3s1d8wj-ww4489nrsd3q-phesfx.mp3" length="39233871"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Davyn Baumann has been in the threat intelligence industry for over 10 years, and in that time has helped uplift cyber awareness by providing comprehensive strategic level intelligence for Australian government and critical industry organisations. Davyn currently is a member of the Custom Intelligence Team at Mandiant, part of Google Cloud.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2455100/c1a-5k0v-7z889wwmbr8j-ziotcb.png"></itunes:image>
                                                                            <itunes:duration>00:40:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 365 Deep Dive: Ashley Rose | Human Risk - The Next Frontier]]>
                </title>
                <pubDate>Wed, 29 Apr 2026 05:45:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2439708</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-365-deep-dive-ashley-rose-human-risk-the-next-frontier</link>
                                <description>
                                            <![CDATA[Ashley Rose is the CEO and Co-Founder of Living Security, where she is building the future of workforce security through AI-native Human Risk Management (HRM). Her work sits at the intersection of AI, cybersecurity, and business transformation—helping enterprises turn human and workforce risk into a measurable, manageable business outcome.

Since founding Living Security in 2017, Ashley has led the company through rapid growth, raising more than $25M for product development and scale, and driving consecutive years of revenue acceleration. Today, her focus is on helping CISOs and security and risk leaders move beyond traditional awareness to a data-driven, predictive model that reduces real risk and supports organizational growth.

Ashley speaks regularly at industry forums including EWF, Security ISACs, and other security and leadership conferences, sharing practical insight on topics such as human risk, AI in the enterprise, and building security programs that executives and boards actually care about. She also contributes thought leadership to outlets such as Forbes and other publications.

At her core, Ashley is a builder—of companies, products, teams, and categories. She is committed to creating a diverse and inclusive organization that reflects the communities Living Security serves, and to leading with transparency, curiosity, and accountability.

Ashley holds a BBA from the University of Michigan and is a serial entrepreneur with a background in tech and product management. She founded Living Security on a simple belief: when you empower people, they become your strongest security asset—not your weakest link.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ashley Rose is the CEO and Co-Founder of Living Security, where she is building the future of workforce security through AI-native Human Risk Management (HRM). Her work sits at the intersection of AI, cybersecurity, and business transformation—helping enterprises turn human and workforce risk into a measurable, manageable business outcome.

Since founding Living Security in 2017, Ashley has led the company through rapid growth, raising more than $25M for product development and scale, and driving consecutive years of revenue acceleration. Today, her focus is on helping CISOs and security and risk leaders move beyond traditional awareness to a data-driven, predictive model that reduces real risk and supports organizational growth.

Ashley speaks regularly at industry forums including EWF, Security ISACs, and other security and leadership conferences, sharing practical insight on topics such as human risk, AI in the enterprise, and building security programs that executives and boards actually care about. She also contributes thought leadership to outlets such as Forbes and other publications.

At her core, Ashley is a builder—of companies, products, teams, and categories. She is committed to creating a diverse and inclusive organization that reflects the communities Living Security serves, and to leading with transparency, curiosity, and accountability.

Ashley holds a BBA from the University of Michigan and is a serial entrepreneur with a background in tech and product management. She founded Living Security on a simple belief: when you empower people, they become your strongest security asset—not your weakest link.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 365 Deep Dive: Ashley Rose | Human Risk - The Next Frontier]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[Ashley Rose is the CEO and Co-Founder of Living Security, where she is building the future of workforce security through AI-native Human Risk Management (HRM). Her work sits at the intersection of AI, cybersecurity, and business transformation—helping enterprises turn human and workforce risk into a measurable, manageable business outcome.

Since founding Living Security in 2017, Ashley has led the company through rapid growth, raising more than $25M for product development and scale, and driving consecutive years of revenue acceleration. Today, her focus is on helping CISOs and security and risk leaders move beyond traditional awareness to a data-driven, predictive model that reduces real risk and supports organizational growth.

Ashley speaks regularly at industry forums including EWF, Security ISACs, and other security and leadership conferences, sharing practical insight on topics such as human risk, AI in the enterprise, and building security programs that executives and boards actually care about. She also contributes thought leadership to outlets such as Forbes and other publications.

At her core, Ashley is a builder—of companies, products, teams, and categories. She is committed to creating a diverse and inclusive organization that reflects the communities Living Security serves, and to leading with transparency, curiosity, and accountability.

Ashley holds a BBA from the University of Michigan and is a serial entrepreneur with a background in tech and product management. She founded Living Security on a simple belief: when you empower people, they become your strongest security asset—not your weakest link.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2439708/c1e-jjvwh48jvkun1k29-jpxnkjrksqgv-7nprib.mp3" length="40128722"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ashley Rose is the CEO and Co-Founder of Living Security, where she is building the future of workforce security through AI-native Human Risk Management (HRM). Her work sits at the intersection of AI, cybersecurity, and business transformation—helping enterprises turn human and workforce risk into a measurable, manageable business outcome.

Since founding Living Security in 2017, Ashley has led the company through rapid growth, raising more than $25M for product development and scale, and driving consecutive years of revenue acceleration. Today, her focus is on helping CISOs and security and risk leaders move beyond traditional awareness to a data-driven, predictive model that reduces real risk and supports organizational growth.

Ashley speaks regularly at industry forums including EWF, Security ISACs, and other security and leadership conferences, sharing practical insight on topics such as human risk, AI in the enterprise, and building security programs that executives and boards actually care about. She also contributes thought leadership to outlets such as Forbes and other publications.

At her core, Ashley is a builder—of companies, products, teams, and categories. She is committed to creating a diverse and inclusive organization that reflects the communities Living Security serves, and to leading with transparency, curiosity, and accountability.

Ashley holds a BBA from the University of Michigan and is a serial entrepreneur with a background in tech and product management. She founded Living Security on a simple belief: when you empower people, they become your strongest security asset—not your weakest link.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2439708/c1a-5k0v-mk9wq7o4f31r-z8bbtz.png"></itunes:image>
                                                                            <itunes:duration>00:41:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 364 Deep Dive: Malcolm Turnbull | Balancing Innovation, Security, and Risk]]>
                </title>
                <pubDate>Wed, 22 Apr 2026 06:00:37 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2426704</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-364-deep-dive-malcolm-turnbull-balancing-innovation-security-and-risk</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Malcolm Turnbull, former Prime Minister of Australia, current Chairman of Fortescue Future Industries, Senior Advisor to KKR, and Strategic Advisor at Semperis. Malcolm reflects on his leadership in launching Australia’s first national cybersecurity strategy and examines the evolution of cyber as a vital component of national security and statecraft. He shares insights into the challenges faced by governments and businesses in raising digital awareness, the necessity of mandatory breach reporting, and the importance of sharing intelligence to combat cybercrime. The conversation covers Australia’s approach to critical infrastructure protection, foreign interference reforms, and the nuances of risk management in telecom and utility sectors. Malcolm also discusses the legal landscape around cybersecurity liabilities and the growing impact of class actions on corporate accountability, emphasizing adaptability, setting realistic expectations, and continual vigilance as key lessons for future leaders.</p>
<p><strong>The Honourable Malcolm Turnbull AC</strong></p>
<p>Australia’s 29th Prime Minister (2015-2018) had international careers in law, business and the media before entering politics at the age of 50.</p>
<p>As Prime Minister, he reformed Australia’s personal income tax, education and childcare systems, oversaw the legalisation of same sex marriage and announced the construction of Snowy Hydro 2.0 the biggest pumped hydro scheme in the southern hemisphere. Mr Turnbull embarked on the largest peacetime investment in Australian defence capabilities and set out Australia’s first national cybersecurity strategy.</p>
<p>Globally, Mr Turnbull played a leading role in reviving the Trans Pacific Partnership (TPP-11 or CPTPP) after the United States withdrew. He also struck deals with US Presidents Obama and Trump to accept refugees who tried to arrive in Australia illegally by boat.</p>
<p>As a young lawyer, Mr Turnbull successfully defended former MI5 agent Peter Wright against the British Government in the 1986 “Spycatcher” trial before entering business where he ran his own investment banking firm for a decade before joining Goldman Sachs as a partner in 1997. Both before and after his political career, Mr Turnbull has been a successful venture capitalist. He co founded OzEmail Limited, the first Australian tech company to be listed on the NASDAQ.</p>
<p>Since leaving politics, Mr Turnbull has resumed his business career. He is a senior adviser to KKR and an investor in, and adviser to, many Australian technology businesses. He is a director of the International Hydropower Association and Chairman of Australian Fortescue Future Industries. Mr Turnbull speaks and writes on a range of issues including cyber security, geopolitics and renewable energy.</p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Malcolm Turnbull, former Prime Minister of Australia, current Chairman of Fortescue Future Industries, Senior Advisor to KKR, and Strategic Advisor at Semperis. Malcolm reflects on his leadership in launching Australia’s first national cybersecurity strategy and examines the evolution of cyber as a vital component of national security and statecraft. He shares insights into the challenges faced by governments and businesses in raising digital awareness, the necessity of mandatory breach reporting, and the importance of sharing intelligence to combat cybercrime. The conversation covers Australia’s approach to critical infrastructure protection, foreign interference reforms, and the nuances of risk management in telecom and utility sectors. Malcolm also discusses the legal landscape around cybersecurity liabilities and the growing impact of class actions on corporate accountability, emphasizing adaptability, setting realistic expectations, and continual vigilance as key lessons for future leaders.
The Honourable Malcolm Turnbull AC
Australia’s 29th Prime Minister (2015-2018) had international careers in law, business and the media before entering politics at the age of 50.
As Prime Minister, he reformed Australia’s personal income tax, education and childcare systems, oversaw the legalisation of same sex marriage and announced the construction of Snowy Hydro 2.0 the biggest pumped hydro scheme in the southern hemisphere. Mr Turnbull embarked on the largest peacetime investment in Australian defence capabilities and set out Australia’s first national cybersecurity strategy.
Globally, Mr Turnbull played a leading role in reviving the Trans Pacific Partnership (TPP-11 or CPTPP) after the United States withdrew. He also struck deals with US Presidents Obama and Trump to accept refugees who tried to arrive in Australia illegally by boat.
As a young lawyer, Mr Turnbull successfully defended former MI5 agent Peter Wright against the British Government in the 1986 “Spycatcher” trial before entering business where he ran his own investment banking firm for a decade before joining Goldman Sachs as a partner in 1997. Both before and after his political career, Mr Turnbull has been a successful venture capitalist. He co founded OzEmail Limited, the first Australian tech company to be listed on the NASDAQ.
Since leaving politics, Mr Turnbull has resumed his business career. He is a senior adviser to KKR and an investor in, and adviser to, many Australian technology businesses. He is a director of the International Hydropower Association and Chairman of Australian Fortescue Future Industries. Mr Turnbull speaks and writes on a range of issues including cyber security, geopolitics and renewable energy.
 ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 364 Deep Dive: Malcolm Turnbull | Balancing Innovation, Security, and Risk]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Malcolm Turnbull, former Prime Minister of Australia, current Chairman of Fortescue Future Industries, Senior Advisor to KKR, and Strategic Advisor at Semperis. Malcolm reflects on his leadership in launching Australia’s first national cybersecurity strategy and examines the evolution of cyber as a vital component of national security and statecraft. He shares insights into the challenges faced by governments and businesses in raising digital awareness, the necessity of mandatory breach reporting, and the importance of sharing intelligence to combat cybercrime. The conversation covers Australia’s approach to critical infrastructure protection, foreign interference reforms, and the nuances of risk management in telecom and utility sectors. Malcolm also discusses the legal landscape around cybersecurity liabilities and the growing impact of class actions on corporate accountability, emphasizing adaptability, setting realistic expectations, and continual vigilance as key lessons for future leaders.</p>
<p><strong>The Honourable Malcolm Turnbull AC</strong></p>
<p>Australia’s 29th Prime Minister (2015-2018) had international careers in law, business and the media before entering politics at the age of 50.</p>
<p>As Prime Minister, he reformed Australia’s personal income tax, education and childcare systems, oversaw the legalisation of same sex marriage and announced the construction of Snowy Hydro 2.0 the biggest pumped hydro scheme in the southern hemisphere. Mr Turnbull embarked on the largest peacetime investment in Australian defence capabilities and set out Australia’s first national cybersecurity strategy.</p>
<p>Globally, Mr Turnbull played a leading role in reviving the Trans Pacific Partnership (TPP-11 or CPTPP) after the United States withdrew. He also struck deals with US Presidents Obama and Trump to accept refugees who tried to arrive in Australia illegally by boat.</p>
<p>As a young lawyer, Mr Turnbull successfully defended former MI5 agent Peter Wright against the British Government in the 1986 “Spycatcher” trial before entering business where he ran his own investment banking firm for a decade before joining Goldman Sachs as a partner in 1997. Both before and after his political career, Mr Turnbull has been a successful venture capitalist. He co founded OzEmail Limited, the first Australian tech company to be listed on the NASDAQ.</p>
<p>Since leaving politics, Mr Turnbull has resumed his business career. He is a senior adviser to KKR and an investor in, and adviser to, many Australian technology businesses. He is a director of the International Hydropower Association and Chairman of Australian Fortescue Future Industries. Mr Turnbull speaks and writes on a range of issues including cyber security, geopolitics and renewable energy.</p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2426704/c1e-6wnpc773g8indop0-ww46gomwi7pp-ho5i7k.mp3" length="44972869"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Malcolm Turnbull, former Prime Minister of Australia, current Chairman of Fortescue Future Industries, Senior Advisor to KKR, and Strategic Advisor at Semperis. Malcolm reflects on his leadership in launching Australia’s first national cybersecurity strategy and examines the evolution of cyber as a vital component of national security and statecraft. He shares insights into the challenges faced by governments and businesses in raising digital awareness, the necessity of mandatory breach reporting, and the importance of sharing intelligence to combat cybercrime. The conversation covers Australia’s approach to critical infrastructure protection, foreign interference reforms, and the nuances of risk management in telecom and utility sectors. Malcolm also discusses the legal landscape around cybersecurity liabilities and the growing impact of class actions on corporate accountability, emphasizing adaptability, setting realistic expectations, and continual vigilance as key lessons for future leaders.
The Honourable Malcolm Turnbull AC
Australia’s 29th Prime Minister (2015-2018) had international careers in law, business and the media before entering politics at the age of 50.
As Prime Minister, he reformed Australia’s personal income tax, education and childcare systems, oversaw the legalisation of same sex marriage and announced the construction of Snowy Hydro 2.0 the biggest pumped hydro scheme in the southern hemisphere. Mr Turnbull embarked on the largest peacetime investment in Australian defence capabilities and set out Australia’s first national cybersecurity strategy.
Globally, Mr Turnbull played a leading role in reviving the Trans Pacific Partnership (TPP-11 or CPTPP) after the United States withdrew. He also struck deals with US Presidents Obama and Trump to accept refugees who tried to arrive in Australia illegally by boat.
As a young lawyer, Mr Turnbull successfully defended former MI5 agent Peter Wright against the British Government in the 1986 “Spycatcher” trial before entering business where he ran his own investment banking firm for a decade before joining Goldman Sachs as a partner in 1997. Both before and after his political career, Mr Turnbull has been a successful venture capitalist. He co founded OzEmail Limited, the first Australian tech company to be listed on the NASDAQ.
Since leaving politics, Mr Turnbull has resumed his business career. He is a senior adviser to KKR and an investor in, and adviser to, many Australian technology businesses. He is a director of the International Hydropower Association and Chairman of Australian Fortescue Future Industries. Mr Turnbull speaks and writes on a range of issues including cyber security, geopolitics and renewable energy.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2426704/c1a-5k0v-345dq4qqadq5-haitgc.png"></itunes:image>
                                                                            <itunes:duration>00:46:51</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 363 Deep Dive: Nathan Thomas - Inside Oracle’s Multi-Cloud Strategy]]>
                </title>
                <pubDate>Wed, 15 Apr 2026 07:26:45 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2422563</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-363-deep-dive-nathan-thomas-inside-oracles-multi-cloud-strategy</link>
                                <description>
                                            <![CDATA[In this episode, we sit down with Nathan Thomas, Senior Vice President of Product Management at Oracle Cloud Infrastructure (OCI), to explore Oracle’s evolving multi cloud strategy and the major trends shaping the cloud landscape. Nathan discusses the company’s shift from an Oracle-first approach to a multi cloud reality, driven by customer expectations for flexibility, governance, and sovereignty of data. He highlights the persistent demand for sovereign solutions, the impact of AI on accelerating multi cloud adoption, and the need for seamless integration and portability as customer loyalty becomes more fluid. Nathan also delves into the complexities of cloud migration, Oracle’s focus on delivering efficient and cost-effective infrastructure, and how maintaining a narrow focus on core services differentiates OCI in a crowded marketplace. Finally, he emphasizes the importance of holding cloud vendors accountable for innovation, value, and enabling truly multi cloud operations.

Nathan Thomas is senior vice president of Product Management at Oracle Cloud Infrastructure (OCI), overseeing product strategy and development of Oracle’s cloud and multicloud services. His organization is responsible for providing secure, reliable, and high-performance solutions that enable customers to run Oracle’s industry-leading services across their preferred cloud environments, addressing complex technical challenges and promoting long-term innovation and growth.

Prior to Oracle, Nathan held senior product and engineering leadership roles at Amazon Web Services, Epic Games, Google Cloud, and Red Hat. His work has been instrumental in promoting enterprise adoption of open-source technologies, driving the commercialization of cloud computing, and broadening the application of real-time 3D technology across multiple industries.

Nathan is based in Nashville, Tennessee.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Nathan Thomas, Senior Vice President of Product Management at Oracle Cloud Infrastructure (OCI), to explore Oracle’s evolving multi cloud strategy and the major trends shaping the cloud landscape. Nathan discusses the company’s shift from an Oracle-first approach to a multi cloud reality, driven by customer expectations for flexibility, governance, and sovereignty of data. He highlights the persistent demand for sovereign solutions, the impact of AI on accelerating multi cloud adoption, and the need for seamless integration and portability as customer loyalty becomes more fluid. Nathan also delves into the complexities of cloud migration, Oracle’s focus on delivering efficient and cost-effective infrastructure, and how maintaining a narrow focus on core services differentiates OCI in a crowded marketplace. Finally, he emphasizes the importance of holding cloud vendors accountable for innovation, value, and enabling truly multi cloud operations.

Nathan Thomas is senior vice president of Product Management at Oracle Cloud Infrastructure (OCI), overseeing product strategy and development of Oracle’s cloud and multicloud services. His organization is responsible for providing secure, reliable, and high-performance solutions that enable customers to run Oracle’s industry-leading services across their preferred cloud environments, addressing complex technical challenges and promoting long-term innovation and growth.

Prior to Oracle, Nathan held senior product and engineering leadership roles at Amazon Web Services, Epic Games, Google Cloud, and Red Hat. His work has been instrumental in promoting enterprise adoption of open-source technologies, driving the commercialization of cloud computing, and broadening the application of real-time 3D technology across multiple industries.

Nathan is based in Nashville, Tennessee.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 363 Deep Dive: Nathan Thomas - Inside Oracle’s Multi-Cloud Strategy]]>
                </itunes:title>
                                    <itunes:episode>363</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[In this episode, we sit down with Nathan Thomas, Senior Vice President of Product Management at Oracle Cloud Infrastructure (OCI), to explore Oracle’s evolving multi cloud strategy and the major trends shaping the cloud landscape. Nathan discusses the company’s shift from an Oracle-first approach to a multi cloud reality, driven by customer expectations for flexibility, governance, and sovereignty of data. He highlights the persistent demand for sovereign solutions, the impact of AI on accelerating multi cloud adoption, and the need for seamless integration and portability as customer loyalty becomes more fluid. Nathan also delves into the complexities of cloud migration, Oracle’s focus on delivering efficient and cost-effective infrastructure, and how maintaining a narrow focus on core services differentiates OCI in a crowded marketplace. Finally, he emphasizes the importance of holding cloud vendors accountable for innovation, value, and enabling truly multi cloud operations.

Nathan Thomas is senior vice president of Product Management at Oracle Cloud Infrastructure (OCI), overseeing product strategy and development of Oracle’s cloud and multicloud services. His organization is responsible for providing secure, reliable, and high-performance solutions that enable customers to run Oracle’s industry-leading services across their preferred cloud environments, addressing complex technical challenges and promoting long-term innovation and growth.

Prior to Oracle, Nathan held senior product and engineering leadership roles at Amazon Web Services, Epic Games, Google Cloud, and Red Hat. His work has been instrumental in promoting enterprise adoption of open-source technologies, driving the commercialization of cloud computing, and broadening the application of real-time 3D technology across multiple industries.

Nathan is based in Nashville, Tennessee.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2422563/c1e-6wnpc7724wundop0-rkgdxnnxux8w-whqfzt.mp3" length="43058198"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Nathan Thomas, Senior Vice President of Product Management at Oracle Cloud Infrastructure (OCI), to explore Oracle’s evolving multi cloud strategy and the major trends shaping the cloud landscape. Nathan discusses the company’s shift from an Oracle-first approach to a multi cloud reality, driven by customer expectations for flexibility, governance, and sovereignty of data. He highlights the persistent demand for sovereign solutions, the impact of AI on accelerating multi cloud adoption, and the need for seamless integration and portability as customer loyalty becomes more fluid. Nathan also delves into the complexities of cloud migration, Oracle’s focus on delivering efficient and cost-effective infrastructure, and how maintaining a narrow focus on core services differentiates OCI in a crowded marketplace. Finally, he emphasizes the importance of holding cloud vendors accountable for innovation, value, and enabling truly multi cloud operations.

Nathan Thomas is senior vice president of Product Management at Oracle Cloud Infrastructure (OCI), overseeing product strategy and development of Oracle’s cloud and multicloud services. His organization is responsible for providing secure, reliable, and high-performance solutions that enable customers to run Oracle’s industry-leading services across their preferred cloud environments, addressing complex technical challenges and promoting long-term innovation and growth.

Prior to Oracle, Nathan held senior product and engineering leadership roles at Amazon Web Services, Epic Games, Google Cloud, and Red Hat. His work has been instrumental in promoting enterprise adoption of open-source technologies, driving the commercialization of cloud computing, and broadening the application of real-time 3D technology across multiple industries.

Nathan is based in Nashville, Tennessee.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2422563/c1a-5k0v-dmj59v8zbx5r-oqqeez.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 362 Deep Dive: César Cernuda | Trust, Trade & the New Data Diplomacy]]>
                </title>
                <pubDate>Wed, 08 Apr 2026 06:00:03 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2416061</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-362-deep-dive-cesar-cernuda-trust-trade-the-new-data-diplomacy</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with César Cernuda, President at NetApp, as he explores the growing significance of data and the evolving role of trust, governance, and transparency in managing this strategic asset. César discusses how organizations and nations must build intelligent data infrastructures to enable AI and navigate complex regulatory landscapes, emphasizing the importance of cybersecurity, interoperability, and modernizing data lakes. We also examine the balance between protection and openness, the resurgence of sovereign cloud requirements, and the pressure for leaders to cultivate a data-first mindset to stay competitive.</p>
<p>César Cernuda has led NetApp’s integrated go-to-market organization since July 2020, delivering on the company’s promise to meet customers wherever they are on their digital-transformation journeys by providing the superior products, specialist skills, and services they need to architect, build, and manage their data fabrics.</p>
<p>César joined NetApp following a long career at Microsoft, where he served as President of Microsoft Asia Pacific, President of Microsoft Latin America, and Global Corporate Vice President of the brand. Having walked in the shoes of NetApp’s enterprise customers, he brings a customer-centric perspective to all he does as president. César serves as the non-executive director and Chairman of the ESG committee at Gestamp, an international organization dedicated to the automotive industry; as an advisory board member of Georgetown University’s McDonough School of Business; and as an international advisory board member of IESE Business School – University of Navarra.</p>
<p> </p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with César Cernuda, President at NetApp, as he explores the growing significance of data and the evolving role of trust, governance, and transparency in managing this strategic asset. César discusses how organizations and nations must build intelligent data infrastructures to enable AI and navigate complex regulatory landscapes, emphasizing the importance of cybersecurity, interoperability, and modernizing data lakes. We also examine the balance between protection and openness, the resurgence of sovereign cloud requirements, and the pressure for leaders to cultivate a data-first mindset to stay competitive.
César Cernuda has led NetApp’s integrated go-to-market organization since July 2020, delivering on the company’s promise to meet customers wherever they are on their digital-transformation journeys by providing the superior products, specialist skills, and services they need to architect, build, and manage their data fabrics.
César joined NetApp following a long career at Microsoft, where he served as President of Microsoft Asia Pacific, President of Microsoft Latin America, and Global Corporate Vice President of the brand. Having walked in the shoes of NetApp’s enterprise customers, he brings a customer-centric perspective to all he does as president. César serves as the non-executive director and Chairman of the ESG committee at Gestamp, an international organization dedicated to the automotive industry; as an advisory board member of Georgetown University’s McDonough School of Business; and as an international advisory board member of IESE Business School – University of Navarra.
 
 ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 362 Deep Dive: César Cernuda | Trust, Trade & the New Data Diplomacy]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with César Cernuda, President at NetApp, as he explores the growing significance of data and the evolving role of trust, governance, and transparency in managing this strategic asset. César discusses how organizations and nations must build intelligent data infrastructures to enable AI and navigate complex regulatory landscapes, emphasizing the importance of cybersecurity, interoperability, and modernizing data lakes. We also examine the balance between protection and openness, the resurgence of sovereign cloud requirements, and the pressure for leaders to cultivate a data-first mindset to stay competitive.</p>
<p>César Cernuda has led NetApp’s integrated go-to-market organization since July 2020, delivering on the company’s promise to meet customers wherever they are on their digital-transformation journeys by providing the superior products, specialist skills, and services they need to architect, build, and manage their data fabrics.</p>
<p>César joined NetApp following a long career at Microsoft, where he served as President of Microsoft Asia Pacific, President of Microsoft Latin America, and Global Corporate Vice President of the brand. Having walked in the shoes of NetApp’s enterprise customers, he brings a customer-centric perspective to all he does as president. César serves as the non-executive director and Chairman of the ESG committee at Gestamp, an international organization dedicated to the automotive industry; as an advisory board member of Georgetown University’s McDonough School of Business; and as an international advisory board member of IESE Business School – University of Navarra.</p>
<p> </p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2416061/c1e-n439hzdw75c9z48r-okp71008fopp-wh7vyx.mp3" length="37039585"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with César Cernuda, President at NetApp, as he explores the growing significance of data and the evolving role of trust, governance, and transparency in managing this strategic asset. César discusses how organizations and nations must build intelligent data infrastructures to enable AI and navigate complex regulatory landscapes, emphasizing the importance of cybersecurity, interoperability, and modernizing data lakes. We also examine the balance between protection and openness, the resurgence of sovereign cloud requirements, and the pressure for leaders to cultivate a data-first mindset to stay competitive.
César Cernuda has led NetApp’s integrated go-to-market organization since July 2020, delivering on the company’s promise to meet customers wherever they are on their digital-transformation journeys by providing the superior products, specialist skills, and services they need to architect, build, and manage their data fabrics.
César joined NetApp following a long career at Microsoft, where he served as President of Microsoft Asia Pacific, President of Microsoft Latin America, and Global Corporate Vice President of the brand. Having walked in the shoes of NetApp’s enterprise customers, he brings a customer-centric perspective to all he does as president. César serves as the non-executive director and Chairman of the ESG committee at Gestamp, an international organization dedicated to the automotive industry; as an advisory board member of Georgetown University’s McDonough School of Business; and as an international advisory board member of IESE Business School – University of Navarra.
 
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2416061/c1a-5k0v-8d065811ar73-xk2adu.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 361 Deep Dive: Richard Stiennon | Why AI Security Will Define The Future Of Digital Defence]]>
                </title>
                <pubDate>Wed, 01 Apr 2026 04:55:57 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2411039</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-361-deep-dive-richard-stiennon-why-ai-security-will-define-the-future-of-digital-defence</link>
                                <description>
                                            <![CDATA[<p>Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of<em> Surviving Cyberwar</em> (Government Institutes, 2010) and Washington Post Best Seller, <em>There Will Be Cyberwar</em>.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book <em>Security Yearbook 2022</em> was released in June, 2022. Get a copy <a href="https://it-harvest.com/shop/security-yearbook-2022/">here</a>.</p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2022 was released in June, 2022. Get a copy here.
 ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 361 Deep Dive: Richard Stiennon | Why AI Security Will Define The Future Of Digital Defence]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of<em> Surviving Cyberwar</em> (Government Institutes, 2010) and Washington Post Best Seller, <em>There Will Be Cyberwar</em>.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book <em>Security Yearbook 2022</em> was released in June, 2022. Get a copy <a href="https://it-harvest.com/shop/security-yearbook-2022/">here</a>.</p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2411039/c1e-z9w7f37dkqaokrwj-dm1761nzt24q-vsreqj.mp3" length="41697741"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2022 was released in June, 2022. Get a copy here.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2411039/c1a-5k0v-ww7vzwx8f194-9h923h.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Elastic{ON} Sydney 2026 – KB On The Go |  Mandy Andress]]>
                </title>
                <pubDate>Fri, 27 Mar 2026 05:00:45 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2406025</guid>
                                    <link>https://kbkast.castos.com/episodes/from-elasticon-2026-kb-on-the-go-mandy-andress</link>
                                <description>
                                            <![CDATA[<p>Data is exploding. Environments are getting noisier and the line between observability and security, it’s basically gone. Search isn’t just a feature anymore, it’s infrastructure. It’s how you see, how you detect, and ultimately how you defend from ai, power detection, engineering to unified visibility across logs, metrics, t races and security telemetry. We’re officially in a world where if you can’t search it in real time, you can’t secure it.</p>
<p>This bonus episode features Mandy Andress, CISO at Elastic, live from Elastic{ON} Sydney 2026. As Australia navigates its unique, sector-led approach to AI regulation, Karissa Breen and Mandy Andress explore the challenges—and opportunities—facing CISOs on the front lines of the agentic AI revolution.</p>
<p>Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security.‬ Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst &amp; Young and Deloitte &amp; Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune‬ 100 companies to start up organizations.‬</p>
<p>‭She is a published author, with her book Surviving Security having two editions and used at multiple‬ universities around the world as the textbook for foundation information security courses. Mandy also tested‬ and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought after expert in the field, speaking at signature‬ security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level‬ Information Risk Management course for UMass Amherst in the College of Information and Computer‬ Sciences.‬</p>
<p>Mandy has a JD from Western New England University, a Master’s in Management Information Systems from Texas A&amp;M University, and a B.B.A in Accounting from Texas A&amp;M University. Mandy is a CISSP, CPA, and‬ member of the Texas Bar.‬</p>
<p> </p>
<p> </p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Data is exploding. Environments are getting noisier and the line between observability and security, it’s basically gone. Search isn’t just a feature anymore, it’s infrastructure. It’s how you see, how you detect, and ultimately how you defend from ai, power detection, engineering to unified visibility across logs, metrics, t races and security telemetry. We’re officially in a world where if you can’t search it in real time, you can’t secure it.
This bonus episode features Mandy Andress, CISO at Elastic, live from Elastic{ON} Sydney 2026. As Australia navigates its unique, sector-led approach to AI regulation, Karissa Breen and Mandy Andress explore the challenges—and opportunities—facing CISOs on the front lines of the agentic AI revolution.
Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security.‬ Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst & Young and Deloitte & Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune‬ 100 companies to start up organizations.‬
‭She is a published author, with her book Surviving Security having two editions and used at multiple‬ universities around the world as the textbook for foundation information security courses. Mandy also tested‬ and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought after expert in the field, speaking at signature‬ security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level‬ Information Risk Management course for UMass Amherst in the College of Information and Computer‬ Sciences.‬
Mandy has a JD from Western New England University, a Master’s in Management Information Systems from Texas A&M University, and a B.B.A in Accounting from Texas A&M University. Mandy is a CISSP, CPA, and‬ member of the Texas Bar.‬
 
 
 ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Elastic{ON} Sydney 2026 – KB On The Go |  Mandy Andress]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Data is exploding. Environments are getting noisier and the line between observability and security, it’s basically gone. Search isn’t just a feature anymore, it’s infrastructure. It’s how you see, how you detect, and ultimately how you defend from ai, power detection, engineering to unified visibility across logs, metrics, t races and security telemetry. We’re officially in a world where if you can’t search it in real time, you can’t secure it.</p>
<p>This bonus episode features Mandy Andress, CISO at Elastic, live from Elastic{ON} Sydney 2026. As Australia navigates its unique, sector-led approach to AI regulation, Karissa Breen and Mandy Andress explore the challenges—and opportunities—facing CISOs on the front lines of the agentic AI revolution.</p>
<p>Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security.‬ Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst &amp; Young and Deloitte &amp; Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune‬ 100 companies to start up organizations.‬</p>
<p>‭She is a published author, with her book Surviving Security having two editions and used at multiple‬ universities around the world as the textbook for foundation information security courses. Mandy also tested‬ and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought after expert in the field, speaking at signature‬ security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level‬ Information Risk Management course for UMass Amherst in the College of Information and Computer‬ Sciences.‬</p>
<p>Mandy has a JD from Western New England University, a Master’s in Management Information Systems from Texas A&amp;M University, and a B.B.A in Accounting from Texas A&amp;M University. Mandy is a CISSP, CPA, and‬ member of the Texas Bar.‬</p>
<p> </p>
<p> </p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2406025/c1e-d5v7aomrvrcpd4gq-5z384w7zczzk-umyqck.mp3" length="40058087"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Data is exploding. Environments are getting noisier and the line between observability and security, it’s basically gone. Search isn’t just a feature anymore, it’s infrastructure. It’s how you see, how you detect, and ultimately how you defend from ai, power detection, engineering to unified visibility across logs, metrics, t races and security telemetry. We’re officially in a world where if you can’t search it in real time, you can’t secure it.
This bonus episode features Mandy Andress, CISO at Elastic, live from Elastic{ON} Sydney 2026. As Australia navigates its unique, sector-led approach to AI regulation, Karissa Breen and Mandy Andress explore the challenges—and opportunities—facing CISOs on the front lines of the agentic AI revolution.
Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security.‬ Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst & Young and Deloitte & Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune‬ 100 companies to start up organizations.‬
‭She is a published author, with her book Surviving Security having two editions and used at multiple‬ universities around the world as the textbook for foundation information security courses. Mandy also tested‬ and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought after expert in the field, speaking at signature‬ security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level‬ Information Risk Management course for UMass Amherst in the College of Information and Computer‬ Sciences.‬
Mandy has a JD from Western New England University, a Master’s in Management Information Systems from Texas A&M University, and a B.B.A in Accounting from Texas A&M University. Mandy is a CISSP, CPA, and‬ member of the Texas Bar.‬
 
 
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2406025/c1a-5k0v-ww7d2vkqb170-cg3lld.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 360 Deep Dive: Simon Cook | The Right To Be Forgotten, Navigating GDPR, IRAP and Global Standards in Physical and Cybersecurity]]>
                </title>
                <pubDate>Wed, 25 Mar 2026 05:00:12 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2404237</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-360-deep-dive-simon-cook-the-right-to-be-forgotten-navigating-gdpr-irap-and-global-stan</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Simon Cook, Director of New Offerings at Genetec, as he discusses the convergence between physical and cybersecurity, and the impact of global standards such as GDPR and IRAP on industry practices. Simon details the shift from siloed teams to collaborative approaches, highlighting how increased connectivity and advancements like generative AI have expanded the attack surface, making cyber risks a broader business concern. He explores the ongoing challenges of device security—from consumer cameras to enterprise solutions—and the market’s growing awareness of attack vectors stemming from seemingly innocuous network devices. Simon also unpacks the complexities of privacy legislation, especially the right to be forgotten, emphasizing the need for technology providers to embed privacy and trust by design at every stage of product development. Finally, he offers insight into the future direction of physical security, predicting the acceleration of proactive, technology-driven systems and deeper integration of compliance frameworks worldwide.</p>
<p>Simon is a highly motivated, innovative and creative security professional with almost 20 years’ experience in the Pre-Sales and design space working with hardware, software and cloud solutions. Leadership experience and a proven track record of success growing and evolving teams in both medium and large organisations and on a global scale. Accustomed to speaking up to C- Level, in public forums and to press. A commercial techie that is inspired by good products, and passionate and motivated people.</p>
<p> </p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Simon Cook, Director of New Offerings at Genetec, as he discusses the convergence between physical and cybersecurity, and the impact of global standards such as GDPR and IRAP on industry practices. Simon details the shift from siloed teams to collaborative approaches, highlighting how increased connectivity and advancements like generative AI have expanded the attack surface, making cyber risks a broader business concern. He explores the ongoing challenges of device security—from consumer cameras to enterprise solutions—and the market’s growing awareness of attack vectors stemming from seemingly innocuous network devices. Simon also unpacks the complexities of privacy legislation, especially the right to be forgotten, emphasizing the need for technology providers to embed privacy and trust by design at every stage of product development. Finally, he offers insight into the future direction of physical security, predicting the acceleration of proactive, technology-driven systems and deeper integration of compliance frameworks worldwide.
Simon is a highly motivated, innovative and creative security professional with almost 20 years’ experience in the Pre-Sales and design space working with hardware, software and cloud solutions. Leadership experience and a proven track record of success growing and evolving teams in both medium and large organisations and on a global scale. Accustomed to speaking up to C- Level, in public forums and to press. A commercial techie that is inspired by good products, and passionate and motivated people.
 
 ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 360 Deep Dive: Simon Cook | The Right To Be Forgotten, Navigating GDPR, IRAP and Global Standards in Physical and Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Simon Cook, Director of New Offerings at Genetec, as he discusses the convergence between physical and cybersecurity, and the impact of global standards such as GDPR and IRAP on industry practices. Simon details the shift from siloed teams to collaborative approaches, highlighting how increased connectivity and advancements like generative AI have expanded the attack surface, making cyber risks a broader business concern. He explores the ongoing challenges of device security—from consumer cameras to enterprise solutions—and the market’s growing awareness of attack vectors stemming from seemingly innocuous network devices. Simon also unpacks the complexities of privacy legislation, especially the right to be forgotten, emphasizing the need for technology providers to embed privacy and trust by design at every stage of product development. Finally, he offers insight into the future direction of physical security, predicting the acceleration of proactive, technology-driven systems and deeper integration of compliance frameworks worldwide.</p>
<p>Simon is a highly motivated, innovative and creative security professional with almost 20 years’ experience in the Pre-Sales and design space working with hardware, software and cloud solutions. Leadership experience and a proven track record of success growing and evolving teams in both medium and large organisations and on a global scale. Accustomed to speaking up to C- Level, in public forums and to press. A commercial techie that is inspired by good products, and passionate and motivated people.</p>
<p> </p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2404237/c1e-2k31bq85rdt67jo4-2502d7oqc7nk-8ykzbp.mp3" length="37324216"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Simon Cook, Director of New Offerings at Genetec, as he discusses the convergence between physical and cybersecurity, and the impact of global standards such as GDPR and IRAP on industry practices. Simon details the shift from siloed teams to collaborative approaches, highlighting how increased connectivity and advancements like generative AI have expanded the attack surface, making cyber risks a broader business concern. He explores the ongoing challenges of device security—from consumer cameras to enterprise solutions—and the market’s growing awareness of attack vectors stemming from seemingly innocuous network devices. Simon also unpacks the complexities of privacy legislation, especially the right to be forgotten, emphasizing the need for technology providers to embed privacy and trust by design at every stage of product development. Finally, he offers insight into the future direction of physical security, predicting the acceleration of proactive, technology-driven systems and deeper integration of compliance frameworks worldwide.
Simon is a highly motivated, innovative and creative security professional with almost 20 years’ experience in the Pre-Sales and design space working with hardware, software and cloud solutions. Leadership experience and a proven track record of success growing and evolving teams in both medium and large organisations and on a global scale. Accustomed to speaking up to C- Level, in public forums and to press. A commercial techie that is inspired by good products, and passionate and motivated people.
 
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2404237/c1a-5k0v-rk2v3vnnuoqd-gx82zr.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 359 Deep Dive: Omar Khawaja | Data Intelligence for Cybersecurity]]>
                </title>
                <pubDate>Wed, 18 Mar 2026 05:00:59 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2398201</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-359-deep-dive-omar-khawaja-data-intelligence-for-cybersecurity</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Omar Khawaja, Vice President of Security and Field CISO at Databricks, as he explores the intersection of data, AI, and cybersecurity defense. Omar addresses the real fatigue facing CISOs amidst rising AI hype, emphasizing that combining high-quality data with AI—not just AI alone—is pivotal to effective cyber defense. He shares insights on the growing need for organizations to get their data in order, challenges in adapting operating models for AI, and the importance of reducing security tool sprawl through robust, unified platforms. Omar also discusses the increasing role of AI agents in automating routine tasks, the evolving skills required to leverage AI securely, and why mature frameworks and a growth mindset are critical as organizations navigate the complexities and risks of AI adoption.</p>
<p>Omar Khawaja is the VP, Field CISO at Databricks where he gets to work with CISOs to help them securely shepherd their organisations’ data+AI journey. He leads Databricks’ Field Security practice globally, teaches at Carnegie Mellon’s CISO program, sits on the boards of HITRUST and FAIR Institute, spent 9 years as CISO of a $26B enterprise and is leading a team that developed an actionable AI security framework for 11,000 enterprise data platform customers at Databricks.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Omar Khawaja, Vice President of Security and Field CISO at Databricks, as he explores the intersection of data, AI, and cybersecurity defense. Omar addresses the real fatigue facing CISOs amidst rising AI hype, emphasizing that combining high-quality data with AI—not just AI alone—is pivotal to effective cyber defense. He shares insights on the growing need for organizations to get their data in order, challenges in adapting operating models for AI, and the importance of reducing security tool sprawl through robust, unified platforms. Omar also discusses the increasing role of AI agents in automating routine tasks, the evolving skills required to leverage AI securely, and why mature frameworks and a growth mindset are critical as organizations navigate the complexities and risks of AI adoption.
Omar Khawaja is the VP, Field CISO at Databricks where he gets to work with CISOs to help them securely shepherd their organisations’ data+AI journey. He leads Databricks’ Field Security practice globally, teaches at Carnegie Mellon’s CISO program, sits on the boards of HITRUST and FAIR Institute, spent 9 years as CISO of a $26B enterprise and is leading a team that developed an actionable AI security framework for 11,000 enterprise data platform customers at Databricks.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 359 Deep Dive: Omar Khawaja | Data Intelligence for Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Omar Khawaja, Vice President of Security and Field CISO at Databricks, as he explores the intersection of data, AI, and cybersecurity defense. Omar addresses the real fatigue facing CISOs amidst rising AI hype, emphasizing that combining high-quality data with AI—not just AI alone—is pivotal to effective cyber defense. He shares insights on the growing need for organizations to get their data in order, challenges in adapting operating models for AI, and the importance of reducing security tool sprawl through robust, unified platforms. Omar also discusses the increasing role of AI agents in automating routine tasks, the evolving skills required to leverage AI securely, and why mature frameworks and a growth mindset are critical as organizations navigate the complexities and risks of AI adoption.</p>
<p>Omar Khawaja is the VP, Field CISO at Databricks where he gets to work with CISOs to help them securely shepherd their organisations’ data+AI journey. He leads Databricks’ Field Security practice globally, teaches at Carnegie Mellon’s CISO program, sits on the boards of HITRUST and FAIR Institute, spent 9 years as CISO of a $26B enterprise and is leading a team that developed an actionable AI security framework for 11,000 enterprise data platform customers at Databricks.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2398201/c1e-2k31bq8vd9a67jo4-xx72g4vwsqkj-4mducd.mp3" length="44947791"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Omar Khawaja, Vice President of Security and Field CISO at Databricks, as he explores the intersection of data, AI, and cybersecurity defense. Omar addresses the real fatigue facing CISOs amidst rising AI hype, emphasizing that combining high-quality data with AI—not just AI alone—is pivotal to effective cyber defense. He shares insights on the growing need for organizations to get their data in order, challenges in adapting operating models for AI, and the importance of reducing security tool sprawl through robust, unified platforms. Omar also discusses the increasing role of AI agents in automating routine tasks, the evolving skills required to leverage AI securely, and why mature frameworks and a growth mindset are critical as organizations navigate the complexities and risks of AI adoption.
Omar Khawaja is the VP, Field CISO at Databricks where he gets to work with CISOs to help them securely shepherd their organisations’ data+AI journey. He leads Databricks’ Field Security practice globally, teaches at Carnegie Mellon’s CISO program, sits on the boards of HITRUST and FAIR Institute, spent 9 years as CISO of a $26B enterprise and is leading a team that developed an actionable AI security framework for 11,000 enterprise data platform customers at Databricks.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2398201/c1a-5k0v-dm1gm6zgtrx4-nxnr5m.jpg"></itunes:image>
                                                                            <itunes:duration>00:46:50</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 358 Deep Dive: Lisa Black | How Leaders Survive Major System Failures]]>
                </title>
                <pubDate>Wed, 11 Mar 2026 05:00:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2389314</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-358-deep-dive-lisa-black-how-leaders-survive-major-system-failures</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Lisa Black, Director of Public Sector at Aeon Nexus Corporation, as she shares her perspectives on crisis leadership and organizational resilience when critical systems fail. Lisa draws from her extensive background leading government operations to highlight how real risk in a crisis is often less about technology and more about maintaining trust, clear communication, and effective decision-making under pressure.</p>
<p>We explore the pitfalls of traditional and predictable crisis training, the importance of cross-training team members, and the value of embedding continuous improvement and consequence-based learning into daily operations. Lisa also discusses the crucial role of cadence in incident communications, the need to manage rumor mills and public scrutiny, consequences of over-reliance on technology, and why true collaboration between public and private sectors is essential to strengthen defenses against modern threats.</p>
<p>Lisa Black is the Director of Public Sector at Aeon Nexus Corporation where she consults with government clients who are committed to enhancing justice through modernizing technology. Utilizing Aeon’s legal case management solution to deliver a single, secure, centralized, cloud-based system to public sector entities Lisa and her company work with public safety agencies, the offices of District Attorneys, Public Defenders, mediators and courts throughout the US.</p>
<p>With over two decades of government experience, Lisa previously served as the Chief Deputy County Executive in Suffolk County, NY. There she managed the daily operations of a local government that served 1.5 million residents with a $4 Billion budget and a workforce of approximately 12,000 staff. Lisa has also held leadership roles with two NY State Senate Majority Leaders, two New York City Mayors and a NY Governor serving as Senior Advisor at the NYS Division of Homeland Security and Emergency Services.</p>
<p>Lisa’s advantage in serving in both republican and democratic governments has been instrumental in her ability to communicate across the aisle where she has been involved in crisis and emergency management for over half of her career. Formerly trained in emergency management and operational decision-making during crisis, Lisa has also earned certificates in Government Leadership and Cybersecurity Policy and Technology from the JFK School of Government at Harvard University Executive Education Program. Importantly, her skills and training helped her lead the Unified Command Incident Response to a 2022 countywide ransomware attack including incident identification, containment, eradication and operational recovery.</p>
<p>She has spoken publicly about the experience at conferences and forums across the US including those with the NY State Association of Counties (NYSAC), the US Secret Service Cyber Fraud Task Force, NY State Local Government Information Technology Directors Association (NYSLGITDA), the National Federation of Municipal Analysts (NFMA), the International Association of Emergency Manager’s (IAEM) Region II Inaugural Conference, the National Association of Counties (NACo) Chief Information Officer Forum, the FBI &amp; Fordham Law School’s International Cyber Security Summit and the 2020Partners Counterterrorism, Counter-Narcotics &amp; Cyber Security Miami Conference.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Lisa Black, Director of Public Sector at Aeon Nexus Corporation, as she shares her perspectives on crisis leadership and organizational resilience when critical systems fail. Lisa draws from her extensive background leading government operations to highlight how real risk in a crisis is often less about technology and more about maintaining trust, clear communication, and effective decision-making under pressure.
We explore the pitfalls of traditional and predictable crisis training, the importance of cross-training team members, and the value of embedding continuous improvement and consequence-based learning into daily operations. Lisa also discusses the crucial role of cadence in incident communications, the need to manage rumor mills and public scrutiny, consequences of over-reliance on technology, and why true collaboration between public and private sectors is essential to strengthen defenses against modern threats.
Lisa Black is the Director of Public Sector at Aeon Nexus Corporation where she consults with government clients who are committed to enhancing justice through modernizing technology. Utilizing Aeon’s legal case management solution to deliver a single, secure, centralized, cloud-based system to public sector entities Lisa and her company work with public safety agencies, the offices of District Attorneys, Public Defenders, mediators and courts throughout the US.
With over two decades of government experience, Lisa previously served as the Chief Deputy County Executive in Suffolk County, NY. There she managed the daily operations of a local government that served 1.5 million residents with a $4 Billion budget and a workforce of approximately 12,000 staff. Lisa has also held leadership roles with two NY State Senate Majority Leaders, two New York City Mayors and a NY Governor serving as Senior Advisor at the NYS Division of Homeland Security and Emergency Services.
Lisa’s advantage in serving in both republican and democratic governments has been instrumental in her ability to communicate across the aisle where she has been involved in crisis and emergency management for over half of her career. Formerly trained in emergency management and operational decision-making during crisis, Lisa has also earned certificates in Government Leadership and Cybersecurity Policy and Technology from the JFK School of Government at Harvard University Executive Education Program. Importantly, her skills and training helped her lead the Unified Command Incident Response to a 2022 countywide ransomware attack including incident identification, containment, eradication and operational recovery.
She has spoken publicly about the experience at conferences and forums across the US including those with the NY State Association of Counties (NYSAC), the US Secret Service Cyber Fraud Task Force, NY State Local Government Information Technology Directors Association (NYSLGITDA), the National Federation of Municipal Analysts (NFMA), the International Association of Emergency Manager’s (IAEM) Region II Inaugural Conference, the National Association of Counties (NACo) Chief Information Officer Forum, the FBI & Fordham Law School’s International Cyber Security Summit and the 2020Partners Counterterrorism, Counter-Narcotics & Cyber Security Miami Conference.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 358 Deep Dive: Lisa Black | How Leaders Survive Major System Failures]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Lisa Black, Director of Public Sector at Aeon Nexus Corporation, as she shares her perspectives on crisis leadership and organizational resilience when critical systems fail. Lisa draws from her extensive background leading government operations to highlight how real risk in a crisis is often less about technology and more about maintaining trust, clear communication, and effective decision-making under pressure.</p>
<p>We explore the pitfalls of traditional and predictable crisis training, the importance of cross-training team members, and the value of embedding continuous improvement and consequence-based learning into daily operations. Lisa also discusses the crucial role of cadence in incident communications, the need to manage rumor mills and public scrutiny, consequences of over-reliance on technology, and why true collaboration between public and private sectors is essential to strengthen defenses against modern threats.</p>
<p>Lisa Black is the Director of Public Sector at Aeon Nexus Corporation where she consults with government clients who are committed to enhancing justice through modernizing technology. Utilizing Aeon’s legal case management solution to deliver a single, secure, centralized, cloud-based system to public sector entities Lisa and her company work with public safety agencies, the offices of District Attorneys, Public Defenders, mediators and courts throughout the US.</p>
<p>With over two decades of government experience, Lisa previously served as the Chief Deputy County Executive in Suffolk County, NY. There she managed the daily operations of a local government that served 1.5 million residents with a $4 Billion budget and a workforce of approximately 12,000 staff. Lisa has also held leadership roles with two NY State Senate Majority Leaders, two New York City Mayors and a NY Governor serving as Senior Advisor at the NYS Division of Homeland Security and Emergency Services.</p>
<p>Lisa’s advantage in serving in both republican and democratic governments has been instrumental in her ability to communicate across the aisle where she has been involved in crisis and emergency management for over half of her career. Formerly trained in emergency management and operational decision-making during crisis, Lisa has also earned certificates in Government Leadership and Cybersecurity Policy and Technology from the JFK School of Government at Harvard University Executive Education Program. Importantly, her skills and training helped her lead the Unified Command Incident Response to a 2022 countywide ransomware attack including incident identification, containment, eradication and operational recovery.</p>
<p>She has spoken publicly about the experience at conferences and forums across the US including those with the NY State Association of Counties (NYSAC), the US Secret Service Cyber Fraud Task Force, NY State Local Government Information Technology Directors Association (NYSLGITDA), the National Federation of Municipal Analysts (NFMA), the International Association of Emergency Manager’s (IAEM) Region II Inaugural Conference, the National Association of Counties (NACo) Chief Information Officer Forum, the FBI &amp; Fordham Law School’s International Cyber Security Summit and the 2020Partners Counterterrorism, Counter-Narcotics &amp; Cyber Security Miami Conference.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2389314/c1e-x8jpi1p2dzcn7wz6-47o0rx0di438-qlenbn.mp3" length="45160114"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Lisa Black, Director of Public Sector at Aeon Nexus Corporation, as she shares her perspectives on crisis leadership and organizational resilience when critical systems fail. Lisa draws from her extensive background leading government operations to highlight how real risk in a crisis is often less about technology and more about maintaining trust, clear communication, and effective decision-making under pressure.
We explore the pitfalls of traditional and predictable crisis training, the importance of cross-training team members, and the value of embedding continuous improvement and consequence-based learning into daily operations. Lisa also discusses the crucial role of cadence in incident communications, the need to manage rumor mills and public scrutiny, consequences of over-reliance on technology, and why true collaboration between public and private sectors is essential to strengthen defenses against modern threats.
Lisa Black is the Director of Public Sector at Aeon Nexus Corporation where she consults with government clients who are committed to enhancing justice through modernizing technology. Utilizing Aeon’s legal case management solution to deliver a single, secure, centralized, cloud-based system to public sector entities Lisa and her company work with public safety agencies, the offices of District Attorneys, Public Defenders, mediators and courts throughout the US.
With over two decades of government experience, Lisa previously served as the Chief Deputy County Executive in Suffolk County, NY. There she managed the daily operations of a local government that served 1.5 million residents with a $4 Billion budget and a workforce of approximately 12,000 staff. Lisa has also held leadership roles with two NY State Senate Majority Leaders, two New York City Mayors and a NY Governor serving as Senior Advisor at the NYS Division of Homeland Security and Emergency Services.
Lisa’s advantage in serving in both republican and democratic governments has been instrumental in her ability to communicate across the aisle where she has been involved in crisis and emergency management for over half of her career. Formerly trained in emergency management and operational decision-making during crisis, Lisa has also earned certificates in Government Leadership and Cybersecurity Policy and Technology from the JFK School of Government at Harvard University Executive Education Program. Importantly, her skills and training helped her lead the Unified Command Incident Response to a 2022 countywide ransomware attack including incident identification, containment, eradication and operational recovery.
She has spoken publicly about the experience at conferences and forums across the US including those with the NY State Association of Counties (NYSAC), the US Secret Service Cyber Fraud Task Force, NY State Local Government Information Technology Directors Association (NYSLGITDA), the National Federation of Municipal Analysts (NFMA), the International Association of Emergency Manager’s (IAEM) Region II Inaugural Conference, the National Association of Counties (NACo) Chief Information Officer Forum, the FBI & Fordham Law School’s International Cyber Security Summit and the 2020Partners Counterterrorism, Counter-Narcotics & Cyber Security Miami Conference.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2389314/c1a-5k0v-9jwz1q80i5zx-e5qbyc.jpg"></itunes:image>
                                                                            <itunes:duration>00:47:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From The SimSpace Summit 2026 – KB On The Go | Rushell Hopkins and Stanley McChrystal (Part 2)]]>
                </title>
                <pubDate>Fri, 06 Mar 2026 05:00:21 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2384066</guid>
                                    <link>https://kbkast.castos.com/episodes/from-the-simspace-summit-2026-kb-on-the-go-rushell-hopkins-and-stanley-mcchrystal-part-2</link>
                                <description>
                                            <![CDATA[<p>Karissa Breen [00:00:10]:
Welcome to KB On The Go. I’m coming to you from my new place of residence, Orlando, Florida. And today I’m being hosted at the SimSpace Summit. Cybersecurity is hitting a breaking point, compliance checklists, tabletop exercises, and confidence claims. Aren’t enough anymore, especially as AI accelerates both attack and defense. This summit is about something different, proving readiness under real pressure, real tools, real teams, real-world chaos. Today, I’m speaking with leaders and former US government officials pushing cyber training testing and validation out of theory and into reality. Because when the next incident hits, what matters isn’t what looks good on paper, it’s what actually holds up.</p>
<p>Karissa Breen [00:00:57]:
Stay with me, we’re diving into the conversations that matter. This is KB On The Go from SYNSPACE Summit 2026.</p>
<p>Karissa Breen [00:01:04]:
Let’s get into it. Joining me now in person is Rochelle Hopkins, Professor, Computer Science and Cybersecurity at Florida Southwestern State College, and today we’re discussing the future of cyber workforce. So, Rochelle, thanks for joining and welcome.</p>
<p>Rushell Hopkins [00:01:23]:
Well, thanks for having me.</p>
<p>Karissa Breen [00:01:24]:
Okay. So Rochelle, I’m really interested in the work that you do. And when we were talking before, you were sort of describing like how things are nowadays. And I think it’s really interesting to explore that a little bit more. So I want to start perhaps with your view on the growing concern about cognitive atrophy in the younger generation. And what are your thoughts here?</p>
<p>Rushell Hopkins [00:01:46]:
Absolutely. One of the things I also didn’t share with you is I’m part of a cohort or consortium called the AAC&amp;U, which is the American Association of Colleges and Universities. And I’m in this cohort where we’re trying to bring AI into higher education and kind of look at what that’s going to do. I share concerns with many of the educators in what they’re calling cognitive offloading or cognitive atrophy in our younger generation. In cybersecurity, I tend to have really remarkable, creative, compassionate, and technically advanced students. But what I’m seeing and the shift that I’m seeing is that these students are using AI at a level where it’s eroding their patience, their deep focus, and their willingness to wrestle with the deeper problems. And learning, especially in cybersecurity, requires discomfort. We have to think outside the box.</p>
<p>Rushell Hopkins [00:02:33]:
It really requires us to sit with something, and if we don’t understand it, we are breaking it down and we’re building up that mental endurance, right, to solve it. And when their answer is just one click away, right, to these problems, that muscle greatly weakens.</p>
<p>Karissa Breen [00:02:50]:
This is where I think it gets really interesting as well, because I’m a millennial, and even when we were learning things, it’s still fundamentally different. Doesn’t feel that long ago. But when you’re talking about what you’re describing versus when I came up through the ranks, it’s not that long ago, but it does feel a lot longer. So I’m curious to see What does this sort of mean now for how people are actually learning things? You mentioned before 15-minute to 20-minute blocks before you had to say, right, we’re gonna get up, go for a walk, we’re gonna do something else. That’s a very short period of time when you think about it. How, what’s going on here?</p>
<p>Rushell Hopkins [00:03:32]:
So there’s a lot, there’s a lot of things. People are starting to do a lot of research on attention span, right? And I don’t wanna go down too much that down that road because I don’t have any degrees in psychology or, you know, I teach computer science and cybersecurity. But I’ve watched a lot of content, and I don’t mean social media content, I mean research, where shows like Cocomelon, right, that we put our kids in...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Karissa Breen [00:00:10]:
Welcome to KB On The Go. I’m coming to you from my new place of residence, Orlando, Florida. And today I’m being hosted at the SimSpace Summit. Cybersecurity is hitting a breaking point, compliance checklists, tabletop exercises, and confidence claims. Aren’t enough anymore, especially as AI accelerates both attack and defense. This summit is about something different, proving readiness under real pressure, real tools, real teams, real-world chaos. Today, I’m speaking with leaders and former US government officials pushing cyber training testing and validation out of theory and into reality. Because when the next incident hits, what matters isn’t what looks good on paper, it’s what actually holds up.
Karissa Breen [00:00:57]:
Stay with me, we’re diving into the conversations that matter. This is KB On The Go from SYNSPACE Summit 2026.
Karissa Breen [00:01:04]:
Let’s get into it. Joining me now in person is Rochelle Hopkins, Professor, Computer Science and Cybersecurity at Florida Southwestern State College, and today we’re discussing the future of cyber workforce. So, Rochelle, thanks for joining and welcome.
Rushell Hopkins [00:01:23]:
Well, thanks for having me.
Karissa Breen [00:01:24]:
Okay. So Rochelle, I’m really interested in the work that you do. And when we were talking before, you were sort of describing like how things are nowadays. And I think it’s really interesting to explore that a little bit more. So I want to start perhaps with your view on the growing concern about cognitive atrophy in the younger generation. And what are your thoughts here?
Rushell Hopkins [00:01:46]:
Absolutely. One of the things I also didn’t share with you is I’m part of a cohort or consortium called the AAC&U, which is the American Association of Colleges and Universities. And I’m in this cohort where we’re trying to bring AI into higher education and kind of look at what that’s going to do. I share concerns with many of the educators in what they’re calling cognitive offloading or cognitive atrophy in our younger generation. In cybersecurity, I tend to have really remarkable, creative, compassionate, and technically advanced students. But what I’m seeing and the shift that I’m seeing is that these students are using AI at a level where it’s eroding their patience, their deep focus, and their willingness to wrestle with the deeper problems. And learning, especially in cybersecurity, requires discomfort. We have to think outside the box.
Rushell Hopkins [00:02:33]:
It really requires us to sit with something, and if we don’t understand it, we are breaking it down and we’re building up that mental endurance, right, to solve it. And when their answer is just one click away, right, to these problems, that muscle greatly weakens.
Karissa Breen [00:02:50]:
This is where I think it gets really interesting as well, because I’m a millennial, and even when we were learning things, it’s still fundamentally different. Doesn’t feel that long ago. But when you’re talking about what you’re describing versus when I came up through the ranks, it’s not that long ago, but it does feel a lot longer. So I’m curious to see What does this sort of mean now for how people are actually learning things? You mentioned before 15-minute to 20-minute blocks before you had to say, right, we’re gonna get up, go for a walk, we’re gonna do something else. That’s a very short period of time when you think about it. How, what’s going on here?
Rushell Hopkins [00:03:32]:
So there’s a lot, there’s a lot of things. People are starting to do a lot of research on attention span, right? And I don’t wanna go down too much that down that road because I don’t have any degrees in psychology or, you know, I teach computer science and cybersecurity. But I’ve watched a lot of content, and I don’t mean social media content, I mean research, where shows like Cocomelon, right, that we put our kids in...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From The SimSpace Summit 2026 – KB On The Go | Rushell Hopkins and Stanley McChrystal (Part 2)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Karissa Breen [00:00:10]:
Welcome to KB On The Go. I’m coming to you from my new place of residence, Orlando, Florida. And today I’m being hosted at the SimSpace Summit. Cybersecurity is hitting a breaking point, compliance checklists, tabletop exercises, and confidence claims. Aren’t enough anymore, especially as AI accelerates both attack and defense. This summit is about something different, proving readiness under real pressure, real tools, real teams, real-world chaos. Today, I’m speaking with leaders and former US government officials pushing cyber training testing and validation out of theory and into reality. Because when the next incident hits, what matters isn’t what looks good on paper, it’s what actually holds up.</p>
<p>Karissa Breen [00:00:57]:
Stay with me, we’re diving into the conversations that matter. This is KB On The Go from SYNSPACE Summit 2026.</p>
<p>Karissa Breen [00:01:04]:
Let’s get into it. Joining me now in person is Rochelle Hopkins, Professor, Computer Science and Cybersecurity at Florida Southwestern State College, and today we’re discussing the future of cyber workforce. So, Rochelle, thanks for joining and welcome.</p>
<p>Rushell Hopkins [00:01:23]:
Well, thanks for having me.</p>
<p>Karissa Breen [00:01:24]:
Okay. So Rochelle, I’m really interested in the work that you do. And when we were talking before, you were sort of describing like how things are nowadays. And I think it’s really interesting to explore that a little bit more. So I want to start perhaps with your view on the growing concern about cognitive atrophy in the younger generation. And what are your thoughts here?</p>
<p>Rushell Hopkins [00:01:46]:
Absolutely. One of the things I also didn’t share with you is I’m part of a cohort or consortium called the AAC&amp;U, which is the American Association of Colleges and Universities. And I’m in this cohort where we’re trying to bring AI into higher education and kind of look at what that’s going to do. I share concerns with many of the educators in what they’re calling cognitive offloading or cognitive atrophy in our younger generation. In cybersecurity, I tend to have really remarkable, creative, compassionate, and technically advanced students. But what I’m seeing and the shift that I’m seeing is that these students are using AI at a level where it’s eroding their patience, their deep focus, and their willingness to wrestle with the deeper problems. And learning, especially in cybersecurity, requires discomfort. We have to think outside the box.</p>
<p>Rushell Hopkins [00:02:33]:
It really requires us to sit with something, and if we don’t understand it, we are breaking it down and we’re building up that mental endurance, right, to solve it. And when their answer is just one click away, right, to these problems, that muscle greatly weakens.</p>
<p>Karissa Breen [00:02:50]:
This is where I think it gets really interesting as well, because I’m a millennial, and even when we were learning things, it’s still fundamentally different. Doesn’t feel that long ago. But when you’re talking about what you’re describing versus when I came up through the ranks, it’s not that long ago, but it does feel a lot longer. So I’m curious to see What does this sort of mean now for how people are actually learning things? You mentioned before 15-minute to 20-minute blocks before you had to say, right, we’re gonna get up, go for a walk, we’re gonna do something else. That’s a very short period of time when you think about it. How, what’s going on here?</p>
<p>Rushell Hopkins [00:03:32]:
So there’s a lot, there’s a lot of things. People are starting to do a lot of research on attention span, right? And I don’t wanna go down too much that down that road because I don’t have any degrees in psychology or, you know, I teach computer science and cybersecurity. But I’ve watched a lot of content, and I don’t mean social media content, I mean research, where shows like Cocomelon, right, that we put our kids in front of, the screens are changing every 1 to 1.5 seconds. You get to 2 seconds before there is a color change, a scene change, or something’s happening. And what’s happening from a very young age when we put children in front of TVs, we are literally breaking down their attention span from birth. Okay? And so when these college kids are coming in, we’ve already done a number on them in terms of by the time they get to the situation, their attention span, they don’t really have the same attention span that I have. I’m a Gen Xer, right? I didn’t have the same experiences or I wasn’t subjected to a lot of TV or these flashing lights or Cocomelon. We just, we didn’t have that, right? So my ability to sit with something is a little bit, is a little bit different than the younger generation.</p>
<p>Rushell Hopkins [00:04:37]:
What I’m finding is that it’s relatively new, like you said, over the past 5 years, I’m just seeing it. I can see it. And so when you’re looking at a classroom, I can tell within the first 5 or 10, 15 minutes that I need to either go down a rabbit hole, tell a joke, and I call it microdosing my lectures. My students are no longer able to sit through an hour and a half, 2-hour, 3-hour lecture, like the ones I sat through when I went through college. And so, what I’ll do is I’ll talk for 15 minutes about a topic, fundamental cybersecurity foundational language, and then I’ll tell a joke or I’ll be like, you know, this one time, and I’ll bring them back and I can see I can bring them back in. And so, the world’s trained that their, you know, their attention differently. And so, I would say that shorter segments I see kind of as on-ramps, right, to that deeper learning. And then, things like SimSpace, right, why we’re here, I will microdose that lecture and then we’ll jump right into a hands-on.</p>
<p>Rushell Hopkins [00:05:33]:
Right? So instead of listening, now I’ve got them acting. And so I’ll do a 15-minute lecture. Hey, let’s solve this knowledge check. Hey, let’s, you know, let me talk about this foundational skill and then let’s jump on and do that. My goal is to stretch their attention span, not succumb to it, right? So I think it’s really about growing that sustained concentration over time, like an athlete, right? Building that muscle memory.</p>
<p>Karissa Breen [00:05:57]:
So one of the things I’m curious to hear, well, whilst you were speaking, You said before when you would sit through lectures, hour and a half, and now it’s obviously these 15, 20-minute bursts before you could do something else. Do you think the outcome’s still the same though in terms of the learning and the knowledge?</p>
<p>Rushell Hopkins [00:06:13]:
This is really probably the first year, maybe year and a half that I’ve been seeing this. So I don’t have a really good litmus test yet in terms of what the outcome’s gonna be and how much they’re retaining. I would say that retention, again, when I was going through school, there wasn’t this one-click-away answer, right? It wasn’t this solution set at my fingertips, right? Everything had to be figured out. And so those lectures, I would take notes, I would be on it. I didn’t have a device, right? It would be me just writing and studying. And now my students are recording it or they’re just going back to it at a later date, or they’re using agentic AI to answer the questions. So I don’t really know. The answer to that is going to come down the road.</p>
<p>Rushell Hopkins [00:06:55]:
Sadly, I’m not really optimistic about that answer. To be honest, but I think we need to give a little bit more time to see how these students are coming out workforce ready. So there’s one thing to get through a course and take the class and pass it. And there’s another to take the course, pass it, and actually be employable and have employable skills where you retain the knowledge when you get out. I don’t know what that’s going to look like yet, or the answer to that yet.</p>
<p>Karissa Breen [00:07:16]:
And speaking of retention of knowledge, one thing, Emma, you would know this more, Michelle, than I would, like writing things down, it actually imprints it more in your brain to learn something versus typing it. So Do you think as well that even if all these things that you’re explaining, it’s still not perhaps being imprinted into this is how we do the thing? So it becomes to your point before around it’s a muscle memory because perhaps people aren’t going and taking notes and highlighting and going to library and using encyclopedias like we used to do. It’s not like that anymore. Everything’s so instant, so quick, so quick and it wants the next thing nowadays. Curious on your thoughts.</p>
<p>Rushell Hopkins [00:07:56]:
So technology is both a gift and a risk, right? It gives my students access to tools that I could only have dreamed of when I was in their position, but it also is a substitute for thinking, right? The future professionals simply accept what a system tells them. My students are, instead of challenging it, thinking outside the box, they’re just accepting the output of the AI. Do you see what I’m saying? And so that We are not creating a group of cyber defenders. We’re really creating a group of individuals that rely on AI to defend.</p>
<p>Karissa Breen [00:08:29]:
So I have a question then. So with going back to the AI and then discerning the answer, there’s a group of people in the world that believe the Earth is flat. So if you said, is the Earth flat? And hypothetically ChatGPT says, yes, people would believe it, or they wouldn’t go, I’m gonna challenge that and think, Is it a threat or not?</p>
<p>Rushell Hopkins [00:08:47]:
So that’s one of the things I challenge my students to do is do a lot of critical thinking, right? Because it all boils down to critical thinking. It’s about challenging the process, challenging the answer. Love to tell you I get a lot of students that do that, but sadly I don’t see a lot of that spark, that willingness to do a deeper dive to confirm. I think a lot of students now, and again, I think that social media has really created this environment where students are more willing to accept data or information that fits their narrative rather than doing the deeper dive and saying, well, if this happens, if this happened and this happened, then that couldn’t have happened, right? And they’re not willing to put in the research or the work. They just simply fall victim. And so one of the things the general was talking about, general gave this analogy about the blind man and the elephant, how you have a bunch of different blind men touching different parts of an elephant. And one man is holding the tail and he says, this is a snake. Another gentleman is touching the legs and he’s like, well, this is a tree.</p>
<p>Rushell Hopkins [00:09:40]:
Well, with all of this, all the social media, and the disinformation, how do you convince students that totality is an elephant when they’re only being fed pieces of information to the whole? Does that make sense? And so my students are seeing things and they’ll say, well, that guy says it’s a snake, so it’s a snake. And that guy says it’s a tree, it’s a tree. And they’re not evaluating the whole entire, they’re not looking at the information as a whole and coming to a conclusion. They’re letting the information that they’re given dictate the outcome. Or their theory.</p>
<p>Karissa Breen [00:10:10]:
Then if we zoom out and look at that as a theory, how does that help? Like, as cybersecurity, when I was a practitioner by trade, curious, ask questions, break things. That’s how I got into it because I’m curious. And it’s ironic now I’m a media person in this space because I’m genuinely curious. I want to understand how you think. So how do we get to a point then? Because we’re going to need, like, eventually my generation, we’re all going to retire. We’re going to need these younger folks to do the work. So how does that stack up?</p>
<p>Rushell Hopkins [00:10:40]:
I think that’s one of the ones that keeps me up at night. I would tell you 5 years ago that we were churning out some pretty amazing— my career was, I was really doing good as a force for good, right? Because we do absolutely need these generations to protect our nation, right? These are— I’m supposed to be churning out workforce-ready students. A lot of that’s why I brought SimSpace on, right, to start giving them more real-world, hands-on scenarios and getting out of that lecture environment, right, where I’m just verbatim spitting out information. If we think about where all these attack surfaces we’re looking at now, especially in Southwest Florida, you know, we need to look at our hospitals, our power grids, our schools, our military. It’s going to depend on them, not algorithms. And I worry about the future of AI in education. That’s a lot of why I joined that consortium, looking at how AI is brought into higher education, not just in cybersecurity, but as a whole, because we still need nurses and doctors. And one of the philosophies that we have, or we call, is like the pixie dust approach to AI.</p>
<p>Rushell Hopkins [00:11:35]:
Which is all these different educators are sprinkling AI into their curriculum or into their course development, or some are what we call conscious abstainers, where they choose to not allow the students to use AI in the classroom. Neither approach is great, right? We don’t have any type of structure. We don’t have any rules. You know, this AI right now is kind of the Wild West, right? We didn’t create any. It’s like putting the genie back in the bottle at this point. And then in higher education, you have a lot of people that are kind of there sitting out their career, they’re in that retirement phase, right? Maybe an older kind of pedagogy or ideas. And then you have these other individuals like me or myself teaching cybersecurity technology where AI is embedded in everything that we do. So our students have to come out and be workforce ready with this heavy AI.</p>
<p>Rushell Hopkins [00:12:19]:
And so one of the concepts we’re talking about is like, how do we shoot that gap? How do we teach them how to use AI to better themselves in their career field without actually doing that cognitive offload? And That’s really where you really have to teach them the difference between when to use it and how to use it. And the when to use it’s the most important because for cognitive offload, as educators, we use it all the time. I’m helping, you know, I have Gronk, I have Gemini, they’re helping me build curriculum, they’re streamlining my mapping. We would do course mapping. It takes a lot of time and does a lot of the heavy lifting and things that I don’t really need to do. And so we need to teach our students that yes, AI is incredibly helpful and it can take a ton of workload off of us.. But we have to make sure that we’re using the AI in the way that we’re still learning the skill to become a subject matter expert in our industry, but using that to take off some of the stuff that we don’t really need to learn.</p>
<p>Karissa Breen [00:13:13]:
So one thing I’m curious to understand from your perspective, Rochelle, would be recently I interviewed the former Deputy Director of the NSA, George Barnes, and he spoke a lot about the new generation and what concerns him. And maybe you can answer this. He said, I’m concerned that people aren’t taking up roles in this period, but also from a government perspective, service to our nation, because YouTubers and TikTokers XYZ, these roles that people want to do over protecting the nation from a public-private sector perspective?</p>
<p>Rushell Hopkins [00:13:43]:
Yeah, that’s something we definitely wrestle with.</p>
<p>Karissa Breen [00:13:44]:
And it’s—</p>
<p>Rushell Hopkins [00:13:45]:
I’m not gonna lie, I would teach a lot of gen ed courses where I had students in different disciplines, right? And one of the courses that I taught was computer literacy. And computer literacy, most, you know, students think that when they come in, they’re like, I don’t need this, I’m computer literate. And they really have no idea what goes on in the background, right? They don’t really know what goes on behind the algorithms and the social media and how those algorithms get into their phone and the security behind it and why social media is eroding our students’ concentration. And they don’t see that aspect. And there’s one assignment that I would, I’d book into my students where there’s a security module and it asks them to go through their phone and find 3 of the most commonly used applications in their phone. I want them to read the terms of service and tell me what they learned. And after they read the terms of service and learned about what these apps are using in terms of their personal data, how do they feel about it, and were they still going to use it or they were gonna delete it? The overwhelming majority of our students said that, wow, I didn’t realize how intrusive they were or how much information they were gathering. I don’t feel comfortable with it, but I’m still gonna keep it ’cause I like watching puppy videos.</p>
<p>Rushell Hopkins [00:14:53]:
So this is where I get nervous, and this is where I guess a little bit of the pessimism comes in because in cybersecurity, we know that end user’s our biggest threat. Our end user, all these demographics outside of cybersecurity, right? So people that are gonna get corporate world marketing, Hospitals, nurses, everybody is our users in our networks, right? And so if at this level we can’t get them to understand basic cybersecurity concepts and get them to realize what they’re giving up, they always say if you’re not paying for the product, you are the product, right? If I can’t get them at this level to take accountability and responsibility and understand the threat landscape, I don’t know what that’s gonna look like for us. And that’s the part I think that keeps me up at night is how do I, be that water droplet, that effect, invoke change, and get some of these kids to understand the repercussions of their actions. So, I don’t know what that’s going to do for our workforce. I think it also creates that conundrum of, you know, in my PhD program, I’m a PhD student, and my dissertation was focusing on how to shorten the cybersecurity skills gap using agentic AI. It’s a self-fulfilling prophecy. So, if we have students that aren’t workforce ready, that are outsourcing their critical thinking to AI, it just makes sense for companies to use AI to close that cybersecurity skills gap because the students that are coming out of higher education are critically offloading to their agentic AI and making their agentic AI more capable than they are to join the workforce.</p>
<p>Karissa Breen [00:16:16]:
So then how can anyone complain to say, well, we don’t have a job and there’s no entry-level jobs? That shouldn’t be a complaint then. It’s valid.</p>
<p>Rushell Hopkins [00:16:22]:
You’re right.</p>
<p>Karissa Breen [00:16:26]:
Joining me now in person is retired General Stanley McChrystal, former commander of Joint Special Operations Command, and today we’re discussing winning the cyber war without a map. So Stan, thanks for joining and welcome.</p>
<p>Stan McChrystal [00:16:37]:
Thanks for having me.</p>
<p>Karissa Breen [00:16:38]:
Okay, so before we sort of got on the record today, I was saying I’ve been watching some of your YouTube videos, some of your interviews, just to understand a little bit more on how you’ve previously interviewed and getting more familiar with your approach to certain things. So I want to start today, Stan, with you’ve said that modern warfare moved from fixed battlefields to the everyday fast tech world. So what I’m curious to know is how does this directly mirror what cyber defenders are dealing with today?</p>
<p>Stan McChrystal [00:17:08]:
If we talk about war, it used to be sort of geographically bounded. If you go way back, it was where the armies were. And then you expanded that. The armies could have a greater effect on countryside as they marched through it. Then we got to world wars, and suddenly the ability to reach with military things like submarines or aircraft, it basically brought the war close to civilians in a pretty real way. Now the war can be everywhere because information technology allows you to get both information and disinformation everywhere, but also cyber activities allow you to have impact everywhere. So whereas it might not have been possible to reach across an ocean and bomb an enemy’s factory, now we can reach across an ocean and attack it with cyber pretty simply. So the reality is the battle space, as the military would call it, has just expanded.</p>
<p>Stan McChrystal [00:18:06]:
It’s almost limitless now. And so there is no front of the battle line, middle, and there’s no rear anymore. I don’t think we’ve really felt that yet. I don’t think we’ve digested the meaning of that because we still have an idea that if something is kinetic and it blows up, then it’s war. And if it’s cyber, that it is maybe espionage or maybe crime or maybe just irritating. But we haven’t had power stations turned off in the United States or Great Britain yet. We haven’t had that real impact felt on everyday lives from enemies yet. They’ve done some of it in Ukraine, but we think of that as battlespace.</p>
<p>Stan McChrystal [00:18:48]:
So I think we are mentally not yet prepared for the fact that war is and can be everywhere, which then expands the idea of who’s a combatant. And then the question is, is someone sitting on a keyboard targetable kinetically, meaning if you hack me, can I bomb you? Is that fair? And I think we haven’t come to grips with that philosophical question yet, but we’re getting close because there will be an appetite to do that.</p>
<p>Karissa Breen [00:19:20]:
Yeah, okay, so this is really interesting. So I’ve come from a cyber background as practitioner before doing this sort of stuff today. And what’s interesting is, do you think now as we move forward with everything that’s happening in the world, of course there’s a rise of geopolitics, but you said before you can attack from anywhere, right? And then what I’m also seeing interviewing people across the globe with how it traverses into the kinetic warfare. And whilst you said nothing major has happened, and I hate to sort of raise it, do you think we’re going to unfortunately start seeing these sort of incidents now?</p>
<p>Stan McChrystal [00:19:51]:
I think we will. I think in the past what we’ve seen in the case of big powers is cyber-enabled killing, meaning we will find a targetable person by cyber, but then we will kill them kinetically. And that feels traditional. And so cyber was part of it. It was maybe the critical part, but the reality is we use traditional means. What if we turn off their pacemaker? What if we disable the hospital? What if we cause water or food to be contaminated, which I think we’ll be able to do all through cyber. And we’re killing people or we’re causing really damaging effects. We didn’t do anything that felt traditional.</p>
<p>Stan McChrystal [00:20:39]:
We’re going to have to come to grips with, if you hit the keyboard, is that the same as pulling the trigger? And I don’t think right now we think of it that way.</p>
<p>Karissa Breen [00:20:48]:
Do you think as well it’s because out of sight, out of mind? What I mean by that is, I worked in a bank as a practitioner. Someone’s money gets stolen, we would just replenish it back in your bank account. It’s a bit different to back in the day when people could physically go to a bank and, you know, rob some cash and run away. Do you think it’s because people can’t see it as much? Perhaps it’s not tangible. You can’t feel the impact?</p>
<p>Stan McChrystal [00:21:09]:
I think that’s right. I think we can’t feel the impact. But of course, if somebody effectively bilks you out of a large amount of money, you will feel the impact at some point because you’ll have less. But I think that’s right. It’s different than being mugged on the street where someone takes your purse or wallet. Which, or even being your home invaded and your jewelry and money stolen from your home, you feel violated. But I think that as people start to do identity theft and other, you will feel violated in the same visceral way, which will start to cause people to want to respond in the same visceral way.</p>
<p>Karissa Breen [00:21:46]:
So respond with force? We don’t. Right. Yeah, because I’ve always wondered this as well, because it’s like If someone upsets me online, for example, it’s not the same as someone coming up and punching me in the street, right? So where do you think the shift’s going to happen, or what do you think the catalyst is? Is it going to be, unfortunately, one of these incidents where people may lose their life as a result of cyber warfare that connects into kinetic warfare and then something bad really happens?</p>
<p>Stan McChrystal [00:22:11]:
Of course I’m not sure, but my sense is it will be a cumulative number of events like that get so painful, like identity theft or even just extreme inconvenience. So, for example, suppose someone disables TSA at the airport and you go to the airport and you can’t board your flight because no one can get through TSA. I think people will get much more angry far quicker than we have so far, particularly if it’s en masse. If someone hacks your account, I feel sorry for you. But I’m glad it wasn’t me. If they hack a bunch of us together, we are outraged and we’re willing to do something. I think something at scale, or cumulatively at scale, enough things happening, people are going to want to act. And again, some cases are going to act kinetically.</p>
<p>Karissa Breen [00:23:03]:
So given your background, do you think people are starting to really focus on this now, like governments, etc.? I mean, like, well, people may start to respond this way. You think it’s on the radar?</p>
<p>Stan McChrystal [00:23:13]:
I think theoretically it is, but practically it’s not because we’ve been warned about this so long. We know the cases of it so much. We’ve seen big hacks of government data. We’ve seen big hacks of business data. We’ve seen individuals suffer different cyber impacts, but it hasn’t affected our life. Look at any of the big cases and you go, wow, that’s bad. But it really didn’t change my life at all. I think one that turns out to have a big military effect or a big financial effect, that will be the tipping point.</p>
<p>Stan McChrystal [00:23:48]:
And I think it has to come pretty soon. And it doesn’t have to come from a nation-state. In fact, it’s probably likely not to, as a nation-state can be held at risk. You can threaten a nation-state. You can’t threaten an individual that doesn’t care. So I think it’s more likely that someone is able to do the equivalent of a weapon of mass destruction on cyber, but without, you know, the national assets. And we just haven’t seen it. And I’m, I’m frankly surprised that we haven’t seen that yet.</p>
<p>Karissa Breen [00:24:17]:
So you think back to the Colonial Pipeline attack that happened, obviously that caused outrage for people. Do you think that even if it’s something like that, there’s going to have this flow-on effect for people, there’s a group of people who are going to be agitating, concerned, start acting in a certain way, or to your point earlier, if it’s water gets contaminated, people start dying because they’re drinking it, and then emergency services go down, people can’t go through. Like, it’s going to have a— it’s, from my understanding, interviewing people like yourself there, Stan, can happen quite quickly. Not like weeks, like hours.</p>
<p>Stan McChrystal [00:24:53]:
Yeah, I think that if you— and I use this word carefully— inconvenience our society enough, I would argue that if you were able to turn the electricity off in a city for 12 hours and people didn’t know when that electricity would come back on in 12 hours, you’d start to see society break down. I think if it was longer than that, it would be even greater. So I think you’d have this groundswell response. Colonial Pipeline inconvenienced some people, but the resilience of our society, in fact, mitigated much of it. And that’s a good thing. We want our society to be very resilient, but we don’t want us to be so resilient that all of these things can happen and we start to just accept them. We’ve got to understand we must be resilient to survive them, but there’s got to be a decision made on the part of society of what’s acceptable and what isn’t and what we are going to actively going to stop, try to stop.</p>
<p>Karissa Breen [00:25:53]:
So one thing I’m curious then You said before we don’t want to accept it because we’re so resilient. Do you think people, even with like cyber breaches, people seem a little bit desensitized, like, oh well, another breach happened? Do you think this will become, oh well, another power plant blew up and people died? Do you think it will unfortunately become like that because so much of this could be happening?</p>
<p>Stan McChrystal [00:26:13]:
I think it could. I don’t think so. I think once you get into those things that affect people directly, that will be a point it tips. And I use, for example, So right now, we know that there are these scam centers in some of the Asian countries where they literally have created little factories of people who reach out around the world and do scamming. We know it. We even know where they are, but we don’t do anything directly. I think the difference would be those kinds of activities, if they rise to enough inconvenience, suddenly you get a strike on them. Either a cyber strike or a kinetic strike, and you say, we’re not putting up with that, and the host country refuses or is unable to do something about it, suddenly that’s a new dynamic because you’re violating national sovereignty to pursue things.</p>
<p>Stan McChrystal [00:27:06]:
But yet, if you think that those nations are unwilling to do that, then you say that they don’t deserve their sovereignty if they’re unwilling to respect international law.</p>
<p>Karissa Breen [00:27:16]:
So with that thought for a moment, one thing I’ve observed and spoken to like ex-law enforcement folks is if I commit a cyber crime in a non-country that doesn’t have a treaty with the US or Australia or whoever, it’s hard to really go after. First of all, it’s hard to track them down, but then it’s really hard to do anything. Where does that— what happens now? I can’t really bring them back and do something. There’s no treaty.</p>
<p>Stan McChrystal [00:27:43]:
Yeah, that’s going to be, I think, a bold new frontier. You know, we just went and took the president of Venezuela out of his palace because he was doing things we didn’t like. Now, you could argue it was geopolitical, but our argument was he had done illegal things. I think the respect for national boundaries— think of the predator strikes that occurred in sovereign countries inside places like Pakistan against terrorism, I think we could easily find an appetite grow for doing operations inside sovereign countries that are either unable or unwilling to take action, that we suddenly don’t respect national boundaries as much as before. I’m not advocating this because there’s a lot of complications that come with that. Once you violate national sovereignty, you take away from them their perceived responsibility to do it. They go, okay, if you’re going to go after people in my country, we’re not going to do that, we’re not going to help you. That’s a different relationship than the international community that we want.</p>
<p>Stan McChrystal [00:28:50]:
But I think that once you get cyber activities that reach a level of damage, I think the appetite for that will be so great that it will force that. Now, I’d like to believe that international Alliances, United Nations, NATO, other places could be very helpful there because international law is critical here because we have the ability for crime to reach so far. And so international law, in my view, becomes increasingly important. And we’re not there yet, but I think we’ll get there. And I also think you described earlier, if someone does a cybercrime from country X and we identify them, You know, we still say, well, they’re guilty of cybercrime. They didn’t kill anyone. They didn’t hold a gun on someone. We almost put them in a different category, like white-collar crime.</p>
<p>Stan McChrystal [00:29:40]:
I think we’ll stop doing that. I think we’ll start saying it’s the impact that you create.</p>
<p>Karissa Breen [00:29:45]:
Do you think from your experience, Stan, it’s better to go on the offensive or on the defensive? Good and bad to both, but I’m curious to hear your thoughts.</p>
<p>Stan McChrystal [00:29:53]:
Obviously, what we’ve largely done is the defensive. We’ve done it imperfectly, but it’s getting better. Just people are becoming more resilient because more organizations get better at it and we can take a punch. I think there’s going to have to be a more aggressive offensive part, but it is going to have to be very controlled. I was with a corporation— it’s been a decade now— when they were exploring developing their own offensive capability against actors around the world. They stepped back and didn’t do it. But they were— their theory was they would have the equivalent of mercenaries. And so anyone who came after their organization was going to be punished offensively.</p>
<p>Stan McChrystal [00:30:35]:
And again, they stopped. But I can understand the appetite for doing that. And I can understand, say, big banks get together and they say, we got to stop this stuff. And they decide to create or hire capabilities to do that because national governments are unwilling or unable. And they say, well, we’ve got to protect the international financial system. And they’re not wrong, but now you’ve created extralegal military or law enforcement capabilities. And again, that’s problematic.</p>
<p>Karissa Breen [00:31:07]:
So talking of problematic, what about now adding AI into the mix, accelerating a lot of these problems you discussed here today?</p>
<p>Stan McChrystal [00:31:13]:
Yeah, we’re not ready for AI. It’s funny, we weren’t ready for social media. We got social media. We didn’t understand how powerful it would be, and it changed our society, and we’re still not mature enough to deal with it. We are polluting a lot of young people’s minds and whatnot. And what seemed like a good thing— I didn’t see it coming— has turned out to have a downside that’s so huge. I think AI is similar. We’re just, as mankind, we are not Maybe we are in the Prometheus phase.</p>
<p>Stan McChrystal [00:31:47]:
Somebody goes and takes fire and suddenly gives man fire and we’re not ready for it because we don’t have the rules in place. We have the whole idea of a capitalist economy is each person does their best. Now they operate hopefully within rules, but they do their best to get the most they can. And in an earlier age where you were reliant on your personal wits or your strength of your body The difference between you and I couldn’t be that much. In an AI world, the difference between you and I could be incalculable. And suddenly you could gather wealth, you can gather influence, you can gather power, and I could have none. You essentially can win Monopoly. You get everything on the first move of the game.</p>
<p>Stan McChrystal [00:32:36]:
And AI offers that potential for individuals, for companies, and for nations. And the problem is we’re still programmed to pursue that because, you know, you pursue in your best interest. And that has worked well in capitalist economies because it made people work hard and be effective. I don’t know that it works hard when suddenly people are empowered to a degree we never thought imaginable. And so I’m worried that we’re gonna get not just wealth inequality, we’re going to have inequality of everything to a massive scale. We’ll have a group of, a small group of empowered people who control everything. And we say, well, that’s not possible. Well, it is, I think.</p>
<p>Stan McChrystal [00:33:25]:
And at least I worry.</p>
<p>Karissa Breen [00:33:27]:
I think it’s interesting. So we’re not ready for social media. Even if you look back to when the internet started and people are saying we’re not ready for that. How are governments, society, companies, private, public, whatever, going to police all of this? What I mean by that is if I go through a red light here, I’m going to get fined. There is repercussion. But hey, someone might think, well, I don’t like Chris Breen’s comment or the story that she’s written about Stan. So I’m going to say something horrible to her. There’s no real repercussions.</p>
<p>Karissa Breen [00:33:55]:
Oh, but it was online. So, and now we’re adding AI into it. So it’s like, well, you know, we could be fighting people with AI and all of the things. So it’s like, Are people going to start to become deluded in what’s real and what’s not real? What’s a fake world fabricated? Like, how do we find that line? Is there a line?</p>
<p>Stan McChrystal [00:34:13]:
I think they are already challenged by that. At least the people who are informed enough, they know that much of what they read is not true and it’s designed to influence. A lot of people still aren’t really aware, but increasingly they are. Whether I think there’s hope, and I’ve done some thinking about this, but I’m not an expert. The potential to use AI for governance. Because if you think about it, a lot of the problems in our governments are inefficiency, but also corruption and things. And we all believe a representative democracy is a good thing, but AI could do a lot of things to make things fair. If you create AI and set up rules and understanding, You say, we’re not going to do something that’s not fair.</p>
<p>Stan McChrystal [00:35:02]:
And you put policies in AI and it comes back and it says, that’s not fair. And suddenly it’s the equivalent of having wise men or women, you know, great people, the gods who say, okay, here are the rules and the road. Now the danger there is it’s almost like an old science fiction movie or something where you have this machine that gives everybody the rules. But perhaps we could use AI to take some of the uncertainty and foolishness out of what we see. What if AI fact checks everything that politicians say and do? And then suddenly, in a best case, what that would do, it would be a shaping to stop them from lying. Because every time they talk, if a red light’s going off over their shoulder that says this person’s lying, boom, It’s hard on them. If we could use it for things like that, then there’s some potential that we shape ourselves into better behavior. You hope we don’t become lab rats that only do what the machine tells us to do, but we need something that brings us back to what is true.</p>
<p>Stan McChrystal [00:36:13]:
Remember the old alternate facts kind of thing? We’ve got to have something that says, no, there aren’t alternate facts, there are facts. There are interpretations, and We accept that, but some things are true, some things are not true.</p>
<p>Karissa Breen [00:36:26]:
So then on that note, and maybe to conclude today’s interview, do you think given everything you talked about with there’ll be a few players that own the power and the distribution, do you think those companies, people, whoever will use that AI for their advantage or to disadvantage people? So like you said, it actually could be used for good and maybe it gets distributed evenly. Or do you think perhaps these people, these companies would be more selfish in looking after themselves? So therefore there’s only the top 10% and the rest is a huge polarization.</p>
<p>Stan McChrystal [00:36:57]:
I think what we’re already seeing is they use it for themselves, for individuals and for the power of corporations. I mean, if you look at some of the conduct of some of the major entities, at the end of the day, they’re about survival and profitability of the entity. And they’ve got a lot of verbiage and narrative that says trying to make the world a better place, but they’re making it very much better for them. And a little bit theoretically better for everyone else. And then you look at the oligarchs, and I use the term pejoratively, intentionally. We have created a class of absurdly wealthy people who live absurdly wealthy lifestyles. And I don’t believe that’s healthy for any society. I think that, I think that’s not sustainable in a healthy way long term.</p>
<p>Stan McChrystal [00:37:52]:
And so that’s either going to get worse if it’s not addressed, or we’re going to have some kind of climactic crash-up about it.</p>
<p>Karissa Breen [00:38:00]:
And then lastly, Stan, what would you like to leave our audience with today? Perhaps one takeaway that you’re thinking about.</p>
<p>Stan McChrystal [00:38:06]:
I think we need to think broadly about cyber. Nuclear weapons emerged at the end of the Second World War, but it took about 15 years before a doctrine of nuclear weapons really emerged where people started to say, okay, a bunch of people have the ability to destroy the world. How are we going to manage these? How are we going to think about them? And you started to have the doctrine of mutually assured destruction and mutual deterrence, all those things which people hate, but they were actually necessary adaptations to the reality that a small group of nations could destroy the world at any moment. And it worked. We need the equivalent for the march of technology, because first it was cyber information technology, and I would argue that that got ahead of us. And now artificial intelligence. We are going to need to develop a doctrine of thought, common understanding, what’s right, what’s wrong, what’s not allowed. And we’re going to have to do it pretty quickly.</p>
<p>Stan McChrystal [00:39:14]:
And it’s not just a few legal rules. It is you know, how we think broadly about it. And so society’s got to mature faster than we have been maturing.</p>
<p>Karissa Breen [00:39:26]:
And there you have it. This is KB On The Go. Stay tuned for more.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2384066/c1e-m1o3c4zjw0swqkqp-xx79g123a8j1-38onma.mp3" length="37967906"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Karissa Breen [00:00:10]:
Welcome to KB On The Go. I’m coming to you from my new place of residence, Orlando, Florida. And today I’m being hosted at the SimSpace Summit. Cybersecurity is hitting a breaking point, compliance checklists, tabletop exercises, and confidence claims. Aren’t enough anymore, especially as AI accelerates both attack and defense. This summit is about something different, proving readiness under real pressure, real tools, real teams, real-world chaos. Today, I’m speaking with leaders and former US government officials pushing cyber training testing and validation out of theory and into reality. Because when the next incident hits, what matters isn’t what looks good on paper, it’s what actually holds up.
Karissa Breen [00:00:57]:
Stay with me, we’re diving into the conversations that matter. This is KB On The Go from SYNSPACE Summit 2026.
Karissa Breen [00:01:04]:
Let’s get into it. Joining me now in person is Rochelle Hopkins, Professor, Computer Science and Cybersecurity at Florida Southwestern State College, and today we’re discussing the future of cyber workforce. So, Rochelle, thanks for joining and welcome.
Rushell Hopkins [00:01:23]:
Well, thanks for having me.
Karissa Breen [00:01:24]:
Okay. So Rochelle, I’m really interested in the work that you do. And when we were talking before, you were sort of describing like how things are nowadays. And I think it’s really interesting to explore that a little bit more. So I want to start perhaps with your view on the growing concern about cognitive atrophy in the younger generation. And what are your thoughts here?
Rushell Hopkins [00:01:46]:
Absolutely. One of the things I also didn’t share with you is I’m part of a cohort or consortium called the AAC&U, which is the American Association of Colleges and Universities. And I’m in this cohort where we’re trying to bring AI into higher education and kind of look at what that’s going to do. I share concerns with many of the educators in what they’re calling cognitive offloading or cognitive atrophy in our younger generation. In cybersecurity, I tend to have really remarkable, creative, compassionate, and technically advanced students. But what I’m seeing and the shift that I’m seeing is that these students are using AI at a level where it’s eroding their patience, their deep focus, and their willingness to wrestle with the deeper problems. And learning, especially in cybersecurity, requires discomfort. We have to think outside the box.
Rushell Hopkins [00:02:33]:
It really requires us to sit with something, and if we don’t understand it, we are breaking it down and we’re building up that mental endurance, right, to solve it. And when their answer is just one click away, right, to these problems, that muscle greatly weakens.
Karissa Breen [00:02:50]:
This is where I think it gets really interesting as well, because I’m a millennial, and even when we were learning things, it’s still fundamentally different. Doesn’t feel that long ago. But when you’re talking about what you’re describing versus when I came up through the ranks, it’s not that long ago, but it does feel a lot longer. So I’m curious to see What does this sort of mean now for how people are actually learning things? You mentioned before 15-minute to 20-minute blocks before you had to say, right, we’re gonna get up, go for a walk, we’re gonna do something else. That’s a very short period of time when you think about it. How, what’s going on here?
Rushell Hopkins [00:03:32]:
So there’s a lot, there’s a lot of things. People are starting to do a lot of research on attention span, right? And I don’t wanna go down too much that down that road because I don’t have any degrees in psychology or, you know, I teach computer science and cybersecurity. But I’ve watched a lot of content, and I don’t mean social media content, I mean research, where shows like Cocomelon, right, that we put our kids in...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2384066/c1a-5k0v-v6woprz7i23z-nmvr48.png"></itunes:image>
                                                                            <itunes:duration>00:39:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From The SimSpace Summit 2026 – KB On The Go | Peter Lee and Ernie Ferraresso (Part 1)]]>
                </title>
                <pubDate>Thu, 05 Mar 2026 05:00:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2382290</guid>
                                    <link>https://kbkast.castos.com/episodes/from-the-simspace-summit-2026-kb-on-the-go-peter-lee-and-ernie-ferraresso-part-1</link>
                                <description>
                                            <![CDATA[<p>Cybersecurity is hitting a breaking point. Compliance checklists, tabletop exercises and confidence claims aren’t enough anymore, especially as AI accelerates both attack and defense. In this bonus episode, KB sits down with Peter Lee, Chief Executive Officer and President of SimSpace, and Ernie Ferraresso, Senior Director of Cyber Florida. Together they discuss cyber readiness and why Florida treats cyber like a mission.</p>
<p><strong><a href="https://www.linkedin.com/in/peter-lee-8a022011">Peter Lee, Chief Executive Officer and President of SimSpace</a></strong></p>
<p>Peter serves as the Chief Executive Officer and President of SimSpace, the realistic, intelligent cyber range that strengthens teams, technologies, and processes to outsmart adversaries before the fight begins.</p>
<p>Previously, Peter was co-founder and CEO of DataSynapse, an infrastructure software company acquired by TIBCO; and CEO of RapidMiner, an open source machine learning platform acquired by Altair. At TIBCO, Peter served as Executive Vice President responsible for multiple businesses including the security, cloud computing, B2B, CX, and analytics product groups. Before launching his career in software, Peter was a strategy consultant with Deloitte and an investment banker with JP Morgan.</p>
<p>Peter has extensive Board experience collaborating with top tier investors to grow innovative software companies, serving as Chairman for Attivio (acquired by ServiceNow), WorldQuant Predictive, and ActiveState, and as Director for Ektron (acquired by Accel-KKR), Vesta (acquired by TINT), Infomatix (acquired by EPAM), OpenAssemby (acquired by Fulcrum), BlogTalkRadio (acquired by iHeartRadio), Entrio and Chattermill. Peter also serves on the investment committees of Advanced Finance &amp; Investment Group and Communitas Capital Partners.</p>
<p>Peter graduated from Harvard College with an AB degree in Government (cum laude), received an MBA degree from The Wharton School in Entrepreneurial Management and an MA degree from The University of Pennsylvania in International Affairs.</p>
<p>Peter has been invited twice to speak at the World Economic Forum in Davos and four times at The Milken Institute Global Conferences in LA and Singapore, explaining the impact of AI in terms of its business value and key use cases. Peter is a former Board member of Upwardly Global, alumnus of YPO and a member of the Development Board for Phillips Academy Andover.</p>
<p><a href="https://www.linkedin.com/in/ernestferraresso/"><strong>Ernie Ferraresso, Senior Director of Cyber Florida</strong></a></p>
<p>As the senior director of Cyber Florida, Ernie drives the organization’s strategic vision while overseeing the center’s day-to-day operations. He started with Cyber Florida in 2017 as associate director of programs and partnerships and brings decades of technology expertise and leadership experience to his role.</p>
<p>Prior to Cyber Florida, Ernie worked for a small technology design and integration firm as the Director of Operations, overseeing the design and implementation of cybersecurity and emergency operations center technology solutions in the U.S. and throughout Latin America.</p>
<p>He is a retired U.S. Marine Intelligence Officer who served in the U.S. and abroad. His work included assignments with the U.S. Special Operations Forces, the intelligence community, the George C. Marshall European Center for Security Studies, and U.S. Cyber Command.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Cybersecurity is hitting a breaking point. Compliance checklists, tabletop exercises and confidence claims aren’t enough anymore, especially as AI accelerates both attack and defense. In this bonus episode, KB sits down with Peter Lee, Chief Executive Officer and President of SimSpace, and Ernie Ferraresso, Senior Director of Cyber Florida. Together they discuss cyber readiness and why Florida treats cyber like a mission.
Peter Lee, Chief Executive Officer and President of SimSpace
Peter serves as the Chief Executive Officer and President of SimSpace, the realistic, intelligent cyber range that strengthens teams, technologies, and processes to outsmart adversaries before the fight begins.
Previously, Peter was co-founder and CEO of DataSynapse, an infrastructure software company acquired by TIBCO; and CEO of RapidMiner, an open source machine learning platform acquired by Altair. At TIBCO, Peter served as Executive Vice President responsible for multiple businesses including the security, cloud computing, B2B, CX, and analytics product groups. Before launching his career in software, Peter was a strategy consultant with Deloitte and an investment banker with JP Morgan.
Peter has extensive Board experience collaborating with top tier investors to grow innovative software companies, serving as Chairman for Attivio (acquired by ServiceNow), WorldQuant Predictive, and ActiveState, and as Director for Ektron (acquired by Accel-KKR), Vesta (acquired by TINT), Infomatix (acquired by EPAM), OpenAssemby (acquired by Fulcrum), BlogTalkRadio (acquired by iHeartRadio), Entrio and Chattermill. Peter also serves on the investment committees of Advanced Finance & Investment Group and Communitas Capital Partners.
Peter graduated from Harvard College with an AB degree in Government (cum laude), received an MBA degree from The Wharton School in Entrepreneurial Management and an MA degree from The University of Pennsylvania in International Affairs.
Peter has been invited twice to speak at the World Economic Forum in Davos and four times at The Milken Institute Global Conferences in LA and Singapore, explaining the impact of AI in terms of its business value and key use cases. Peter is a former Board member of Upwardly Global, alumnus of YPO and a member of the Development Board for Phillips Academy Andover.
Ernie Ferraresso, Senior Director of Cyber Florida
As the senior director of Cyber Florida, Ernie drives the organization’s strategic vision while overseeing the center’s day-to-day operations. He started with Cyber Florida in 2017 as associate director of programs and partnerships and brings decades of technology expertise and leadership experience to his role.
Prior to Cyber Florida, Ernie worked for a small technology design and integration firm as the Director of Operations, overseeing the design and implementation of cybersecurity and emergency operations center technology solutions in the U.S. and throughout Latin America.
He is a retired U.S. Marine Intelligence Officer who served in the U.S. and abroad. His work included assignments with the U.S. Special Operations Forces, the intelligence community, the George C. Marshall European Center for Security Studies, and U.S. Cyber Command.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From The SimSpace Summit 2026 – KB On The Go | Peter Lee and Ernie Ferraresso (Part 1)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Cybersecurity is hitting a breaking point. Compliance checklists, tabletop exercises and confidence claims aren’t enough anymore, especially as AI accelerates both attack and defense. In this bonus episode, KB sits down with Peter Lee, Chief Executive Officer and President of SimSpace, and Ernie Ferraresso, Senior Director of Cyber Florida. Together they discuss cyber readiness and why Florida treats cyber like a mission.</p>
<p><strong><a href="https://www.linkedin.com/in/peter-lee-8a022011">Peter Lee, Chief Executive Officer and President of SimSpace</a></strong></p>
<p>Peter serves as the Chief Executive Officer and President of SimSpace, the realistic, intelligent cyber range that strengthens teams, technologies, and processes to outsmart adversaries before the fight begins.</p>
<p>Previously, Peter was co-founder and CEO of DataSynapse, an infrastructure software company acquired by TIBCO; and CEO of RapidMiner, an open source machine learning platform acquired by Altair. At TIBCO, Peter served as Executive Vice President responsible for multiple businesses including the security, cloud computing, B2B, CX, and analytics product groups. Before launching his career in software, Peter was a strategy consultant with Deloitte and an investment banker with JP Morgan.</p>
<p>Peter has extensive Board experience collaborating with top tier investors to grow innovative software companies, serving as Chairman for Attivio (acquired by ServiceNow), WorldQuant Predictive, and ActiveState, and as Director for Ektron (acquired by Accel-KKR), Vesta (acquired by TINT), Infomatix (acquired by EPAM), OpenAssemby (acquired by Fulcrum), BlogTalkRadio (acquired by iHeartRadio), Entrio and Chattermill. Peter also serves on the investment committees of Advanced Finance &amp; Investment Group and Communitas Capital Partners.</p>
<p>Peter graduated from Harvard College with an AB degree in Government (cum laude), received an MBA degree from The Wharton School in Entrepreneurial Management and an MA degree from The University of Pennsylvania in International Affairs.</p>
<p>Peter has been invited twice to speak at the World Economic Forum in Davos and four times at The Milken Institute Global Conferences in LA and Singapore, explaining the impact of AI in terms of its business value and key use cases. Peter is a former Board member of Upwardly Global, alumnus of YPO and a member of the Development Board for Phillips Academy Andover.</p>
<p><a href="https://www.linkedin.com/in/ernestferraresso/"><strong>Ernie Ferraresso, Senior Director of Cyber Florida</strong></a></p>
<p>As the senior director of Cyber Florida, Ernie drives the organization’s strategic vision while overseeing the center’s day-to-day operations. He started with Cyber Florida in 2017 as associate director of programs and partnerships and brings decades of technology expertise and leadership experience to his role.</p>
<p>Prior to Cyber Florida, Ernie worked for a small technology design and integration firm as the Director of Operations, overseeing the design and implementation of cybersecurity and emergency operations center technology solutions in the U.S. and throughout Latin America.</p>
<p>He is a retired U.S. Marine Intelligence Officer who served in the U.S. and abroad. His work included assignments with the U.S. Special Operations Forces, the intelligence community, the George C. Marshall European Center for Security Studies, and U.S. Cyber Command.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2382290/c1e-d5v7aokop7cpd4gq-kpj8znmriq4d-avxgmn.mp3" length="47427125"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Cybersecurity is hitting a breaking point. Compliance checklists, tabletop exercises and confidence claims aren’t enough anymore, especially as AI accelerates both attack and defense. In this bonus episode, KB sits down with Peter Lee, Chief Executive Officer and President of SimSpace, and Ernie Ferraresso, Senior Director of Cyber Florida. Together they discuss cyber readiness and why Florida treats cyber like a mission.
Peter Lee, Chief Executive Officer and President of SimSpace
Peter serves as the Chief Executive Officer and President of SimSpace, the realistic, intelligent cyber range that strengthens teams, technologies, and processes to outsmart adversaries before the fight begins.
Previously, Peter was co-founder and CEO of DataSynapse, an infrastructure software company acquired by TIBCO; and CEO of RapidMiner, an open source machine learning platform acquired by Altair. At TIBCO, Peter served as Executive Vice President responsible for multiple businesses including the security, cloud computing, B2B, CX, and analytics product groups. Before launching his career in software, Peter was a strategy consultant with Deloitte and an investment banker with JP Morgan.
Peter has extensive Board experience collaborating with top tier investors to grow innovative software companies, serving as Chairman for Attivio (acquired by ServiceNow), WorldQuant Predictive, and ActiveState, and as Director for Ektron (acquired by Accel-KKR), Vesta (acquired by TINT), Infomatix (acquired by EPAM), OpenAssemby (acquired by Fulcrum), BlogTalkRadio (acquired by iHeartRadio), Entrio and Chattermill. Peter also serves on the investment committees of Advanced Finance & Investment Group and Communitas Capital Partners.
Peter graduated from Harvard College with an AB degree in Government (cum laude), received an MBA degree from The Wharton School in Entrepreneurial Management and an MA degree from The University of Pennsylvania in International Affairs.
Peter has been invited twice to speak at the World Economic Forum in Davos and four times at The Milken Institute Global Conferences in LA and Singapore, explaining the impact of AI in terms of its business value and key use cases. Peter is a former Board member of Upwardly Global, alumnus of YPO and a member of the Development Board for Phillips Academy Andover.
Ernie Ferraresso, Senior Director of Cyber Florida
As the senior director of Cyber Florida, Ernie drives the organization’s strategic vision while overseeing the center’s day-to-day operations. He started with Cyber Florida in 2017 as associate director of programs and partnerships and brings decades of technology expertise and leadership experience to his role.
Prior to Cyber Florida, Ernie worked for a small technology design and integration firm as the Director of Operations, overseeing the design and implementation of cybersecurity and emergency operations center technology solutions in the U.S. and throughout Latin America.
He is a retired U.S. Marine Intelligence Officer who served in the U.S. and abroad. His work included assignments with the U.S. Special Operations Forces, the intelligence community, the George C. Marshall European Center for Security Studies, and U.S. Cyber Command.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2382290/c1a-5k0v-kpj622wdtr9d-hjiyhg.png"></itunes:image>
                                                                            <itunes:duration>00:49:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 357 Deep Dive: James Tennant | Why does AUKUS Need Sovereign Capital?]]>
                </title>
                <pubDate>Wed, 04 Mar 2026 05:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2381226</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-357-deep-dive-james-tennant-why-does-aukus-need-sovereign-capital</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with James Tennant, Partner and Head of JAPAC at Boka Capital, as he discusses why AUKUS needs sovereign capital to successfully deliver on its strategic ambitions. James explores the disparity between the headline-grabbing investments of AUKUS Pillar 1 and the overlooked capital shortfalls of Pillar 2, emphasizing the urgent need to build a unified capital architecture across Australia, the UK, and the US. He highlights the challenges faced by defense technology startups, such as the “valley of death” funding gap and ESG constraints that lock out institutional investment, and draws valuable lessons from international examples like In-Q-Tel and Israel’s Yozma. Throughout the conversation, James argues for a coordinated sovereign capital framework, increased public education about dual-use technologies, and transparent government action to move from strategic announcements to real capital deployment, ensuring AUKUS can compete effectively on a global stage.</p>
<p><strong>James Tennant, Partner – Head of JAPAC, BOKA Capital</strong></p>
<p>James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.</p>
<p>His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.</p>
<p>James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.</p>
<p>James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with James Tennant, Partner and Head of JAPAC at Boka Capital, as he discusses why AUKUS needs sovereign capital to successfully deliver on its strategic ambitions. James explores the disparity between the headline-grabbing investments of AUKUS Pillar 1 and the overlooked capital shortfalls of Pillar 2, emphasizing the urgent need to build a unified capital architecture across Australia, the UK, and the US. He highlights the challenges faced by defense technology startups, such as the “valley of death” funding gap and ESG constraints that lock out institutional investment, and draws valuable lessons from international examples like In-Q-Tel and Israel’s Yozma. Throughout the conversation, James argues for a coordinated sovereign capital framework, increased public education about dual-use technologies, and transparent government action to move from strategic announcements to real capital deployment, ensuring AUKUS can compete effectively on a global stage.
James Tennant, Partner – Head of JAPAC, BOKA Capital
James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.
His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.
James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.
James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 357 Deep Dive: James Tennant | Why does AUKUS Need Sovereign Capital?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with James Tennant, Partner and Head of JAPAC at Boka Capital, as he discusses why AUKUS needs sovereign capital to successfully deliver on its strategic ambitions. James explores the disparity between the headline-grabbing investments of AUKUS Pillar 1 and the overlooked capital shortfalls of Pillar 2, emphasizing the urgent need to build a unified capital architecture across Australia, the UK, and the US. He highlights the challenges faced by defense technology startups, such as the “valley of death” funding gap and ESG constraints that lock out institutional investment, and draws valuable lessons from international examples like In-Q-Tel and Israel’s Yozma. Throughout the conversation, James argues for a coordinated sovereign capital framework, increased public education about dual-use technologies, and transparent government action to move from strategic announcements to real capital deployment, ensuring AUKUS can compete effectively on a global stage.</p>
<p><strong>James Tennant, Partner – Head of JAPAC, BOKA Capital</strong></p>
<p>James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.</p>
<p>His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.</p>
<p>James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.</p>
<p>James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2381226/c1e-kdkxsd4gz6c941jo-kpj83ddrad9n-zyhi4e.mp3" length="38683001"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with James Tennant, Partner and Head of JAPAC at Boka Capital, as he discusses why AUKUS needs sovereign capital to successfully deliver on its strategic ambitions. James explores the disparity between the headline-grabbing investments of AUKUS Pillar 1 and the overlooked capital shortfalls of Pillar 2, emphasizing the urgent need to build a unified capital architecture across Australia, the UK, and the US. He highlights the challenges faced by defense technology startups, such as the “valley of death” funding gap and ESG constraints that lock out institutional investment, and draws valuable lessons from international examples like In-Q-Tel and Israel’s Yozma. Throughout the conversation, James argues for a coordinated sovereign capital framework, increased public education about dual-use technologies, and transparent government action to move from strategic announcements to real capital deployment, ensuring AUKUS can compete effectively on a global stage.
James Tennant, Partner – Head of JAPAC, BOKA Capital
James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.
His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.
James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.
James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2381226/c1a-5k0v-47ow0vggh24z-t9ymra.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 356 Deep Dive: Simon Hodgkinson | The Burnout Crisis in the Cybersecurity Community]]>
                </title>
                <pubDate>Wed, 25 Feb 2026 05:00:24 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2373197</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-356-deep-dive-simon-hodgkinson-the-burnout-crisis-in-the-cybersecurity-community</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Strategic Advisor at Semperis, as he shares his personal experience with burnout during his tenure as CISO at BP. Simon provides a candid look into the immense pressures and responsibilities of overseeing cybersecurity across a massive, global organisation, highlighting the challenges of balancing work with personal well-being and family life. He discusses the emotional toll of always being “on,” the importance of transparent communication about risks, and the necessity of setting clear boundaries—what he calls “red lines”—to safeguard health and relationships. Simon also reflects on the industry-wide burnout crisis, the tendency for CISOs to prioritize work over their own needs, and the critical role of organisational support and personal maturity in sustaining a long career in cybersecurity leadership.</p>
<p>Simon Hodgkinson is a Strategic Advisor at cybersecurity firm Semperis, and a former Chief Information Security Officer at multinational energy company BP. In his 18 year tenure at BP, Simon held several senior IT leadership roles and was responsible for the company’s cybersecurity strategy, governance, architecture, education, counter threat operations, and incident response.  </p>
<p>During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in BP Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the BP group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Strategic Advisor at Semperis, as he shares his personal experience with burnout during his tenure as CISO at BP. Simon provides a candid look into the immense pressures and responsibilities of overseeing cybersecurity across a massive, global organisation, highlighting the challenges of balancing work with personal well-being and family life. He discusses the emotional toll of always being “on,” the importance of transparent communication about risks, and the necessity of setting clear boundaries—what he calls “red lines”—to safeguard health and relationships. Simon also reflects on the industry-wide burnout crisis, the tendency for CISOs to prioritize work over their own needs, and the critical role of organisational support and personal maturity in sustaining a long career in cybersecurity leadership.
Simon Hodgkinson is a Strategic Advisor at cybersecurity firm Semperis, and a former Chief Information Security Officer at multinational energy company BP. In his 18 year tenure at BP, Simon held several senior IT leadership roles and was responsible for the company’s cybersecurity strategy, governance, architecture, education, counter threat operations, and incident response.  
During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in BP Supply & Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the BP group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 356 Deep Dive: Simon Hodgkinson | The Burnout Crisis in the Cybersecurity Community]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Strategic Advisor at Semperis, as he shares his personal experience with burnout during his tenure as CISO at BP. Simon provides a candid look into the immense pressures and responsibilities of overseeing cybersecurity across a massive, global organisation, highlighting the challenges of balancing work with personal well-being and family life. He discusses the emotional toll of always being “on,” the importance of transparent communication about risks, and the necessity of setting clear boundaries—what he calls “red lines”—to safeguard health and relationships. Simon also reflects on the industry-wide burnout crisis, the tendency for CISOs to prioritize work over their own needs, and the critical role of organisational support and personal maturity in sustaining a long career in cybersecurity leadership.</p>
<p>Simon Hodgkinson is a Strategic Advisor at cybersecurity firm Semperis, and a former Chief Information Security Officer at multinational energy company BP. In his 18 year tenure at BP, Simon held several senior IT leadership roles and was responsible for the company’s cybersecurity strategy, governance, architecture, education, counter threat operations, and incident response.  </p>
<p>During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in BP Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the BP group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2373197/c1e-5k0vb7g3gms0xmvo-okpdg1qnij0z-n3sozh.mp3" length="40246168"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Strategic Advisor at Semperis, as he shares his personal experience with burnout during his tenure as CISO at BP. Simon provides a candid look into the immense pressures and responsibilities of overseeing cybersecurity across a massive, global organisation, highlighting the challenges of balancing work with personal well-being and family life. He discusses the emotional toll of always being “on,” the importance of transparent communication about risks, and the necessity of setting clear boundaries—what he calls “red lines”—to safeguard health and relationships. Simon also reflects on the industry-wide burnout crisis, the tendency for CISOs to prioritize work over their own needs, and the critical role of organisational support and personal maturity in sustaining a long career in cybersecurity leadership.
Simon Hodgkinson is a Strategic Advisor at cybersecurity firm Semperis, and a former Chief Information Security Officer at multinational energy company BP. In his 18 year tenure at BP, Simon held several senior IT leadership roles and was responsible for the company’s cybersecurity strategy, governance, architecture, education, counter threat operations, and incident response.  
During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in BP Supply & Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the BP group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2373197/c1a-5k0v-7zrw7729bgww-umhhim.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 355 Deep Dive: Sam Cummings | Will we see current LLM technology reach it's limits in 2026?]]>
                </title>
                <pubDate>Wed, 18 Feb 2026 05:00:36 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2365567</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-355-deep-dive-sam-cummings-will-we-see-current-llm-technology-reach-its-limits-in-2026</link>
                                <description>
                                            <![CDATA[<p>Samuel J. Cummings III is an award-winning data scientist, keynote speaker, and renowned thought leader in AI, specializing in complex reasoning and memory architecture. In his recent work he has created AI model architecture that runs 94% less tokens than standard LLMs. As Director of Education at Gen AI Works, Sam brings over a decade of expertise in AI and runs a podcast called Gen AI Talks.</p>
<p>In this episode, we sit down with Sam Cummings, Director of Education at Gen AI Works, as he explores the current and future landscape of large language models (LLMs) and their impact on cybersecurity. Sam unpacks the technical and economic limitations of LLMs, highlighting issues such as model cost, scalability, hallucination, and the looming challenges around reasoning and memory management. The conversation delves into the shift from universal LLMs to specialized models, the inevitability of market monopolization by big tech firms, and the environmental cost of massive data centers. Sam also paints a vivid picture of the “arms race” in the cybersecurity sector, predicting a boom in both offensive and defensive capabilities powered by AI, and offers actionable insights for professionals and entrepreneurs looking to thrive in this rapidly-evolving environment.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Samuel J. Cummings III is an award-winning data scientist, keynote speaker, and renowned thought leader in AI, specializing in complex reasoning and memory architecture. In his recent work he has created AI model architecture that runs 94% less tokens than standard LLMs. As Director of Education at Gen AI Works, Sam brings over a decade of expertise in AI and runs a podcast called Gen AI Talks.
In this episode, we sit down with Sam Cummings, Director of Education at Gen AI Works, as he explores the current and future landscape of large language models (LLMs) and their impact on cybersecurity. Sam unpacks the technical and economic limitations of LLMs, highlighting issues such as model cost, scalability, hallucination, and the looming challenges around reasoning and memory management. The conversation delves into the shift from universal LLMs to specialized models, the inevitability of market monopolization by big tech firms, and the environmental cost of massive data centers. Sam also paints a vivid picture of the “arms race” in the cybersecurity sector, predicting a boom in both offensive and defensive capabilities powered by AI, and offers actionable insights for professionals and entrepreneurs looking to thrive in this rapidly-evolving environment.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 355 Deep Dive: Sam Cummings | Will we see current LLM technology reach it's limits in 2026?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Samuel J. Cummings III is an award-winning data scientist, keynote speaker, and renowned thought leader in AI, specializing in complex reasoning and memory architecture. In his recent work he has created AI model architecture that runs 94% less tokens than standard LLMs. As Director of Education at Gen AI Works, Sam brings over a decade of expertise in AI and runs a podcast called Gen AI Talks.</p>
<p>In this episode, we sit down with Sam Cummings, Director of Education at Gen AI Works, as he explores the current and future landscape of large language models (LLMs) and their impact on cybersecurity. Sam unpacks the technical and economic limitations of LLMs, highlighting issues such as model cost, scalability, hallucination, and the looming challenges around reasoning and memory management. The conversation delves into the shift from universal LLMs to specialized models, the inevitability of market monopolization by big tech firms, and the environmental cost of massive data centers. Sam also paints a vivid picture of the “arms race” in the cybersecurity sector, predicting a boom in both offensive and defensive capabilities powered by AI, and offers actionable insights for professionals and entrepreneurs looking to thrive in this rapidly-evolving environment.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2365567/c1e-vzj8a5rno5awz1vk-6z9npj72aogq-a2g6sm.mp3" length="50796294"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Samuel J. Cummings III is an award-winning data scientist, keynote speaker, and renowned thought leader in AI, specializing in complex reasoning and memory architecture. In his recent work he has created AI model architecture that runs 94% less tokens than standard LLMs. As Director of Education at Gen AI Works, Sam brings over a decade of expertise in AI and runs a podcast called Gen AI Talks.
In this episode, we sit down with Sam Cummings, Director of Education at Gen AI Works, as he explores the current and future landscape of large language models (LLMs) and their impact on cybersecurity. Sam unpacks the technical and economic limitations of LLMs, highlighting issues such as model cost, scalability, hallucination, and the looming challenges around reasoning and memory management. The conversation delves into the shift from universal LLMs to specialized models, the inevitability of market monopolization by big tech firms, and the environmental cost of massive data centers. Sam also paints a vivid picture of the “arms race” in the cybersecurity sector, predicting a boom in both offensive and defensive capabilities powered by AI, and offers actionable insights for professionals and entrepreneurs looking to thrive in this rapidly-evolving environment.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2365567/c1a-5k0v-qd10n67dcdwx-em8onh.jpg"></itunes:image>
                                                                            <itunes:duration>00:52:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 354 Deep Dive: Lili Infante | The Growing Prevalence of Crime in the Crypto Space]]>
                </title>
                <pubDate>Wed, 11 Feb 2026 05:00:52 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2354536</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-354-deep-dive-lili-infante-the-growing-prevalence-of-crime-in-the-crypto-space</link>
                                <description>
                                            <![CDATA[In this episode, we sit down with Lili Infante, CEO of CAT Labs, as she discusses the evolving landscape of crime in the crypto space and her work combating crypto-enabled criminal activity. Lili, drawing from her experience as a former DOJ and DEA agent who pioneered the DEA Cyber Investigations Task Force, explains the rise of crypto as both a tool for criminals and a unique opportunity for law enforcement due to its traceability. She highlights the challenges surrounding self-custody private keys, the increased risks and opportunities for asset seizure, and the emerging insider threat within law enforcement agencies handling crypto evidence. Lili also shares her perspective on regulatory debates between banks and crypto exchanges, the necessity for policy grounded in technological understanding, and the innovations CAT Labs is bringing to government agencies, including tools for key management, data scanning, and digital asset recovery.

Lili Infante is the CEO and Founder of CAT Labs, a technology company helping government agencies find, seize and secure illicit cryptocurrency assets hidden in their seized evidence.
<p>As a former DEA Special Agent, she pioneered the first federal task force focused on Dark Web and crypto investigations, leading landmark cases including the takedown of Hydra Market, the world’s largest dark-web marketplace. Her work has earned national awards for cybercrime investigation and helped establish the investigative and policy frameworks now used by law-enforcement agencies worldwide.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Lili Infante, CEO of CAT Labs, as she discusses the evolving landscape of crime in the crypto space and her work combating crypto-enabled criminal activity. Lili, drawing from her experience as a former DOJ and DEA agent who pioneered the DEA Cyber Investigations Task Force, explains the rise of crypto as both a tool for criminals and a unique opportunity for law enforcement due to its traceability. She highlights the challenges surrounding self-custody private keys, the increased risks and opportunities for asset seizure, and the emerging insider threat within law enforcement agencies handling crypto evidence. Lili also shares her perspective on regulatory debates between banks and crypto exchanges, the necessity for policy grounded in technological understanding, and the innovations CAT Labs is bringing to government agencies, including tools for key management, data scanning, and digital asset recovery.

Lili Infante is the CEO and Founder of CAT Labs, a technology company helping government agencies find, seize and secure illicit cryptocurrency assets hidden in their seized evidence.
As a former DEA Special Agent, she pioneered the first federal task force focused on Dark Web and crypto investigations, leading landmark cases including the takedown of Hydra Market, the world’s largest dark-web marketplace. Her work has earned national awards for cybercrime investigation and helped establish the investigative and policy frameworks now used by law-enforcement agencies worldwide.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 354 Deep Dive: Lili Infante | The Growing Prevalence of Crime in the Crypto Space]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[In this episode, we sit down with Lili Infante, CEO of CAT Labs, as she discusses the evolving landscape of crime in the crypto space and her work combating crypto-enabled criminal activity. Lili, drawing from her experience as a former DOJ and DEA agent who pioneered the DEA Cyber Investigations Task Force, explains the rise of crypto as both a tool for criminals and a unique opportunity for law enforcement due to its traceability. She highlights the challenges surrounding self-custody private keys, the increased risks and opportunities for asset seizure, and the emerging insider threat within law enforcement agencies handling crypto evidence. Lili also shares her perspective on regulatory debates between banks and crypto exchanges, the necessity for policy grounded in technological understanding, and the innovations CAT Labs is bringing to government agencies, including tools for key management, data scanning, and digital asset recovery.

Lili Infante is the CEO and Founder of CAT Labs, a technology company helping government agencies find, seize and secure illicit cryptocurrency assets hidden in their seized evidence.
<p>As a former DEA Special Agent, she pioneered the first federal task force focused on Dark Web and crypto investigations, leading landmark cases including the takedown of Hydra Market, the world’s largest dark-web marketplace. Her work has earned national awards for cybercrime investigation and helped establish the investigative and policy frameworks now used by law-enforcement agencies worldwide.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2354536/c1e-5k0vb7z7q3a0xmvo-5z3z110wcmk9-s4llry.mp3" length="44063390"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Lili Infante, CEO of CAT Labs, as she discusses the evolving landscape of crime in the crypto space and her work combating crypto-enabled criminal activity. Lili, drawing from her experience as a former DOJ and DEA agent who pioneered the DEA Cyber Investigations Task Force, explains the rise of crypto as both a tool for criminals and a unique opportunity for law enforcement due to its traceability. She highlights the challenges surrounding self-custody private keys, the increased risks and opportunities for asset seizure, and the emerging insider threat within law enforcement agencies handling crypto evidence. Lili also shares her perspective on regulatory debates between banks and crypto exchanges, the necessity for policy grounded in technological understanding, and the innovations CAT Labs is bringing to government agencies, including tools for key management, data scanning, and digital asset recovery.

Lili Infante is the CEO and Founder of CAT Labs, a technology company helping government agencies find, seize and secure illicit cryptocurrency assets hidden in their seized evidence.
As a former DEA Special Agent, she pioneered the first federal task force focused on Dark Web and crypto investigations, leading landmark cases including the takedown of Hydra Market, the world’s largest dark-web marketplace. Her work has earned national awards for cybercrime investigation and helped establish the investigative and policy frameworks now used by law-enforcement agencies worldwide.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2354536/c1a-5k0v-mkgkwzgdf79n-cemmc6.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 353 Deep Dive: River Nygryn | Trust, Test, Transform: Executive Playbook for AI Leadership]]>
                </title>
                <pubDate>Wed, 04 Feb 2026 05:00:25 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2347036</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-353-deep-dive-river-nygryn-trust-test-transform-executive-playbook-for-ai-leadership</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with River Nygryn, CISO and AI thought leader, as she explores the critical concepts outlined in the executive playbook for AI leadership: Trust, Test, and Transform. River provides a comprehensive overview of AI’s evolution—from its historical roots in early automated machines and neural networks to the development of large language models (LLMs) and generative assistants. She emphasizes the importance of “trust but verify” in deploying AI, warning against overreliance and the risk of diminishing critical thinking skills. River introduces the 4Ds—dull, dangerous, difficult, and dirty work—where AI delivers the greatest value, and cautions about the loss of creativity and authenticity with widespread use of AI-generated content. She encourages organizations to leverage their unique data sets, underscoring that human judgment and oversight are essential for harnessing AI’s transformative opportunities.</p>
<p><strong>River</strong> is a visionary cybersecurity and technology leader with a dynamic career spanning traditional banking, cutting-edge blockchain innovation, and Web3 transformation. As a Chief Information Security Officer (CISO) and fractional C-suite executive, River has driven security and operational excellence across highly regulated industries, including healthcare, financial services, and emerging tech.</p>
<p>Renowned for bridging the gap between strategic leadership and hands-on execution, River has played a pivotal role in modernising risk and security frameworks, scaling secure systems, and advising on crypto, digital asset infrastructure, and decentralized technologies. Her influence extends beyond the boardroom – she is a powerful voice in the tech community, advocating for digital trust, innovation, and ethical leadership in the AI era.</p>
<p>In 2025, River was named one of <em>The CEO Magazine’s</em> <strong>Top 50 Women of Influence</strong>, recognised not only for her technical expertise but for her commitment to shaping a more secure and inclusive digital future. She is a sought-after speaker, frequently appearing on stage at leading conferences, panels, and keynotes to share insights on cybersecurity resilience, leadership, and the evolving Web3 landscape.</p>
<p>With a storytelling style that blends bold insights with deep reflection, River continues to inspire the next generation of cyber leaders and disruptors.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with River Nygryn, CISO and AI thought leader, as she explores the critical concepts outlined in the executive playbook for AI leadership: Trust, Test, and Transform. River provides a comprehensive overview of AI’s evolution—from its historical roots in early automated machines and neural networks to the development of large language models (LLMs) and generative assistants. She emphasizes the importance of “trust but verify” in deploying AI, warning against overreliance and the risk of diminishing critical thinking skills. River introduces the 4Ds—dull, dangerous, difficult, and dirty work—where AI delivers the greatest value, and cautions about the loss of creativity and authenticity with widespread use of AI-generated content. She encourages organizations to leverage their unique data sets, underscoring that human judgment and oversight are essential for harnessing AI’s transformative opportunities.
River is a visionary cybersecurity and technology leader with a dynamic career spanning traditional banking, cutting-edge blockchain innovation, and Web3 transformation. As a Chief Information Security Officer (CISO) and fractional C-suite executive, River has driven security and operational excellence across highly regulated industries, including healthcare, financial services, and emerging tech.
Renowned for bridging the gap between strategic leadership and hands-on execution, River has played a pivotal role in modernising risk and security frameworks, scaling secure systems, and advising on crypto, digital asset infrastructure, and decentralized technologies. Her influence extends beyond the boardroom – she is a powerful voice in the tech community, advocating for digital trust, innovation, and ethical leadership in the AI era.
In 2025, River was named one of The CEO Magazine’s Top 50 Women of Influence, recognised not only for her technical expertise but for her commitment to shaping a more secure and inclusive digital future. She is a sought-after speaker, frequently appearing on stage at leading conferences, panels, and keynotes to share insights on cybersecurity resilience, leadership, and the evolving Web3 landscape.
With a storytelling style that blends bold insights with deep reflection, River continues to inspire the next generation of cyber leaders and disruptors.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 353 Deep Dive: River Nygryn | Trust, Test, Transform: Executive Playbook for AI Leadership]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with River Nygryn, CISO and AI thought leader, as she explores the critical concepts outlined in the executive playbook for AI leadership: Trust, Test, and Transform. River provides a comprehensive overview of AI’s evolution—from its historical roots in early automated machines and neural networks to the development of large language models (LLMs) and generative assistants. She emphasizes the importance of “trust but verify” in deploying AI, warning against overreliance and the risk of diminishing critical thinking skills. River introduces the 4Ds—dull, dangerous, difficult, and dirty work—where AI delivers the greatest value, and cautions about the loss of creativity and authenticity with widespread use of AI-generated content. She encourages organizations to leverage their unique data sets, underscoring that human judgment and oversight are essential for harnessing AI’s transformative opportunities.</p>
<p><strong>River</strong> is a visionary cybersecurity and technology leader with a dynamic career spanning traditional banking, cutting-edge blockchain innovation, and Web3 transformation. As a Chief Information Security Officer (CISO) and fractional C-suite executive, River has driven security and operational excellence across highly regulated industries, including healthcare, financial services, and emerging tech.</p>
<p>Renowned for bridging the gap between strategic leadership and hands-on execution, River has played a pivotal role in modernising risk and security frameworks, scaling secure systems, and advising on crypto, digital asset infrastructure, and decentralized technologies. Her influence extends beyond the boardroom – she is a powerful voice in the tech community, advocating for digital trust, innovation, and ethical leadership in the AI era.</p>
<p>In 2025, River was named one of <em>The CEO Magazine’s</em> <strong>Top 50 Women of Influence</strong>, recognised not only for her technical expertise but for her commitment to shaping a more secure and inclusive digital future. She is a sought-after speaker, frequently appearing on stage at leading conferences, panels, and keynotes to share insights on cybersecurity resilience, leadership, and the evolving Web3 landscape.</p>
<p>With a storytelling style that blends bold insights with deep reflection, River continues to inspire the next generation of cyber leaders and disruptors.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2347036/c1e-d5v7aordzkfpd4gq-47o4on48fj6z-eh0wdw.mp3" length="36582756"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with River Nygryn, CISO and AI thought leader, as she explores the critical concepts outlined in the executive playbook for AI leadership: Trust, Test, and Transform. River provides a comprehensive overview of AI’s evolution—from its historical roots in early automated machines and neural networks to the development of large language models (LLMs) and generative assistants. She emphasizes the importance of “trust but verify” in deploying AI, warning against overreliance and the risk of diminishing critical thinking skills. River introduces the 4Ds—dull, dangerous, difficult, and dirty work—where AI delivers the greatest value, and cautions about the loss of creativity and authenticity with widespread use of AI-generated content. She encourages organizations to leverage their unique data sets, underscoring that human judgment and oversight are essential for harnessing AI’s transformative opportunities.
River is a visionary cybersecurity and technology leader with a dynamic career spanning traditional banking, cutting-edge blockchain innovation, and Web3 transformation. As a Chief Information Security Officer (CISO) and fractional C-suite executive, River has driven security and operational excellence across highly regulated industries, including healthcare, financial services, and emerging tech.
Renowned for bridging the gap between strategic leadership and hands-on execution, River has played a pivotal role in modernising risk and security frameworks, scaling secure systems, and advising on crypto, digital asset infrastructure, and decentralized technologies. Her influence extends beyond the boardroom – she is a powerful voice in the tech community, advocating for digital trust, innovation, and ethical leadership in the AI era.
In 2025, River was named one of The CEO Magazine’s Top 50 Women of Influence, recognised not only for her technical expertise but for her commitment to shaping a more secure and inclusive digital future. She is a sought-after speaker, frequently appearing on stage at leading conferences, panels, and keynotes to share insights on cybersecurity resilience, leadership, and the evolving Web3 landscape.
With a storytelling style that blends bold insights with deep reflection, River continues to inspire the next generation of cyber leaders and disruptors.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2347036/c1a-5k0v-z341wnm3ijz6-hpume5.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 352 Deep Dive: Alex Loizou | The Human Impact of a Cyber Incident]]>
                </title>
                <pubDate>Wed, 28 Jan 2026 05:00:53 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2340159</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-352-deep-dive-alex-loizou-the-human-impact-of-a-cyber-incident</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Alex Loizou, Managing Director at Intrinsic Security and former CISO of Medibank, as he shares firsthand insights into the human impact of navigating a major cyber breach. Alex walks us through the initial moments of discovery, the emotional and psychological toll on teams, and the importance of staying calm under pressure. He dives into Medibank’s approach to incident response, including the use of multiple IR partners for comprehensive investigations and the challenges of coordinating large incident teams in real time. The conversation highlights the value of practical, repeated exposure to incident scenarios, the pitfalls of “ambulance chasing” in the security industry, and the vital role of transparent, evidence-based communication during sensitive events. Alex emphasizes lessons learned about organisational preparedness, collaboration across the cybersecurity community, and the importance of building strong relationships with external media and government agencies.</p>
<p>Alex Loizou is a seasoned cybersecurity leader with a proven track record of building and leading high-performing security teams. He has extensive experience as a Chief Information Security Officer (CISO) for major organisations such as Medibank, Flybuys, and Bupa. Notably, he served as the CISO at Medibank during their 2022 cyber incident, where he played a crucial role in leading the response and recovery efforts.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Alex Loizou, Managing Director at Intrinsic Security and former CISO of Medibank, as he shares firsthand insights into the human impact of navigating a major cyber breach. Alex walks us through the initial moments of discovery, the emotional and psychological toll on teams, and the importance of staying calm under pressure. He dives into Medibank’s approach to incident response, including the use of multiple IR partners for comprehensive investigations and the challenges of coordinating large incident teams in real time. The conversation highlights the value of practical, repeated exposure to incident scenarios, the pitfalls of “ambulance chasing” in the security industry, and the vital role of transparent, evidence-based communication during sensitive events. Alex emphasizes lessons learned about organisational preparedness, collaboration across the cybersecurity community, and the importance of building strong relationships with external media and government agencies.
Alex Loizou is a seasoned cybersecurity leader with a proven track record of building and leading high-performing security teams. He has extensive experience as a Chief Information Security Officer (CISO) for major organisations such as Medibank, Flybuys, and Bupa. Notably, he served as the CISO at Medibank during their 2022 cyber incident, where he played a crucial role in leading the response and recovery efforts.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 352 Deep Dive: Alex Loizou | The Human Impact of a Cyber Incident]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Alex Loizou, Managing Director at Intrinsic Security and former CISO of Medibank, as he shares firsthand insights into the human impact of navigating a major cyber breach. Alex walks us through the initial moments of discovery, the emotional and psychological toll on teams, and the importance of staying calm under pressure. He dives into Medibank’s approach to incident response, including the use of multiple IR partners for comprehensive investigations and the challenges of coordinating large incident teams in real time. The conversation highlights the value of practical, repeated exposure to incident scenarios, the pitfalls of “ambulance chasing” in the security industry, and the vital role of transparent, evidence-based communication during sensitive events. Alex emphasizes lessons learned about organisational preparedness, collaboration across the cybersecurity community, and the importance of building strong relationships with external media and government agencies.</p>
<p>Alex Loizou is a seasoned cybersecurity leader with a proven track record of building and leading high-performing security teams. He has extensive experience as a Chief Information Security Officer (CISO) for major organisations such as Medibank, Flybuys, and Bupa. Notably, he served as the CISO at Medibank during their 2022 cyber incident, where he played a crucial role in leading the response and recovery efforts.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2340159/c1e-gkvqbrgm1oh249gq-250mpd5waq5m-oxwom6.mp3" length="40055579"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Alex Loizou, Managing Director at Intrinsic Security and former CISO of Medibank, as he shares firsthand insights into the human impact of navigating a major cyber breach. Alex walks us through the initial moments of discovery, the emotional and psychological toll on teams, and the importance of staying calm under pressure. He dives into Medibank’s approach to incident response, including the use of multiple IR partners for comprehensive investigations and the challenges of coordinating large incident teams in real time. The conversation highlights the value of practical, repeated exposure to incident scenarios, the pitfalls of “ambulance chasing” in the security industry, and the vital role of transparent, evidence-based communication during sensitive events. Alex emphasizes lessons learned about organisational preparedness, collaboration across the cybersecurity community, and the importance of building strong relationships with external media and government agencies.
Alex Loizou is a seasoned cybersecurity leader with a proven track record of building and leading high-performing security teams. He has extensive experience as a Chief Information Security Officer (CISO) for major organisations such as Medibank, Flybuys, and Bupa. Notably, he served as the CISO at Medibank during their 2022 cyber incident, where he played a crucial role in leading the response and recovery efforts.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2340159/c1a-5k0v-47omw6q0i21p-hskhpl.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 351 Deep Dive: Tammy Klotz | Leading with Empathy and Grace]]>
                </title>
                <pubDate>Wed, 21 Jan 2026 05:00:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2331443</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-351-deep-dive-tammy-klotz-leading-with-empathy-and-grace</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Tammy Klotz, cybersecurity and IT executive and author of <em><a href="https://www.amazon.com/Leading-Empathy-Grace-Developing-Performing/dp/1950336573">Leading with Empathy and Grace</a>,</em> as she explores the critical role of intentional empathy in leadership. Tammy unpacks the misconception that empathy and accountability are opposites, arguing they are essential partners for building trust within teams. She discusses the impact of technology on our ability to be present, the importance of transparency during organizational challenges, and the pitfalls of viewing empathy as a “soft skill” in cybersecurity. Tammy also addresses how leaders can be more intentional in their interactions, foster stronger human connections despite remote and hybrid work environments, and why self-care is foundational for personal and professional success.</p>
<p><strong>Tammy Klotz</strong> is a vibrant and accomplished executive and best-selling author with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned in security, risk, and compliance leadership. Tammy brings a dynamic and positive approach to problem solving, excelling in simplifying intricate IT and cybersecurity concepts and facilitating pragmatic, non-technical dialogues that resonate with business executives. She is recognized as a strong, knowledgeable, thoughtful security executive who excels in public speaking and thought leadership, striving to empower others through knowledge sharing.</p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Tammy Klotz, cybersecurity and IT executive and author of Leading with Empathy and Grace, as she explores the critical role of intentional empathy in leadership. Tammy unpacks the misconception that empathy and accountability are opposites, arguing they are essential partners for building trust within teams. She discusses the impact of technology on our ability to be present, the importance of transparency during organizational challenges, and the pitfalls of viewing empathy as a “soft skill” in cybersecurity. Tammy also addresses how leaders can be more intentional in their interactions, foster stronger human connections despite remote and hybrid work environments, and why self-care is foundational for personal and professional success.
Tammy Klotz is a vibrant and accomplished executive and best-selling author with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned in security, risk, and compliance leadership. Tammy brings a dynamic and positive approach to problem solving, excelling in simplifying intricate IT and cybersecurity concepts and facilitating pragmatic, non-technical dialogues that resonate with business executives. She is recognized as a strong, knowledgeable, thoughtful security executive who excels in public speaking and thought leadership, striving to empower others through knowledge sharing.
 ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 351 Deep Dive: Tammy Klotz | Leading with Empathy and Grace]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Tammy Klotz, cybersecurity and IT executive and author of <em><a href="https://www.amazon.com/Leading-Empathy-Grace-Developing-Performing/dp/1950336573">Leading with Empathy and Grace</a>,</em> as she explores the critical role of intentional empathy in leadership. Tammy unpacks the misconception that empathy and accountability are opposites, arguing they are essential partners for building trust within teams. She discusses the impact of technology on our ability to be present, the importance of transparency during organizational challenges, and the pitfalls of viewing empathy as a “soft skill” in cybersecurity. Tammy also addresses how leaders can be more intentional in their interactions, foster stronger human connections despite remote and hybrid work environments, and why self-care is foundational for personal and professional success.</p>
<p><strong>Tammy Klotz</strong> is a vibrant and accomplished executive and best-selling author with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned in security, risk, and compliance leadership. Tammy brings a dynamic and positive approach to problem solving, excelling in simplifying intricate IT and cybersecurity concepts and facilitating pragmatic, non-technical dialogues that resonate with business executives. She is recognized as a strong, knowledgeable, thoughtful security executive who excels in public speaking and thought leadership, striving to empower others through knowledge sharing.</p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2331443/c1e-3g92cwr66qskq027-rk247dooamww-hao3aj.mp3" length="40599762"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Tammy Klotz, cybersecurity and IT executive and author of Leading with Empathy and Grace, as she explores the critical role of intentional empathy in leadership. Tammy unpacks the misconception that empathy and accountability are opposites, arguing they are essential partners for building trust within teams. She discusses the impact of technology on our ability to be present, the importance of transparency during organizational challenges, and the pitfalls of viewing empathy as a “soft skill” in cybersecurity. Tammy also addresses how leaders can be more intentional in their interactions, foster stronger human connections despite remote and hybrid work environments, and why self-care is foundational for personal and professional success.
Tammy Klotz is a vibrant and accomplished executive and best-selling author with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned in security, risk, and compliance leadership. Tammy brings a dynamic and positive approach to problem solving, excelling in simplifying intricate IT and cybersecurity concepts and facilitating pragmatic, non-technical dialogues that resonate with business executives. She is recognized as a strong, knowledgeable, thoughtful security executive who excels in public speaking and thought leadership, striving to empower others through knowledge sharing.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2331443/c1a-5k0v-rk247djgtvqj-xxtksh.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 350 Deep Dive: George Barnes | Journey from the NSA to the Private Sector]]>
                </title>
                <pubDate>Wed, 14 Jan 2026 04:58:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2322516</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-350-deep-dive-george-barnes-journey-from-the-nsa-to-the-private-sector</link>
                                <description>
                                            <![CDATA[<p>Mr. George C. Barnes is the President of Red Cell Partner’s Cyber Practice and a Partner at the firm. In this role, he oversees the pursuit of new-start incubations that are focused on cybersecurity opportunities spanning commercial and government sectors. He ensures optimized market gap responsiveness of new incubations and guides Red Cell’s platform team support as young cybersecurity companies progress through their early-stage business life cycles. As a Red Cell Partner, Mr. Barnes applies his national security and cybersecurity domain expertise to Red Cell’s incubation activities and oversees the company’s overall cyber-related investment strategy.</p>
<p>Prior to joining Red Cell, Mr. Barnes served as the Deputy Director and senior civilian leader of the U.S. National Security Agency (NSA) from April 2017 through September 2023. In this role, Mr. Barnes served as NSA’s chief operating officer, overseeing strategy, policy, and operations.  As an agency deputy in the U.S. national security system, Mr. Barnes supported the U.S. defense and intelligence enterprise in national security strategy execution and the formulation of supporting policies.  He positioned NSA as an integrated mission partner enabling U.S. decision advantage and security against foreign threats.</p>
<p>Over his 36-year career at the NSA, Mr. Barnes held numerous technical and organizational leadership roles spanning intelligence collection operations, intelligence target analysis, foreign liaison and industrial partnership management, workforce support, and global enterprise governance.</p>
<p>U.S. Government Service Recognition Includes:</p>
<p>Department of Defense Distinguished Civilian Service Medal</p>
<p>Joint Chiefs of Staff Joint Meritorious Civilian Service Medal</p>
<p>National Intelligence Distinguished Service Medal</p>
<p>Under Secretary of Defense for Intelligence &amp; Security Distinguished Service Medallion</p>
<p>National Security Agency Distinguished Civilian Service Medal</p>
<p>Central Intelligence Agency Seal Medal</p>
<p>National Reconnaissance Office Medal of Distinguished Performance</p>
<p>National Geospatial Intelligence Agency Medallion for Excellence</p>
<p>National Intelligence Medal of Achievement</p>
<p>Distinguished Executive Presidential Rank Award</p>
<p>Meritorious Executive Presidential Rank Awards (2)</p>
<p>Mr. Barnes received a Bachelor of Science in Electrical Engineering from the University of Maryland in 1986. In 2020, he was honored as a Distinguished Alumni by the University of Maryland’s College of Electrical and Computer Engineering.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mr. George C. Barnes is the President of Red Cell Partner’s Cyber Practice and a Partner at the firm. In this role, he oversees the pursuit of new-start incubations that are focused on cybersecurity opportunities spanning commercial and government sectors. He ensures optimized market gap responsiveness of new incubations and guides Red Cell’s platform team support as young cybersecurity companies progress through their early-stage business life cycles. As a Red Cell Partner, Mr. Barnes applies his national security and cybersecurity domain expertise to Red Cell’s incubation activities and oversees the company’s overall cyber-related investment strategy.
Prior to joining Red Cell, Mr. Barnes served as the Deputy Director and senior civilian leader of the U.S. National Security Agency (NSA) from April 2017 through September 2023. In this role, Mr. Barnes served as NSA’s chief operating officer, overseeing strategy, policy, and operations.  As an agency deputy in the U.S. national security system, Mr. Barnes supported the U.S. defense and intelligence enterprise in national security strategy execution and the formulation of supporting policies.  He positioned NSA as an integrated mission partner enabling U.S. decision advantage and security against foreign threats.
Over his 36-year career at the NSA, Mr. Barnes held numerous technical and organizational leadership roles spanning intelligence collection operations, intelligence target analysis, foreign liaison and industrial partnership management, workforce support, and global enterprise governance.
U.S. Government Service Recognition Includes:
Department of Defense Distinguished Civilian Service Medal
Joint Chiefs of Staff Joint Meritorious Civilian Service Medal
National Intelligence Distinguished Service Medal
Under Secretary of Defense for Intelligence & Security Distinguished Service Medallion
National Security Agency Distinguished Civilian Service Medal
Central Intelligence Agency Seal Medal
National Reconnaissance Office Medal of Distinguished Performance
National Geospatial Intelligence Agency Medallion for Excellence
National Intelligence Medal of Achievement
Distinguished Executive Presidential Rank Award
Meritorious Executive Presidential Rank Awards (2)
Mr. Barnes received a Bachelor of Science in Electrical Engineering from the University of Maryland in 1986. In 2020, he was honored as a Distinguished Alumni by the University of Maryland’s College of Electrical and Computer Engineering.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 350 Deep Dive: George Barnes | Journey from the NSA to the Private Sector]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mr. George C. Barnes is the President of Red Cell Partner’s Cyber Practice and a Partner at the firm. In this role, he oversees the pursuit of new-start incubations that are focused on cybersecurity opportunities spanning commercial and government sectors. He ensures optimized market gap responsiveness of new incubations and guides Red Cell’s platform team support as young cybersecurity companies progress through their early-stage business life cycles. As a Red Cell Partner, Mr. Barnes applies his national security and cybersecurity domain expertise to Red Cell’s incubation activities and oversees the company’s overall cyber-related investment strategy.</p>
<p>Prior to joining Red Cell, Mr. Barnes served as the Deputy Director and senior civilian leader of the U.S. National Security Agency (NSA) from April 2017 through September 2023. In this role, Mr. Barnes served as NSA’s chief operating officer, overseeing strategy, policy, and operations.  As an agency deputy in the U.S. national security system, Mr. Barnes supported the U.S. defense and intelligence enterprise in national security strategy execution and the formulation of supporting policies.  He positioned NSA as an integrated mission partner enabling U.S. decision advantage and security against foreign threats.</p>
<p>Over his 36-year career at the NSA, Mr. Barnes held numerous technical and organizational leadership roles spanning intelligence collection operations, intelligence target analysis, foreign liaison and industrial partnership management, workforce support, and global enterprise governance.</p>
<p>U.S. Government Service Recognition Includes:</p>
<p>Department of Defense Distinguished Civilian Service Medal</p>
<p>Joint Chiefs of Staff Joint Meritorious Civilian Service Medal</p>
<p>National Intelligence Distinguished Service Medal</p>
<p>Under Secretary of Defense for Intelligence &amp; Security Distinguished Service Medallion</p>
<p>National Security Agency Distinguished Civilian Service Medal</p>
<p>Central Intelligence Agency Seal Medal</p>
<p>National Reconnaissance Office Medal of Distinguished Performance</p>
<p>National Geospatial Intelligence Agency Medallion for Excellence</p>
<p>National Intelligence Medal of Achievement</p>
<p>Distinguished Executive Presidential Rank Award</p>
<p>Meritorious Executive Presidential Rank Awards (2)</p>
<p>Mr. Barnes received a Bachelor of Science in Electrical Engineering from the University of Maryland in 1986. In 2020, he was honored as a Distinguished Alumni by the University of Maryland’s College of Electrical and Computer Engineering.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2322516/c1e-89g7fv77qnf1d8wj-jpqj0vx8sr79-6syihw.mp3" length="38522505"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mr. George C. Barnes is the President of Red Cell Partner’s Cyber Practice and a Partner at the firm. In this role, he oversees the pursuit of new-start incubations that are focused on cybersecurity opportunities spanning commercial and government sectors. He ensures optimized market gap responsiveness of new incubations and guides Red Cell’s platform team support as young cybersecurity companies progress through their early-stage business life cycles. As a Red Cell Partner, Mr. Barnes applies his national security and cybersecurity domain expertise to Red Cell’s incubation activities and oversees the company’s overall cyber-related investment strategy.
Prior to joining Red Cell, Mr. Barnes served as the Deputy Director and senior civilian leader of the U.S. National Security Agency (NSA) from April 2017 through September 2023. In this role, Mr. Barnes served as NSA’s chief operating officer, overseeing strategy, policy, and operations.  As an agency deputy in the U.S. national security system, Mr. Barnes supported the U.S. defense and intelligence enterprise in national security strategy execution and the formulation of supporting policies.  He positioned NSA as an integrated mission partner enabling U.S. decision advantage and security against foreign threats.
Over his 36-year career at the NSA, Mr. Barnes held numerous technical and organizational leadership roles spanning intelligence collection operations, intelligence target analysis, foreign liaison and industrial partnership management, workforce support, and global enterprise governance.
U.S. Government Service Recognition Includes:
Department of Defense Distinguished Civilian Service Medal
Joint Chiefs of Staff Joint Meritorious Civilian Service Medal
National Intelligence Distinguished Service Medal
Under Secretary of Defense for Intelligence & Security Distinguished Service Medallion
National Security Agency Distinguished Civilian Service Medal
Central Intelligence Agency Seal Medal
National Reconnaissance Office Medal of Distinguished Performance
National Geospatial Intelligence Agency Medallion for Excellence
National Intelligence Medal of Achievement
Distinguished Executive Presidential Rank Award
Meritorious Executive Presidential Rank Awards (2)
Mr. Barnes received a Bachelor of Science in Electrical Engineering from the University of Maryland in 1986. In 2020, he was honored as a Distinguished Alumni by the University of Maryland’s College of Electrical and Computer Engineering.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2322516/c1a-5k0v-mkg18rjna9v-kfndab.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From 2020Partners 2025 – KB On The Go | Paul Maddison and Jeff Lindholm (Part 2)]]>
                </title>
                <pubDate>Fri, 09 Jan 2026 05:00:23 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2318140</guid>
                                    <link>https://kbkast.castos.com/episodes/from-2020partners-2025-kb-on-the-go-paul-maddison-and-jeff-lindholm-part-2</link>
                                <description>
                                            <![CDATA[<p>The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Paul Maddison (Australia &amp;New Zealand Country Manager, Strider Technologies) and Jeff Lindholm (Chief Revenue Officer at Lookout).</p>
<p><strong>Paul Maddison, Australia &amp; New Zealand Country Manager, Strider Technologies</strong></p>
<p>Paul Maddison is the Australia &amp; New Zealand Country Manager at Strider Technologies, where he is responsible for leading Strider’s market expansion and strategic partnerships with Australian universities, corporations, and governments.</p>
<p>Prior to joining Strider, Paul worked at the University of New South Wales in Sydney and Canberra as Director of the UNSW Defence Research Institute. This was preceded by a four-year appointment as  Canada’s High Commissioner for Australia. Paul also spent over 35 years in Canadian naval service. As a surface warfare officer, he commanded at all levels culminating in his appointment as Commander of the Royal Canadian Navy at the rank of Vice
Admiral. A graduate of Canada’s Royal Military College, and a dual national since 2020, Paul is from Canada but has chosen to make Australia his home.</p>
<p><strong>Jeff Lindholm, Chief Revenue Officer at Lookout</strong></p>
<p>As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Paul Maddison (Australia &New Zealand Country Manager, Strider Technologies) and Jeff Lindholm (Chief Revenue Officer at Lookout).
Paul Maddison, Australia & New Zealand Country Manager, Strider Technologies
Paul Maddison is the Australia & New Zealand Country Manager at Strider Technologies, where he is responsible for leading Strider’s market expansion and strategic partnerships with Australian universities, corporations, and governments.
Prior to joining Strider, Paul worked at the University of New South Wales in Sydney and Canberra as Director of the UNSW Defence Research Institute. This was preceded by a four-year appointment as  Canada’s High Commissioner for Australia. Paul also spent over 35 years in Canadian naval service. As a surface warfare officer, he commanded at all levels culminating in his appointment as Commander of the Royal Canadian Navy at the rank of Vice
Admiral. A graduate of Canada’s Royal Military College, and a dual national since 2020, Paul is from Canada but has chosen to make Australia his home.
Jeff Lindholm, Chief Revenue Officer at Lookout
As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From 2020Partners 2025 – KB On The Go | Paul Maddison and Jeff Lindholm (Part 2)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Paul Maddison (Australia &amp;New Zealand Country Manager, Strider Technologies) and Jeff Lindholm (Chief Revenue Officer at Lookout).</p>
<p><strong>Paul Maddison, Australia &amp; New Zealand Country Manager, Strider Technologies</strong></p>
<p>Paul Maddison is the Australia &amp; New Zealand Country Manager at Strider Technologies, where he is responsible for leading Strider’s market expansion and strategic partnerships with Australian universities, corporations, and governments.</p>
<p>Prior to joining Strider, Paul worked at the University of New South Wales in Sydney and Canberra as Director of the UNSW Defence Research Institute. This was preceded by a four-year appointment as  Canada’s High Commissioner for Australia. Paul also spent over 35 years in Canadian naval service. As a surface warfare officer, he commanded at all levels culminating in his appointment as Commander of the Royal Canadian Navy at the rank of Vice
Admiral. A graduate of Canada’s Royal Military College, and a dual national since 2020, Paul is from Canada but has chosen to make Australia his home.</p>
<p><strong>Jeff Lindholm, Chief Revenue Officer at Lookout</strong></p>
<p>As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2318140/c1e-m1o3cqrp6ztwqk4n-kpj2v5kmbog-mjtga9.mp3" length="41102985"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Paul Maddison (Australia &New Zealand Country Manager, Strider Technologies) and Jeff Lindholm (Chief Revenue Officer at Lookout).
Paul Maddison, Australia & New Zealand Country Manager, Strider Technologies
Paul Maddison is the Australia & New Zealand Country Manager at Strider Technologies, where he is responsible for leading Strider’s market expansion and strategic partnerships with Australian universities, corporations, and governments.
Prior to joining Strider, Paul worked at the University of New South Wales in Sydney and Canberra as Director of the UNSW Defence Research Institute. This was preceded by a four-year appointment as  Canada’s High Commissioner for Australia. Paul also spent over 35 years in Canadian naval service. As a surface warfare officer, he commanded at all levels culminating in his appointment as Commander of the Royal Canadian Navy at the rank of Vice
Admiral. A graduate of Canada’s Royal Military College, and a dual national since 2020, Paul is from Canada but has chosen to make Australia his home.
Jeff Lindholm, Chief Revenue Officer at Lookout
As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2318140/c1a-5k0v-7zr4gvkpc364-egdedc.png"></itunes:image>
                                                                            <itunes:duration>00:42:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From 2020Partners 2025 – KB On The Go | Neha Idnani, James Tennant, and Simon Hodgkinson (Part 1)]]>
                </title>
                <pubDate>Wed, 07 Jan 2026 05:00:21 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2316702</guid>
                                    <link>https://kbkast.castos.com/episodes/from-2020partners-2025-kb-on-the-go-neha-idnani-james-tennant-and-simon-hodgkinson-part-1</link>
                                <description>
                                            <![CDATA[<p>The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Neha Idnani (Regional Vice President – APAC, Eutelsat OneWeb), James Tennant (Partner – Head of JAPAC, BOKA Capital), and Simon Hodgkinson (Strategic Advisor at Semperis).</p>
<p>Neha delves into the significance of operating one of only two global LEO satellite constellations, emphasizing how satellite networks power resilient connectivity, complement terrestrial infrastructure, and enable sovereign national capabilities amid rising geopolitical tensions. James offers a global investment perspective, highlighting how Australia and other key regions are rapidly adapting to strategic defense imperatives, the challenge of nurturing deep-tech startups, and the necessity of scaling defense technology within complex regulatory frameworks. Simon rounds out the discussion with expert insights on cybersecurity, examining the impact of economic uncertainty, increased insider risk during major corporate events and layoffs, and the criticality of robust cyber operations—even as organizations strive to balance resource constraints and work-life demands.</p>
<p><strong>Neha Idnani, </strong><strong>Regional Vice President – APAC, Eutelsat OneWeb</strong></p>
<p>Neha Idnani is an accomplished leader in the Technology, Media, and Telecom (TMT) sector, currently serving as the Regional Vice President for APAC at Eutelsat OneWeb. With over 18 years of experience across the telecom, space, and infrastructure industries, she leads the Asia Pacific and ANZ business for Eutelsat Group, the world’s first multi-orbit satellite connectivity provider. Prior to her current role, she spent over a decade with Bharti Enterprises and Bharti Airtel, notably serving as Vice President and Chief of Staff to the Chairman’s Office. In that capacity, she managed multi-billion dollar fundraising transactions and drove significant global expansion initiatives.</p>
<p>Beyond her corporate leadership, Neha is deeply involved in industry governance and the arts. She serves as a Board Director for OneWeb Communications India, is a Founding Member of the Indian Space Association (ISpA), and acts as a Board Trustee for Improbable, a UK-based non-profit. Academically, she holds an MBA from NMIMS, Mumbai, and a Bachelor’s in Commerce (Honours) from Shri Ram College of Commerce (SRCC), Delhi University. Throughout her career, she has remained a passionate advocate for driving the future of global connectivity through innovation and strategic collaboration.</p>
<p><strong>James Tennant, Partner – Head of JAPAC, BOKA Capital</strong></p>
<p>James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.</p>
<p>His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.</p>
<p>James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.</p>
<p>James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Ap...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Neha Idnani (Regional Vice President – APAC, Eutelsat OneWeb), James Tennant (Partner – Head of JAPAC, BOKA Capital), and Simon Hodgkinson (Strategic Advisor at Semperis).
Neha delves into the significance of operating one of only two global LEO satellite constellations, emphasizing how satellite networks power resilient connectivity, complement terrestrial infrastructure, and enable sovereign national capabilities amid rising geopolitical tensions. James offers a global investment perspective, highlighting how Australia and other key regions are rapidly adapting to strategic defense imperatives, the challenge of nurturing deep-tech startups, and the necessity of scaling defense technology within complex regulatory frameworks. Simon rounds out the discussion with expert insights on cybersecurity, examining the impact of economic uncertainty, increased insider risk during major corporate events and layoffs, and the criticality of robust cyber operations—even as organizations strive to balance resource constraints and work-life demands.
Neha Idnani, Regional Vice President – APAC, Eutelsat OneWeb
Neha Idnani is an accomplished leader in the Technology, Media, and Telecom (TMT) sector, currently serving as the Regional Vice President for APAC at Eutelsat OneWeb. With over 18 years of experience across the telecom, space, and infrastructure industries, she leads the Asia Pacific and ANZ business for Eutelsat Group, the world’s first multi-orbit satellite connectivity provider. Prior to her current role, she spent over a decade with Bharti Enterprises and Bharti Airtel, notably serving as Vice President and Chief of Staff to the Chairman’s Office. In that capacity, she managed multi-billion dollar fundraising transactions and drove significant global expansion initiatives.
Beyond her corporate leadership, Neha is deeply involved in industry governance and the arts. She serves as a Board Director for OneWeb Communications India, is a Founding Member of the Indian Space Association (ISpA), and acts as a Board Trustee for Improbable, a UK-based non-profit. Academically, she holds an MBA from NMIMS, Mumbai, and a Bachelor’s in Commerce (Honours) from Shri Ram College of Commerce (SRCC), Delhi University. Throughout her career, she has remained a passionate advocate for driving the future of global connectivity through innovation and strategic collaboration.
James Tennant, Partner – Head of JAPAC, BOKA Capital
James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.
His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.
James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.
James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Ap...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From 2020Partners 2025 – KB On The Go | Neha Idnani, James Tennant, and Simon Hodgkinson (Part 1)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Neha Idnani (Regional Vice President – APAC, Eutelsat OneWeb), James Tennant (Partner – Head of JAPAC, BOKA Capital), and Simon Hodgkinson (Strategic Advisor at Semperis).</p>
<p>Neha delves into the significance of operating one of only two global LEO satellite constellations, emphasizing how satellite networks power resilient connectivity, complement terrestrial infrastructure, and enable sovereign national capabilities amid rising geopolitical tensions. James offers a global investment perspective, highlighting how Australia and other key regions are rapidly adapting to strategic defense imperatives, the challenge of nurturing deep-tech startups, and the necessity of scaling defense technology within complex regulatory frameworks. Simon rounds out the discussion with expert insights on cybersecurity, examining the impact of economic uncertainty, increased insider risk during major corporate events and layoffs, and the criticality of robust cyber operations—even as organizations strive to balance resource constraints and work-life demands.</p>
<p><strong>Neha Idnani, </strong><strong>Regional Vice President – APAC, Eutelsat OneWeb</strong></p>
<p>Neha Idnani is an accomplished leader in the Technology, Media, and Telecom (TMT) sector, currently serving as the Regional Vice President for APAC at Eutelsat OneWeb. With over 18 years of experience across the telecom, space, and infrastructure industries, she leads the Asia Pacific and ANZ business for Eutelsat Group, the world’s first multi-orbit satellite connectivity provider. Prior to her current role, she spent over a decade with Bharti Enterprises and Bharti Airtel, notably serving as Vice President and Chief of Staff to the Chairman’s Office. In that capacity, she managed multi-billion dollar fundraising transactions and drove significant global expansion initiatives.</p>
<p>Beyond her corporate leadership, Neha is deeply involved in industry governance and the arts. She serves as a Board Director for OneWeb Communications India, is a Founding Member of the Indian Space Association (ISpA), and acts as a Board Trustee for Improbable, a UK-based non-profit. Academically, she holds an MBA from NMIMS, Mumbai, and a Bachelor’s in Commerce (Honours) from Shri Ram College of Commerce (SRCC), Delhi University. Throughout her career, she has remained a passionate advocate for driving the future of global connectivity through innovation and strategic collaboration.</p>
<p><strong>James Tennant, Partner – Head of JAPAC, BOKA Capital</strong></p>
<p>James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.</p>
<p>His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.</p>
<p>James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.</p>
<p>James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.</p>
<p><strong>Simon Hodgkinson, Strategic Advisor, Semperis</strong></p>
<p>Simon is an experienced technology leader who has worked in the software sector, financial services, energy sector and has worked in a financial services startup company.</p>
<p>Simon is currently a Strategic Advisor at cybersecurity firm Semperis, and prior to this, he spent 18 years working for BP in a variety of global roles, the last being CISO. Simon transformed BP’s cyber security with a strategy of embedding security to simplify and accelerate adoption. Simon advised the BP board and has shared his expertise on numerous technology and diversity forums.</p>
<p>Prior to the CISO role, Simon was the VP of Infrastructure and Integration Services where he initiated the programme to move BP to the cloud, significantly improving time to market and user experience. Simon was accountable for a complex technology infrastructure in 80 countries, supporting 75,000 users across 600 offices and included critical national infrastructure.</p>
<p>Simon has led globally diverse teams in excess of 500, an annual budget in excess of $0.5bn and has negotiated and managed significant outsourced contracts. His brand is building highly inclusive, capable and successful technical teams, leading with empathy and performance edge.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2316702/c1e-m1o3cqr7kqiwqk4n-kpj247nzc4rg-xfwhwz.mp3" length="61575879"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Neha Idnani (Regional Vice President – APAC, Eutelsat OneWeb), James Tennant (Partner – Head of JAPAC, BOKA Capital), and Simon Hodgkinson (Strategic Advisor at Semperis).
Neha delves into the significance of operating one of only two global LEO satellite constellations, emphasizing how satellite networks power resilient connectivity, complement terrestrial infrastructure, and enable sovereign national capabilities amid rising geopolitical tensions. James offers a global investment perspective, highlighting how Australia and other key regions are rapidly adapting to strategic defense imperatives, the challenge of nurturing deep-tech startups, and the necessity of scaling defense technology within complex regulatory frameworks. Simon rounds out the discussion with expert insights on cybersecurity, examining the impact of economic uncertainty, increased insider risk during major corporate events and layoffs, and the criticality of robust cyber operations—even as organizations strive to balance resource constraints and work-life demands.
Neha Idnani, Regional Vice President – APAC, Eutelsat OneWeb
Neha Idnani is an accomplished leader in the Technology, Media, and Telecom (TMT) sector, currently serving as the Regional Vice President for APAC at Eutelsat OneWeb. With over 18 years of experience across the telecom, space, and infrastructure industries, she leads the Asia Pacific and ANZ business for Eutelsat Group, the world’s first multi-orbit satellite connectivity provider. Prior to her current role, she spent over a decade with Bharti Enterprises and Bharti Airtel, notably serving as Vice President and Chief of Staff to the Chairman’s Office. In that capacity, she managed multi-billion dollar fundraising transactions and drove significant global expansion initiatives.
Beyond her corporate leadership, Neha is deeply involved in industry governance and the arts. She serves as a Board Director for OneWeb Communications India, is a Founding Member of the Indian Space Association (ISpA), and acts as a Board Trustee for Improbable, a UK-based non-profit. Academically, she holds an MBA from NMIMS, Mumbai, and a Bachelor’s in Commerce (Honours) from Shri Ram College of Commerce (SRCC), Delhi University. Throughout her career, she has remained a passionate advocate for driving the future of global connectivity through innovation and strategic collaboration.
James Tennant, Partner – Head of JAPAC, BOKA Capital
James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.
His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.
James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.
James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Ap...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2316702/c1a-5k0v-ww7zxdkrb09-thtyyh.png"></itunes:image>
                                                                            <itunes:duration>01:04:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 349 Deep Dive: Mike Worth | Why Legal SMBs Overlook Cybersecurity]]>
                </title>
                <pubDate>Fri, 02 Jan 2026 04:59:35 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2310758</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-349-deep-dive-mike-worth-why-legal-smbs-overlook-cybersecurity</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Mike Worth, Founder of Indi-tech Consultancy, as he unpacks the unique cybersecurity challenges facing small and medium-sized legal firms. Mike highlights a major misconception in the industry—treating cybersecurity solely as an IT problem rather than a broader business risk—and explains why investing in the human aspect of cybersecurity is more effective than relying on tools alone. He discusses the billable hours mindset prevalent in professional services, the opportunity cost of security training, and the importance of creating a positive, engaging, and competitive security culture tailored to staff demographics. Mike also shares insights into common pitfalls SMBs face, such as overspending on ineffective security tools, gaps in cyber insurance coverage, and the pitfalls of generic training programs. He closes with actionable advice on building a resilient cybersecurity culture, measuring progress through behaviour-based metrics, and fostering open, honest risk discussions within the organisation.</p>
<p>Mike is a proud Londoner now living in Hampshire, UK. He has worked across various industries covering local and central Government, manufacturing and more recently 11 years of Legal professional services as an IT professional.</p>
<p>Mike’s passion has recently seen him start his own IT consultancy targeting support for SMB’s on Cyber security &amp; virtual IT management.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Mike Worth, Founder of Indi-tech Consultancy, as he unpacks the unique cybersecurity challenges facing small and medium-sized legal firms. Mike highlights a major misconception in the industry—treating cybersecurity solely as an IT problem rather than a broader business risk—and explains why investing in the human aspect of cybersecurity is more effective than relying on tools alone. He discusses the billable hours mindset prevalent in professional services, the opportunity cost of security training, and the importance of creating a positive, engaging, and competitive security culture tailored to staff demographics. Mike also shares insights into common pitfalls SMBs face, such as overspending on ineffective security tools, gaps in cyber insurance coverage, and the pitfalls of generic training programs. He closes with actionable advice on building a resilient cybersecurity culture, measuring progress through behaviour-based metrics, and fostering open, honest risk discussions within the organisation.
Mike is a proud Londoner now living in Hampshire, UK. He has worked across various industries covering local and central Government, manufacturing and more recently 11 years of Legal professional services as an IT professional.
Mike’s passion has recently seen him start his own IT consultancy targeting support for SMB’s on Cyber security & virtual IT management.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 349 Deep Dive: Mike Worth | Why Legal SMBs Overlook Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Mike Worth, Founder of Indi-tech Consultancy, as he unpacks the unique cybersecurity challenges facing small and medium-sized legal firms. Mike highlights a major misconception in the industry—treating cybersecurity solely as an IT problem rather than a broader business risk—and explains why investing in the human aspect of cybersecurity is more effective than relying on tools alone. He discusses the billable hours mindset prevalent in professional services, the opportunity cost of security training, and the importance of creating a positive, engaging, and competitive security culture tailored to staff demographics. Mike also shares insights into common pitfalls SMBs face, such as overspending on ineffective security tools, gaps in cyber insurance coverage, and the pitfalls of generic training programs. He closes with actionable advice on building a resilient cybersecurity culture, measuring progress through behaviour-based metrics, and fostering open, honest risk discussions within the organisation.</p>
<p>Mike is a proud Londoner now living in Hampshire, UK. He has worked across various industries covering local and central Government, manufacturing and more recently 11 years of Legal professional services as an IT professional.</p>
<p>Mike’s passion has recently seen him start his own IT consultancy targeting support for SMB’s on Cyber security &amp; virtual IT management.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2310758/c1e-41r8c1p0o2bopgxk-v6p8kpwoh86r-vdbc0z.mp3" length="34002276"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Mike Worth, Founder of Indi-tech Consultancy, as he unpacks the unique cybersecurity challenges facing small and medium-sized legal firms. Mike highlights a major misconception in the industry—treating cybersecurity solely as an IT problem rather than a broader business risk—and explains why investing in the human aspect of cybersecurity is more effective than relying on tools alone. He discusses the billable hours mindset prevalent in professional services, the opportunity cost of security training, and the importance of creating a positive, engaging, and competitive security culture tailored to staff demographics. Mike also shares insights into common pitfalls SMBs face, such as overspending on ineffective security tools, gaps in cyber insurance coverage, and the pitfalls of generic training programs. He closes with actionable advice on building a resilient cybersecurity culture, measuring progress through behaviour-based metrics, and fostering open, honest risk discussions within the organisation.
Mike is a proud Londoner now living in Hampshire, UK. He has worked across various industries covering local and central Government, manufacturing and more recently 11 years of Legal professional services as an IT professional.
Mike’s passion has recently seen him start his own IT consultancy targeting support for SMB’s on Cyber security & virtual IT management.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2310758/c1a-5k0v-0v7mn99nird5-xhsmiq.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 348 Deep Dive: Alex Tilley | DPRK IT Workers Go Global]]>
                </title>
                <pubDate>Wed, 24 Dec 2025 05:00:25 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2303777</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-348-deep-dive-alex-tilley-dprk-it-workers-go-global</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Alex Tilley, Global Threat Research Coordinator at Okta, as he unpacks the evolving threat landscape posed by North Korean IT workers infiltrating global organizations. Alex shares insights from his recent research, emphasizing that this is not just a US big tech problem but a widespread issue affecting various industries—including healthcare, automotive, and construction—across multiple countries. He highlights the sophistication of fake applicants, their use of advanced techniques to bypass hiring filters, and the alarming success rate, even if only for short periods. The conversation explores the challenges companies face in verifying remote candidates, the necessity for ongoing identification checks, and the implementation of least privilege access for new hires.</p>
<p>Alex Tilley is a Cyber Intelligence and investigation guy with over 25 years of experience spanning the private sector and federal law enforcement. As the Australian Federal Police’s first Senior Cybercrime Senior Technical Analyst, he specialised in unmasking and prosecuting sophisticated threat actors in global cybercrime and child protection. In his current role as Global Threat Research Coordinator at Okta, he leads law enforcement liaison efforts and drives critical threat research for the world’s leading identity company.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Alex Tilley, Global Threat Research Coordinator at Okta, as he unpacks the evolving threat landscape posed by North Korean IT workers infiltrating global organizations. Alex shares insights from his recent research, emphasizing that this is not just a US big tech problem but a widespread issue affecting various industries—including healthcare, automotive, and construction—across multiple countries. He highlights the sophistication of fake applicants, their use of advanced techniques to bypass hiring filters, and the alarming success rate, even if only for short periods. The conversation explores the challenges companies face in verifying remote candidates, the necessity for ongoing identification checks, and the implementation of least privilege access for new hires.
Alex Tilley is a Cyber Intelligence and investigation guy with over 25 years of experience spanning the private sector and federal law enforcement. As the Australian Federal Police’s first Senior Cybercrime Senior Technical Analyst, he specialised in unmasking and prosecuting sophisticated threat actors in global cybercrime and child protection. In his current role as Global Threat Research Coordinator at Okta, he leads law enforcement liaison efforts and drives critical threat research for the world’s leading identity company.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 348 Deep Dive: Alex Tilley | DPRK IT Workers Go Global]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Alex Tilley, Global Threat Research Coordinator at Okta, as he unpacks the evolving threat landscape posed by North Korean IT workers infiltrating global organizations. Alex shares insights from his recent research, emphasizing that this is not just a US big tech problem but a widespread issue affecting various industries—including healthcare, automotive, and construction—across multiple countries. He highlights the sophistication of fake applicants, their use of advanced techniques to bypass hiring filters, and the alarming success rate, even if only for short periods. The conversation explores the challenges companies face in verifying remote candidates, the necessity for ongoing identification checks, and the implementation of least privilege access for new hires.</p>
<p>Alex Tilley is a Cyber Intelligence and investigation guy with over 25 years of experience spanning the private sector and federal law enforcement. As the Australian Federal Police’s first Senior Cybercrime Senior Technical Analyst, he specialised in unmasking and prosecuting sophisticated threat actors in global cybercrime and child protection. In his current role as Global Threat Research Coordinator at Okta, he leads law enforcement liaison efforts and drives critical threat research for the world’s leading identity company.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2303777/c1e-z9w7f70pvofokrwj-xxgqrdzxhqn2-psj5uv.mp3" length="41198279"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Alex Tilley, Global Threat Research Coordinator at Okta, as he unpacks the evolving threat landscape posed by North Korean IT workers infiltrating global organizations. Alex shares insights from his recent research, emphasizing that this is not just a US big tech problem but a widespread issue affecting various industries—including healthcare, automotive, and construction—across multiple countries. He highlights the sophistication of fake applicants, their use of advanced techniques to bypass hiring filters, and the alarming success rate, even if only for short periods. The conversation explores the challenges companies face in verifying remote candidates, the necessity for ongoing identification checks, and the implementation of least privilege access for new hires.
Alex Tilley is a Cyber Intelligence and investigation guy with over 25 years of experience spanning the private sector and federal law enforcement. As the Australian Federal Police’s first Senior Cybercrime Senior Technical Analyst, he specialised in unmasking and prosecuting sophisticated threat actors in global cybercrime and child protection. In his current role as Global Threat Research Coordinator at Okta, he leads law enforcement liaison efforts and drives critical threat research for the world’s leading identity company.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2303777/c1a-5k0v-1p7mzgdju60v-m1hlaz.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 347 Deep Dive: Rajesh Ganesan | AI Anxiety and the Global Cyber Balancing Act]]>
                </title>
                <pubDate>Fri, 19 Dec 2025 05:00:53 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2294149</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-347-deep-dive-rajesh-ganesan-ai-anxiety-and-the-global-cyber-balancing-act</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Rajesh Ganesan, CEO of ManageEngine, as he explores the complexities of AI anxiety within organisations and the global challenges of balancing cybersecurity, privacy, and rapid technological change. Rajesh discusses the uneven pace of AI adoption among businesses of different sizes, the critical role of regulation and capital investment by region, and the growing necessity for upskilling in an evolving digital environment. He highlights the persistent anxiety surrounding job displacement, the shift in workforce requirements, and emphasises the importance of resilience and adaptability. Rajesh concludes by stressing the need for businesses to keep customer needs at the centre and to use technology as an enabler to solve real problems in an age defined by both opportunity and uncertainty.</p>
<p>Rajesh Ganesan is the CEO of ManageEngine, a division of Zoho Corp. and a leading provider of enterprise IT management solutions. With over two decades of experience at the company, he plays a pivotal role in shaping ManageEngine’s strategy, direction, and product management while also serving as a key evangelist for the brand. Beyond strategy, his day-to-day work involves being a mentor and coach to teams across various business functions. With deep institutional knowledge and market insight, he helps them navigate decisions with clarity and perspective, ensuring they are equipped to handle the challenges of today’s IT market.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Rajesh Ganesan, CEO of ManageEngine, as he explores the complexities of AI anxiety within organisations and the global challenges of balancing cybersecurity, privacy, and rapid technological change. Rajesh discusses the uneven pace of AI adoption among businesses of different sizes, the critical role of regulation and capital investment by region, and the growing necessity for upskilling in an evolving digital environment. He highlights the persistent anxiety surrounding job displacement, the shift in workforce requirements, and emphasises the importance of resilience and adaptability. Rajesh concludes by stressing the need for businesses to keep customer needs at the centre and to use technology as an enabler to solve real problems in an age defined by both opportunity and uncertainty.
Rajesh Ganesan is the CEO of ManageEngine, a division of Zoho Corp. and a leading provider of enterprise IT management solutions. With over two decades of experience at the company, he plays a pivotal role in shaping ManageEngine’s strategy, direction, and product management while also serving as a key evangelist for the brand. Beyond strategy, his day-to-day work involves being a mentor and coach to teams across various business functions. With deep institutional knowledge and market insight, he helps them navigate decisions with clarity and perspective, ensuring they are equipped to handle the challenges of today’s IT market.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 347 Deep Dive: Rajesh Ganesan | AI Anxiety and the Global Cyber Balancing Act]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Rajesh Ganesan, CEO of ManageEngine, as he explores the complexities of AI anxiety within organisations and the global challenges of balancing cybersecurity, privacy, and rapid technological change. Rajesh discusses the uneven pace of AI adoption among businesses of different sizes, the critical role of regulation and capital investment by region, and the growing necessity for upskilling in an evolving digital environment. He highlights the persistent anxiety surrounding job displacement, the shift in workforce requirements, and emphasises the importance of resilience and adaptability. Rajesh concludes by stressing the need for businesses to keep customer needs at the centre and to use technology as an enabler to solve real problems in an age defined by both opportunity and uncertainty.</p>
<p>Rajesh Ganesan is the CEO of ManageEngine, a division of Zoho Corp. and a leading provider of enterprise IT management solutions. With over two decades of experience at the company, he plays a pivotal role in shaping ManageEngine’s strategy, direction, and product management while also serving as a key evangelist for the brand. Beyond strategy, his day-to-day work involves being a mentor and coach to teams across various business functions. With deep institutional knowledge and market insight, he helps them navigate decisions with clarity and perspective, ensuring they are equipped to handle the challenges of today’s IT market.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2294149/c1e-o39rf28z87a8n0xz-wwp1vj98s78p-ncsmtr.mp3" length="39262710"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Rajesh Ganesan, CEO of ManageEngine, as he explores the complexities of AI anxiety within organisations and the global challenges of balancing cybersecurity, privacy, and rapid technological change. Rajesh discusses the uneven pace of AI adoption among businesses of different sizes, the critical role of regulation and capital investment by region, and the growing necessity for upskilling in an evolving digital environment. He highlights the persistent anxiety surrounding job displacement, the shift in workforce requirements, and emphasises the importance of resilience and adaptability. Rajesh concludes by stressing the need for businesses to keep customer needs at the centre and to use technology as an enabler to solve real problems in an age defined by both opportunity and uncertainty.
Rajesh Ganesan is the CEO of ManageEngine, a division of Zoho Corp. and a leading provider of enterprise IT management solutions. With over two decades of experience at the company, he plays a pivotal role in shaping ManageEngine’s strategy, direction, and product management while also serving as a key evangelist for the brand. Beyond strategy, his day-to-day work involves being a mentor and coach to teams across various business functions. With deep institutional knowledge and market insight, he helps them navigate decisions with clarity and perspective, ensuring they are equipped to handle the challenges of today’s IT market.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2294149/c1a-5k0v-0v762odzio85-esblk5.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From AWS re:Invent 2025 – KB On The Go | CJ Moses, Hart Rossman, and Mark Ryland]]>
                </title>
                <pubDate>Wed, 17 Dec 2025 04:57:17 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2290518</guid>
                                    <link>https://kbkast.castos.com/episodes/from-aws-reinvent-2025-kb-on-the-go-cj-moses-hart-rossman-and-mark-ryland</link>
                                <description>
                                            <![CDATA[In this bonus episode, KB sits down with CJ Moses, CISO at Amazon, Hart Rossman, VP of Global Security Services at AWS, and Mark Ryland, Director, AWS Security. Together they discuss the realities of “planetary scale security,” AI-powered defenses, and the shifting mindset that’s driving organizations to adopt automation and agentic technologies faster than ever before.


<strong>CJ Moses, CISO, Amazon</strong>

CJ Moses, CISO at Amazon, leads security engineering and operations across the company. His mission is to enable Amazon businesses by making the benefits of security the path of least resistance. CJ joined Amazon in December 2007, holding various roles including Consumer CISO and AWS CISO, before becoming CISO of Amazon in September 2023.

Before Amazon, CJ led the technical analysis of computer and network intrusion efforts at the Federal Bureau of Investigation’s Cyber Division and served as a Special Agent with the Air Force Office of Special Investigations (AFOSI). CJ led several computer intrusion investigations seen as foundational to the security industry today.

CJ holds degrees in Computer Science and Criminal Justice and is an active SRO GT America GT2 Race car driver.


<strong>Hart Rossman, VP of Global Security Services, AWS</strong>


Hart Rossman is the VP of Global Security Services at AWS. He leads a team of geographically distributed AWS builders who help customers realise the benefits of planetary-scale security solutions in the cloud, with a focus on innovating with internal teams and partners. Prior to AWS, he was VP &amp; CTO of Cyber Security Services &amp; Solutions at SAIC.




<strong>Mark Ryland, Director, AWS Security</strong>


Mark Ryland is a Director, AWS Security, reporting to the CISO of AWS, and engaging with a variety of external and internal stakeholders on behalf of the AWS Security leadership team. Externally, he focuses on public policy initiatives and public sector regulators and customers on issues related to cloud and AI security. Internally, he works with AWS service teams by channelling the perspectives of external stakeholders to influence their plans and priorities. In addition, Ryland works with industry partners to enhance the security of the broader information technology ecosystem as Amazon’s representative on the governing board of the Open Source Security Foundation (OpenSSF), as well as in industry groups focusing on the security and reliability of cutting-edge artificial intelligence systems such as the Frontier Model Forum (FMF) and the Coalition for Secure AI (CoSAI).Ryland has more than 34 years of experience in the technology industry across a wide range of leadership roles in information security, software engineering, distributed systems, technical standardisation, and public policy. Most recently he founded and ran AWS’s Office of the CISO from 2018 to 2023, a team with which he still collaborates closely on a variety of matters. Prior to that, he was the Director of Solutions Architecture and Professional Services for the AWS Worldwide Public Sector team, founding the team in 2011 and growing it to a large global organisation through early 2018. Before joining AWS, Ryland worked for Microsoft for 13 years in two different stints (1991-2000 and 2008-2011) in multiple roles including Lead Program Manager for COM/DCOM, and founder and Director, Standards Strategy Group. In between work at Microsoft, he was co-founder and CTO of two start-ups, and served as vice president and director of the Washington DC office of a public policy think tank.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB sits down with CJ Moses, CISO at Amazon, Hart Rossman, VP of Global Security Services at AWS, and Mark Ryland, Director, AWS Security. Together they discuss the realities of “planetary scale security,” AI-powered defenses, and the shifting mindset that’s driving organizations to adopt automation and agentic technologies faster than ever before.


CJ Moses, CISO, Amazon

CJ Moses, CISO at Amazon, leads security engineering and operations across the company. His mission is to enable Amazon businesses by making the benefits of security the path of least resistance. CJ joined Amazon in December 2007, holding various roles including Consumer CISO and AWS CISO, before becoming CISO of Amazon in September 2023.

Before Amazon, CJ led the technical analysis of computer and network intrusion efforts at the Federal Bureau of Investigation’s Cyber Division and served as a Special Agent with the Air Force Office of Special Investigations (AFOSI). CJ led several computer intrusion investigations seen as foundational to the security industry today.

CJ holds degrees in Computer Science and Criminal Justice and is an active SRO GT America GT2 Race car driver.


Hart Rossman, VP of Global Security Services, AWS


Hart Rossman is the VP of Global Security Services at AWS. He leads a team of geographically distributed AWS builders who help customers realise the benefits of planetary-scale security solutions in the cloud, with a focus on innovating with internal teams and partners. Prior to AWS, he was VP & CTO of Cyber Security Services & Solutions at SAIC.




Mark Ryland, Director, AWS Security


Mark Ryland is a Director, AWS Security, reporting to the CISO of AWS, and engaging with a variety of external and internal stakeholders on behalf of the AWS Security leadership team. Externally, he focuses on public policy initiatives and public sector regulators and customers on issues related to cloud and AI security. Internally, he works with AWS service teams by channelling the perspectives of external stakeholders to influence their plans and priorities. In addition, Ryland works with industry partners to enhance the security of the broader information technology ecosystem as Amazon’s representative on the governing board of the Open Source Security Foundation (OpenSSF), as well as in industry groups focusing on the security and reliability of cutting-edge artificial intelligence systems such as the Frontier Model Forum (FMF) and the Coalition for Secure AI (CoSAI).Ryland has more than 34 years of experience in the technology industry across a wide range of leadership roles in information security, software engineering, distributed systems, technical standardisation, and public policy. Most recently he founded and ran AWS’s Office of the CISO from 2018 to 2023, a team with which he still collaborates closely on a variety of matters. Prior to that, he was the Director of Solutions Architecture and Professional Services for the AWS Worldwide Public Sector team, founding the team in 2011 and growing it to a large global organisation through early 2018. Before joining AWS, Ryland worked for Microsoft for 13 years in two different stints (1991-2000 and 2008-2011) in multiple roles including Lead Program Manager for COM/DCOM, and founder and Director, Standards Strategy Group. In between work at Microsoft, he was co-founder and CTO of two start-ups, and served as vice president and director of the Washington DC office of a public policy think tank.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From AWS re:Invent 2025 – KB On The Go | CJ Moses, Hart Rossman, and Mark Ryland]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[In this bonus episode, KB sits down with CJ Moses, CISO at Amazon, Hart Rossman, VP of Global Security Services at AWS, and Mark Ryland, Director, AWS Security. Together they discuss the realities of “planetary scale security,” AI-powered defenses, and the shifting mindset that’s driving organizations to adopt automation and agentic technologies faster than ever before.


<strong>CJ Moses, CISO, Amazon</strong>

CJ Moses, CISO at Amazon, leads security engineering and operations across the company. His mission is to enable Amazon businesses by making the benefits of security the path of least resistance. CJ joined Amazon in December 2007, holding various roles including Consumer CISO and AWS CISO, before becoming CISO of Amazon in September 2023.

Before Amazon, CJ led the technical analysis of computer and network intrusion efforts at the Federal Bureau of Investigation’s Cyber Division and served as a Special Agent with the Air Force Office of Special Investigations (AFOSI). CJ led several computer intrusion investigations seen as foundational to the security industry today.

CJ holds degrees in Computer Science and Criminal Justice and is an active SRO GT America GT2 Race car driver.


<strong>Hart Rossman, VP of Global Security Services, AWS</strong>


Hart Rossman is the VP of Global Security Services at AWS. He leads a team of geographically distributed AWS builders who help customers realise the benefits of planetary-scale security solutions in the cloud, with a focus on innovating with internal teams and partners. Prior to AWS, he was VP &amp; CTO of Cyber Security Services &amp; Solutions at SAIC.




<strong>Mark Ryland, Director, AWS Security</strong>


Mark Ryland is a Director, AWS Security, reporting to the CISO of AWS, and engaging with a variety of external and internal stakeholders on behalf of the AWS Security leadership team. Externally, he focuses on public policy initiatives and public sector regulators and customers on issues related to cloud and AI security. Internally, he works with AWS service teams by channelling the perspectives of external stakeholders to influence their plans and priorities. In addition, Ryland works with industry partners to enhance the security of the broader information technology ecosystem as Amazon’s representative on the governing board of the Open Source Security Foundation (OpenSSF), as well as in industry groups focusing on the security and reliability of cutting-edge artificial intelligence systems such as the Frontier Model Forum (FMF) and the Coalition for Secure AI (CoSAI).Ryland has more than 34 years of experience in the technology industry across a wide range of leadership roles in information security, software engineering, distributed systems, technical standardisation, and public policy. Most recently he founded and ran AWS’s Office of the CISO from 2018 to 2023, a team with which he still collaborates closely on a variety of matters. Prior to that, he was the Director of Solutions Architecture and Professional Services for the AWS Worldwide Public Sector team, founding the team in 2011 and growing it to a large global organisation through early 2018. Before joining AWS, Ryland worked for Microsoft for 13 years in two different stints (1991-2000 and 2008-2011) in multiple roles including Lead Program Manager for COM/DCOM, and founder and Director, Standards Strategy Group. In between work at Microsoft, he was co-founder and CTO of two start-ups, and served as vice president and director of the Washington DC office of a public policy think tank.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2290518/c1e-n439hdr6xdf9z48r-34mp4618fjzg-qhlwrt.mp3" length="53546883"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB sits down with CJ Moses, CISO at Amazon, Hart Rossman, VP of Global Security Services at AWS, and Mark Ryland, Director, AWS Security. Together they discuss the realities of “planetary scale security,” AI-powered defenses, and the shifting mindset that’s driving organizations to adopt automation and agentic technologies faster than ever before.


CJ Moses, CISO, Amazon

CJ Moses, CISO at Amazon, leads security engineering and operations across the company. His mission is to enable Amazon businesses by making the benefits of security the path of least resistance. CJ joined Amazon in December 2007, holding various roles including Consumer CISO and AWS CISO, before becoming CISO of Amazon in September 2023.

Before Amazon, CJ led the technical analysis of computer and network intrusion efforts at the Federal Bureau of Investigation’s Cyber Division and served as a Special Agent with the Air Force Office of Special Investigations (AFOSI). CJ led several computer intrusion investigations seen as foundational to the security industry today.

CJ holds degrees in Computer Science and Criminal Justice and is an active SRO GT America GT2 Race car driver.


Hart Rossman, VP of Global Security Services, AWS


Hart Rossman is the VP of Global Security Services at AWS. He leads a team of geographically distributed AWS builders who help customers realise the benefits of planetary-scale security solutions in the cloud, with a focus on innovating with internal teams and partners. Prior to AWS, he was VP & CTO of Cyber Security Services & Solutions at SAIC.




Mark Ryland, Director, AWS Security


Mark Ryland is a Director, AWS Security, reporting to the CISO of AWS, and engaging with a variety of external and internal stakeholders on behalf of the AWS Security leadership team. Externally, he focuses on public policy initiatives and public sector regulators and customers on issues related to cloud and AI security. Internally, he works with AWS service teams by channelling the perspectives of external stakeholders to influence their plans and priorities. In addition, Ryland works with industry partners to enhance the security of the broader information technology ecosystem as Amazon’s representative on the governing board of the Open Source Security Foundation (OpenSSF), as well as in industry groups focusing on the security and reliability of cutting-edge artificial intelligence systems such as the Frontier Model Forum (FMF) and the Coalition for Secure AI (CoSAI).Ryland has more than 34 years of experience in the technology industry across a wide range of leadership roles in information security, software engineering, distributed systems, technical standardisation, and public policy. Most recently he founded and ran AWS’s Office of the CISO from 2018 to 2023, a team with which he still collaborates closely on a variety of matters. Prior to that, he was the Director of Solutions Architecture and Professional Services for the AWS Worldwide Public Sector team, founding the team in 2011 and growing it to a large global organisation through early 2018. Before joining AWS, Ryland worked for Microsoft for 13 years in two different stints (1991-2000 and 2008-2011) in multiple roles including Lead Program Manager for COM/DCOM, and founder and Director, Standards Strategy Group. In between work at Microsoft, he was co-founder and CTO of two start-ups, and served as vice president and director of the Washington DC office of a public policy think tank.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2290518/c1a-5k0v-ndvx71d3s9nk-vy9fru.png"></itunes:image>
                                                                            <itunes:duration>00:55:47</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 346 Deep Dive: Amberley Brady | Everyone is Protecting My Password but Who is Protecting My Toilet Paper?]]>
                </title>
                <pubDate>Wed, 10 Dec 2025 04:55:16 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2280221</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-346-deep-dive-amberley-brady-everyone-is-protecting-my-password-but-who-is-protecting-my</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Amberley Brady, founder at Realfoodprice, as she explores the urgent issue of food security as a national security crisis in Australia. Amberley discusses the four pillars of food security—availability, access, utilization, and stability—emphasising how fragile supply chains, economic shocks, climate events, and cyber incidents threaten the nation’s access to safe and affordable food. She recounts the disruptions experienced during COVID-19 and highlights the risks of over-reliance on large supermarket conglomerates and lack of support for local farmers. The conversation covers the need for greater policy coordination, strategic food reserves, improved data transparency, and the integration of technology to strengthen domestic resilience. Amberley urges for accountability, innovation, and collaboration between government, industry, and the tech community to ensure that access to nutritious food remains a right, not a privilege, for all Australians.</p>
<p>Amberley, an astute industry professional with extensive experience in public policy, founded Realfoodprice in 2024 in response to identified structural inefficiencies within Australia’s food supply chain. Recognizing the critical need for market transparency, she established this data-driven platform to address the competitive imbalance affecting both producers and consumers.</p>
<p>Through rigorous market analysis and comparative price assessment, Amberley developed a methodology to clearly communicate authentic food value throughout the supply chain. Her strategic initiative to “un-supermarket” represents a paradigm shift in how agricultural commodities are valued and traded within the Australian market.</p>
<p>Realfoodprice exemplifies Amberley’s innovative approach to economic challenges, leveraging data analytics to foster equitable commercial relationships between farming communities and end consumers. The platform serves as both an advocacy tool and a practical market mechanism designed to ensure the long-term sustainability of Australia’s agricultural sector and strengthen national economic resilience.</p>
<p>Under Amberley’s leadership, <a href="https://realfoodprice.com.au/">Realfoodprice</a> continues to advance data transparency as an essential component in creating a more competitive and balanced food system for all stakeholders.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Amberley Brady, founder at Realfoodprice, as she explores the urgent issue of food security as a national security crisis in Australia. Amberley discusses the four pillars of food security—availability, access, utilization, and stability—emphasising how fragile supply chains, economic shocks, climate events, and cyber incidents threaten the nation’s access to safe and affordable food. She recounts the disruptions experienced during COVID-19 and highlights the risks of over-reliance on large supermarket conglomerates and lack of support for local farmers. The conversation covers the need for greater policy coordination, strategic food reserves, improved data transparency, and the integration of technology to strengthen domestic resilience. Amberley urges for accountability, innovation, and collaboration between government, industry, and the tech community to ensure that access to nutritious food remains a right, not a privilege, for all Australians.
Amberley, an astute industry professional with extensive experience in public policy, founded Realfoodprice in 2024 in response to identified structural inefficiencies within Australia’s food supply chain. Recognizing the critical need for market transparency, she established this data-driven platform to address the competitive imbalance affecting both producers and consumers.
Through rigorous market analysis and comparative price assessment, Amberley developed a methodology to clearly communicate authentic food value throughout the supply chain. Her strategic initiative to “un-supermarket” represents a paradigm shift in how agricultural commodities are valued and traded within the Australian market.
Realfoodprice exemplifies Amberley’s innovative approach to economic challenges, leveraging data analytics to foster equitable commercial relationships between farming communities and end consumers. The platform serves as both an advocacy tool and a practical market mechanism designed to ensure the long-term sustainability of Australia’s agricultural sector and strengthen national economic resilience.
Under Amberley’s leadership, Realfoodprice continues to advance data transparency as an essential component in creating a more competitive and balanced food system for all stakeholders.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 346 Deep Dive: Amberley Brady | Everyone is Protecting My Password but Who is Protecting My Toilet Paper?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Amberley Brady, founder at Realfoodprice, as she explores the urgent issue of food security as a national security crisis in Australia. Amberley discusses the four pillars of food security—availability, access, utilization, and stability—emphasising how fragile supply chains, economic shocks, climate events, and cyber incidents threaten the nation’s access to safe and affordable food. She recounts the disruptions experienced during COVID-19 and highlights the risks of over-reliance on large supermarket conglomerates and lack of support for local farmers. The conversation covers the need for greater policy coordination, strategic food reserves, improved data transparency, and the integration of technology to strengthen domestic resilience. Amberley urges for accountability, innovation, and collaboration between government, industry, and the tech community to ensure that access to nutritious food remains a right, not a privilege, for all Australians.</p>
<p>Amberley, an astute industry professional with extensive experience in public policy, founded Realfoodprice in 2024 in response to identified structural inefficiencies within Australia’s food supply chain. Recognizing the critical need for market transparency, she established this data-driven platform to address the competitive imbalance affecting both producers and consumers.</p>
<p>Through rigorous market analysis and comparative price assessment, Amberley developed a methodology to clearly communicate authentic food value throughout the supply chain. Her strategic initiative to “un-supermarket” represents a paradigm shift in how agricultural commodities are valued and traded within the Australian market.</p>
<p>Realfoodprice exemplifies Amberley’s innovative approach to economic challenges, leveraging data analytics to foster equitable commercial relationships between farming communities and end consumers. The platform serves as both an advocacy tool and a practical market mechanism designed to ensure the long-term sustainability of Australia’s agricultural sector and strengthen national economic resilience.</p>
<p>Under Amberley’s leadership, <a href="https://realfoodprice.com.au/">Realfoodprice</a> continues to advance data transparency as an essential component in creating a more competitive and balanced food system for all stakeholders.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2280221/c1e-89g7fo3jg9f1d8wj-5zdnmon1towv-hzfucv.mp3" length="47112820"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Amberley Brady, founder at Realfoodprice, as she explores the urgent issue of food security as a national security crisis in Australia. Amberley discusses the four pillars of food security—availability, access, utilization, and stability—emphasising how fragile supply chains, economic shocks, climate events, and cyber incidents threaten the nation’s access to safe and affordable food. She recounts the disruptions experienced during COVID-19 and highlights the risks of over-reliance on large supermarket conglomerates and lack of support for local farmers. The conversation covers the need for greater policy coordination, strategic food reserves, improved data transparency, and the integration of technology to strengthen domestic resilience. Amberley urges for accountability, innovation, and collaboration between government, industry, and the tech community to ensure that access to nutritious food remains a right, not a privilege, for all Australians.
Amberley, an astute industry professional with extensive experience in public policy, founded Realfoodprice in 2024 in response to identified structural inefficiencies within Australia’s food supply chain. Recognizing the critical need for market transparency, she established this data-driven platform to address the competitive imbalance affecting both producers and consumers.
Through rigorous market analysis and comparative price assessment, Amberley developed a methodology to clearly communicate authentic food value throughout the supply chain. Her strategic initiative to “un-supermarket” represents a paradigm shift in how agricultural commodities are valued and traded within the Australian market.
Realfoodprice exemplifies Amberley’s innovative approach to economic challenges, leveraging data analytics to foster equitable commercial relationships between farming communities and end consumers. The platform serves as both an advocacy tool and a practical market mechanism designed to ensure the long-term sustainability of Australia’s agricultural sector and strengthen national economic resilience.
Under Amberley’s leadership, Realfoodprice continues to advance data transparency as an essential component in creating a more competitive and balanced food system for all stakeholders.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2280221/c1a-5k0v-47m0nr71tx24-q69k5p.jpg"></itunes:image>
                                                                            <itunes:duration>00:49:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Oracle AI World 2025 – KB On The Go | Jenny Tsai-Smith, Rand Waldron, and Arman Ashouriha]]>
                </title>
                <pubDate>Fri, 05 Dec 2025 04:55:55 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2232455</guid>
                                    <link>https://kbkast.castos.com/episodes/from-oracle-ai-world-2025-kb-on-the-go-jenny-tsai-smith-rand-waldron-and-arman-ashouriha</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB sits down with Jenny Tsai-Smith, SVP, Overall Database Product Management at Oracle, Rand Waldron, VP at Oracle, and Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone. Together they discuss Oracle’s move towards supporting modern workloads and their AI play, Oracle’s position in the public and private sector, and Vodafone’s journey to modernisation on Oracle Cloud.</p>
<p><strong>Jenny Tsai-Smith, SVP, Overall Database Product Management, Oracle</strong></p>
<p>Since joining Oracle in 1993, Jenny Tsai-Smith has held leadership roles spanning technical support, content development, education delivery, plus Oracle Cloud acceleration of startups and scientific research. As the leader for database product management, Jenny works with release and development management to take products and services from design through development to production. Her team runs the customer advisory board, drives technology adoption partners, performs field enablement, assists with migrations to Oracle Database, and works directly with a wide range of customers. She meets regularly with customers, partners, press, and analysts to better understand existing and emerging data management requirements, and to discuss how database innovations can be applied to solve real-world challenges.</p>
<p><strong>Rand Waldron, VP at Oracle</strong></p>
<p>Rand Waldron is vice president of Oracle Cloud Infrastructure product development, responsible for the Global Government Sector team and leading the strategy, development and deployment of Oracle’s National Security Region product line. Prior to joining Oracle in 2018, he was Deputy Assistant Director at the Federal Bureau of Investigation, responsible for the FBI’s enterprise software and data—including investigative and intelligence analytics, records and evidence management, large scale custom software development and business operations systems. Prior to the FBI, Waldron served at the U.S. Department of Justice.</p>
<p><strong>Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone
</strong></p>
<p>As the Head of the Oracle Cloud Infrastructure Modernisation Programme at Vodafone, Arman Ashouriha leads the strategic effort to modernize and migrate thousands of key systems to a dedicated region within the Oracle Cloud Infrastructure (OCI). Arman is continually driving towards platform support, system modernization, and scaling crucial operations across complex, high-stakes infrastructure environments.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB sits down with Jenny Tsai-Smith, SVP, Overall Database Product Management at Oracle, Rand Waldron, VP at Oracle, and Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone. Together they discuss Oracle’s move towards supporting modern workloads and their AI play, Oracle’s position in the public and private sector, and Vodafone’s journey to modernisation on Oracle Cloud.
Jenny Tsai-Smith, SVP, Overall Database Product Management, Oracle
Since joining Oracle in 1993, Jenny Tsai-Smith has held leadership roles spanning technical support, content development, education delivery, plus Oracle Cloud acceleration of startups and scientific research. As the leader for database product management, Jenny works with release and development management to take products and services from design through development to production. Her team runs the customer advisory board, drives technology adoption partners, performs field enablement, assists with migrations to Oracle Database, and works directly with a wide range of customers. She meets regularly with customers, partners, press, and analysts to better understand existing and emerging data management requirements, and to discuss how database innovations can be applied to solve real-world challenges.
Rand Waldron, VP at Oracle
Rand Waldron is vice president of Oracle Cloud Infrastructure product development, responsible for the Global Government Sector team and leading the strategy, development and deployment of Oracle’s National Security Region product line. Prior to joining Oracle in 2018, he was Deputy Assistant Director at the Federal Bureau of Investigation, responsible for the FBI’s enterprise software and data—including investigative and intelligence analytics, records and evidence management, large scale custom software development and business operations systems. Prior to the FBI, Waldron served at the U.S. Department of Justice.
Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone

As the Head of the Oracle Cloud Infrastructure Modernisation Programme at Vodafone, Arman Ashouriha leads the strategic effort to modernize and migrate thousands of key systems to a dedicated region within the Oracle Cloud Infrastructure (OCI). Arman is continually driving towards platform support, system modernization, and scaling crucial operations across complex, high-stakes infrastructure environments.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Oracle AI World 2025 – KB On The Go | Jenny Tsai-Smith, Rand Waldron, and Arman Ashouriha]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB sits down with Jenny Tsai-Smith, SVP, Overall Database Product Management at Oracle, Rand Waldron, VP at Oracle, and Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone. Together they discuss Oracle’s move towards supporting modern workloads and their AI play, Oracle’s position in the public and private sector, and Vodafone’s journey to modernisation on Oracle Cloud.</p>
<p><strong>Jenny Tsai-Smith, SVP, Overall Database Product Management, Oracle</strong></p>
<p>Since joining Oracle in 1993, Jenny Tsai-Smith has held leadership roles spanning technical support, content development, education delivery, plus Oracle Cloud acceleration of startups and scientific research. As the leader for database product management, Jenny works with release and development management to take products and services from design through development to production. Her team runs the customer advisory board, drives technology adoption partners, performs field enablement, assists with migrations to Oracle Database, and works directly with a wide range of customers. She meets regularly with customers, partners, press, and analysts to better understand existing and emerging data management requirements, and to discuss how database innovations can be applied to solve real-world challenges.</p>
<p><strong>Rand Waldron, VP at Oracle</strong></p>
<p>Rand Waldron is vice president of Oracle Cloud Infrastructure product development, responsible for the Global Government Sector team and leading the strategy, development and deployment of Oracle’s National Security Region product line. Prior to joining Oracle in 2018, he was Deputy Assistant Director at the Federal Bureau of Investigation, responsible for the FBI’s enterprise software and data—including investigative and intelligence analytics, records and evidence management, large scale custom software development and business operations systems. Prior to the FBI, Waldron served at the U.S. Department of Justice.</p>
<p><strong>Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone
</strong></p>
<p>As the Head of the Oracle Cloud Infrastructure Modernisation Programme at Vodafone, Arman Ashouriha leads the strategic effort to modernize and migrate thousands of key systems to a dedicated region within the Oracle Cloud Infrastructure (OCI). Arman is continually driving towards platform support, system modernization, and scaling crucial operations across complex, high-stakes infrastructure environments.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2232455/c1e-q40nhd3xm5a0v2x4-gp9105wmcwxq-xviiit.mp3" length="65614201"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB sits down with Jenny Tsai-Smith, SVP, Overall Database Product Management at Oracle, Rand Waldron, VP at Oracle, and Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone. Together they discuss Oracle’s move towards supporting modern workloads and their AI play, Oracle’s position in the public and private sector, and Vodafone’s journey to modernisation on Oracle Cloud.
Jenny Tsai-Smith, SVP, Overall Database Product Management, Oracle
Since joining Oracle in 1993, Jenny Tsai-Smith has held leadership roles spanning technical support, content development, education delivery, plus Oracle Cloud acceleration of startups and scientific research. As the leader for database product management, Jenny works with release and development management to take products and services from design through development to production. Her team runs the customer advisory board, drives technology adoption partners, performs field enablement, assists with migrations to Oracle Database, and works directly with a wide range of customers. She meets regularly with customers, partners, press, and analysts to better understand existing and emerging data management requirements, and to discuss how database innovations can be applied to solve real-world challenges.
Rand Waldron, VP at Oracle
Rand Waldron is vice president of Oracle Cloud Infrastructure product development, responsible for the Global Government Sector team and leading the strategy, development and deployment of Oracle’s National Security Region product line. Prior to joining Oracle in 2018, he was Deputy Assistant Director at the Federal Bureau of Investigation, responsible for the FBI’s enterprise software and data—including investigative and intelligence analytics, records and evidence management, large scale custom software development and business operations systems. Prior to the FBI, Waldron served at the U.S. Department of Justice.
Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone

As the Head of the Oracle Cloud Infrastructure Modernisation Programme at Vodafone, Arman Ashouriha leads the strategic effort to modernize and migrate thousands of key systems to a dedicated region within the Oracle Cloud Infrastructure (OCI). Arman is continually driving towards platform support, system modernization, and scaling crucial operations across complex, high-stakes infrastructure environments.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2232455/c1a-5k0v-1p7jv29xid4x-v4ey7i.png"></itunes:image>
                                                                            <itunes:duration>01:08:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 345 Deep Dive: David Bloxham | Changing Face of Work Around AI, Skills and the Future of Employment]]>
                </title>
                <pubDate>Wed, 03 Dec 2025 05:00:32 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2265163</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-345-deep-dive-david-bloxham-changing-face-of-work-around-ai-skills-and-the-future-of-emp</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with David Bloxham, CEO of GCS Recruitment Specialist, as he unpacks the impact of AI on the changing face of work and the tech talent landscape. David shares his perspective on how AI-driven disruption differs from previous waves like cloud and mobile transformations, highlighting the rapid decline in traditional software engineering and process-driven roles as automation takes hold. He explores the challenges and opportunities for jobseekers at all levels, emphasizing the need to specialize within industry verticals, build adaptable skill sets, and nurture strong professional networks. David also provides valuable insights into the evolving nature of technical and functional roles, the linkage between AI and cybersecurity investment, and the importance of human connection in recruitment practices as organisations and candidates adapt to a more automated future.</p>
<p><em>David Bloxham is the CEO of GCS Recruitment Specialists, where he has been a key player since 1996, with a brief hiatus from 2004 to 2008. Starting as a fresh graduate, he quickly rose through the ranks, becoming a manager in 1999, a director in 2004, and the MD in 2008. In 2017, he led a management buyout with nGAGE. David is passionate about recruitment, strategic leadership, and making a positive impact. He is also the host of the GCS Leaders Series Podcast, where he engages with industry thought leaders to share insights and drive conversations around innovation and excellence.</em></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with David Bloxham, CEO of GCS Recruitment Specialist, as he unpacks the impact of AI on the changing face of work and the tech talent landscape. David shares his perspective on how AI-driven disruption differs from previous waves like cloud and mobile transformations, highlighting the rapid decline in traditional software engineering and process-driven roles as automation takes hold. He explores the challenges and opportunities for jobseekers at all levels, emphasizing the need to specialize within industry verticals, build adaptable skill sets, and nurture strong professional networks. David also provides valuable insights into the evolving nature of technical and functional roles, the linkage between AI and cybersecurity investment, and the importance of human connection in recruitment practices as organisations and candidates adapt to a more automated future.
David Bloxham is the CEO of GCS Recruitment Specialists, where he has been a key player since 1996, with a brief hiatus from 2004 to 2008. Starting as a fresh graduate, he quickly rose through the ranks, becoming a manager in 1999, a director in 2004, and the MD in 2008. In 2017, he led a management buyout with nGAGE. David is passionate about recruitment, strategic leadership, and making a positive impact. He is also the host of the GCS Leaders Series Podcast, where he engages with industry thought leaders to share insights and drive conversations around innovation and excellence.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 345 Deep Dive: David Bloxham | Changing Face of Work Around AI, Skills and the Future of Employment]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with David Bloxham, CEO of GCS Recruitment Specialist, as he unpacks the impact of AI on the changing face of work and the tech talent landscape. David shares his perspective on how AI-driven disruption differs from previous waves like cloud and mobile transformations, highlighting the rapid decline in traditional software engineering and process-driven roles as automation takes hold. He explores the challenges and opportunities for jobseekers at all levels, emphasizing the need to specialize within industry verticals, build adaptable skill sets, and nurture strong professional networks. David also provides valuable insights into the evolving nature of technical and functional roles, the linkage between AI and cybersecurity investment, and the importance of human connection in recruitment practices as organisations and candidates adapt to a more automated future.</p>
<p><em>David Bloxham is the CEO of GCS Recruitment Specialists, where he has been a key player since 1996, with a brief hiatus from 2004 to 2008. Starting as a fresh graduate, he quickly rose through the ranks, becoming a manager in 1999, a director in 2004, and the MD in 2008. In 2017, he led a management buyout with nGAGE. David is passionate about recruitment, strategic leadership, and making a positive impact. He is also the host of the GCS Leaders Series Podcast, where he engages with industry thought leaders to share insights and drive conversations around innovation and excellence.</em></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2265163/c1e-3g92ck14g1akq027-xxg98w03trwj-qxua2n.mp3" length="45689251"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with David Bloxham, CEO of GCS Recruitment Specialist, as he unpacks the impact of AI on the changing face of work and the tech talent landscape. David shares his perspective on how AI-driven disruption differs from previous waves like cloud and mobile transformations, highlighting the rapid decline in traditional software engineering and process-driven roles as automation takes hold. He explores the challenges and opportunities for jobseekers at all levels, emphasizing the need to specialize within industry verticals, build adaptable skill sets, and nurture strong professional networks. David also provides valuable insights into the evolving nature of technical and functional roles, the linkage between AI and cybersecurity investment, and the importance of human connection in recruitment practices as organisations and candidates adapt to a more automated future.
David Bloxham is the CEO of GCS Recruitment Specialists, where he has been a key player since 1996, with a brief hiatus from 2004 to 2008. Starting as a fresh graduate, he quickly rose through the ranks, becoming a manager in 1999, a director in 2004, and the MD in 2008. In 2017, he led a management buyout with nGAGE. David is passionate about recruitment, strategic leadership, and making a positive impact. He is also the host of the GCS Leaders Series Podcast, where he engages with industry thought leaders to share insights and drive conversations around innovation and excellence.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2265163/c1a-5k0v-v6pozdg4f5op-cp6juh.jpg"></itunes:image>
                                                                            <itunes:duration>00:47:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 344 Deep Dive: Steven Grossman | Cybersecurity and Compliance in regulated Small and Medium Sized Businesses (SMBs)]]>
                </title>
                <pubDate>Fri, 28 Nov 2025 05:00:16 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2247365</guid>
                                    <link>https://kbkast.castos.com/episodes/episdoe-344-deep-dive-steven-grossman-cybersecurity-and-compliance-in-regulated-small-and-medium</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Steven Grossman, CISO / CIO at Standard &amp; Preferred Insurance, as he talks about the challenges small and medium-sized businesses face in securing their environment, especially in view of growing regulatory requirements, and how he brings his enterprise consulting experience to bear in driving change. Steven discusses the unique challenges faced by SMBs—such as limited budgets, smaller IT teams, and a general lack of prioritization around cyber risk—while emphasizing the importance of leadership, education, and investing in the right resources like MSPs and fractional CISOs. The conversation covers the regulatory pressures driving security improvements, the pitfalls of treating cybersecurity as a box-ticking exercise, and strategies for building a resilient risk management culture. Steven also shares his perspective on balancing regulatory burden and genuine security, the dangers of under-resourcing IT, and the reasons why proactive approaches to cyber risk are essential for business continuity and consumer trust.</p>
<p>Steven is a cross-functional cybersecurity and information technology leader with experience working in startup to large enterprise environments. After 2 decades of management consulting with international firms like PwC, smaller boutiques and independently on his own, Steven jumped into the cyber and tech startup ecosystem, bringing to bear his knowledge and experience in cybersecurity, risk management, regulatory regimes, data analytics and business process management. Throughout his career, Steven has also held numerous industry executive positions, including his current role as CISO/CIO of Standard &amp; Preferred and the Graph Group, a Workers Comp insurance carrier based in the NY/NJ tri state area.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Steven Grossman, CISO / CIO at Standard & Preferred Insurance, as he talks about the challenges small and medium-sized businesses face in securing their environment, especially in view of growing regulatory requirements, and how he brings his enterprise consulting experience to bear in driving change. Steven discusses the unique challenges faced by SMBs—such as limited budgets, smaller IT teams, and a general lack of prioritization around cyber risk—while emphasizing the importance of leadership, education, and investing in the right resources like MSPs and fractional CISOs. The conversation covers the regulatory pressures driving security improvements, the pitfalls of treating cybersecurity as a box-ticking exercise, and strategies for building a resilient risk management culture. Steven also shares his perspective on balancing regulatory burden and genuine security, the dangers of under-resourcing IT, and the reasons why proactive approaches to cyber risk are essential for business continuity and consumer trust.
Steven is a cross-functional cybersecurity and information technology leader with experience working in startup to large enterprise environments. After 2 decades of management consulting with international firms like PwC, smaller boutiques and independently on his own, Steven jumped into the cyber and tech startup ecosystem, bringing to bear his knowledge and experience in cybersecurity, risk management, regulatory regimes, data analytics and business process management. Throughout his career, Steven has also held numerous industry executive positions, including his current role as CISO/CIO of Standard & Preferred and the Graph Group, a Workers Comp insurance carrier based in the NY/NJ tri state area.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 344 Deep Dive: Steven Grossman | Cybersecurity and Compliance in regulated Small and Medium Sized Businesses (SMBs)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Steven Grossman, CISO / CIO at Standard &amp; Preferred Insurance, as he talks about the challenges small and medium-sized businesses face in securing their environment, especially in view of growing regulatory requirements, and how he brings his enterprise consulting experience to bear in driving change. Steven discusses the unique challenges faced by SMBs—such as limited budgets, smaller IT teams, and a general lack of prioritization around cyber risk—while emphasizing the importance of leadership, education, and investing in the right resources like MSPs and fractional CISOs. The conversation covers the regulatory pressures driving security improvements, the pitfalls of treating cybersecurity as a box-ticking exercise, and strategies for building a resilient risk management culture. Steven also shares his perspective on balancing regulatory burden and genuine security, the dangers of under-resourcing IT, and the reasons why proactive approaches to cyber risk are essential for business continuity and consumer trust.</p>
<p>Steven is a cross-functional cybersecurity and information technology leader with experience working in startup to large enterprise environments. After 2 decades of management consulting with international firms like PwC, smaller boutiques and independently on his own, Steven jumped into the cyber and tech startup ecosystem, bringing to bear his knowledge and experience in cybersecurity, risk management, regulatory regimes, data analytics and business process management. Throughout his career, Steven has also held numerous industry executive positions, including his current role as CISO/CIO of Standard &amp; Preferred and the Graph Group, a Workers Comp insurance carrier based in the NY/NJ tri state area.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2247365/c1e-rdnmsw374jc2kwqj-v6p93q0nbgod-r2sj2r.mp3" length="34077927"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Steven Grossman, CISO / CIO at Standard & Preferred Insurance, as he talks about the challenges small and medium-sized businesses face in securing their environment, especially in view of growing regulatory requirements, and how he brings his enterprise consulting experience to bear in driving change. Steven discusses the unique challenges faced by SMBs—such as limited budgets, smaller IT teams, and a general lack of prioritization around cyber risk—while emphasizing the importance of leadership, education, and investing in the right resources like MSPs and fractional CISOs. The conversation covers the regulatory pressures driving security improvements, the pitfalls of treating cybersecurity as a box-ticking exercise, and strategies for building a resilient risk management culture. Steven also shares his perspective on balancing regulatory burden and genuine security, the dangers of under-resourcing IT, and the reasons why proactive approaches to cyber risk are essential for business continuity and consumer trust.
Steven is a cross-functional cybersecurity and information technology leader with experience working in startup to large enterprise environments. After 2 decades of management consulting with international firms like PwC, smaller boutiques and independently on his own, Steven jumped into the cyber and tech startup ecosystem, bringing to bear his knowledge and experience in cybersecurity, risk management, regulatory regimes, data analytics and business process management. Throughout his career, Steven has also held numerous industry executive positions, including his current role as CISO/CIO of Standard & Preferred and the Graph Group, a Workers Comp insurance carrier based in the NY/NJ tri state area.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2247365/c1a-5k0v-z3pmn0r9tgmo-qlzwdo.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Commvault SHIFT 2025 – KB On The Go | Danielle Sheer and Avi Boru]]>
                </title>
                <pubDate>Wed, 26 Nov 2025 05:00:12 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2245048</guid>
                                    <link>https://kbkast.castos.com/episodes/from-commvault-shift-2025-kb-on-the-go-danielle-sheer-and-avi-boru</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB sits down with Danielle Sheer, Chief Trust Officer at Commvault, and Avi Boru, Senior Director, Cloud Engineering, Network &amp; Telecom at Lennar. Together they discuss building trust by design and how AI, transparency, and authentic relationships are shaping the future of business continuity and cyber recovery.</p>
<p><strong>Danielle Sheer, Chief Trust Officer, Commvault</strong></p>

<p>Modern compliance, legal and security teams need to be predictive, proactive, and data-driven to meet the speed, agility, and growth of global business in a world of constant cyberattacks. Danielle Sheer, Chief Trust Officer, enables Commvault to do just that.</p>

Danielle Sheer is a strategic leader with deep expertise managing complex global privacy systems. She has repeatedly scaled Corporate Trust operations for public technology companies, led IPOs and other transformative strategic transactions, and counselled leaders and boards on significant governance and activist shareholder matters.

<p>Prior to joining Commvault, Danielle served as General Counsel at financial technology services company Bottomline (NASDAQ:EPAY) and at cloud-backup SaaS solutions provider Carbonite (NASDAQ:CARB).</p>

She currently serves as Global Chair of The L Suite; as well as a director on the Boards of <a href="https://linksquares.com/" target="_blank" rel="noreferrer noopener">LinkSquares</a>; <a href="https://www.breachrx.com/" target="_blank" rel="noreferrer noopener">BreachRx</a>; <a href="https://formally.ai/" target="_blank" rel="noreferrer noopener">Formally</a>; and the <a href="https://www.netzero-institute.org/" target="_blank" rel="noreferrer noopener">NetZero Institute</a>; and the Board of Trustees at <a href="https://www.bidmc.org/" target="_blank" rel="noreferrer noopener">Beth Israel Deaconess Medical Center</a>.

<strong>Avi Boru, Senior Director, Cloud Engineering, Network &amp; Telecom at Lennar Corp.</strong>
<p>As Senior Director of Cloud Engineering at Lennar, Avi leads Lennar’s enterprise cloud vision and strategy to drive the company’s digital transformation. With expertise spanning Strategic Planning, &amp; Integration, Digital Transformation, Cloud Computing, and more, Avi is continually driving towards excellence, scalability, and reliability, especially in fast- paced settings.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB sits down with Danielle Sheer, Chief Trust Officer at Commvault, and Avi Boru, Senior Director, Cloud Engineering, Network & Telecom at Lennar. Together they discuss building trust by design and how AI, transparency, and authentic relationships are shaping the future of business continuity and cyber recovery.
Danielle Sheer, Chief Trust Officer, Commvault

Modern compliance, legal and security teams need to be predictive, proactive, and data-driven to meet the speed, agility, and growth of global business in a world of constant cyberattacks. Danielle Sheer, Chief Trust Officer, enables Commvault to do just that.

Danielle Sheer is a strategic leader with deep expertise managing complex global privacy systems. She has repeatedly scaled Corporate Trust operations for public technology companies, led IPOs and other transformative strategic transactions, and counselled leaders and boards on significant governance and activist shareholder matters.

Prior to joining Commvault, Danielle served as General Counsel at financial technology services company Bottomline (NASDAQ:EPAY) and at cloud-backup SaaS solutions provider Carbonite (NASDAQ:CARB).

She currently serves as Global Chair of The L Suite; as well as a director on the Boards of LinkSquares; BreachRx; Formally; and the NetZero Institute; and the Board of Trustees at Beth Israel Deaconess Medical Center.

Avi Boru, Senior Director, Cloud Engineering, Network & Telecom at Lennar Corp.
As Senior Director of Cloud Engineering at Lennar, Avi leads Lennar’s enterprise cloud vision and strategy to drive the company’s digital transformation. With expertise spanning Strategic Planning, & Integration, Digital Transformation, Cloud Computing, and more, Avi is continually driving towards excellence, scalability, and reliability, especially in fast- paced settings.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Commvault SHIFT 2025 – KB On The Go | Danielle Sheer and Avi Boru]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB sits down with Danielle Sheer, Chief Trust Officer at Commvault, and Avi Boru, Senior Director, Cloud Engineering, Network &amp; Telecom at Lennar. Together they discuss building trust by design and how AI, transparency, and authentic relationships are shaping the future of business continuity and cyber recovery.</p>
<p><strong>Danielle Sheer, Chief Trust Officer, Commvault</strong></p>

<p>Modern compliance, legal and security teams need to be predictive, proactive, and data-driven to meet the speed, agility, and growth of global business in a world of constant cyberattacks. Danielle Sheer, Chief Trust Officer, enables Commvault to do just that.</p>

Danielle Sheer is a strategic leader with deep expertise managing complex global privacy systems. She has repeatedly scaled Corporate Trust operations for public technology companies, led IPOs and other transformative strategic transactions, and counselled leaders and boards on significant governance and activist shareholder matters.

<p>Prior to joining Commvault, Danielle served as General Counsel at financial technology services company Bottomline (NASDAQ:EPAY) and at cloud-backup SaaS solutions provider Carbonite (NASDAQ:CARB).</p>

She currently serves as Global Chair of The L Suite; as well as a director on the Boards of <a href="https://linksquares.com/" target="_blank" rel="noreferrer noopener">LinkSquares</a>; <a href="https://www.breachrx.com/" target="_blank" rel="noreferrer noopener">BreachRx</a>; <a href="https://formally.ai/" target="_blank" rel="noreferrer noopener">Formally</a>; and the <a href="https://www.netzero-institute.org/" target="_blank" rel="noreferrer noopener">NetZero Institute</a>; and the Board of Trustees at <a href="https://www.bidmc.org/" target="_blank" rel="noreferrer noopener">Beth Israel Deaconess Medical Center</a>.

<strong>Avi Boru, Senior Director, Cloud Engineering, Network &amp; Telecom at Lennar Corp.</strong>
<p>As Senior Director of Cloud Engineering at Lennar, Avi leads Lennar’s enterprise cloud vision and strategy to drive the company’s digital transformation. With expertise spanning Strategic Planning, &amp; Integration, Digital Transformation, Cloud Computing, and more, Avi is continually driving towards excellence, scalability, and reliability, especially in fast- paced settings.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2245048/c1e-z9w7f76dpnbokrwj-z3pmkqo1fgpj-dtjyje.mp3" length="41001003"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB sits down with Danielle Sheer, Chief Trust Officer at Commvault, and Avi Boru, Senior Director, Cloud Engineering, Network & Telecom at Lennar. Together they discuss building trust by design and how AI, transparency, and authentic relationships are shaping the future of business continuity and cyber recovery.
Danielle Sheer, Chief Trust Officer, Commvault

Modern compliance, legal and security teams need to be predictive, proactive, and data-driven to meet the speed, agility, and growth of global business in a world of constant cyberattacks. Danielle Sheer, Chief Trust Officer, enables Commvault to do just that.

Danielle Sheer is a strategic leader with deep expertise managing complex global privacy systems. She has repeatedly scaled Corporate Trust operations for public technology companies, led IPOs and other transformative strategic transactions, and counselled leaders and boards on significant governance and activist shareholder matters.

Prior to joining Commvault, Danielle served as General Counsel at financial technology services company Bottomline (NASDAQ:EPAY) and at cloud-backup SaaS solutions provider Carbonite (NASDAQ:CARB).

She currently serves as Global Chair of The L Suite; as well as a director on the Boards of LinkSquares; BreachRx; Formally; and the NetZero Institute; and the Board of Trustees at Beth Israel Deaconess Medical Center.

Avi Boru, Senior Director, Cloud Engineering, Network & Telecom at Lennar Corp.
As Senior Director of Cloud Engineering at Lennar, Avi leads Lennar’s enterprise cloud vision and strategy to drive the company’s digital transformation. With expertise spanning Strategic Planning, & Integration, Digital Transformation, Cloud Computing, and more, Avi is continually driving towards excellence, scalability, and reliability, especially in fast- paced settings.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2245048/c1a-5k0v-6z9wnvgzhdww-ocsiet.png"></itunes:image>
                                                                            <itunes:duration>00:42:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 343 Deep Dive: Rajesh Khazanchi | Breach Ready is More Than Just A Mindset]]>
                </title>
                <pubDate>Wed, 19 Nov 2025 05:00:50 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2229578</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-343-deep-dive-rajesh-khazanchi-breach-ready-is-more-than-just-a-mindset</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Rajesh Khazanchi, CEO and co-founder of ColorTokens, as he explores what it truly means to be “breach ready” in today’s cybersecurity landscape. Rajesh emphasises the shift from perimeter-based defences to a proactive containment strategy, highlighting the importance of assuming breaches are inevitable and minimising damage through micro segmentation and Zero Trust principles. He discusses how evolving business pressures and sophisticated AI-driven attacks are raising expectations for swift decision-making and rapid recovery from disruptions. The conversation covers practical approaches for bridging knowledge gaps, the role of continuous compliance and visibility, and how organisations can leverage existing EDR technologies to achieve stronger resilience without increasing tool sprawl. Rajesh also shares insights on building customer trust through quicker recovery times, the impact of business continuity on competitive advantage, and the importance of design thinking for both organisational and personal cyber safety.</p>
<p>Rajesh Khazanchi is the CEO and Co-Founder of ColorTokens, a company that provides a zero-trust segmentation SaaS platform that spans across IT, OT, Industrial Control Systems (ICS), Devices and Users. Under Rajesh’s leadership company has accelerated to grown over 300% annual in last 3 years deployed over 100+ large enterprise customers in Insurance, Healthcare, Retail, Manufacturing, Oil &amp; Gas and Pharma. Rajesh leads a team of 400+ people worldwide and drives the vision, strategy, and execution of the company’s products and services. As an accomplished technology leader, Rajesh has led product teams at VMware, BMC, HP, and Oracle, and has been on the front lines of the battle against cyberattacks for more than two decades. He has been awarded six patents for his innovations in cloud automation and cybersecurity, and is a member of YPO and TiE, two global networks of entrepreneurs and executives. Rajesh is passionate about solving complex problems, creating value for customers, and building a culture of excellence and innovation at ColorTokens.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Rajesh Khazanchi, CEO and co-founder of ColorTokens, as he explores what it truly means to be “breach ready” in today’s cybersecurity landscape. Rajesh emphasises the shift from perimeter-based defences to a proactive containment strategy, highlighting the importance of assuming breaches are inevitable and minimising damage through micro segmentation and Zero Trust principles. He discusses how evolving business pressures and sophisticated AI-driven attacks are raising expectations for swift decision-making and rapid recovery from disruptions. The conversation covers practical approaches for bridging knowledge gaps, the role of continuous compliance and visibility, and how organisations can leverage existing EDR technologies to achieve stronger resilience without increasing tool sprawl. Rajesh also shares insights on building customer trust through quicker recovery times, the impact of business continuity on competitive advantage, and the importance of design thinking for both organisational and personal cyber safety.
Rajesh Khazanchi is the CEO and Co-Founder of ColorTokens, a company that provides a zero-trust segmentation SaaS platform that spans across IT, OT, Industrial Control Systems (ICS), Devices and Users. Under Rajesh’s leadership company has accelerated to grown over 300% annual in last 3 years deployed over 100+ large enterprise customers in Insurance, Healthcare, Retail, Manufacturing, Oil & Gas and Pharma. Rajesh leads a team of 400+ people worldwide and drives the vision, strategy, and execution of the company’s products and services. As an accomplished technology leader, Rajesh has led product teams at VMware, BMC, HP, and Oracle, and has been on the front lines of the battle against cyberattacks for more than two decades. He has been awarded six patents for his innovations in cloud automation and cybersecurity, and is a member of YPO and TiE, two global networks of entrepreneurs and executives. Rajesh is passionate about solving complex problems, creating value for customers, and building a culture of excellence and innovation at ColorTokens.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 343 Deep Dive: Rajesh Khazanchi | Breach Ready is More Than Just A Mindset]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Rajesh Khazanchi, CEO and co-founder of ColorTokens, as he explores what it truly means to be “breach ready” in today’s cybersecurity landscape. Rajesh emphasises the shift from perimeter-based defences to a proactive containment strategy, highlighting the importance of assuming breaches are inevitable and minimising damage through micro segmentation and Zero Trust principles. He discusses how evolving business pressures and sophisticated AI-driven attacks are raising expectations for swift decision-making and rapid recovery from disruptions. The conversation covers practical approaches for bridging knowledge gaps, the role of continuous compliance and visibility, and how organisations can leverage existing EDR technologies to achieve stronger resilience without increasing tool sprawl. Rajesh also shares insights on building customer trust through quicker recovery times, the impact of business continuity on competitive advantage, and the importance of design thinking for both organisational and personal cyber safety.</p>
<p>Rajesh Khazanchi is the CEO and Co-Founder of ColorTokens, a company that provides a zero-trust segmentation SaaS platform that spans across IT, OT, Industrial Control Systems (ICS), Devices and Users. Under Rajesh’s leadership company has accelerated to grown over 300% annual in last 3 years deployed over 100+ large enterprise customers in Insurance, Healthcare, Retail, Manufacturing, Oil &amp; Gas and Pharma. Rajesh leads a team of 400+ people worldwide and drives the vision, strategy, and execution of the company’s products and services. As an accomplished technology leader, Rajesh has led product teams at VMware, BMC, HP, and Oracle, and has been on the front lines of the battle against cyberattacks for more than two decades. He has been awarded six patents for his innovations in cloud automation and cybersecurity, and is a member of YPO and TiE, two global networks of entrepreneurs and executives. Rajesh is passionate about solving complex problems, creating value for customers, and building a culture of excellence and innovation at ColorTokens.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2229578/c1e-d5v7amzm57bpd4gq-rkp13gj8cgz-f9chll.mp3" length="36826844"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Rajesh Khazanchi, CEO and co-founder of ColorTokens, as he explores what it truly means to be “breach ready” in today’s cybersecurity landscape. Rajesh emphasises the shift from perimeter-based defences to a proactive containment strategy, highlighting the importance of assuming breaches are inevitable and minimising damage through micro segmentation and Zero Trust principles. He discusses how evolving business pressures and sophisticated AI-driven attacks are raising expectations for swift decision-making and rapid recovery from disruptions. The conversation covers practical approaches for bridging knowledge gaps, the role of continuous compliance and visibility, and how organisations can leverage existing EDR technologies to achieve stronger resilience without increasing tool sprawl. Rajesh also shares insights on building customer trust through quicker recovery times, the impact of business continuity on competitive advantage, and the importance of design thinking for both organisational and personal cyber safety.
Rajesh Khazanchi is the CEO and Co-Founder of ColorTokens, a company that provides a zero-trust segmentation SaaS platform that spans across IT, OT, Industrial Control Systems (ICS), Devices and Users. Under Rajesh’s leadership company has accelerated to grown over 300% annual in last 3 years deployed over 100+ large enterprise customers in Insurance, Healthcare, Retail, Manufacturing, Oil & Gas and Pharma. Rajesh leads a team of 400+ people worldwide and drives the vision, strategy, and execution of the company’s products and services. As an accomplished technology leader, Rajesh has led product teams at VMware, BMC, HP, and Oracle, and has been on the front lines of the battle against cyberattacks for more than two decades. He has been awarded six patents for his innovations in cloud automation and cybersecurity, and is a member of YPO and TiE, two global networks of entrepreneurs and executives. Rajesh is passionate about solving complex problems, creating value for customers, and building a culture of excellence and innovation at ColorTokens.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2229578/c1a-5k0v-6zq7z7jmf9mr-1s2kfm.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 342 Deep Dive: Daniel Churches | The Impact of Personal Liability in Cybersecurity and Security Professionals]]>
                </title>
                <pubDate>Tue, 11 Nov 2025 05:00:52 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2202115</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-342-deep-dive-daniel-churches-the-impact-of-personal-liability-in-cybersecurity-and-secur</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Daniel Churches, Director in Sydney at ColorTokens, as he explores the sweeping impact of new Australian legislation imposing personal liability on company directors for cybersecurity breaches. Daniel breaks down the shifting landscape for CISOs and senior security leaders, the end of self-regulation, and how shared risk at the board and executive levels is altering market behaviour. He discusses the challenges around resource constraints in security teams, the crucial role of business continuity planning, and the importance of articulating measurable value to organisational leadership. We also examine how the legislation is driving changes in funding priorities, motivating cross-functional engagement, and preparing organisations to better withstand breaches in an evolving threat environment. Daniel shares his optimism about the future, emphasising both the increased pressure and potential for positive, industry-wide change.</p>
<p>Dan is an Australian and Asia Pacific Sales Leader with over 25 years’ IT experience in Hardware and Software Solutions and Services, Business Development, GTM planning and implementation, Large Complex Negotiations and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation solution sales.</p>
<p>As a Sales Director with ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens “Breach Ready” messaging focusing on halting the spread of ransomware and malware attacks across IT/OT, IoT and Legacy environments providing customers a viable Cyber Resilience ‘Uptime’ compliance capability they can report to market.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Daniel Churches, Director in Sydney at ColorTokens, as he explores the sweeping impact of new Australian legislation imposing personal liability on company directors for cybersecurity breaches. Daniel breaks down the shifting landscape for CISOs and senior security leaders, the end of self-regulation, and how shared risk at the board and executive levels is altering market behaviour. He discusses the challenges around resource constraints in security teams, the crucial role of business continuity planning, and the importance of articulating measurable value to organisational leadership. We also examine how the legislation is driving changes in funding priorities, motivating cross-functional engagement, and preparing organisations to better withstand breaches in an evolving threat environment. Daniel shares his optimism about the future, emphasising both the increased pressure and potential for positive, industry-wide change.
Dan is an Australian and Asia Pacific Sales Leader with over 25 years’ IT experience in Hardware and Software Solutions and Services, Business Development, GTM planning and implementation, Large Complex Negotiations and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation solution sales.
As a Sales Director with ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens “Breach Ready” messaging focusing on halting the spread of ransomware and malware attacks across IT/OT, IoT and Legacy environments providing customers a viable Cyber Resilience ‘Uptime’ compliance capability they can report to market.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 342 Deep Dive: Daniel Churches | The Impact of Personal Liability in Cybersecurity and Security Professionals]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Daniel Churches, Director in Sydney at ColorTokens, as he explores the sweeping impact of new Australian legislation imposing personal liability on company directors for cybersecurity breaches. Daniel breaks down the shifting landscape for CISOs and senior security leaders, the end of self-regulation, and how shared risk at the board and executive levels is altering market behaviour. He discusses the challenges around resource constraints in security teams, the crucial role of business continuity planning, and the importance of articulating measurable value to organisational leadership. We also examine how the legislation is driving changes in funding priorities, motivating cross-functional engagement, and preparing organisations to better withstand breaches in an evolving threat environment. Daniel shares his optimism about the future, emphasising both the increased pressure and potential for positive, industry-wide change.</p>
<p>Dan is an Australian and Asia Pacific Sales Leader with over 25 years’ IT experience in Hardware and Software Solutions and Services, Business Development, GTM planning and implementation, Large Complex Negotiations and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation solution sales.</p>
<p>As a Sales Director with ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens “Breach Ready” messaging focusing on halting the spread of ransomware and malware attacks across IT/OT, IoT and Legacy environments providing customers a viable Cyber Resilience ‘Uptime’ compliance capability they can report to market.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2202115/c1e-3g92ck6wx1fkq027-8dod8m90f3z-ppstqn.mp3" length="39829881"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Daniel Churches, Director in Sydney at ColorTokens, as he explores the sweeping impact of new Australian legislation imposing personal liability on company directors for cybersecurity breaches. Daniel breaks down the shifting landscape for CISOs and senior security leaders, the end of self-regulation, and how shared risk at the board and executive levels is altering market behaviour. He discusses the challenges around resource constraints in security teams, the crucial role of business continuity planning, and the importance of articulating measurable value to organisational leadership. We also examine how the legislation is driving changes in funding priorities, motivating cross-functional engagement, and preparing organisations to better withstand breaches in an evolving threat environment. Daniel shares his optimism about the future, emphasising both the increased pressure and potential for positive, industry-wide change.
Dan is an Australian and Asia Pacific Sales Leader with over 25 years’ IT experience in Hardware and Software Solutions and Services, Business Development, GTM planning and implementation, Large Complex Negotiations and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation solution sales.
As a Sales Director with ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens “Breach Ready” messaging focusing on halting the spread of ransomware and malware attacks across IT/OT, IoT and Legacy environments providing customers a viable Cyber Resilience ‘Uptime’ compliance capability they can report to market.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2202115/c1a-5k0v-xxgxkj0vu8mq-rum8nt.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 341 Deep Dive: Anshuman Sharma | A Critical Infrastructure Approach to Cyber Security]]>
                </title>
                <pubDate>Wed, 05 Nov 2025 04:55:59 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2192902</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-341-deep-dive-anshuman-sharma-a-critical-infrastructure-approach-to-cyber-security</link>
                                <description>
                                            <![CDATA[<p>Anshuman Sharma is the Director of Verizon Threat Research Advisory Centre (VTRAC), Cybersecurity Consulting Services at Verizon Business. Anshuman has more than 17 years’ experience as a well-rounded and seasoned Cyber Security Professional.</p>
<p>VTRAC is a specialized division within Verizon’s Cyber Security Consulting organisation, helping customers regain control and mitigate cyber threats from their networks, applications and devices. VTRAC team members are located across the globe, bringing together professionals with military, law enforcement and IT expertise who are well-versed in criminal and civil investigative requirements.  The organisation is a globally-approved PCI Forensic Investigator (PFI).</p>
<p>As a regional leader for the investigative response team and a global capability lead for VTRAC, Anshuman is responsible for business portfolio management for professional services, especially focused on digital forensics, incident response, and threat intelligence in the APJ region while working for several top global enterprises and government organisations.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Anshuman Sharma is the Director of Verizon Threat Research Advisory Centre (VTRAC), Cybersecurity Consulting Services at Verizon Business. Anshuman has more than 17 years’ experience as a well-rounded and seasoned Cyber Security Professional.
VTRAC is a specialized division within Verizon’s Cyber Security Consulting organisation, helping customers regain control and mitigate cyber threats from their networks, applications and devices. VTRAC team members are located across the globe, bringing together professionals with military, law enforcement and IT expertise who are well-versed in criminal and civil investigative requirements.  The organisation is a globally-approved PCI Forensic Investigator (PFI).
As a regional leader for the investigative response team and a global capability lead for VTRAC, Anshuman is responsible for business portfolio management for professional services, especially focused on digital forensics, incident response, and threat intelligence in the APJ region while working for several top global enterprises and government organisations.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 341 Deep Dive: Anshuman Sharma | A Critical Infrastructure Approach to Cyber Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Anshuman Sharma is the Director of Verizon Threat Research Advisory Centre (VTRAC), Cybersecurity Consulting Services at Verizon Business. Anshuman has more than 17 years’ experience as a well-rounded and seasoned Cyber Security Professional.</p>
<p>VTRAC is a specialized division within Verizon’s Cyber Security Consulting organisation, helping customers regain control and mitigate cyber threats from their networks, applications and devices. VTRAC team members are located across the globe, bringing together professionals with military, law enforcement and IT expertise who are well-versed in criminal and civil investigative requirements.  The organisation is a globally-approved PCI Forensic Investigator (PFI).</p>
<p>As a regional leader for the investigative response team and a global capability lead for VTRAC, Anshuman is responsible for business portfolio management for professional services, especially focused on digital forensics, incident response, and threat intelligence in the APJ region while working for several top global enterprises and government organisations.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2192902/c1e-1dogs516gxaxv9nj-rkpgx8noi46o-2519xy.mp3" length="42475145"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Anshuman Sharma is the Director of Verizon Threat Research Advisory Centre (VTRAC), Cybersecurity Consulting Services at Verizon Business. Anshuman has more than 17 years’ experience as a well-rounded and seasoned Cyber Security Professional.
VTRAC is a specialized division within Verizon’s Cyber Security Consulting organisation, helping customers regain control and mitigate cyber threats from their networks, applications and devices. VTRAC team members are located across the globe, bringing together professionals with military, law enforcement and IT expertise who are well-versed in criminal and civil investigative requirements.  The organisation is a globally-approved PCI Forensic Investigator (PFI).
As a regional leader for the investigative response team and a global capability lead for VTRAC, Anshuman is responsible for business portfolio management for professional services, especially focused on digital forensics, incident response, and threat intelligence in the APJ region while working for several top global enterprises and government organisations.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2192902/c1a-5k0v-34m502nkb7d1-8x9lph.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 340 Deep Dive: Paul Davis | JFrog’s First Step Towards AppTrust and DevGovOps]]>
                </title>
                <pubDate>Wed, 29 Oct 2025 05:00:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2173754</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-340-deep-dive-paul-davis-jfrogs-first-step-towards-apptrust-and-devgovops</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Paul Davis, Field CISO at JFrog, as he explores JFrog’s approach to building trust in software development pipelines and the evolution towards DevGovOps. Paul shares his perspective on elevating trust from the granular level of software releases to the broader application layer, emphasising the need for consistent, automated, and reliable methodologies in development. He discusses the critical role of automation in balancing speed and security, tackling tool sprawl, and mitigating risks posed by open source dependencies. The conversation touches on the realities of legacy tech debt, the challenges of integrating and consolidating security tooling, and the importance of having a single source of truth.</p>
<p>Paul is an experienced IT Security Executive who, as Field CISO at JFrog, works to help CISOs, IT execs and security teams, enhance protection of their software supply chain. Additionally, he advises IT security startups, mentors security leaders, and provides guidance on various IT security trends.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Paul Davis, Field CISO at JFrog, as he explores JFrog’s approach to building trust in software development pipelines and the evolution towards DevGovOps. Paul shares his perspective on elevating trust from the granular level of software releases to the broader application layer, emphasising the need for consistent, automated, and reliable methodologies in development. He discusses the critical role of automation in balancing speed and security, tackling tool sprawl, and mitigating risks posed by open source dependencies. The conversation touches on the realities of legacy tech debt, the challenges of integrating and consolidating security tooling, and the importance of having a single source of truth.
Paul is an experienced IT Security Executive who, as Field CISO at JFrog, works to help CISOs, IT execs and security teams, enhance protection of their software supply chain. Additionally, he advises IT security startups, mentors security leaders, and provides guidance on various IT security trends.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 340 Deep Dive: Paul Davis | JFrog’s First Step Towards AppTrust and DevGovOps]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Paul Davis, Field CISO at JFrog, as he explores JFrog’s approach to building trust in software development pipelines and the evolution towards DevGovOps. Paul shares his perspective on elevating trust from the granular level of software releases to the broader application layer, emphasising the need for consistent, automated, and reliable methodologies in development. He discusses the critical role of automation in balancing speed and security, tackling tool sprawl, and mitigating risks posed by open source dependencies. The conversation touches on the realities of legacy tech debt, the challenges of integrating and consolidating security tooling, and the importance of having a single source of truth.</p>
<p>Paul is an experienced IT Security Executive who, as Field CISO at JFrog, works to help CISOs, IT execs and security teams, enhance protection of their software supply chain. Additionally, he advises IT security startups, mentors security leaders, and provides guidance on various IT security trends.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2173754/c1e-41r8c1d4vnfopgxk-pkvvowrpamwk-vssko1.mp3" length="42231056"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Paul Davis, Field CISO at JFrog, as he explores JFrog’s approach to building trust in software development pipelines and the evolution towards DevGovOps. Paul shares his perspective on elevating trust from the granular level of software releases to the broader application layer, emphasising the need for consistent, automated, and reliable methodologies in development. He discusses the critical role of automation in balancing speed and security, tackling tool sprawl, and mitigating risks posed by open source dependencies. The conversation touches on the realities of legacy tech debt, the challenges of integrating and consolidating security tooling, and the importance of having a single source of truth.
Paul is an experienced IT Security Executive who, as Field CISO at JFrog, works to help CISOs, IT execs and security teams, enhance protection of their software supply chain. Additionally, he advises IT security startups, mentors security leaders, and provides guidance on various IT security trends.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2173754/c1a-5k0v-0v77m92xcg49-tipmyg.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:00</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 339 Deep Dive: M.K. Palmore | Leading Through Uncertainty: Security, Safety, and Cyber Awareness in a Time of Crisis]]>
                </title>
                <pubDate>Wed, 22 Oct 2025 04:58:27 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2169673</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-339-deep-dive-mk-palmore-leading-through-uncertainty-security-safety-and-cyber-aware</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with M.K. Palmore, Chief Executive Officer at Apogee Global RMS, as he explores strategies for leading through uncertainty with a focus on security, safety, and cyber awareness in times of crisis. M.K. emphasises the critical importance of practicing security response scenarios, noting that organisations truly respond better in real-world incidents when they’ve regularly rehearsed decision-making with their teams. He discusses the value of people-centric leadership, the need for strong relationships with both internal stakeholders and external partners, and the dangers of letting practice fall to the bottom of the priority list. As security concerns grow globally—particularly for government officials and public leaders—M.K. reflects on the heightened threat landscape, the impact of political divisiveness, and the role of leadership in lowering tensions. He concludes by highlighting the enduring need for leaders to maintain humanity and remain diligent, ensuring decisions are always made with people at the centre.</p>
<p class="p1">M.K. Palmore is an award-winning cybersecurity executive, military veteran, public speaker, and leadership advisor with more than 30 years of combined public- and private-sector experience. He is the Founder and CEO of Apogee Global RMS, a veteran-owned enterprise risk management advisory firm delivering solutions across cyber and physical risk landscapes. Through Apogee, he also leads the Apogee Speakers Bureau, a premier platform showcasing more than 40 diverse experts at the intersection of technology, leadership, and security.</p>
<p class="p3">Palmore’s distinguished career includes service as a commissioned officer in the U.S. Marine Corps, leadership as head of the Cyber Security Branch at the FBI’s San Francisco Field Office, and senior executive roles in the private sector, including VP/Field CSO at Palo Alto Networks and Director in Google Cloud’s Office of the CISO.</p>
<p class="p1">A graduate of the U.S. Naval Academy, Palmore also holds an MBA from Pepperdine University. His expertise spans cybersecurity strategy, executive risk management, leadership, digital transformation, cloud security, and national security. He is widely sought after as a keynote speaker and advisor to boards and senior executives navigating today’s complex threat landscape.</p>
<p class="p3">Through Apogee Global RMS and its Speakers Bureau, Palmore is advancing his mission to amplify diverse voices and perspectives shaping the future of technology, leadership, and security.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with M.K. Palmore, Chief Executive Officer at Apogee Global RMS, as he explores strategies for leading through uncertainty with a focus on security, safety, and cyber awareness in times of crisis. M.K. emphasises the critical importance of practicing security response scenarios, noting that organisations truly respond better in real-world incidents when they’ve regularly rehearsed decision-making with their teams. He discusses the value of people-centric leadership, the need for strong relationships with both internal stakeholders and external partners, and the dangers of letting practice fall to the bottom of the priority list. As security concerns grow globally—particularly for government officials and public leaders—M.K. reflects on the heightened threat landscape, the impact of political divisiveness, and the role of leadership in lowering tensions. He concludes by highlighting the enduring need for leaders to maintain humanity and remain diligent, ensuring decisions are always made with people at the centre.
M.K. Palmore is an award-winning cybersecurity executive, military veteran, public speaker, and leadership advisor with more than 30 years of combined public- and private-sector experience. He is the Founder and CEO of Apogee Global RMS, a veteran-owned enterprise risk management advisory firm delivering solutions across cyber and physical risk landscapes. Through Apogee, he also leads the Apogee Speakers Bureau, a premier platform showcasing more than 40 diverse experts at the intersection of technology, leadership, and security.
Palmore’s distinguished career includes service as a commissioned officer in the U.S. Marine Corps, leadership as head of the Cyber Security Branch at the FBI’s San Francisco Field Office, and senior executive roles in the private sector, including VP/Field CSO at Palo Alto Networks and Director in Google Cloud’s Office of the CISO.
A graduate of the U.S. Naval Academy, Palmore also holds an MBA from Pepperdine University. His expertise spans cybersecurity strategy, executive risk management, leadership, digital transformation, cloud security, and national security. He is widely sought after as a keynote speaker and advisor to boards and senior executives navigating today’s complex threat landscape.
Through Apogee Global RMS and its Speakers Bureau, Palmore is advancing his mission to amplify diverse voices and perspectives shaping the future of technology, leadership, and security.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 339 Deep Dive: M.K. Palmore | Leading Through Uncertainty: Security, Safety, and Cyber Awareness in a Time of Crisis]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with M.K. Palmore, Chief Executive Officer at Apogee Global RMS, as he explores strategies for leading through uncertainty with a focus on security, safety, and cyber awareness in times of crisis. M.K. emphasises the critical importance of practicing security response scenarios, noting that organisations truly respond better in real-world incidents when they’ve regularly rehearsed decision-making with their teams. He discusses the value of people-centric leadership, the need for strong relationships with both internal stakeholders and external partners, and the dangers of letting practice fall to the bottom of the priority list. As security concerns grow globally—particularly for government officials and public leaders—M.K. reflects on the heightened threat landscape, the impact of political divisiveness, and the role of leadership in lowering tensions. He concludes by highlighting the enduring need for leaders to maintain humanity and remain diligent, ensuring decisions are always made with people at the centre.</p>
<p class="p1">M.K. Palmore is an award-winning cybersecurity executive, military veteran, public speaker, and leadership advisor with more than 30 years of combined public- and private-sector experience. He is the Founder and CEO of Apogee Global RMS, a veteran-owned enterprise risk management advisory firm delivering solutions across cyber and physical risk landscapes. Through Apogee, he also leads the Apogee Speakers Bureau, a premier platform showcasing more than 40 diverse experts at the intersection of technology, leadership, and security.</p>
<p class="p3">Palmore’s distinguished career includes service as a commissioned officer in the U.S. Marine Corps, leadership as head of the Cyber Security Branch at the FBI’s San Francisco Field Office, and senior executive roles in the private sector, including VP/Field CSO at Palo Alto Networks and Director in Google Cloud’s Office of the CISO.</p>
<p class="p1">A graduate of the U.S. Naval Academy, Palmore also holds an MBA from Pepperdine University. His expertise spans cybersecurity strategy, executive risk management, leadership, digital transformation, cloud security, and national security. He is widely sought after as a keynote speaker and advisor to boards and senior executives navigating today’s complex threat landscape.</p>
<p class="p3">Through Apogee Global RMS and its Speakers Bureau, Palmore is advancing his mission to amplify diverse voices and perspectives shaping the future of technology, leadership, and security.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2169673/c1e-z9w7f7x0k2iokrwj-25m4kg51ixp8-tgzhkt.mp3" length="38380816"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with M.K. Palmore, Chief Executive Officer at Apogee Global RMS, as he explores strategies for leading through uncertainty with a focus on security, safety, and cyber awareness in times of crisis. M.K. emphasises the critical importance of practicing security response scenarios, noting that organisations truly respond better in real-world incidents when they’ve regularly rehearsed decision-making with their teams. He discusses the value of people-centric leadership, the need for strong relationships with both internal stakeholders and external partners, and the dangers of letting practice fall to the bottom of the priority list. As security concerns grow globally—particularly for government officials and public leaders—M.K. reflects on the heightened threat landscape, the impact of political divisiveness, and the role of leadership in lowering tensions. He concludes by highlighting the enduring need for leaders to maintain humanity and remain diligent, ensuring decisions are always made with people at the centre.
M.K. Palmore is an award-winning cybersecurity executive, military veteran, public speaker, and leadership advisor with more than 30 years of combined public- and private-sector experience. He is the Founder and CEO of Apogee Global RMS, a veteran-owned enterprise risk management advisory firm delivering solutions across cyber and physical risk landscapes. Through Apogee, he also leads the Apogee Speakers Bureau, a premier platform showcasing more than 40 diverse experts at the intersection of technology, leadership, and security.
Palmore’s distinguished career includes service as a commissioned officer in the U.S. Marine Corps, leadership as head of the Cyber Security Branch at the FBI’s San Francisco Field Office, and senior executive roles in the private sector, including VP/Field CSO at Palo Alto Networks and Director in Google Cloud’s Office of the CISO.
A graduate of the U.S. Naval Academy, Palmore also holds an MBA from Pepperdine University. His expertise spans cybersecurity strategy, executive risk management, leadership, digital transformation, cloud security, and national security. He is widely sought after as a keynote speaker and advisor to boards and senior executives navigating today’s complex threat landscape.
Through Apogee Global RMS and its Speakers Bureau, Palmore is advancing his mission to amplify diverse voices and perspectives shaping the future of technology, leadership, and security.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2169673/c1a-5k0v-34m7gzqnf2r1-mlr5wf.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 338 Deep Dive: Eric Stride | Securing the Aviation Industry in the Modern Age]]>
                </title>
                <pubDate>Wed, 15 Oct 2025 05:00:59 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2164527</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-338-deep-dive-eric-stride-securing-the-aviation-industry-in-the-modern-age</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Eric Stride, Chief Security Officer at Huntress, to discuss the escalating cybersecurity challenges facing the aviation industry. Eric highlights the alarming 600% year-over-year surge in cyberattacks targeting the sector, emphasising how attackers are exploiting the interconnected and fragile aviation supply chain—most notably seen in recent incidents like the ransomware strike on Collins Aerospace. He explores the growing risk posed by both IT and OT system convergence, the shift in regulation tying cybersecurity readiness directly to airworthiness, and the increasing adoption of robust frameworks to mitigate operational disruptions and data breaches. Eric also highlights the critical need for holistic supply chain security, the importance of regulatory enforcement, and a cultural shift in the industry toward prioritising safety and cyber resilience to restore public trust in air travel.</p>
<p>Eric Stride is the Chief Security Officer at Huntress, where he oversees the company’s 24/7 Global Security Operations Center, Detection Engineering, Adversary Tactics, IT Operations, and Internal Security. A 20+ year cybersecurity leader, Eric has held senior roles spanning the U.S. Air Force, NSA, and private sector. </p>
<p>During his 12 years on active duty, Eric helped architect the Air Force’s first cyber combat mission team, co-authored its first offensive cyber operations manual, and rose to Deputy Chief for Cyber Operations at NSA Georgia. He continues to serve as a Colonel in the Air Force Reserve, where he established its first cyber range squadron. </p>
<p>In the private sector, Eric co-founded Atlas Cybersecurity, advised defense and enterprise clients as an independent consultant, and led Deloitte’s Advanced Cyber Training portfolio, generating $135M+ in new business. He holds an M.S. in Information Technology Management, a B.S. in Computer Science, and multiple cybersecurity certifications (CISSP, GCIH, CEH). </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Eric Stride, Chief Security Officer at Huntress, to discuss the escalating cybersecurity challenges facing the aviation industry. Eric highlights the alarming 600% year-over-year surge in cyberattacks targeting the sector, emphasising how attackers are exploiting the interconnected and fragile aviation supply chain—most notably seen in recent incidents like the ransomware strike on Collins Aerospace. He explores the growing risk posed by both IT and OT system convergence, the shift in regulation tying cybersecurity readiness directly to airworthiness, and the increasing adoption of robust frameworks to mitigate operational disruptions and data breaches. Eric also highlights the critical need for holistic supply chain security, the importance of regulatory enforcement, and a cultural shift in the industry toward prioritising safety and cyber resilience to restore public trust in air travel.
Eric Stride is the Chief Security Officer at Huntress, where he oversees the company’s 24/7 Global Security Operations Center, Detection Engineering, Adversary Tactics, IT Operations, and Internal Security. A 20+ year cybersecurity leader, Eric has held senior roles spanning the U.S. Air Force, NSA, and private sector. 
During his 12 years on active duty, Eric helped architect the Air Force’s first cyber combat mission team, co-authored its first offensive cyber operations manual, and rose to Deputy Chief for Cyber Operations at NSA Georgia. He continues to serve as a Colonel in the Air Force Reserve, where he established its first cyber range squadron. 
In the private sector, Eric co-founded Atlas Cybersecurity, advised defense and enterprise clients as an independent consultant, and led Deloitte’s Advanced Cyber Training portfolio, generating $135M+ in new business. He holds an M.S. in Information Technology Management, a B.S. in Computer Science, and multiple cybersecurity certifications (CISSP, GCIH, CEH). ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 338 Deep Dive: Eric Stride | Securing the Aviation Industry in the Modern Age]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Eric Stride, Chief Security Officer at Huntress, to discuss the escalating cybersecurity challenges facing the aviation industry. Eric highlights the alarming 600% year-over-year surge in cyberattacks targeting the sector, emphasising how attackers are exploiting the interconnected and fragile aviation supply chain—most notably seen in recent incidents like the ransomware strike on Collins Aerospace. He explores the growing risk posed by both IT and OT system convergence, the shift in regulation tying cybersecurity readiness directly to airworthiness, and the increasing adoption of robust frameworks to mitigate operational disruptions and data breaches. Eric also highlights the critical need for holistic supply chain security, the importance of regulatory enforcement, and a cultural shift in the industry toward prioritising safety and cyber resilience to restore public trust in air travel.</p>
<p>Eric Stride is the Chief Security Officer at Huntress, where he oversees the company’s 24/7 Global Security Operations Center, Detection Engineering, Adversary Tactics, IT Operations, and Internal Security. A 20+ year cybersecurity leader, Eric has held senior roles spanning the U.S. Air Force, NSA, and private sector. </p>
<p>During his 12 years on active duty, Eric helped architect the Air Force’s first cyber combat mission team, co-authored its first offensive cyber operations manual, and rose to Deputy Chief for Cyber Operations at NSA Georgia. He continues to serve as a Colonel in the Air Force Reserve, where he established its first cyber range squadron. </p>
<p>In the private sector, Eric co-founded Atlas Cybersecurity, advised defense and enterprise clients as an independent consultant, and led Deloitte’s Advanced Cyber Training portfolio, generating $135M+ in new business. He holds an M.S. in Information Technology Management, a B.S. in Computer Science, and multiple cybersecurity certifications (CISSP, GCIH, CEH). </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2164527/c1e-7km5b97x06ad6vxo-jpn2jgz3sggz-qpgd1l.mp3" length="36665930"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Eric Stride, Chief Security Officer at Huntress, to discuss the escalating cybersecurity challenges facing the aviation industry. Eric highlights the alarming 600% year-over-year surge in cyberattacks targeting the sector, emphasising how attackers are exploiting the interconnected and fragile aviation supply chain—most notably seen in recent incidents like the ransomware strike on Collins Aerospace. He explores the growing risk posed by both IT and OT system convergence, the shift in regulation tying cybersecurity readiness directly to airworthiness, and the increasing adoption of robust frameworks to mitigate operational disruptions and data breaches. Eric also highlights the critical need for holistic supply chain security, the importance of regulatory enforcement, and a cultural shift in the industry toward prioritising safety and cyber resilience to restore public trust in air travel.
Eric Stride is the Chief Security Officer at Huntress, where he oversees the company’s 24/7 Global Security Operations Center, Detection Engineering, Adversary Tactics, IT Operations, and Internal Security. A 20+ year cybersecurity leader, Eric has held senior roles spanning the U.S. Air Force, NSA, and private sector. 
During his 12 years on active duty, Eric helped architect the Air Force’s first cyber combat mission team, co-authored its first offensive cyber operations manual, and rose to Deputy Chief for Cyber Operations at NSA Georgia. He continues to serve as a Colonel in the Air Force Reserve, where he established its first cyber range squadron. 
In the private sector, Eric co-founded Atlas Cybersecurity, advised defense and enterprise clients as an independent consultant, and led Deloitte’s Advanced Cyber Training portfolio, generating $135M+ in new business. He holds an M.S. in Information Technology Management, a B.S. in Computer Science, and multiple cybersecurity certifications (CISSP, GCIH, CEH). ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2164527/c1a-5k0v-v6p2p8n2ckm-7ltl6p.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 337 Deep Dive: Christine Gadsby | Why Mobile Espionage is a Critical National Security Threat to Australia and Globally]]>
                </title>
                <pubDate>Wed, 08 Oct 2025 05:00:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2159599</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-337-deep-dive-christine-gadsby-why-mobile-espionage-is-a-critical-national-security-threa</link>
                                <description>
                                            <![CDATA[<p class="cvGsUA direction-ltr align-start para-style-body">In this episode, we sit down with Christine Gadsby, Chief Security Advisor at BlackBerry, as she explores why mobile espionage has become a critical national security threat in Australia and globally. Christine unpacks the mounting risks posed by outdated telco infrastructure, the vulnerability of mobile communications, and the rapid evolution of attacker tactics—fueled by AI, automation, and the expansive attack surface created by free messaging apps. She highlights the real-world impact of scams, cultural differences in social engineering, and the challenges faced by both consumers and organizations in protecting sensitive information.</p>
<p>Christine Gadsby is the Vice President and Chief Information Security Officer for BlackBerry Secure Communications. With over 20 years of experience in mobile and information security, Christine is known for her strategic vision and leadership skills, with a proven track record of developing and implementing robust strategies that protect organizations from evolving risks and digital threats – particularly in the areas of communications security and critical event management.
Gadsby is a visionary who helped pioneer secure software supply chain efforts and SDLC capabilities influencing industry and government-driven security frameworks in use by the world’s most security-conscious industries.</p>
<p>She is a sought-after panelist, moderator, and keynote speaker with several awards for challenging security mindsets and leading Diversity efforts, including Cybersecurity Woman of the Year, Power 100 Women in Security, and Top 10 Women Leading Cybersecurity. She is a well-known contributor, including RSA, CES, Black Hat and has been quoted in notable media outlets Fox News, CBS, Yahoo, MSN, CSO Magazine, CyberScoop, and Dark Reading.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Christine Gadsby, Chief Security Advisor at BlackBerry, as she explores why mobile espionage has become a critical national security threat in Australia and globally. Christine unpacks the mounting risks posed by outdated telco infrastructure, the vulnerability of mobile communications, and the rapid evolution of attacker tactics—fueled by AI, automation, and the expansive attack surface created by free messaging apps. She highlights the real-world impact of scams, cultural differences in social engineering, and the challenges faced by both consumers and organizations in protecting sensitive information.
Christine Gadsby is the Vice President and Chief Information Security Officer for BlackBerry Secure Communications. With over 20 years of experience in mobile and information security, Christine is known for her strategic vision and leadership skills, with a proven track record of developing and implementing robust strategies that protect organizations from evolving risks and digital threats – particularly in the areas of communications security and critical event management.
Gadsby is a visionary who helped pioneer secure software supply chain efforts and SDLC capabilities influencing industry and government-driven security frameworks in use by the world’s most security-conscious industries.
She is a sought-after panelist, moderator, and keynote speaker with several awards for challenging security mindsets and leading Diversity efforts, including Cybersecurity Woman of the Year, Power 100 Women in Security, and Top 10 Women Leading Cybersecurity. She is a well-known contributor, including RSA, CES, Black Hat and has been quoted in notable media outlets Fox News, CBS, Yahoo, MSN, CSO Magazine, CyberScoop, and Dark Reading.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 337 Deep Dive: Christine Gadsby | Why Mobile Espionage is a Critical National Security Threat to Australia and Globally]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p class="cvGsUA direction-ltr align-start para-style-body">In this episode, we sit down with Christine Gadsby, Chief Security Advisor at BlackBerry, as she explores why mobile espionage has become a critical national security threat in Australia and globally. Christine unpacks the mounting risks posed by outdated telco infrastructure, the vulnerability of mobile communications, and the rapid evolution of attacker tactics—fueled by AI, automation, and the expansive attack surface created by free messaging apps. She highlights the real-world impact of scams, cultural differences in social engineering, and the challenges faced by both consumers and organizations in protecting sensitive information.</p>
<p>Christine Gadsby is the Vice President and Chief Information Security Officer for BlackBerry Secure Communications. With over 20 years of experience in mobile and information security, Christine is known for her strategic vision and leadership skills, with a proven track record of developing and implementing robust strategies that protect organizations from evolving risks and digital threats – particularly in the areas of communications security and critical event management.
Gadsby is a visionary who helped pioneer secure software supply chain efforts and SDLC capabilities influencing industry and government-driven security frameworks in use by the world’s most security-conscious industries.</p>
<p>She is a sought-after panelist, moderator, and keynote speaker with several awards for challenging security mindsets and leading Diversity efforts, including Cybersecurity Woman of the Year, Power 100 Women in Security, and Top 10 Women Leading Cybersecurity. She is a well-known contributor, including RSA, CES, Black Hat and has been quoted in notable media outlets Fox News, CBS, Yahoo, MSN, CSO Magazine, CyberScoop, and Dark Reading.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2159599/c1e-3g92ckp5wwfkq09n-rkp03x7dhmro-tepyq5.mp3" length="39299958"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Christine Gadsby, Chief Security Advisor at BlackBerry, as she explores why mobile espionage has become a critical national security threat in Australia and globally. Christine unpacks the mounting risks posed by outdated telco infrastructure, the vulnerability of mobile communications, and the rapid evolution of attacker tactics—fueled by AI, automation, and the expansive attack surface created by free messaging apps. She highlights the real-world impact of scams, cultural differences in social engineering, and the challenges faced by both consumers and organizations in protecting sensitive information.
Christine Gadsby is the Vice President and Chief Information Security Officer for BlackBerry Secure Communications. With over 20 years of experience in mobile and information security, Christine is known for her strategic vision and leadership skills, with a proven track record of developing and implementing robust strategies that protect organizations from evolving risks and digital threats – particularly in the areas of communications security and critical event management.
Gadsby is a visionary who helped pioneer secure software supply chain efforts and SDLC capabilities influencing industry and government-driven security frameworks in use by the world’s most security-conscious industries.
She is a sought-after panelist, moderator, and keynote speaker with several awards for challenging security mindsets and leading Diversity efforts, including Cybersecurity Woman of the Year, Power 100 Women in Security, and Top 10 Women Leading Cybersecurity. She is a well-known contributor, including RSA, CES, Black Hat and has been quoted in notable media outlets Fox News, CBS, Yahoo, MSN, CSO Magazine, CyberScoop, and Dark Reading.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2159599/c1a-5k0v-ndvw0k25f708-exazoc.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 336 Deep Dive: Joe Cozzupoli | The Boardroom View of CTI and Speaking the Language of Risk]]>
                </title>
                <pubDate>Wed, 01 Oct 2025 05:57:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2154095</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-336-deep-dive-joe-cozzupoli-the-boardroom-view-of-cti-and-speaking-the-language-of-risk</link>
                                <description>
                                            <![CDATA[<p>Joe Cozzupoli is a Principal Security Advisor / Field CISO at Cosive with a focus on helping clients operationalise Cyber Threat Intelligence and Security Operations to reduce risk and deliver measurable business outcomes. With over 20 years in cyber security, Joe has led strategy and delivery for enterprises and government, translating board priorities into executable security programs and aligning identity, data protection, and cloud controls with organisational goals. Equally comfortable in the boardroom and at the whiteboard, he bridges business, architecture, and operations across Australia and internationally.</p>
<p>Prior to joining Cosive, Joe held senior roles at Microsoft, Citrix, Palo Alto Networks, and Cisco where he focused on AI and Data Security, cloud security, risk management, and executive engagement. He has served as a Virtual CISO and Security Architecture Advisor for complex transformations, including industrial and mining clients undergoing separation programs and Azure cloud migrations. Joe works extensively with Australian frameworks and regulations including the ACSC Essential Eight, APRA CPS 234, the SOCI Act, the PSPF, and ISO/IEC 27001, and partners with boards, CISOs, and delivery teams to operationalise pragmatic controls. A committed mentor to the next generation of practitioners, Joe has also completed ISACA training in AI Governance, AI Risk, and Auditing AI.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Joe Cozzupoli is a Principal Security Advisor / Field CISO at Cosive with a focus on helping clients operationalise Cyber Threat Intelligence and Security Operations to reduce risk and deliver measurable business outcomes. With over 20 years in cyber security, Joe has led strategy and delivery for enterprises and government, translating board priorities into executable security programs and aligning identity, data protection, and cloud controls with organisational goals. Equally comfortable in the boardroom and at the whiteboard, he bridges business, architecture, and operations across Australia and internationally.
Prior to joining Cosive, Joe held senior roles at Microsoft, Citrix, Palo Alto Networks, and Cisco where he focused on AI and Data Security, cloud security, risk management, and executive engagement. He has served as a Virtual CISO and Security Architecture Advisor for complex transformations, including industrial and mining clients undergoing separation programs and Azure cloud migrations. Joe works extensively with Australian frameworks and regulations including the ACSC Essential Eight, APRA CPS 234, the SOCI Act, the PSPF, and ISO/IEC 27001, and partners with boards, CISOs, and delivery teams to operationalise pragmatic controls. A committed mentor to the next generation of practitioners, Joe has also completed ISACA training in AI Governance, AI Risk, and Auditing AI.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 336 Deep Dive: Joe Cozzupoli | The Boardroom View of CTI and Speaking the Language of Risk]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Joe Cozzupoli is a Principal Security Advisor / Field CISO at Cosive with a focus on helping clients operationalise Cyber Threat Intelligence and Security Operations to reduce risk and deliver measurable business outcomes. With over 20 years in cyber security, Joe has led strategy and delivery for enterprises and government, translating board priorities into executable security programs and aligning identity, data protection, and cloud controls with organisational goals. Equally comfortable in the boardroom and at the whiteboard, he bridges business, architecture, and operations across Australia and internationally.</p>
<p>Prior to joining Cosive, Joe held senior roles at Microsoft, Citrix, Palo Alto Networks, and Cisco where he focused on AI and Data Security, cloud security, risk management, and executive engagement. He has served as a Virtual CISO and Security Architecture Advisor for complex transformations, including industrial and mining clients undergoing separation programs and Azure cloud migrations. Joe works extensively with Australian frameworks and regulations including the ACSC Essential Eight, APRA CPS 234, the SOCI Act, the PSPF, and ISO/IEC 27001, and partners with boards, CISOs, and delivery teams to operationalise pragmatic controls. A committed mentor to the next generation of practitioners, Joe has also completed ISACA training in AI Governance, AI Risk, and Auditing AI.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2154095/c1e-z9w7f74koqtokrwj-8dq7jov1i0zv-kzfsiy.mp3" length="36991520"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Joe Cozzupoli is a Principal Security Advisor / Field CISO at Cosive with a focus on helping clients operationalise Cyber Threat Intelligence and Security Operations to reduce risk and deliver measurable business outcomes. With over 20 years in cyber security, Joe has led strategy and delivery for enterprises and government, translating board priorities into executable security programs and aligning identity, data protection, and cloud controls with organisational goals. Equally comfortable in the boardroom and at the whiteboard, he bridges business, architecture, and operations across Australia and internationally.
Prior to joining Cosive, Joe held senior roles at Microsoft, Citrix, Palo Alto Networks, and Cisco where he focused on AI and Data Security, cloud security, risk management, and executive engagement. He has served as a Virtual CISO and Security Architecture Advisor for complex transformations, including industrial and mining clients undergoing separation programs and Azure cloud migrations. Joe works extensively with Australian frameworks and regulations including the ACSC Essential Eight, APRA CPS 234, the SOCI Act, the PSPF, and ISO/IEC 27001, and partners with boards, CISOs, and delivery teams to operationalise pragmatic controls. A committed mentor to the next generation of practitioners, Joe has also completed ISACA training in AI Governance, AI Risk, and Auditing AI.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2154095/c1a-5k0v-0vpmj7z4a1q5-zp9tdc.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 335 Deep Dive: Anne-Marie Paterson | The Changing Face of Risk]]>
                </title>
                <pubDate>Wed, 24 Sep 2025 05:58:36 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2148027</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-335-deep-dive-anne-marie-paterson-the-changing-face-of-risk</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Anne-Marie Paterson, a profound risk executive, to explore the evolving role of the Chief Risk Officer and the changing face of risk management. Anne-Marie shares her perspective on how risk now has a real seat at the C-suite table, emphasising the shift from being a business roadblock to serving as an enabler of strategy. She addresses the traditional stereotypes of risk professionals, contrasts conservative legacy approaches with the need for creativity and relevance, and highlights the increasing focus on non-financial risks such as conduct, reputation, and operational challenges—especially in light of rapidly advancing technologies like AI. Anne-Marie also provides insights into Australia’s regulatory landscape, discusses the balance between regulation and innovation, and underscores the importance of fostering a proactive risk culture throughout organisations.</p>
<p style="font-weight:400;"><strong><em>Blending legal expertise with executive leadership to deliver risk transformation and regulatory uplift at scale.</em></strong></p>
<p style="font-weight:400;">Anne-Marie Paterson is a risk executive and former legal partner with more than two decades of experience spanning risk management, governance, and legal services. Beginning her career in top-tier law firms before founding and leading her own practice, Anne-Marie has gone on to hold senior executive roles across ASX-listed companies and the financial services sector. Recognised as both a strategist and a problem-solver, she has built and led teams that deliver lasting impact in risk management, compliance, legal services, and organisational integrity.</p>
<p style="font-weight:400;">Anne-Marie has shaped enterprise-wide risk culture strategies recognised by APRA, designed whistleblowing and investigation frameworks for ASX-listed companies, and steered some of the largest regulatory uplift programs in the financial services sector. Her career highlights include establishing AMP’s inaugural Group Integrity Office, uplifting governance for Colonial First State post-demerger, and most recently leading Bendigo and Adelaide Bank’s largest multi-stream risk transformation program.</p>
<p style="font-weight:400;">Equally comfortable in the boardroom and at the front line of crisis management, Anne-Marie is known for her values-based leadership, her ability to influence stakeholders from directors to regulators, and her focus on embedding sustainable change. A qualified lawyer, and graduate of the Australian Institute of Company Directors, she is also a regular keynote speaker on risk, governance, and whistleblowing.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Anne-Marie Paterson, a profound risk executive, to explore the evolving role of the Chief Risk Officer and the changing face of risk management. Anne-Marie shares her perspective on how risk now has a real seat at the C-suite table, emphasising the shift from being a business roadblock to serving as an enabler of strategy. She addresses the traditional stereotypes of risk professionals, contrasts conservative legacy approaches with the need for creativity and relevance, and highlights the increasing focus on non-financial risks such as conduct, reputation, and operational challenges—especially in light of rapidly advancing technologies like AI. Anne-Marie also provides insights into Australia’s regulatory landscape, discusses the balance between regulation and innovation, and underscores the importance of fostering a proactive risk culture throughout organisations.
Blending legal expertise with executive leadership to deliver risk transformation and regulatory uplift at scale.
Anne-Marie Paterson is a risk executive and former legal partner with more than two decades of experience spanning risk management, governance, and legal services. Beginning her career in top-tier law firms before founding and leading her own practice, Anne-Marie has gone on to hold senior executive roles across ASX-listed companies and the financial services sector. Recognised as both a strategist and a problem-solver, she has built and led teams that deliver lasting impact in risk management, compliance, legal services, and organisational integrity.
Anne-Marie has shaped enterprise-wide risk culture strategies recognised by APRA, designed whistleblowing and investigation frameworks for ASX-listed companies, and steered some of the largest regulatory uplift programs in the financial services sector. Her career highlights include establishing AMP’s inaugural Group Integrity Office, uplifting governance for Colonial First State post-demerger, and most recently leading Bendigo and Adelaide Bank’s largest multi-stream risk transformation program.
Equally comfortable in the boardroom and at the front line of crisis management, Anne-Marie is known for her values-based leadership, her ability to influence stakeholders from directors to regulators, and her focus on embedding sustainable change. A qualified lawyer, and graduate of the Australian Institute of Company Directors, she is also a regular keynote speaker on risk, governance, and whistleblowing.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 335 Deep Dive: Anne-Marie Paterson | The Changing Face of Risk]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Anne-Marie Paterson, a profound risk executive, to explore the evolving role of the Chief Risk Officer and the changing face of risk management. Anne-Marie shares her perspective on how risk now has a real seat at the C-suite table, emphasising the shift from being a business roadblock to serving as an enabler of strategy. She addresses the traditional stereotypes of risk professionals, contrasts conservative legacy approaches with the need for creativity and relevance, and highlights the increasing focus on non-financial risks such as conduct, reputation, and operational challenges—especially in light of rapidly advancing technologies like AI. Anne-Marie also provides insights into Australia’s regulatory landscape, discusses the balance between regulation and innovation, and underscores the importance of fostering a proactive risk culture throughout organisations.</p>
<p style="font-weight:400;"><strong><em>Blending legal expertise with executive leadership to deliver risk transformation and regulatory uplift at scale.</em></strong></p>
<p style="font-weight:400;">Anne-Marie Paterson is a risk executive and former legal partner with more than two decades of experience spanning risk management, governance, and legal services. Beginning her career in top-tier law firms before founding and leading her own practice, Anne-Marie has gone on to hold senior executive roles across ASX-listed companies and the financial services sector. Recognised as both a strategist and a problem-solver, she has built and led teams that deliver lasting impact in risk management, compliance, legal services, and organisational integrity.</p>
<p style="font-weight:400;">Anne-Marie has shaped enterprise-wide risk culture strategies recognised by APRA, designed whistleblowing and investigation frameworks for ASX-listed companies, and steered some of the largest regulatory uplift programs in the financial services sector. Her career highlights include establishing AMP’s inaugural Group Integrity Office, uplifting governance for Colonial First State post-demerger, and most recently leading Bendigo and Adelaide Bank’s largest multi-stream risk transformation program.</p>
<p style="font-weight:400;">Equally comfortable in the boardroom and at the front line of crisis management, Anne-Marie is known for her values-based leadership, her ability to influence stakeholders from directors to regulators, and her focus on embedding sustainable change. A qualified lawyer, and graduate of the Australian Institute of Company Directors, she is also a regular keynote speaker on risk, governance, and whistleblowing.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2148027/c1e-3g92ckq250hkq027-1p5m6590i3x3-q7xnwq.mp3" length="40866002"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Anne-Marie Paterson, a profound risk executive, to explore the evolving role of the Chief Risk Officer and the changing face of risk management. Anne-Marie shares her perspective on how risk now has a real seat at the C-suite table, emphasising the shift from being a business roadblock to serving as an enabler of strategy. She addresses the traditional stereotypes of risk professionals, contrasts conservative legacy approaches with the need for creativity and relevance, and highlights the increasing focus on non-financial risks such as conduct, reputation, and operational challenges—especially in light of rapidly advancing technologies like AI. Anne-Marie also provides insights into Australia’s regulatory landscape, discusses the balance between regulation and innovation, and underscores the importance of fostering a proactive risk culture throughout organisations.
Blending legal expertise with executive leadership to deliver risk transformation and regulatory uplift at scale.
Anne-Marie Paterson is a risk executive and former legal partner with more than two decades of experience spanning risk management, governance, and legal services. Beginning her career in top-tier law firms before founding and leading her own practice, Anne-Marie has gone on to hold senior executive roles across ASX-listed companies and the financial services sector. Recognised as both a strategist and a problem-solver, she has built and led teams that deliver lasting impact in risk management, compliance, legal services, and organisational integrity.
Anne-Marie has shaped enterprise-wide risk culture strategies recognised by APRA, designed whistleblowing and investigation frameworks for ASX-listed companies, and steered some of the largest regulatory uplift programs in the financial services sector. Her career highlights include establishing AMP’s inaugural Group Integrity Office, uplifting governance for Colonial First State post-demerger, and most recently leading Bendigo and Adelaide Bank’s largest multi-stream risk transformation program.
Equally comfortable in the boardroom and at the front line of crisis management, Anne-Marie is known for her values-based leadership, her ability to influence stakeholders from directors to regulators, and her focus on embedding sustainable change. A qualified lawyer, and graduate of the Australian Institute of Company Directors, she is also a regular keynote speaker on risk, governance, and whistleblowing.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2148027/c1a-5k0v-7z9p6x4dhd8-e2nf0a.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 334 Deep Dive: Brad Jones | Securing AI Deployments and Mitigating LLM-Powered Attacks]]>
                </title>
                <pubDate>Wed, 17 Sep 2025 05:55:25 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2142543</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-334-deep-dive-brad-jones-securing-ai-deployments-and-mitigating-llm-powered-attacks</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Brad Jones, CISO at Snowflake, as he unpacks the evolving challenges of securing AI deployments and defending against large language model (LLM) powered attacks.</p>
<p>Brad explores the complexities enterprises face in keeping up with the rapid pace of AI innovation, especially as traditional policy frameworks struggle to adapt. He outlines the growing use of LLMs in both consumer and enterprise environments, the unique risks of agentic workflows, and the blurred boundaries between public and private AI deployments.</p>
<p>He also highlights the increased sophistication of social engineering threats fueled by LLMs and discusses strategies for observability, governance, and keeping security teams ahead of the curve in a fast-changing landscape.</p>
<p> </p>
<p>Brad serves as the Chief Information Security Officer and has been with the company since 2023. Prior to joining Snowflake, Brad was the CISO and VP of Information Security at Seagate for over six years. Before his tenure at Seagate, Brad oversaw Information Security at Synopsys and SanDisk. Additionally, he has actively participated in a number of customer advisory boards and is currently part of the CISO Advisor Council at NightDragon. Brad earned his Bachelor of Science in Mechanical Engineering from the University of California, Davis.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Brad Jones, CISO at Snowflake, as he unpacks the evolving challenges of securing AI deployments and defending against large language model (LLM) powered attacks.
Brad explores the complexities enterprises face in keeping up with the rapid pace of AI innovation, especially as traditional policy frameworks struggle to adapt. He outlines the growing use of LLMs in both consumer and enterprise environments, the unique risks of agentic workflows, and the blurred boundaries between public and private AI deployments.
He also highlights the increased sophistication of social engineering threats fueled by LLMs and discusses strategies for observability, governance, and keeping security teams ahead of the curve in a fast-changing landscape.
 
Brad serves as the Chief Information Security Officer and has been with the company since 2023. Prior to joining Snowflake, Brad was the CISO and VP of Information Security at Seagate for over six years. Before his tenure at Seagate, Brad oversaw Information Security at Synopsys and SanDisk. Additionally, he has actively participated in a number of customer advisory boards and is currently part of the CISO Advisor Council at NightDragon. Brad earned his Bachelor of Science in Mechanical Engineering from the University of California, Davis.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 334 Deep Dive: Brad Jones | Securing AI Deployments and Mitigating LLM-Powered Attacks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Brad Jones, CISO at Snowflake, as he unpacks the evolving challenges of securing AI deployments and defending against large language model (LLM) powered attacks.</p>
<p>Brad explores the complexities enterprises face in keeping up with the rapid pace of AI innovation, especially as traditional policy frameworks struggle to adapt. He outlines the growing use of LLMs in both consumer and enterprise environments, the unique risks of agentic workflows, and the blurred boundaries between public and private AI deployments.</p>
<p>He also highlights the increased sophistication of social engineering threats fueled by LLMs and discusses strategies for observability, governance, and keeping security teams ahead of the curve in a fast-changing landscape.</p>
<p> </p>
<p>Brad serves as the Chief Information Security Officer and has been with the company since 2023. Prior to joining Snowflake, Brad was the CISO and VP of Information Security at Seagate for over six years. Before his tenure at Seagate, Brad oversaw Information Security at Synopsys and SanDisk. Additionally, he has actively participated in a number of customer advisory boards and is currently part of the CISO Advisor Council at NightDragon. Brad earned his Bachelor of Science in Mechanical Engineering from the University of California, Davis.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2142543/c1e-7km5b98dn6cd6vkn-gpz8464zfo9d-8flfyi.mp3" length="38680124"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Brad Jones, CISO at Snowflake, as he unpacks the evolving challenges of securing AI deployments and defending against large language model (LLM) powered attacks.
Brad explores the complexities enterprises face in keeping up with the rapid pace of AI innovation, especially as traditional policy frameworks struggle to adapt. He outlines the growing use of LLMs in both consumer and enterprise environments, the unique risks of agentic workflows, and the blurred boundaries between public and private AI deployments.
He also highlights the increased sophistication of social engineering threats fueled by LLMs and discusses strategies for observability, governance, and keeping security teams ahead of the curve in a fast-changing landscape.
 
Brad serves as the Chief Information Security Officer and has been with the company since 2023. Prior to joining Snowflake, Brad was the CISO and VP of Information Security at Seagate for over six years. Before his tenure at Seagate, Brad oversaw Information Security at Synopsys and SanDisk. Additionally, he has actively participated in a number of customer advisory boards and is currently part of the CISO Advisor Council at NightDragon. Brad earned his Bachelor of Science in Mechanical Engineering from the University of California, Davis.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2142543/c1a-5k0v-347pz0j9sxr1-cci1mt.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 333 Deep Dive: Prashant Vadlamudi | Building Secure Foundations for Agentic AI]]>
                </title>
                <pubDate>Wed, 10 Sep 2025 05:56:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2136705</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-333-deep-dive-prashant-vadlamudi-building-secure-foundations-for-agentic-ai</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Prashant Vadlamudi, Senior Vice President of Product Security at Salesforce, as he explores how organisations can build secure foundations for agentic AI. Prashant offers a holistic view of agentic AI, highlighting its shift from simple generative models to autonomous agents capable of reasoning, sequencing complex tasks, and performing actions—while emphasising the productivity benefits and the imperative for strong trust and security principles. The conversation covers the balance between fostering innovation and maintaining robust governance and security, the evolving nature of guardrails as AI models mature, and the importance of ongoing policy updates to keep pace with rapid technological changes. Prashant also discusses Salesforce’s approach to deploying AI responsibly, the role of trust metrics such as bias and hallucination scores, the necessity for data governance as the backbone of AI strategies, and the shared responsibility between providers and customers to ensure that agentic AI operates securely and transparently.</p>
<p>Prashant Vadlamudi is a strategic leader with two decades of experience driving transformative information security and compliance initiatives. As Senior Vice President of Product Security at Salesforce, he is responsible for safeguarding the company’s products and ensuring adherence to global standards. His career is marked by pivotal leadership roles, including Vice President of Information Security and Cloud Compliance at Cisco, where he established robust security baselines for SaaS offerings, and Director of Technology GRC at Adobe, where he architected the Adobe Common Controls Framework (CCF), a cornerstone of their global trust strategy. Prashant’s expertise spans cloud security, global certifications, and data-driven risk management, allowing him to navigate and mitigate complex security challenges in today’s dynamic landscape. He utilises a risk-based approach to decision-making and focuses on operational efficiency. He has experience in team development and mentoring, with individuals he has mentored holding security leadership positions across the industry. His professional experience includes strategic planning, technical implementation, and team management within the field of information security.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Prashant Vadlamudi, Senior Vice President of Product Security at Salesforce, as he explores how organisations can build secure foundations for agentic AI. Prashant offers a holistic view of agentic AI, highlighting its shift from simple generative models to autonomous agents capable of reasoning, sequencing complex tasks, and performing actions—while emphasising the productivity benefits and the imperative for strong trust and security principles. The conversation covers the balance between fostering innovation and maintaining robust governance and security, the evolving nature of guardrails as AI models mature, and the importance of ongoing policy updates to keep pace with rapid technological changes. Prashant also discusses Salesforce’s approach to deploying AI responsibly, the role of trust metrics such as bias and hallucination scores, the necessity for data governance as the backbone of AI strategies, and the shared responsibility between providers and customers to ensure that agentic AI operates securely and transparently.
Prashant Vadlamudi is a strategic leader with two decades of experience driving transformative information security and compliance initiatives. As Senior Vice President of Product Security at Salesforce, he is responsible for safeguarding the company’s products and ensuring adherence to global standards. His career is marked by pivotal leadership roles, including Vice President of Information Security and Cloud Compliance at Cisco, where he established robust security baselines for SaaS offerings, and Director of Technology GRC at Adobe, where he architected the Adobe Common Controls Framework (CCF), a cornerstone of their global trust strategy. Prashant’s expertise spans cloud security, global certifications, and data-driven risk management, allowing him to navigate and mitigate complex security challenges in today’s dynamic landscape. He utilises a risk-based approach to decision-making and focuses on operational efficiency. He has experience in team development and mentoring, with individuals he has mentored holding security leadership positions across the industry. His professional experience includes strategic planning, technical implementation, and team management within the field of information security.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 333 Deep Dive: Prashant Vadlamudi | Building Secure Foundations for Agentic AI]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Prashant Vadlamudi, Senior Vice President of Product Security at Salesforce, as he explores how organisations can build secure foundations for agentic AI. Prashant offers a holistic view of agentic AI, highlighting its shift from simple generative models to autonomous agents capable of reasoning, sequencing complex tasks, and performing actions—while emphasising the productivity benefits and the imperative for strong trust and security principles. The conversation covers the balance between fostering innovation and maintaining robust governance and security, the evolving nature of guardrails as AI models mature, and the importance of ongoing policy updates to keep pace with rapid technological changes. Prashant also discusses Salesforce’s approach to deploying AI responsibly, the role of trust metrics such as bias and hallucination scores, the necessity for data governance as the backbone of AI strategies, and the shared responsibility between providers and customers to ensure that agentic AI operates securely and transparently.</p>
<p>Prashant Vadlamudi is a strategic leader with two decades of experience driving transformative information security and compliance initiatives. As Senior Vice President of Product Security at Salesforce, he is responsible for safeguarding the company’s products and ensuring adherence to global standards. His career is marked by pivotal leadership roles, including Vice President of Information Security and Cloud Compliance at Cisco, where he established robust security baselines for SaaS offerings, and Director of Technology GRC at Adobe, where he architected the Adobe Common Controls Framework (CCF), a cornerstone of their global trust strategy. Prashant’s expertise spans cloud security, global certifications, and data-driven risk management, allowing him to navigate and mitigate complex security challenges in today’s dynamic landscape. He utilises a risk-based approach to decision-making and focuses on operational efficiency. He has experience in team development and mentoring, with individuals he has mentored holding security leadership positions across the industry. His professional experience includes strategic planning, technical implementation, and team management within the field of information security.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2136705/c1e-pjr0h1xddocmo95v-xx41zzdgckpv-6gn6dt.mp3" length="36134755"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Prashant Vadlamudi, Senior Vice President of Product Security at Salesforce, as he explores how organisations can build secure foundations for agentic AI. Prashant offers a holistic view of agentic AI, highlighting its shift from simple generative models to autonomous agents capable of reasoning, sequencing complex tasks, and performing actions—while emphasising the productivity benefits and the imperative for strong trust and security principles. The conversation covers the balance between fostering innovation and maintaining robust governance and security, the evolving nature of guardrails as AI models mature, and the importance of ongoing policy updates to keep pace with rapid technological changes. Prashant also discusses Salesforce’s approach to deploying AI responsibly, the role of trust metrics such as bias and hallucination scores, the necessity for data governance as the backbone of AI strategies, and the shared responsibility between providers and customers to ensure that agentic AI operates securely and transparently.
Prashant Vadlamudi is a strategic leader with two decades of experience driving transformative information security and compliance initiatives. As Senior Vice President of Product Security at Salesforce, he is responsible for safeguarding the company’s products and ensuring adherence to global standards. His career is marked by pivotal leadership roles, including Vice President of Information Security and Cloud Compliance at Cisco, where he established robust security baselines for SaaS offerings, and Director of Technology GRC at Adobe, where he architected the Adobe Common Controls Framework (CCF), a cornerstone of their global trust strategy. Prashant’s expertise spans cloud security, global certifications, and data-driven risk management, allowing him to navigate and mitigate complex security challenges in today’s dynamic landscape. He utilises a risk-based approach to decision-making and focuses on operational efficiency. He has experience in team development and mentoring, with individuals he has mentored holding security leadership positions across the industry. His professional experience includes strategic planning, technical implementation, and team management within the field of information security.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2136705/c1a-5k0v-v64r4qvou44-boxzpj.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 332 Deep Dive: Emilio Escobar | The Modern CISO]]>
                </title>
                <pubDate>Wed, 03 Sep 2025 05:55:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2130389</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-332-deep-dive-emilio-escobar-the-modern-ciso</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Emilio Escobar, Chief Information Security Officer at Datadog, as he explores the evolving definition of the modern CISO and what it means to lead security programs in today’s technology-driven organisations. Emilio delves into the transition of CISOs from traditional audit and IT backgrounds to deeply technical and business-savvy leaders, emphasising the importance of being part of the C-suite and understanding both regulatory and technological risks. We discuss the growing need for CISOs to embrace failure as part of innovation, the increasing accountability and liability facing security leaders, and the shift in expectations as companies fine-tune their search for security executives with both operational expertise and business acumen. Emilio also shares his views on the “technical enough” debate within the industry, the potential splitting of the CISO role, and the value of fostering trust and adaptability in security leadership.</p>
<p>Emilio Escobar is Chief Information Security Officer (CISO) at observability and security company Datadog (NASDAQ: DDOG). With two decades of experience in Information Security and Compliance, Emilio has worked at large enterprises, medium-sized companies, and government organizations. Before Datadog, Emilio served as the VP of Information Security for Hulu, where he played a pivotal role in setting up key security functions. Prior to that, Emilio worked for PlayStation, where he built and ran the software security teams. Emilio’s unique approach to security and compliance has always prioritized partnerships and people—hiring the right talent to build the processes, procedures, and technologies that unite Security, Engineering, and Operations teams. Emilio holds a BS in Computer Science from the University of Puerto Rico.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Emilio Escobar, Chief Information Security Officer at Datadog, as he explores the evolving definition of the modern CISO and what it means to lead security programs in today’s technology-driven organisations. Emilio delves into the transition of CISOs from traditional audit and IT backgrounds to deeply technical and business-savvy leaders, emphasising the importance of being part of the C-suite and understanding both regulatory and technological risks. We discuss the growing need for CISOs to embrace failure as part of innovation, the increasing accountability and liability facing security leaders, and the shift in expectations as companies fine-tune their search for security executives with both operational expertise and business acumen. Emilio also shares his views on the “technical enough” debate within the industry, the potential splitting of the CISO role, and the value of fostering trust and adaptability in security leadership.
Emilio Escobar is Chief Information Security Officer (CISO) at observability and security company Datadog (NASDAQ: DDOG). With two decades of experience in Information Security and Compliance, Emilio has worked at large enterprises, medium-sized companies, and government organizations. Before Datadog, Emilio served as the VP of Information Security for Hulu, where he played a pivotal role in setting up key security functions. Prior to that, Emilio worked for PlayStation, where he built and ran the software security teams. Emilio’s unique approach to security and compliance has always prioritized partnerships and people—hiring the right talent to build the processes, procedures, and technologies that unite Security, Engineering, and Operations teams. Emilio holds a BS in Computer Science from the University of Puerto Rico.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 332 Deep Dive: Emilio Escobar | The Modern CISO]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Emilio Escobar, Chief Information Security Officer at Datadog, as he explores the evolving definition of the modern CISO and what it means to lead security programs in today’s technology-driven organisations. Emilio delves into the transition of CISOs from traditional audit and IT backgrounds to deeply technical and business-savvy leaders, emphasising the importance of being part of the C-suite and understanding both regulatory and technological risks. We discuss the growing need for CISOs to embrace failure as part of innovation, the increasing accountability and liability facing security leaders, and the shift in expectations as companies fine-tune their search for security executives with both operational expertise and business acumen. Emilio also shares his views on the “technical enough” debate within the industry, the potential splitting of the CISO role, and the value of fostering trust and adaptability in security leadership.</p>
<p>Emilio Escobar is Chief Information Security Officer (CISO) at observability and security company Datadog (NASDAQ: DDOG). With two decades of experience in Information Security and Compliance, Emilio has worked at large enterprises, medium-sized companies, and government organizations. Before Datadog, Emilio served as the VP of Information Security for Hulu, where he played a pivotal role in setting up key security functions. Prior to that, Emilio worked for PlayStation, where he built and ran the software security teams. Emilio’s unique approach to security and compliance has always prioritized partnerships and people—hiring the right talent to build the processes, procedures, and technologies that unite Security, Engineering, and Operations teams. Emilio holds a BS in Computer Science from the University of Puerto Rico.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2130389/c1e-7km5b98qk4fd6vxo-kp965k5rhv7-i4hr9e.mp3" length="37595471"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Emilio Escobar, Chief Information Security Officer at Datadog, as he explores the evolving definition of the modern CISO and what it means to lead security programs in today’s technology-driven organisations. Emilio delves into the transition of CISOs from traditional audit and IT backgrounds to deeply technical and business-savvy leaders, emphasising the importance of being part of the C-suite and understanding both regulatory and technological risks. We discuss the growing need for CISOs to embrace failure as part of innovation, the increasing accountability and liability facing security leaders, and the shift in expectations as companies fine-tune their search for security executives with both operational expertise and business acumen. Emilio also shares his views on the “technical enough” debate within the industry, the potential splitting of the CISO role, and the value of fostering trust and adaptability in security leadership.
Emilio Escobar is Chief Information Security Officer (CISO) at observability and security company Datadog (NASDAQ: DDOG). With two decades of experience in Information Security and Compliance, Emilio has worked at large enterprises, medium-sized companies, and government organizations. Before Datadog, Emilio served as the VP of Information Security for Hulu, where he played a pivotal role in setting up key security functions. Prior to that, Emilio worked for PlayStation, where he built and ran the software security teams. Emilio’s unique approach to security and compliance has always prioritized partnerships and people—hiring the right talent to build the processes, procedures, and technologies that unite Security, Engineering, and Operations teams. Emilio holds a BS in Computer Science from the University of Puerto Rico.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2130389/c1a-5k0v-xx49m2nrcpmn-zxvzsa.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 331 Deep Dive: Christian Morin | Cyber Security and Organisational Resilience Across ANZ]]>
                </title>
                <pubDate>Wed, 27 Aug 2025 05:58:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2124644</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-331-deep-dive-christian-morin-cyber-security-and-organisational-resilience-across-anz</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Christian Morin, Chief Security Officer and Vice President of Product Engineering at Genetec, as he shares his insights on the critical importance of moving beyond a “checkbox” approach to incident response, emphasising the value of regular tabletop exercises and fostering genuine security muscle memory within teams. He highlights the convergence between physical security and cybersecurity, arguing for a unified approach that bridges silos and enhances both protection and response capabilities. Christian also reflects on the growing risks posed by connected IoT and OT devices, the challenges of asset inventory, and the cultural shifts required to improve cyber awareness.</p>
<p>Christian Morin is the Chief Security Officer at Genetec. With over 20 years of experience in IT, telecommunications and physical security industries, Chris has a keen ability to anticipate technological trends and drive meaningful organizational growth. He is a multidisciplinary business leader, having managed the Operations, Customer Service, Sales Engineering, Technical Support, Professional Services, and IT Teams since joining Genetec in 2002. Chris’ executive leadership continues to support the strategic direction and success of the company.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Christian Morin, Chief Security Officer and Vice President of Product Engineering at Genetec, as he shares his insights on the critical importance of moving beyond a “checkbox” approach to incident response, emphasising the value of regular tabletop exercises and fostering genuine security muscle memory within teams. He highlights the convergence between physical security and cybersecurity, arguing for a unified approach that bridges silos and enhances both protection and response capabilities. Christian also reflects on the growing risks posed by connected IoT and OT devices, the challenges of asset inventory, and the cultural shifts required to improve cyber awareness.
Christian Morin is the Chief Security Officer at Genetec. With over 20 years of experience in IT, telecommunications and physical security industries, Chris has a keen ability to anticipate technological trends and drive meaningful organizational growth. He is a multidisciplinary business leader, having managed the Operations, Customer Service, Sales Engineering, Technical Support, Professional Services, and IT Teams since joining Genetec in 2002. Chris’ executive leadership continues to support the strategic direction and success of the company.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 331 Deep Dive: Christian Morin | Cyber Security and Organisational Resilience Across ANZ]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Christian Morin, Chief Security Officer and Vice President of Product Engineering at Genetec, as he shares his insights on the critical importance of moving beyond a “checkbox” approach to incident response, emphasising the value of regular tabletop exercises and fostering genuine security muscle memory within teams. He highlights the convergence between physical security and cybersecurity, arguing for a unified approach that bridges silos and enhances both protection and response capabilities. Christian also reflects on the growing risks posed by connected IoT and OT devices, the challenges of asset inventory, and the cultural shifts required to improve cyber awareness.</p>
<p>Christian Morin is the Chief Security Officer at Genetec. With over 20 years of experience in IT, telecommunications and physical security industries, Chris has a keen ability to anticipate technological trends and drive meaningful organizational growth. He is a multidisciplinary business leader, having managed the Operations, Customer Service, Sales Engineering, Technical Support, Professional Services, and IT Teams since joining Genetec in 2002. Chris’ executive leadership continues to support the strategic direction and success of the company.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2124644/c1e-41r8c1jm2rbopgxk-xx4058m0t1j2-btwatx.mp3" length="36062397"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Christian Morin, Chief Security Officer and Vice President of Product Engineering at Genetec, as he shares his insights on the critical importance of moving beyond a “checkbox” approach to incident response, emphasising the value of regular tabletop exercises and fostering genuine security muscle memory within teams. He highlights the convergence between physical security and cybersecurity, arguing for a unified approach that bridges silos and enhances both protection and response capabilities. Christian also reflects on the growing risks posed by connected IoT and OT devices, the challenges of asset inventory, and the cultural shifts required to improve cyber awareness.
Christian Morin is the Chief Security Officer at Genetec. With over 20 years of experience in IT, telecommunications and physical security industries, Chris has a keen ability to anticipate technological trends and drive meaningful organizational growth. He is a multidisciplinary business leader, having managed the Operations, Customer Service, Sales Engineering, Technical Support, Professional Services, and IT Teams since joining Genetec in 2002. Chris’ executive leadership continues to support the strategic direction and success of the company.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2124644/c1a-5k0v-1p5vqpoda6xz-a3itc3.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 330 Deep Dive: Marco Pereira | The Day Encryption Breaks: Are We Ready for the Quantum Threat?]]>
                </title>
                <pubDate>Wed, 20 Aug 2025 05:58:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2115021</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-330-deep-dive-marco-pereira-the-day-encryption-breaks-are-we-ready-for-the-quantum-threa</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Marco Pereira, Executive Vice President and Global Head of Cybersecurity at Capgemini, as he explores the looming risk posed by quantum computing to current encryption standards. Marco breaks down what could happen the day encryption breaks—referred to as “Q Day”—and highlights why the urgency to prepare for quantum threats is so critical, especially given the uncertainty about when this shift might occur. He discusses the widespread reliance on RSA-based encryption, the potential for a sudden cyber ‘Armageddon’ if organisations are not proactive, and the immense challenge of transitioning global digital infrastructure to post-quantum cryptography. Marco also addresses the current lack of urgency and crypto expertise in the industry, emphasises the need for crypto agility, and draws parallels to the rapid adoption challenges seen with cloud computing and AI.</p>
<p>Marco is an industry-recognised cybersecurity thought leader and strategist with over 25 years of leadership and hands-on experience. He has a proven track record of successfully implementing highly complex, large-scale IT transformation projects. Known for his visionary approach, Marco has been instrumental in shaping and executing numerous strategic cybersecurity initiatives. Marco holds a master’s degree in information systems and computer engineering, as well as a Master of Business Administration (MBA). His unique blend of technical expertise and business acumen enables him to bridge the gap between technology and strategy, driving innovation and achieving organisational goals.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Marco Pereira, Executive Vice President and Global Head of Cybersecurity at Capgemini, as he explores the looming risk posed by quantum computing to current encryption standards. Marco breaks down what could happen the day encryption breaks—referred to as “Q Day”—and highlights why the urgency to prepare for quantum threats is so critical, especially given the uncertainty about when this shift might occur. He discusses the widespread reliance on RSA-based encryption, the potential for a sudden cyber ‘Armageddon’ if organisations are not proactive, and the immense challenge of transitioning global digital infrastructure to post-quantum cryptography. Marco also addresses the current lack of urgency and crypto expertise in the industry, emphasises the need for crypto agility, and draws parallels to the rapid adoption challenges seen with cloud computing and AI.
Marco is an industry-recognised cybersecurity thought leader and strategist with over 25 years of leadership and hands-on experience. He has a proven track record of successfully implementing highly complex, large-scale IT transformation projects. Known for his visionary approach, Marco has been instrumental in shaping and executing numerous strategic cybersecurity initiatives. Marco holds a master’s degree in information systems and computer engineering, as well as a Master of Business Administration (MBA). His unique blend of technical expertise and business acumen enables him to bridge the gap between technology and strategy, driving innovation and achieving organisational goals.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 330 Deep Dive: Marco Pereira | The Day Encryption Breaks: Are We Ready for the Quantum Threat?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Marco Pereira, Executive Vice President and Global Head of Cybersecurity at Capgemini, as he explores the looming risk posed by quantum computing to current encryption standards. Marco breaks down what could happen the day encryption breaks—referred to as “Q Day”—and highlights why the urgency to prepare for quantum threats is so critical, especially given the uncertainty about when this shift might occur. He discusses the widespread reliance on RSA-based encryption, the potential for a sudden cyber ‘Armageddon’ if organisations are not proactive, and the immense challenge of transitioning global digital infrastructure to post-quantum cryptography. Marco also addresses the current lack of urgency and crypto expertise in the industry, emphasises the need for crypto agility, and draws parallels to the rapid adoption challenges seen with cloud computing and AI.</p>
<p>Marco is an industry-recognised cybersecurity thought leader and strategist with over 25 years of leadership and hands-on experience. He has a proven track record of successfully implementing highly complex, large-scale IT transformation projects. Known for his visionary approach, Marco has been instrumental in shaping and executing numerous strategic cybersecurity initiatives. Marco holds a master’s degree in information systems and computer engineering, as well as a Master of Business Administration (MBA). His unique blend of technical expertise and business acumen enables him to bridge the gap between technology and strategy, driving innovation and achieving organisational goals.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2115021/c1e-2k31bmko33h67jo4-xx4r179mcrxn-n9wpvh.mp3" length="38368696"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Marco Pereira, Executive Vice President and Global Head of Cybersecurity at Capgemini, as he explores the looming risk posed by quantum computing to current encryption standards. Marco breaks down what could happen the day encryption breaks—referred to as “Q Day”—and highlights why the urgency to prepare for quantum threats is so critical, especially given the uncertainty about when this shift might occur. He discusses the widespread reliance on RSA-based encryption, the potential for a sudden cyber ‘Armageddon’ if organisations are not proactive, and the immense challenge of transitioning global digital infrastructure to post-quantum cryptography. Marco also addresses the current lack of urgency and crypto expertise in the industry, emphasises the need for crypto agility, and draws parallels to the rapid adoption challenges seen with cloud computing and AI.
Marco is an industry-recognised cybersecurity thought leader and strategist with over 25 years of leadership and hands-on experience. He has a proven track record of successfully implementing highly complex, large-scale IT transformation projects. Known for his visionary approach, Marco has been instrumental in shaping and executing numerous strategic cybersecurity initiatives. Marco holds a master’s degree in information systems and computer engineering, as well as a Master of Business Administration (MBA). His unique blend of technical expertise and business acumen enables him to bridge the gap between technology and strategy, driving innovation and achieving organisational goals.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2115021/c1a-5k0v-ndz071xjho0k-0j61sm.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 329 Deep Dive: John Hultquist | An Overview of Australia’s Threat Landscape]]>
                </title>
                <pubDate>Wed, 13 Aug 2025 05:57:57 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2111282</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-329-deep-dive-john-hultquist-an-overview-of-australias-threat-landscape</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with John Hultquist, Chief Analyst at Mandiant Intelligence, now part of Google Cloud, as he shares his insights on Australia’s evolving cybersecurity threat landscape. John explores the increasing complexity and velocity of threats, spotlighting both nation-state actors—particularly from China—and financially motivated cybercriminal groups like Scattered Spider. He addresses the psychological and structural drivers behind rising attacks, including the troubling pattern of minors engaging in increasingly aggressive cybercrime. The discussion further examines the targeting of critical sectors such as healthcare, the growing use of advanced techniques to evade detection, and the influence of geopolitics and emerging technologies like AI on intelligence operations.</p>
<p><strong>John Hultquist – Chief Analyst, Mandiant Threat Intelligence</strong></p>
<p>John Hultquist serves as the Chief Analyst at <strong>Mandiant Intelligence</strong>, now part of Google Cloud. In this senior leadership role, he oversees global threat intelligence operations—tracking cyber espionage, hacktivism, ransomware, and state-aligned threat actors. He regularly advises C-suite and public-sector leaders on cyber risk strategy and prioritisation.</p>
<p>John’s unique background—spanning military intelligence, U.S. government service, private sector leadership, and real-time cyber conflict analysis—positions him as one of the most respected voices in global threat intelligence. He brings a strategic mindset focused equally on technical insights, geopolitical awareness, and operational impact.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with John Hultquist, Chief Analyst at Mandiant Intelligence, now part of Google Cloud, as he shares his insights on Australia’s evolving cybersecurity threat landscape. John explores the increasing complexity and velocity of threats, spotlighting both nation-state actors—particularly from China—and financially motivated cybercriminal groups like Scattered Spider. He addresses the psychological and structural drivers behind rising attacks, including the troubling pattern of minors engaging in increasingly aggressive cybercrime. The discussion further examines the targeting of critical sectors such as healthcare, the growing use of advanced techniques to evade detection, and the influence of geopolitics and emerging technologies like AI on intelligence operations.
John Hultquist – Chief Analyst, Mandiant Threat Intelligence
John Hultquist serves as the Chief Analyst at Mandiant Intelligence, now part of Google Cloud. In this senior leadership role, he oversees global threat intelligence operations—tracking cyber espionage, hacktivism, ransomware, and state-aligned threat actors. He regularly advises C-suite and public-sector leaders on cyber risk strategy and prioritisation.
John’s unique background—spanning military intelligence, U.S. government service, private sector leadership, and real-time cyber conflict analysis—positions him as one of the most respected voices in global threat intelligence. He brings a strategic mindset focused equally on technical insights, geopolitical awareness, and operational impact.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 329 Deep Dive: John Hultquist | An Overview of Australia’s Threat Landscape]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with John Hultquist, Chief Analyst at Mandiant Intelligence, now part of Google Cloud, as he shares his insights on Australia’s evolving cybersecurity threat landscape. John explores the increasing complexity and velocity of threats, spotlighting both nation-state actors—particularly from China—and financially motivated cybercriminal groups like Scattered Spider. He addresses the psychological and structural drivers behind rising attacks, including the troubling pattern of minors engaging in increasingly aggressive cybercrime. The discussion further examines the targeting of critical sectors such as healthcare, the growing use of advanced techniques to evade detection, and the influence of geopolitics and emerging technologies like AI on intelligence operations.</p>
<p><strong>John Hultquist – Chief Analyst, Mandiant Threat Intelligence</strong></p>
<p>John Hultquist serves as the Chief Analyst at <strong>Mandiant Intelligence</strong>, now part of Google Cloud. In this senior leadership role, he oversees global threat intelligence operations—tracking cyber espionage, hacktivism, ransomware, and state-aligned threat actors. He regularly advises C-suite and public-sector leaders on cyber risk strategy and prioritisation.</p>
<p>John’s unique background—spanning military intelligence, U.S. government service, private sector leadership, and real-time cyber conflict analysis—positions him as one of the most respected voices in global threat intelligence. He brings a strategic mindset focused equally on technical insights, geopolitical awareness, and operational impact.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2111282/c1e-wmjvu37podu0gmpo-1p5pmggvc34w-msiwgn.mp3" length="36194890"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with John Hultquist, Chief Analyst at Mandiant Intelligence, now part of Google Cloud, as he shares his insights on Australia’s evolving cybersecurity threat landscape. John explores the increasing complexity and velocity of threats, spotlighting both nation-state actors—particularly from China—and financially motivated cybercriminal groups like Scattered Spider. He addresses the psychological and structural drivers behind rising attacks, including the troubling pattern of minors engaging in increasingly aggressive cybercrime. The discussion further examines the targeting of critical sectors such as healthcare, the growing use of advanced techniques to evade detection, and the influence of geopolitics and emerging technologies like AI on intelligence operations.
John Hultquist – Chief Analyst, Mandiant Threat Intelligence
John Hultquist serves as the Chief Analyst at Mandiant Intelligence, now part of Google Cloud. In this senior leadership role, he oversees global threat intelligence operations—tracking cyber espionage, hacktivism, ransomware, and state-aligned threat actors. He regularly advises C-suite and public-sector leaders on cyber risk strategy and prioritisation.
John’s unique background—spanning military intelligence, U.S. government service, private sector leadership, and real-time cyber conflict analysis—positions him as one of the most respected voices in global threat intelligence. He brings a strategic mindset focused equally on technical insights, geopolitical awareness, and operational impact.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2111282/c1a-5k0v-2545zk6du9w7-jy4o6y.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 328 Deep Dive: Rob Clyde & Jamie Norton | Quantum Computing – How Can Cyber Professionals Prepare?]]>
                </title>
                <pubDate>Wed, 06 Aug 2025 05:58:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2105089</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-328-deep-dive-rob-clyde-jamie-norton-quantum-computing-how-can-cyber-professionals-pr</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Jamie Norton, Board Director at ISACA, and Rob Clyde, Crypto Quantique and past ISACA Board Chair, as they discuss the impact of quantum computing on cybersecurity and how professionals can prepare for imminent change. Jamie shares insights from a <a href="https://www.isaca.org/resources/quantum-pulse-poll">recent ISACA global survey</a> revealing that 95% of organizations lack a quantum computing roadmap, highlighting both a general awareness of the concept and a significant gap in practical action. Rob emphasizes the urgency of understanding and adopting new post-quantum cryptography standards, noting the risks posed by “harvest now, decrypt later” attacks and the likelihood of nation states leading the charge in exploiting quantum capabilities. Together, they explore the need for continuous education, the evolving skills landscape—including the increasing value of quantum and AI literacy, and practical first steps organisations should take to assess risk, build strategy, and transition critical assets to post-quantum security measures.</p>
<p><strong><a href="https://www.linkedin.com/in/robclyde/">Rob Clyde</a>, Chairman, Crypto Quantique, and past ISACA board chair</strong></p>
<p>Rob Clyde is a distinguished cybersecurity and technology leader with over three decades of experience in executive, board, and advisory roles. He currently serves as Chairman of the Board at Crypto Quantique, a company specialising in quantum-driven IoT cybersecurity solutions. He is also the Executive Chair of White Cloud Security and a long-term board member of ISACA, where he previously held the position of Chair.</p>
<p>Rob’s career includes notable positions such as Chief Technology Officer at Symantec, CEO of Adaptive Computing, and co-founder of Axent Technologies. As Managing Director of Clyde Consulting LLC, he provides strategic advisory services to cybersecurity software companies. Rob is also a Certified Information Security Manager (CISM) and holds the NACD Directorship Certification.</p>
<p>A frequent speaker at global cybersecurity conferences, Rob brings a wealth of knowledge and leadership to discussions on digital trust, governance and emerging technologies.</p>
<p><strong><a href="https://www.linkedin.com/in/jamienorton/">Jamie Norton</a>, ISACA Board Director</strong></p>
<p>Jamie Norton is a leading cybersecurity expert with over 25 years of experience across government, commercial and international sectors. He is Chief Information Security Officer at Australian Securities and Investment Commission (ASIC) and Board Director at ISACA. He is a Partner at McGrathNicol, where he advises executives and boards on cyber risk, resilience and strategic performance. Jamie also serves on the Advisory Board of Avertro, a cybersecurity start-up focused on informed, data-driven decision-making around cyber resilience and AI safety. He previously held leadership roles at NEC, Tenable, Check Point and the World Health Organisation.</p>
<p>Jamie is the former Chief Information Security Officer at the Australian Taxation Office (ATO), one of Australia’s largest federal agencies. He has chaired and contributed to numerous interdepartmental and industry committees on cyber strategy, and represented Australia at international government forums on cybercrime. He holds degrees in accounting and IT from the Australian National University and is a respected speaker and media commentator.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Jamie Norton, Board Director at ISACA, and Rob Clyde, Crypto Quantique and past ISACA Board Chair, as they discuss the impact of quantum computing on cybersecurity and how professionals can prepare for imminent change. Jamie shares insights from a recent ISACA global survey revealing that 95% of organizations lack a quantum computing roadmap, highlighting both a general awareness of the concept and a significant gap in practical action. Rob emphasizes the urgency of understanding and adopting new post-quantum cryptography standards, noting the risks posed by “harvest now, decrypt later” attacks and the likelihood of nation states leading the charge in exploiting quantum capabilities. Together, they explore the need for continuous education, the evolving skills landscape—including the increasing value of quantum and AI literacy, and practical first steps organisations should take to assess risk, build strategy, and transition critical assets to post-quantum security measures.
Rob Clyde, Chairman, Crypto Quantique, and past ISACA board chair
Rob Clyde is a distinguished cybersecurity and technology leader with over three decades of experience in executive, board, and advisory roles. He currently serves as Chairman of the Board at Crypto Quantique, a company specialising in quantum-driven IoT cybersecurity solutions. He is also the Executive Chair of White Cloud Security and a long-term board member of ISACA, where he previously held the position of Chair.
Rob’s career includes notable positions such as Chief Technology Officer at Symantec, CEO of Adaptive Computing, and co-founder of Axent Technologies. As Managing Director of Clyde Consulting LLC, he provides strategic advisory services to cybersecurity software companies. Rob is also a Certified Information Security Manager (CISM) and holds the NACD Directorship Certification.
A frequent speaker at global cybersecurity conferences, Rob brings a wealth of knowledge and leadership to discussions on digital trust, governance and emerging technologies.
Jamie Norton, ISACA Board Director
Jamie Norton is a leading cybersecurity expert with over 25 years of experience across government, commercial and international sectors. He is Chief Information Security Officer at Australian Securities and Investment Commission (ASIC) and Board Director at ISACA. He is a Partner at McGrathNicol, where he advises executives and boards on cyber risk, resilience and strategic performance. Jamie also serves on the Advisory Board of Avertro, a cybersecurity start-up focused on informed, data-driven decision-making around cyber resilience and AI safety. He previously held leadership roles at NEC, Tenable, Check Point and the World Health Organisation.
Jamie is the former Chief Information Security Officer at the Australian Taxation Office (ATO), one of Australia’s largest federal agencies. He has chaired and contributed to numerous interdepartmental and industry committees on cyber strategy, and represented Australia at international government forums on cybercrime. He holds degrees in accounting and IT from the Australian National University and is a respected speaker and media commentator.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 328 Deep Dive: Rob Clyde & Jamie Norton | Quantum Computing – How Can Cyber Professionals Prepare?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Jamie Norton, Board Director at ISACA, and Rob Clyde, Crypto Quantique and past ISACA Board Chair, as they discuss the impact of quantum computing on cybersecurity and how professionals can prepare for imminent change. Jamie shares insights from a <a href="https://www.isaca.org/resources/quantum-pulse-poll">recent ISACA global survey</a> revealing that 95% of organizations lack a quantum computing roadmap, highlighting both a general awareness of the concept and a significant gap in practical action. Rob emphasizes the urgency of understanding and adopting new post-quantum cryptography standards, noting the risks posed by “harvest now, decrypt later” attacks and the likelihood of nation states leading the charge in exploiting quantum capabilities. Together, they explore the need for continuous education, the evolving skills landscape—including the increasing value of quantum and AI literacy, and practical first steps organisations should take to assess risk, build strategy, and transition critical assets to post-quantum security measures.</p>
<p><strong><a href="https://www.linkedin.com/in/robclyde/">Rob Clyde</a>, Chairman, Crypto Quantique, and past ISACA board chair</strong></p>
<p>Rob Clyde is a distinguished cybersecurity and technology leader with over three decades of experience in executive, board, and advisory roles. He currently serves as Chairman of the Board at Crypto Quantique, a company specialising in quantum-driven IoT cybersecurity solutions. He is also the Executive Chair of White Cloud Security and a long-term board member of ISACA, where he previously held the position of Chair.</p>
<p>Rob’s career includes notable positions such as Chief Technology Officer at Symantec, CEO of Adaptive Computing, and co-founder of Axent Technologies. As Managing Director of Clyde Consulting LLC, he provides strategic advisory services to cybersecurity software companies. Rob is also a Certified Information Security Manager (CISM) and holds the NACD Directorship Certification.</p>
<p>A frequent speaker at global cybersecurity conferences, Rob brings a wealth of knowledge and leadership to discussions on digital trust, governance and emerging technologies.</p>
<p><strong><a href="https://www.linkedin.com/in/jamienorton/">Jamie Norton</a>, ISACA Board Director</strong></p>
<p>Jamie Norton is a leading cybersecurity expert with over 25 years of experience across government, commercial and international sectors. He is Chief Information Security Officer at Australian Securities and Investment Commission (ASIC) and Board Director at ISACA. He is a Partner at McGrathNicol, where he advises executives and boards on cyber risk, resilience and strategic performance. Jamie also serves on the Advisory Board of Avertro, a cybersecurity start-up focused on informed, data-driven decision-making around cyber resilience and AI safety. He previously held leadership roles at NEC, Tenable, Check Point and the World Health Organisation.</p>
<p>Jamie is the former Chief Information Security Officer at the Australian Taxation Office (ATO), one of Australia’s largest federal agencies. He has chaired and contributed to numerous interdepartmental and industry committees on cyber strategy, and represented Australia at international government forums on cybercrime. He holds degrees in accounting and IT from the Australian National University and is a respected speaker and media commentator.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2105089/c1e-pjr0h1m1jpumo9x0-6z30wwg5inzm-qtewkb.mp3" length="42554557"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Jamie Norton, Board Director at ISACA, and Rob Clyde, Crypto Quantique and past ISACA Board Chair, as they discuss the impact of quantum computing on cybersecurity and how professionals can prepare for imminent change. Jamie shares insights from a recent ISACA global survey revealing that 95% of organizations lack a quantum computing roadmap, highlighting both a general awareness of the concept and a significant gap in practical action. Rob emphasizes the urgency of understanding and adopting new post-quantum cryptography standards, noting the risks posed by “harvest now, decrypt later” attacks and the likelihood of nation states leading the charge in exploiting quantum capabilities. Together, they explore the need for continuous education, the evolving skills landscape—including the increasing value of quantum and AI literacy, and practical first steps organisations should take to assess risk, build strategy, and transition critical assets to post-quantum security measures.
Rob Clyde, Chairman, Crypto Quantique, and past ISACA board chair
Rob Clyde is a distinguished cybersecurity and technology leader with over three decades of experience in executive, board, and advisory roles. He currently serves as Chairman of the Board at Crypto Quantique, a company specialising in quantum-driven IoT cybersecurity solutions. He is also the Executive Chair of White Cloud Security and a long-term board member of ISACA, where he previously held the position of Chair.
Rob’s career includes notable positions such as Chief Technology Officer at Symantec, CEO of Adaptive Computing, and co-founder of Axent Technologies. As Managing Director of Clyde Consulting LLC, he provides strategic advisory services to cybersecurity software companies. Rob is also a Certified Information Security Manager (CISM) and holds the NACD Directorship Certification.
A frequent speaker at global cybersecurity conferences, Rob brings a wealth of knowledge and leadership to discussions on digital trust, governance and emerging technologies.
Jamie Norton, ISACA Board Director
Jamie Norton is a leading cybersecurity expert with over 25 years of experience across government, commercial and international sectors. He is Chief Information Security Officer at Australian Securities and Investment Commission (ASIC) and Board Director at ISACA. He is a Partner at McGrathNicol, where he advises executives and boards on cyber risk, resilience and strategic performance. Jamie also serves on the Advisory Board of Avertro, a cybersecurity start-up focused on informed, data-driven decision-making around cyber resilience and AI safety. He previously held leadership roles at NEC, Tenable, Check Point and the World Health Organisation.
Jamie is the former Chief Information Security Officer at the Australian Taxation Office (ATO), one of Australia’s largest federal agencies. He has chaired and contributed to numerous interdepartmental and industry committees on cyber strategy, and represented Australia at international government forums on cybercrime. He holds degrees in accounting and IT from the Australian National University and is a respected speaker and media commentator.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2105089/c1a-5k0v-v640zdo7upj6-z2io8u.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 327 Deep Dive: David Wiseman | Do You Really Know Who You're Speaking To?]]>
                </title>
                <pubDate>Wed, 30 Jul 2025 05:58:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2099410</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-327-deep-dive-david-wiseman-do-you-really0so</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with David Wiseman, Vice President, Secure Communications at BlackBerry, as he explores the growing challenges of authenticating identity in digital communication channels. David discusses recent high-profile incidents—including compromised government messaging apps and political deep fakes—that highlight vulnerabilities in platforms like Signal and WhatsApp. He highlights the risks associated with AI-powered voice and message spoofing, and emphasizes the importance of maintaining clear boundaries between business and personal communications to prevent data leaks and blackmail. David also explains how evolving AI tools are making targeted spam, phishing attacks, and metadata mining more effective, and calls for stronger controls, technological safeguards, and user awareness to preserve trust in digital communications.</p>
<p><strong>Experience</strong></p>
<p>David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security</p>
<p><strong>Notable Achievements</strong></p>
<p>David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with David Wiseman, Vice President, Secure Communications at BlackBerry, as he explores the growing challenges of authenticating identity in digital communication channels. David discusses recent high-profile incidents—including compromised government messaging apps and political deep fakes—that highlight vulnerabilities in platforms like Signal and WhatsApp. He highlights the risks associated with AI-powered voice and message spoofing, and emphasizes the importance of maintaining clear boundaries between business and personal communications to prevent data leaks and blackmail. David also explains how evolving AI tools are making targeted spam, phishing attacks, and metadata mining more effective, and calls for stronger controls, technological safeguards, and user awareness to preserve trust in digital communications.
Experience
David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security
Notable Achievements
David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 327 Deep Dive: David Wiseman | Do You Really Know Who You're Speaking To?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with David Wiseman, Vice President, Secure Communications at BlackBerry, as he explores the growing challenges of authenticating identity in digital communication channels. David discusses recent high-profile incidents—including compromised government messaging apps and political deep fakes—that highlight vulnerabilities in platforms like Signal and WhatsApp. He highlights the risks associated with AI-powered voice and message spoofing, and emphasizes the importance of maintaining clear boundaries between business and personal communications to prevent data leaks and blackmail. David also explains how evolving AI tools are making targeted spam, phishing attacks, and metadata mining more effective, and calls for stronger controls, technological safeguards, and user awareness to preserve trust in digital communications.</p>
<p><strong>Experience</strong></p>
<p>David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security</p>
<p><strong>Notable Achievements</strong></p>
<p>David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2099410/c1e-5k0vb1748dt0xmvo-ww8pgz31tzqd-typc0r.mp3" length="38535043"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with David Wiseman, Vice President, Secure Communications at BlackBerry, as he explores the growing challenges of authenticating identity in digital communication channels. David discusses recent high-profile incidents—including compromised government messaging apps and political deep fakes—that highlight vulnerabilities in platforms like Signal and WhatsApp. He highlights the risks associated with AI-powered voice and message spoofing, and emphasizes the importance of maintaining clear boundaries between business and personal communications to prevent data leaks and blackmail. David also explains how evolving AI tools are making targeted spam, phishing attacks, and metadata mining more effective, and calls for stronger controls, technological safeguards, and user awareness to preserve trust in digital communications.
Experience
David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security
Notable Achievements
David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2099410/c1a-5k0v-47xom81ks7wo-lahppn.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 326 Deep Dive: James Blake | Assessing Your Organisation’s Cyber Resilience]]>
                </title>
                <pubDate>Mon, 28 Jul 2025 05:58:25 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2098405</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-326-deep-dive-james-blake-assessing-youretk</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with James Blake, Vice President, Global Cyber Resiliency Strategy at Cohesity, as he shares his insights on assessing and building organizational cyber resilience. James emphasizes the importance of pragmatism and preparedness, urging companies to address their weakest resiliency links rather than over-focusing on a single area or relying entirely on technology for prevention and detection. He discusses the growing sophistication of cyber threats, particularly ransomware and wiper attacks, and highlights the need for a shared responsibility model between IT and security teams.</p>
<p style="font-weight:400;">James leads cyber resilience strategy at Cohesity. He brings extensive hands-on experience in leading incident response in dozens of ransomware and wiper incidents; as the former CISO of Mimecast and Global Director of Cyber Transformation at JPMorgan Chase; and having led a consultancy practice that built the end-to-end security operation center capability for over 91 organizations including over two dozen in the FORTUNE 100.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with James Blake, Vice President, Global Cyber Resiliency Strategy at Cohesity, as he shares his insights on assessing and building organizational cyber resilience. James emphasizes the importance of pragmatism and preparedness, urging companies to address their weakest resiliency links rather than over-focusing on a single area or relying entirely on technology for prevention and detection. He discusses the growing sophistication of cyber threats, particularly ransomware and wiper attacks, and highlights the need for a shared responsibility model between IT and security teams.
James leads cyber resilience strategy at Cohesity. He brings extensive hands-on experience in leading incident response in dozens of ransomware and wiper incidents; as the former CISO of Mimecast and Global Director of Cyber Transformation at JPMorgan Chase; and having led a consultancy practice that built the end-to-end security operation center capability for over 91 organizations including over two dozen in the FORTUNE 100.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 326 Deep Dive: James Blake | Assessing Your Organisation’s Cyber Resilience]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with James Blake, Vice President, Global Cyber Resiliency Strategy at Cohesity, as he shares his insights on assessing and building organizational cyber resilience. James emphasizes the importance of pragmatism and preparedness, urging companies to address their weakest resiliency links rather than over-focusing on a single area or relying entirely on technology for prevention and detection. He discusses the growing sophistication of cyber threats, particularly ransomware and wiper attacks, and highlights the need for a shared responsibility model between IT and security teams.</p>
<p style="font-weight:400;">James leads cyber resilience strategy at Cohesity. He brings extensive hands-on experience in leading incident response in dozens of ransomware and wiper incidents; as the former CISO of Mimecast and Global Director of Cyber Transformation at JPMorgan Chase; and having led a consultancy practice that built the end-to-end security operation center capability for over 91 organizations including over two dozen in the FORTUNE 100.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2098405/c1e-jjvwh54xm6tn1k29-47xm3mgwf8ok-tjysx0.mp3" length="52064800"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with James Blake, Vice President, Global Cyber Resiliency Strategy at Cohesity, as he shares his insights on assessing and building organizational cyber resilience. James emphasizes the importance of pragmatism and preparedness, urging companies to address their weakest resiliency links rather than over-focusing on a single area or relying entirely on technology for prevention and detection. He discusses the growing sophistication of cyber threats, particularly ransomware and wiper attacks, and highlights the need for a shared responsibility model between IT and security teams.
James leads cyber resilience strategy at Cohesity. He brings extensive hands-on experience in leading incident response in dozens of ransomware and wiper incidents; as the former CISO of Mimecast and Global Director of Cyber Transformation at JPMorgan Chase; and having led a consultancy practice that built the end-to-end security operation center capability for over 91 organizations including over two dozen in the FORTUNE 100.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2098405/c1a-5k0v-xx4gnx4nsvm8-a84wyr.jpg"></itunes:image>
                                                                            <itunes:duration>00:54:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 325 Deep Dive: Federico Torreti | Organisations Getting Choice and Flexibility for AI Experimentation]]>
                </title>
                <pubDate>Wed, 23 Jul 2025 06:00:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2095160</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-325-deep-dive-federico-torreti-organisatiadf</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Federico Torreti, Senior Director of Product for AI &amp; ML at Oracle, as he discusses the company’s latest partnership with xAI to bring the Grok 3 model to Oracle Cloud Infrastructure (OCI). Federico explores the importance of offering curated model choice to enterprises, emphasizing that there is no one-size-fits-all approach to AI solutions. He highlights the challenges organizations face in evaluating AI models, managing decision fatigue, and moving from experimentation to production. The conversation also covers the critical role of data security, privacy, and sovereignty when implementing AI, as well as Oracle’s differentiated approach to embedding AI across its entire technology stack.</p>
<p>Federico Torreti leads the vision, strategy, and delivery of generative AI services, enabling enterprises to build, deploy, and scale large language model applications on Oracle’s cloud platform. Prior to Oracle, he spent over 20 years at Amazon Web Services, Eaton Corporation, and Rolls-Royce, leading AI product teams and launching corporate ventures.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Federico Torreti, Senior Director of Product for AI & ML at Oracle, as he discusses the company’s latest partnership with xAI to bring the Grok 3 model to Oracle Cloud Infrastructure (OCI). Federico explores the importance of offering curated model choice to enterprises, emphasizing that there is no one-size-fits-all approach to AI solutions. He highlights the challenges organizations face in evaluating AI models, managing decision fatigue, and moving from experimentation to production. The conversation also covers the critical role of data security, privacy, and sovereignty when implementing AI, as well as Oracle’s differentiated approach to embedding AI across its entire technology stack.
Federico Torreti leads the vision, strategy, and delivery of generative AI services, enabling enterprises to build, deploy, and scale large language model applications on Oracle’s cloud platform. Prior to Oracle, he spent over 20 years at Amazon Web Services, Eaton Corporation, and Rolls-Royce, leading AI product teams and launching corporate ventures.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 325 Deep Dive: Federico Torreti | Organisations Getting Choice and Flexibility for AI Experimentation]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Federico Torreti, Senior Director of Product for AI &amp; ML at Oracle, as he discusses the company’s latest partnership with xAI to bring the Grok 3 model to Oracle Cloud Infrastructure (OCI). Federico explores the importance of offering curated model choice to enterprises, emphasizing that there is no one-size-fits-all approach to AI solutions. He highlights the challenges organizations face in evaluating AI models, managing decision fatigue, and moving from experimentation to production. The conversation also covers the critical role of data security, privacy, and sovereignty when implementing AI, as well as Oracle’s differentiated approach to embedding AI across its entire technology stack.</p>
<p>Federico Torreti leads the vision, strategy, and delivery of generative AI services, enabling enterprises to build, deploy, and scale large language model applications on Oracle’s cloud platform. Prior to Oracle, he spent over 20 years at Amazon Web Services, Eaton Corporation, and Rolls-Royce, leading AI product teams and launching corporate ventures.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2095160/c1e-n439hdz7o8a9z48r-1p55pzdgbjvj-zffmvg.mp3" length="35209342"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Federico Torreti, Senior Director of Product for AI & ML at Oracle, as he discusses the company’s latest partnership with xAI to bring the Grok 3 model to Oracle Cloud Infrastructure (OCI). Federico explores the importance of offering curated model choice to enterprises, emphasizing that there is no one-size-fits-all approach to AI solutions. He highlights the challenges organizations face in evaluating AI models, managing decision fatigue, and moving from experimentation to production. The conversation also covers the critical role of data security, privacy, and sovereignty when implementing AI, as well as Oracle’s differentiated approach to embedding AI across its entire technology stack.
Federico Torreti leads the vision, strategy, and delivery of generative AI services, enabling enterprises to build, deploy, and scale large language model applications on Oracle’s cloud platform. Prior to Oracle, he spent over 20 years at Amazon Web Services, Eaton Corporation, and Rolls-Royce, leading AI product teams and launching corporate ventures.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2095160/c1a-5k0v-okzz988qb9x4-0cps5k.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 324 Deep Dive: Kate Healy | Successfully Engaging and Selling to a CISO]]>
                </title>
                <pubDate>Fri, 18 Jul 2025 06:00:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2092153</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-324-deep-dive-kate-healy-successfully-engb9f</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Kate Healy, Founder of Empowered Cyber, as she shares her insights on how to successfully engage and sell to CISOs. Kate highlights the challenges salespeople face in a market where traditional tactics, such as cold calls, unsolicited emails, and LinkedIn pitches, often fall flat and can damage long-term relationships. She emphasizes the importance of building genuine trust, creating value, and truly understanding a CISO’s unique challenges rather than launching straight into product pitches. Kate also discusses how effective sales strategies in Australia hinge on relationship-building and mutual respect, and offers practical advice on leveraging existing customer introductions, participating in industry events, and communicating with authenticity and transparency. She strongly advocates for marketing, PR, and sales teams to align more closely and for both sides, vendor and client, to treat each other with empathy, honesty, and a human-centric approach.</p>
<p>Awarded Australia’s Most Outstanding in IT Security 2024, Fellow of AISA, and Graduate Australian Institute of Company Directors, Kate is a distinguished cyber security executive with over 25 years global experience. She has served in influential roles including Interim CISO The Lottery Corporation, Head of Security Google Cloud ANZ, Head of Risk, Wholesale Banking, Standard Chartered Bank and has been a volunteer Board Director. This diverse experience positions her uniquely, having been both an operator and a vendor, she understands the industry from both sides. Kate brings not only deep expertise but also a passion for making this knowledge accessible to everyone through her company Empowered Cyber.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Kate Healy, Founder of Empowered Cyber, as she shares her insights on how to successfully engage and sell to CISOs. Kate highlights the challenges salespeople face in a market where traditional tactics, such as cold calls, unsolicited emails, and LinkedIn pitches, often fall flat and can damage long-term relationships. She emphasizes the importance of building genuine trust, creating value, and truly understanding a CISO’s unique challenges rather than launching straight into product pitches. Kate also discusses how effective sales strategies in Australia hinge on relationship-building and mutual respect, and offers practical advice on leveraging existing customer introductions, participating in industry events, and communicating with authenticity and transparency. She strongly advocates for marketing, PR, and sales teams to align more closely and for both sides, vendor and client, to treat each other with empathy, honesty, and a human-centric approach.
Awarded Australia’s Most Outstanding in IT Security 2024, Fellow of AISA, and Graduate Australian Institute of Company Directors, Kate is a distinguished cyber security executive with over 25 years global experience. She has served in influential roles including Interim CISO The Lottery Corporation, Head of Security Google Cloud ANZ, Head of Risk, Wholesale Banking, Standard Chartered Bank and has been a volunteer Board Director. This diverse experience positions her uniquely, having been both an operator and a vendor, she understands the industry from both sides. Kate brings not only deep expertise but also a passion for making this knowledge accessible to everyone through her company Empowered Cyber.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 324 Deep Dive: Kate Healy | Successfully Engaging and Selling to a CISO]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Kate Healy, Founder of Empowered Cyber, as she shares her insights on how to successfully engage and sell to CISOs. Kate highlights the challenges salespeople face in a market where traditional tactics, such as cold calls, unsolicited emails, and LinkedIn pitches, often fall flat and can damage long-term relationships. She emphasizes the importance of building genuine trust, creating value, and truly understanding a CISO’s unique challenges rather than launching straight into product pitches. Kate also discusses how effective sales strategies in Australia hinge on relationship-building and mutual respect, and offers practical advice on leveraging existing customer introductions, participating in industry events, and communicating with authenticity and transparency. She strongly advocates for marketing, PR, and sales teams to align more closely and for both sides, vendor and client, to treat each other with empathy, honesty, and a human-centric approach.</p>
<p>Awarded Australia’s Most Outstanding in IT Security 2024, Fellow of AISA, and Graduate Australian Institute of Company Directors, Kate is a distinguished cyber security executive with over 25 years global experience. She has served in influential roles including Interim CISO The Lottery Corporation, Head of Security Google Cloud ANZ, Head of Risk, Wholesale Banking, Standard Chartered Bank and has been a volunteer Board Director. This diverse experience positions her uniquely, having been both an operator and a vendor, she understands the industry from both sides. Kate brings not only deep expertise but also a passion for making this knowledge accessible to everyone through her company Empowered Cyber.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2092153/c1e-02xmsk7mjrfgm3k5-0vpk59rpioz1-w59mjb.mp3" length="35844640"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Kate Healy, Founder of Empowered Cyber, as she shares her insights on how to successfully engage and sell to CISOs. Kate highlights the challenges salespeople face in a market where traditional tactics, such as cold calls, unsolicited emails, and LinkedIn pitches, often fall flat and can damage long-term relationships. She emphasizes the importance of building genuine trust, creating value, and truly understanding a CISO’s unique challenges rather than launching straight into product pitches. Kate also discusses how effective sales strategies in Australia hinge on relationship-building and mutual respect, and offers practical advice on leveraging existing customer introductions, participating in industry events, and communicating with authenticity and transparency. She strongly advocates for marketing, PR, and sales teams to align more closely and for both sides, vendor and client, to treat each other with empathy, honesty, and a human-centric approach.
Awarded Australia’s Most Outstanding in IT Security 2024, Fellow of AISA, and Graduate Australian Institute of Company Directors, Kate is a distinguished cyber security executive with over 25 years global experience. She has served in influential roles including Interim CISO The Lottery Corporation, Head of Security Google Cloud ANZ, Head of Risk, Wholesale Banking, Standard Chartered Bank and has been a volunteer Board Director. This diverse experience positions her uniquely, having been both an operator and a vendor, she understands the industry from both sides. Kate brings not only deep expertise but also a passion for making this knowledge accessible to everyone through her company Empowered Cyber.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2092153/c1a-5k0v-rk344zxnim6k-6lsmwh.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 323 Deep Dive: Jadee Hanson | Is Compliance A Minimum Standard Or A Strategic Enabler In Cybersecurity Governance?]]>
                </title>
                <pubDate>Wed, 16 Jul 2025 06:00:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2089879</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-323-deep-dive-jadee-hanson-is-compliancejqm</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Jadee Hanson, Chief Information Security Officer at Vanta, as she explores whether compliance is simply a minimum standard or a strategic enabler in cybersecurity governance. Jadee shares insights on how compliance, when approached with transparency and accountability, can build customer trust and drive business success. She discusses the shift from outdated, manual audit practices to a model of continuous, automated compliance monitoring, emphasizing the efficiency and assurance provided by real-time controls. Jadee also highlights the importance of going beyond compliance “checkboxes,” advocating for proactive security measures, such as bug bounty programs and responsible disclosure processes, that strengthen organizational resilience.</p>


Jadee Hanson, Chief Information Security Officer

Jadee is Vanta’s Chief Information Security Officer leading the organization’s security program and overseeing Security, Enterprise Engineering and Privacy, Risk and Compliance (PRC). Prior to joining Vanta, Jadee served as CISO and CIO for Code42, where she elevated the Security team within Code42, helping internal teams and customers adopt right-sized risk management and increasing the company’s cyber detection, response, and recovery capabilities.Previously, Jadee held a number of senior leadership roles in the security department of Target Corporation including serving as the security leader for the acquisition of software development and online retail companies, and the sale of Target Pharmacies to CVS Health. Before joining Target, Jadee worked at Deloitte as a security consultant for companies across diverse industries such as healthcare, manufacturing energy, retail and more. Hanson received her Bachelor of Science, Information Systems from the University of North Dakota.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Jadee Hanson, Chief Information Security Officer at Vanta, as she explores whether compliance is simply a minimum standard or a strategic enabler in cybersecurity governance. Jadee shares insights on how compliance, when approached with transparency and accountability, can build customer trust and drive business success. She discusses the shift from outdated, manual audit practices to a model of continuous, automated compliance monitoring, emphasizing the efficiency and assurance provided by real-time controls. Jadee also highlights the importance of going beyond compliance “checkboxes,” advocating for proactive security measures, such as bug bounty programs and responsible disclosure processes, that strengthen organizational resilience.


Jadee Hanson, Chief Information Security Officer

Jadee is Vanta’s Chief Information Security Officer leading the organization’s security program and overseeing Security, Enterprise Engineering and Privacy, Risk and Compliance (PRC). Prior to joining Vanta, Jadee served as CISO and CIO for Code42, where she elevated the Security team within Code42, helping internal teams and customers adopt right-sized risk management and increasing the company’s cyber detection, response, and recovery capabilities.Previously, Jadee held a number of senior leadership roles in the security department of Target Corporation including serving as the security leader for the acquisition of software development and online retail companies, and the sale of Target Pharmacies to CVS Health. Before joining Target, Jadee worked at Deloitte as a security consultant for companies across diverse industries such as healthcare, manufacturing energy, retail and more. Hanson received her Bachelor of Science, Information Systems from the University of North Dakota.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 323 Deep Dive: Jadee Hanson | Is Compliance A Minimum Standard Or A Strategic Enabler In Cybersecurity Governance?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Jadee Hanson, Chief Information Security Officer at Vanta, as she explores whether compliance is simply a minimum standard or a strategic enabler in cybersecurity governance. Jadee shares insights on how compliance, when approached with transparency and accountability, can build customer trust and drive business success. She discusses the shift from outdated, manual audit practices to a model of continuous, automated compliance monitoring, emphasizing the efficiency and assurance provided by real-time controls. Jadee also highlights the importance of going beyond compliance “checkboxes,” advocating for proactive security measures, such as bug bounty programs and responsible disclosure processes, that strengthen organizational resilience.</p>


Jadee Hanson, Chief Information Security Officer

Jadee is Vanta’s Chief Information Security Officer leading the organization’s security program and overseeing Security, Enterprise Engineering and Privacy, Risk and Compliance (PRC). Prior to joining Vanta, Jadee served as CISO and CIO for Code42, where she elevated the Security team within Code42, helping internal teams and customers adopt right-sized risk management and increasing the company’s cyber detection, response, and recovery capabilities.Previously, Jadee held a number of senior leadership roles in the security department of Target Corporation including serving as the security leader for the acquisition of software development and online retail companies, and the sale of Target Pharmacies to CVS Health. Before joining Target, Jadee worked at Deloitte as a security consultant for companies across diverse industries such as healthcare, manufacturing energy, retail and more. Hanson received her Bachelor of Science, Information Systems from the University of North Dakota.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2089879/c1e-n439hdz3dza9z48r-47xd3j3kfnmq-euzbwf.mp3" length="32361368"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Jadee Hanson, Chief Information Security Officer at Vanta, as she explores whether compliance is simply a minimum standard or a strategic enabler in cybersecurity governance. Jadee shares insights on how compliance, when approached with transparency and accountability, can build customer trust and drive business success. She discusses the shift from outdated, manual audit practices to a model of continuous, automated compliance monitoring, emphasizing the efficiency and assurance provided by real-time controls. Jadee also highlights the importance of going beyond compliance “checkboxes,” advocating for proactive security measures, such as bug bounty programs and responsible disclosure processes, that strengthen organizational resilience.


Jadee Hanson, Chief Information Security Officer

Jadee is Vanta’s Chief Information Security Officer leading the organization’s security program and overseeing Security, Enterprise Engineering and Privacy, Risk and Compliance (PRC). Prior to joining Vanta, Jadee served as CISO and CIO for Code42, where she elevated the Security team within Code42, helping internal teams and customers adopt right-sized risk management and increasing the company’s cyber detection, response, and recovery capabilities.Previously, Jadee held a number of senior leadership roles in the security department of Target Corporation including serving as the security leader for the acquisition of software development and online retail companies, and the sale of Target Pharmacies to CVS Health. Before joining Target, Jadee worked at Deloitte as a security consultant for companies across diverse industries such as healthcare, manufacturing energy, retail and more. Hanson received her Bachelor of Science, Information Systems from the University of North Dakota.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2089879/c1a-5k0v-1p54w42zuk54-cq6sbt.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 322 Deep Dive: Courtney Guss | Resilience in Real Time: Women, Leadership and the Frontlines of Cyber Crisis]]>
                </title>
                <pubDate>Fri, 11 Jul 2025 05:57:51 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2085474</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-322-deep-dive-courtney-guss-resilience-inuml</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Courtney Guss, Director of Crisis Response at Sempris, as she sheds light on why a crisis plan alone won’t always save organizations in moments of disruption. Courtney unpacks surprising research showing that despite 97% of organizations regularly planning and training for crises, 76% still suffer significant impacts during incidents. She discusses how misaligned training, outdated and irrelevant scenarios, and a “checkbox” mentality frequently undermine preparedness. Courtney emphasizes the need for organizations to tailor crisis exercises to their specific business context, practice more frequently in smaller, relevant groups, and prioritize adaptability with backup plans when things go awry. She also highlights the importance of having accessible contact information and robust communication channels, as well as clearly defined decision triggers and justifications for pivoting during an incident.</p>
<p>Courtney Guss, Semperis, Director of Crisis Management </p>
<p>Courtney Guss brings over 20 years of experience in cybersecurity, crisis response, and business resilience. She began her career in the insurance and risk management sector, working with FEMA and the NFIP, where she developed a strong foundation in emergency preparedness and crisis communications before transitioning into cybersecurity leadership roles. </p>
<p>Courtney has led cyber crisis management initiatives for a wide range of organizations, including global enterprises, government agencies, and Fortune 500 companies. She previously served as a senior consultant at IBM Security, where she specialized in cyber risk quantification using the FAIR framework and advised clients on regulatory compliance, incident response, and stakeholder management. </p>
<p>Her work has included developing and running executive-level tabletop exercises, supporting ransomware recovery efforts, advising organizations on SEC, DORA, CCOP, and CIRCIA reporting obligations, and orchestrating cross-functional response plans to major incidents. Courtney is passionate about turning chaos into order and equipping teams with the clarity, tools, and playbooks they need to act decisively under pressure. </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Courtney Guss, Director of Crisis Response at Sempris, as she sheds light on why a crisis plan alone won’t always save organizations in moments of disruption. Courtney unpacks surprising research showing that despite 97% of organizations regularly planning and training for crises, 76% still suffer significant impacts during incidents. She discusses how misaligned training, outdated and irrelevant scenarios, and a “checkbox” mentality frequently undermine preparedness. Courtney emphasizes the need for organizations to tailor crisis exercises to their specific business context, practice more frequently in smaller, relevant groups, and prioritize adaptability with backup plans when things go awry. She also highlights the importance of having accessible contact information and robust communication channels, as well as clearly defined decision triggers and justifications for pivoting during an incident.
Courtney Guss, Semperis, Director of Crisis Management 
Courtney Guss brings over 20 years of experience in cybersecurity, crisis response, and business resilience. She began her career in the insurance and risk management sector, working with FEMA and the NFIP, where she developed a strong foundation in emergency preparedness and crisis communications before transitioning into cybersecurity leadership roles. 
Courtney has led cyber crisis management initiatives for a wide range of organizations, including global enterprises, government agencies, and Fortune 500 companies. She previously served as a senior consultant at IBM Security, where she specialized in cyber risk quantification using the FAIR framework and advised clients on regulatory compliance, incident response, and stakeholder management. 
Her work has included developing and running executive-level tabletop exercises, supporting ransomware recovery efforts, advising organizations on SEC, DORA, CCOP, and CIRCIA reporting obligations, and orchestrating cross-functional response plans to major incidents. Courtney is passionate about turning chaos into order and equipping teams with the clarity, tools, and playbooks they need to act decisively under pressure. ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 322 Deep Dive: Courtney Guss | Resilience in Real Time: Women, Leadership and the Frontlines of Cyber Crisis]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Courtney Guss, Director of Crisis Response at Sempris, as she sheds light on why a crisis plan alone won’t always save organizations in moments of disruption. Courtney unpacks surprising research showing that despite 97% of organizations regularly planning and training for crises, 76% still suffer significant impacts during incidents. She discusses how misaligned training, outdated and irrelevant scenarios, and a “checkbox” mentality frequently undermine preparedness. Courtney emphasizes the need for organizations to tailor crisis exercises to their specific business context, practice more frequently in smaller, relevant groups, and prioritize adaptability with backup plans when things go awry. She also highlights the importance of having accessible contact information and robust communication channels, as well as clearly defined decision triggers and justifications for pivoting during an incident.</p>
<p>Courtney Guss, Semperis, Director of Crisis Management </p>
<p>Courtney Guss brings over 20 years of experience in cybersecurity, crisis response, and business resilience. She began her career in the insurance and risk management sector, working with FEMA and the NFIP, where she developed a strong foundation in emergency preparedness and crisis communications before transitioning into cybersecurity leadership roles. </p>
<p>Courtney has led cyber crisis management initiatives for a wide range of organizations, including global enterprises, government agencies, and Fortune 500 companies. She previously served as a senior consultant at IBM Security, where she specialized in cyber risk quantification using the FAIR framework and advised clients on regulatory compliance, incident response, and stakeholder management. </p>
<p>Her work has included developing and running executive-level tabletop exercises, supporting ransomware recovery efforts, advising organizations on SEC, DORA, CCOP, and CIRCIA reporting obligations, and orchestrating cross-functional response plans to major incidents. Courtney is passionate about turning chaos into order and equipping teams with the clarity, tools, and playbooks they need to act decisively under pressure. </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2085474/c1e-kdkxsggn36u941jo-mkj14k3xhd9r-90iepi.mp3" length="40040114"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Courtney Guss, Director of Crisis Response at Sempris, as she sheds light on why a crisis plan alone won’t always save organizations in moments of disruption. Courtney unpacks surprising research showing that despite 97% of organizations regularly planning and training for crises, 76% still suffer significant impacts during incidents. She discusses how misaligned training, outdated and irrelevant scenarios, and a “checkbox” mentality frequently undermine preparedness. Courtney emphasizes the need for organizations to tailor crisis exercises to their specific business context, practice more frequently in smaller, relevant groups, and prioritize adaptability with backup plans when things go awry. She also highlights the importance of having accessible contact information and robust communication channels, as well as clearly defined decision triggers and justifications for pivoting during an incident.
Courtney Guss, Semperis, Director of Crisis Management 
Courtney Guss brings over 20 years of experience in cybersecurity, crisis response, and business resilience. She began her career in the insurance and risk management sector, working with FEMA and the NFIP, where she developed a strong foundation in emergency preparedness and crisis communications before transitioning into cybersecurity leadership roles. 
Courtney has led cyber crisis management initiatives for a wide range of organizations, including global enterprises, government agencies, and Fortune 500 companies. She previously served as a senior consultant at IBM Security, where she specialized in cyber risk quantification using the FAIR framework and advised clients on regulatory compliance, incident response, and stakeholder management. 
Her work has included developing and running executive-level tabletop exercises, supporting ransomware recovery efforts, advising organizations on SEC, DORA, CCOP, and CIRCIA reporting obligations, and orchestrating cross-functional response plans to major incidents. Courtney is passionate about turning chaos into order and equipping teams with the clarity, tools, and playbooks they need to act decisively under pressure. ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2085474/c1a-5k0v-1p5d2vr1uj12-tsm4dq.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KBI.Media Update | KBKast Partners with Vanta as First Exclusive Sponsor]]>
                </title>
                <pubDate>Thu, 10 Jul 2025 06:03:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2085059</guid>
                                    <link>https://kbkast.castos.com/episodes/kbimedia-update-kbkast-partners-with-vanta-as-firgop</link>
                                <description>
                                            <![CDATA[<p><strong><a href="https://kbi.media/">KBI.Media</a></strong> is proud to announce a landmark partnership between KBKast, the flagship security podcast for leadership, and <a href="https://vanta.com/kbkast/">Vanta</a>, the leading trust management platform.</p>
<p>In a dynamic and rapidly evolving media landscape, companies like Vanta are exploring innovative platforms to amplify their presence and impact. This partnership enables KBKast to:</p>
<ul>
<li>Invest in content development: Improve production quality and explore new formats to engage listeners more deeply</li>
<li>Foster brand trust: Support brands in reaching security-minded audiences through authentic, expert-driven conversations</li>
<li>Enhance cybersecurity awareness: Continue providing valuable, accessible insights to a global audience</li>
</ul>
<p>With Vanta’s involvement, KBKast will introduce:</p>
<ul>
<li>Expert insights: Timely discussions on the evolving compliance and security landscape</li>
<li>Real-world case studies: Practical lessons from businesses navigating compliance challenges</li>
<li>Resource-rich learning: Access to best-in-class materials and frameworks via Vanta’s expertise</li>
</ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[KBI.Media is proud to announce a landmark partnership between KBKast, the flagship security podcast for leadership, and Vanta, the leading trust management platform.
In a dynamic and rapidly evolving media landscape, companies like Vanta are exploring innovative platforms to amplify their presence and impact. This partnership enables KBKast to:

Invest in content development: Improve production quality and explore new formats to engage listeners more deeply
Foster brand trust: Support brands in reaching security-minded audiences through authentic, expert-driven conversations
Enhance cybersecurity awareness: Continue providing valuable, accessible insights to a global audience

With Vanta’s involvement, KBKast will introduce:

Expert insights: Timely discussions on the evolving compliance and security landscape
Real-world case studies: Practical lessons from businesses navigating compliance challenges
Resource-rich learning: Access to best-in-class materials and frameworks via Vanta’s expertise
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KBI.Media Update | KBKast Partners with Vanta as First Exclusive Sponsor]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong><a href="https://kbi.media/">KBI.Media</a></strong> is proud to announce a landmark partnership between KBKast, the flagship security podcast for leadership, and <a href="https://vanta.com/kbkast/">Vanta</a>, the leading trust management platform.</p>
<p>In a dynamic and rapidly evolving media landscape, companies like Vanta are exploring innovative platforms to amplify their presence and impact. This partnership enables KBKast to:</p>
<ul>
<li>Invest in content development: Improve production quality and explore new formats to engage listeners more deeply</li>
<li>Foster brand trust: Support brands in reaching security-minded audiences through authentic, expert-driven conversations</li>
<li>Enhance cybersecurity awareness: Continue providing valuable, accessible insights to a global audience</li>
</ul>
<p>With Vanta’s involvement, KBKast will introduce:</p>
<ul>
<li>Expert insights: Timely discussions on the evolving compliance and security landscape</li>
<li>Real-world case studies: Practical lessons from businesses navigating compliance challenges</li>
<li>Resource-rich learning: Access to best-in-class materials and frameworks via Vanta’s expertise</li>
</ul>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2085059/c1e-02xmskkn4vsgm3k5-7z9k4xo0fmd1-nlnmwp.mp3" length="979739"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[KBI.Media is proud to announce a landmark partnership between KBKast, the flagship security podcast for leadership, and Vanta, the leading trust management platform.
In a dynamic and rapidly evolving media landscape, companies like Vanta are exploring innovative platforms to amplify their presence and impact. This partnership enables KBKast to:

Invest in content development: Improve production quality and explore new formats to engage listeners more deeply
Foster brand trust: Support brands in reaching security-minded audiences through authentic, expert-driven conversations
Enhance cybersecurity awareness: Continue providing valuable, accessible insights to a global audience

With Vanta’s involvement, KBKast will introduce:

Expert insights: Timely discussions on the evolving compliance and security landscape
Real-world case studies: Practical lessons from businesses navigating compliance challenges
Resource-rich learning: Access to best-in-class materials and frameworks via Vanta’s expertise
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2085059/c1a-5k0v-pkxjzwj0ho7z-pjadj7.png"></itunes:image>
                                                                            <itunes:duration>00:01:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 321 Deep Dive: Graeme Neilson | How the Security Industry Ignores the Halting Problem]]>
                </title>
                <pubDate>Wed, 09 Jul 2025 05:58:27 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2084275</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-321-deep-dive-graeme-neilson-how-the-secuwee</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Graeme Neilson, Founder and Chief Research Officer at Siege, as he unpacks why the security industry often ignores the halting problem—a foundational concept in computer science that explains why software will always contain bugs and vulnerabilities. Graeme challenges the efficacy of awareness training programs, arguing that fundamental flaws in protocols like email and the complexity of software itself, not user behaviour, are the real culprits behind persistent cyber risks. The discussion explores the ongoing frustrations around password management and multifactor authentication, the dangers of concentrating credentials in cloud-based password managers, and the risks introduced by abstracted and AI-generated code. Graeme also emphasises that the true security challenge lies in managing identity—both human and machine—as digital systems become more pervasive and embedded in our daily lives, advocating for a move towards treating cybersecurity issues more like safety concerns in other industries.</p>
<p>Graeme was born in Scotland, learnt cracking, reverse engineering and security from the Internet. Emigrated to NZ in early 2000’s and was one of the founders of Aura Information Security (pen testing company and RedShield (web defence company). He has presented original offensive security research at many international conferences including Blackhat, H2HC, Troopers, Ruxcon and Kiwicon. Now he is head of research for Siege Ltd, an NZ based company specialising in testing denial of service and bot mitigations.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Graeme Neilson, Founder and Chief Research Officer at Siege, as he unpacks why the security industry often ignores the halting problem—a foundational concept in computer science that explains why software will always contain bugs and vulnerabilities. Graeme challenges the efficacy of awareness training programs, arguing that fundamental flaws in protocols like email and the complexity of software itself, not user behaviour, are the real culprits behind persistent cyber risks. The discussion explores the ongoing frustrations around password management and multifactor authentication, the dangers of concentrating credentials in cloud-based password managers, and the risks introduced by abstracted and AI-generated code. Graeme also emphasises that the true security challenge lies in managing identity—both human and machine—as digital systems become more pervasive and embedded in our daily lives, advocating for a move towards treating cybersecurity issues more like safety concerns in other industries.
Graeme was born in Scotland, learnt cracking, reverse engineering and security from the Internet. Emigrated to NZ in early 2000’s and was one of the founders of Aura Information Security (pen testing company and RedShield (web defence company). He has presented original offensive security research at many international conferences including Blackhat, H2HC, Troopers, Ruxcon and Kiwicon. Now he is head of research for Siege Ltd, an NZ based company specialising in testing denial of service and bot mitigations.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 321 Deep Dive: Graeme Neilson | How the Security Industry Ignores the Halting Problem]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Graeme Neilson, Founder and Chief Research Officer at Siege, as he unpacks why the security industry often ignores the halting problem—a foundational concept in computer science that explains why software will always contain bugs and vulnerabilities. Graeme challenges the efficacy of awareness training programs, arguing that fundamental flaws in protocols like email and the complexity of software itself, not user behaviour, are the real culprits behind persistent cyber risks. The discussion explores the ongoing frustrations around password management and multifactor authentication, the dangers of concentrating credentials in cloud-based password managers, and the risks introduced by abstracted and AI-generated code. Graeme also emphasises that the true security challenge lies in managing identity—both human and machine—as digital systems become more pervasive and embedded in our daily lives, advocating for a move towards treating cybersecurity issues more like safety concerns in other industries.</p>
<p>Graeme was born in Scotland, learnt cracking, reverse engineering and security from the Internet. Emigrated to NZ in early 2000’s and was one of the founders of Aura Information Security (pen testing company and RedShield (web defence company). He has presented original offensive security research at many international conferences including Blackhat, H2HC, Troopers, Ruxcon and Kiwicon. Now he is head of research for Siege Ltd, an NZ based company specialising in testing denial of service and bot mitigations.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2084275/c1e-02xmskkxzntgm3k5-xx4v2g8kfvq1-xwo5y7.mp3" length="38544656"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Graeme Neilson, Founder and Chief Research Officer at Siege, as he unpacks why the security industry often ignores the halting problem—a foundational concept in computer science that explains why software will always contain bugs and vulnerabilities. Graeme challenges the efficacy of awareness training programs, arguing that fundamental flaws in protocols like email and the complexity of software itself, not user behaviour, are the real culprits behind persistent cyber risks. The discussion explores the ongoing frustrations around password management and multifactor authentication, the dangers of concentrating credentials in cloud-based password managers, and the risks introduced by abstracted and AI-generated code. Graeme also emphasises that the true security challenge lies in managing identity—both human and machine—as digital systems become more pervasive and embedded in our daily lives, advocating for a move towards treating cybersecurity issues more like safety concerns in other industries.
Graeme was born in Scotland, learnt cracking, reverse engineering and security from the Internet. Emigrated to NZ in early 2000’s and was one of the founders of Aura Information Security (pen testing company and RedShield (web defence company). He has presented original offensive security research at many international conferences including Blackhat, H2HC, Troopers, Ruxcon and Kiwicon. Now he is head of research for Siege Ltd, an NZ based company specialising in testing denial of service and bot mitigations.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2084275/c1a-5k0v-ndzw84jviq2v-dthrn3.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 320 Deep Dive: Kavitha Mariappan | The Future of Data Protection]]>
                </title>
                <pubDate>Fri, 04 Jul 2025 05:53:59 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2080517</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-320-deep-dive-kavitha-mariappan-the-futuriud</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Kavitha Mariappan, Chief Transformation Officer at Rubrik, as she unpacks data protection and the critical importance of cyber resilience. Kavitha challenges the industry’s tendency to hyper-focus on prevention and detection, advocating instead for a holistic approach that integrates resilience and recovery as boardroom imperatives. She shares insights from Rubrik Zero Labs on the real-world challenges organizations face when recovering from ransomware attacks, and highlights the often-overlooked need to make backup, recovery, and risk mitigation a core part of business continuity and security strategy. The conversation covers the business impact of breaches—including monetary loss, reputational risk, and regulatory implications—while emphasizing the growing complexity of identity management in the age of AI and the need for interoperability between security domains. Kavitha also stresses the role of executive leadership in driving change and the importance of public-private collaboration to shape standards and frameworks for a secure digital future.</p>
<p><strong>Kavitha Mariappan, Chief Transformation Officer, Rubrik</strong></p>
<p>Kavitha leads Rubrik’s efforts to accelerate enterprise transformation and deepen executive engagement, with a focus on expanding Rubrik’s footprint across the Global 2000 and public sector decision-makers. She partners across the GTM organization, shaping Rubrik’s CXO narrative, championing value economics, and unlocking new revenue streams. Prior to Rubrik, Kavitha was EVP of Customer Experience &amp; Transformation at Zscaler, where she built and scaled the company’s CXO and Transformation Practice. She holds a B.Eng. in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and an M.S. in Cybersecurity Risk and Strategy from NYU School of Law and Tandon School of Engineering.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Kavitha Mariappan, Chief Transformation Officer at Rubrik, as she unpacks data protection and the critical importance of cyber resilience. Kavitha challenges the industry’s tendency to hyper-focus on prevention and detection, advocating instead for a holistic approach that integrates resilience and recovery as boardroom imperatives. She shares insights from Rubrik Zero Labs on the real-world challenges organizations face when recovering from ransomware attacks, and highlights the often-overlooked need to make backup, recovery, and risk mitigation a core part of business continuity and security strategy. The conversation covers the business impact of breaches—including monetary loss, reputational risk, and regulatory implications—while emphasizing the growing complexity of identity management in the age of AI and the need for interoperability between security domains. Kavitha also stresses the role of executive leadership in driving change and the importance of public-private collaboration to shape standards and frameworks for a secure digital future.
Kavitha Mariappan, Chief Transformation Officer, Rubrik
Kavitha leads Rubrik’s efforts to accelerate enterprise transformation and deepen executive engagement, with a focus on expanding Rubrik’s footprint across the Global 2000 and public sector decision-makers. She partners across the GTM organization, shaping Rubrik’s CXO narrative, championing value economics, and unlocking new revenue streams. Prior to Rubrik, Kavitha was EVP of Customer Experience & Transformation at Zscaler, where she built and scaled the company’s CXO and Transformation Practice. She holds a B.Eng. in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and an M.S. in Cybersecurity Risk and Strategy from NYU School of Law and Tandon School of Engineering.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 320 Deep Dive: Kavitha Mariappan | The Future of Data Protection]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Kavitha Mariappan, Chief Transformation Officer at Rubrik, as she unpacks data protection and the critical importance of cyber resilience. Kavitha challenges the industry’s tendency to hyper-focus on prevention and detection, advocating instead for a holistic approach that integrates resilience and recovery as boardroom imperatives. She shares insights from Rubrik Zero Labs on the real-world challenges organizations face when recovering from ransomware attacks, and highlights the often-overlooked need to make backup, recovery, and risk mitigation a core part of business continuity and security strategy. The conversation covers the business impact of breaches—including monetary loss, reputational risk, and regulatory implications—while emphasizing the growing complexity of identity management in the age of AI and the need for interoperability between security domains. Kavitha also stresses the role of executive leadership in driving change and the importance of public-private collaboration to shape standards and frameworks for a secure digital future.</p>
<p><strong>Kavitha Mariappan, Chief Transformation Officer, Rubrik</strong></p>
<p>Kavitha leads Rubrik’s efforts to accelerate enterprise transformation and deepen executive engagement, with a focus on expanding Rubrik’s footprint across the Global 2000 and public sector decision-makers. She partners across the GTM organization, shaping Rubrik’s CXO narrative, championing value economics, and unlocking new revenue streams. Prior to Rubrik, Kavitha was EVP of Customer Experience &amp; Transformation at Zscaler, where she built and scaled the company’s CXO and Transformation Practice. She holds a B.Eng. in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and an M.S. in Cybersecurity Risk and Strategy from NYU School of Law and Tandon School of Engineering.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2080517/c1e-gkvqbmm943h249gq-jpd0xd32u71-1vglja.mp3" length="37689094"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Kavitha Mariappan, Chief Transformation Officer at Rubrik, as she unpacks data protection and the critical importance of cyber resilience. Kavitha challenges the industry’s tendency to hyper-focus on prevention and detection, advocating instead for a holistic approach that integrates resilience and recovery as boardroom imperatives. She shares insights from Rubrik Zero Labs on the real-world challenges organizations face when recovering from ransomware attacks, and highlights the often-overlooked need to make backup, recovery, and risk mitigation a core part of business continuity and security strategy. The conversation covers the business impact of breaches—including monetary loss, reputational risk, and regulatory implications—while emphasizing the growing complexity of identity management in the age of AI and the need for interoperability between security domains. Kavitha also stresses the role of executive leadership in driving change and the importance of public-private collaboration to shape standards and frameworks for a secure digital future.
Kavitha Mariappan, Chief Transformation Officer, Rubrik
Kavitha leads Rubrik’s efforts to accelerate enterprise transformation and deepen executive engagement, with a focus on expanding Rubrik’s footprint across the Global 2000 and public sector decision-makers. She partners across the GTM organization, shaping Rubrik’s CXO narrative, championing value economics, and unlocking new revenue streams. Prior to Rubrik, Kavitha was EVP of Customer Experience & Transformation at Zscaler, where she built and scaled the company’s CXO and Transformation Practice. She holds a B.Eng. in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and an M.S. in Cybersecurity Risk and Strategy from NYU School of Law and Tandon School of Engineering.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2080517/c1a-5k0v-47kvq52dugjg-qaafbb.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From JFrog EveryOps Day '25 Sydney – KB On The Go | Sunny Rao, Craig Wilson, and Tal Zarfati]]>
                </title>
                <pubDate>Wed, 02 Jul 2025 06:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2079361</guid>
                                    <link>https://kbkast.castos.com/episodes/from-jfrog-everyops-day-25-sydney-kb-on-the-go-jm4</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB sits down with Sunny Rao, SVP, Asia Pacific at JFrog, Craig Wilson, Principal Cloud Platform Engineer at Iress, and Tal Zarfati, Architect Lead at JFrog Security. Together they discuss how to strengthen software supply chain security, modernising infrastructure through cloud migration to overcome legacy constraints, and the CISA-MITRE CVE funding scare.</p>
<p><strong>Sunny Rao, SVP, Asia Pacific at JFrog</strong></p>
<p>Sunny Rao is SVP, Asia Pacific at JFrog and brings almost three decades of business management experience in information technology and enterprise software. Rao has vast experience and deep expertise in the global expansion of emerging technologies and is passionate about helping customers and partners enhance, secure, and accelerate their entire software supply chain with JFrog.</p>
<p><strong>Craig Wilson, Cloud Platform Principal Engineer at Iress</strong></p>
<p>Craig Wilson is a Cloud Platform Principal Engineer at Iress, where he focuses on cloud architecture and developer tools, and champions ‘shift-left’ practices to implement secure software delivery platforms.</p>
<p><strong>Tal Zarfati, Architect Lead, JFrog Security</strong></p>
<p>Tal Zarfati is the Architect Lead at JFrog Security, bringing over 20 years of expertise in software engineering and cybersecurity. With a strong background in leading R&amp;D teams focused on Supply Chain security, he has since spearheaded the development of core SCA and SBOM capabilities and owned the JFrog OSS Catalog product, leading multiple teams to bring it to life.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB sits down with Sunny Rao, SVP, Asia Pacific at JFrog, Craig Wilson, Principal Cloud Platform Engineer at Iress, and Tal Zarfati, Architect Lead at JFrog Security. Together they discuss how to strengthen software supply chain security, modernising infrastructure through cloud migration to overcome legacy constraints, and the CISA-MITRE CVE funding scare.
Sunny Rao, SVP, Asia Pacific at JFrog
Sunny Rao is SVP, Asia Pacific at JFrog and brings almost three decades of business management experience in information technology and enterprise software. Rao has vast experience and deep expertise in the global expansion of emerging technologies and is passionate about helping customers and partners enhance, secure, and accelerate their entire software supply chain with JFrog.
Craig Wilson, Cloud Platform Principal Engineer at Iress
Craig Wilson is a Cloud Platform Principal Engineer at Iress, where he focuses on cloud architecture and developer tools, and champions ‘shift-left’ practices to implement secure software delivery platforms.
Tal Zarfati, Architect Lead, JFrog Security
Tal Zarfati is the Architect Lead at JFrog Security, bringing over 20 years of expertise in software engineering and cybersecurity. With a strong background in leading R&D teams focused on Supply Chain security, he has since spearheaded the development of core SCA and SBOM capabilities and owned the JFrog OSS Catalog product, leading multiple teams to bring it to life.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From JFrog EveryOps Day '25 Sydney – KB On The Go | Sunny Rao, Craig Wilson, and Tal Zarfati]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB sits down with Sunny Rao, SVP, Asia Pacific at JFrog, Craig Wilson, Principal Cloud Platform Engineer at Iress, and Tal Zarfati, Architect Lead at JFrog Security. Together they discuss how to strengthen software supply chain security, modernising infrastructure through cloud migration to overcome legacy constraints, and the CISA-MITRE CVE funding scare.</p>
<p><strong>Sunny Rao, SVP, Asia Pacific at JFrog</strong></p>
<p>Sunny Rao is SVP, Asia Pacific at JFrog and brings almost three decades of business management experience in information technology and enterprise software. Rao has vast experience and deep expertise in the global expansion of emerging technologies and is passionate about helping customers and partners enhance, secure, and accelerate their entire software supply chain with JFrog.</p>
<p><strong>Craig Wilson, Cloud Platform Principal Engineer at Iress</strong></p>
<p>Craig Wilson is a Cloud Platform Principal Engineer at Iress, where he focuses on cloud architecture and developer tools, and champions ‘shift-left’ practices to implement secure software delivery platforms.</p>
<p><strong>Tal Zarfati, Architect Lead, JFrog Security</strong></p>
<p>Tal Zarfati is the Architect Lead at JFrog Security, bringing over 20 years of expertise in software engineering and cybersecurity. With a strong background in leading R&amp;D teams focused on Supply Chain security, he has since spearheaded the development of core SCA and SBOM capabilities and owned the JFrog OSS Catalog product, leading multiple teams to bring it to life.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2079361/c1e-kdkxsggvmzb941jo-ndn99qqxs14p-knphp5.mp3" length="77558221"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB sits down with Sunny Rao, SVP, Asia Pacific at JFrog, Craig Wilson, Principal Cloud Platform Engineer at Iress, and Tal Zarfati, Architect Lead at JFrog Security. Together they discuss how to strengthen software supply chain security, modernising infrastructure through cloud migration to overcome legacy constraints, and the CISA-MITRE CVE funding scare.
Sunny Rao, SVP, Asia Pacific at JFrog
Sunny Rao is SVP, Asia Pacific at JFrog and brings almost three decades of business management experience in information technology and enterprise software. Rao has vast experience and deep expertise in the global expansion of emerging technologies and is passionate about helping customers and partners enhance, secure, and accelerate their entire software supply chain with JFrog.
Craig Wilson, Cloud Platform Principal Engineer at Iress
Craig Wilson is a Cloud Platform Principal Engineer at Iress, where he focuses on cloud architecture and developer tools, and champions ‘shift-left’ practices to implement secure software delivery platforms.
Tal Zarfati, Architect Lead, JFrog Security
Tal Zarfati is the Architect Lead at JFrog Security, bringing over 20 years of expertise in software engineering and cybersecurity. With a strong background in leading R&D teams focused on Supply Chain security, he has since spearheaded the development of core SCA and SBOM capabilities and owned the JFrog OSS Catalog product, leading multiple teams to bring it to life.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2079361/c1a-5k0v-25n1g8p2az5g-ujeo6b.png"></itunes:image>
                                                                            <itunes:duration>01:20:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 319 Deep Dive: Paul O'Rourke | The New Function Of A CRO And What This Actually Means]]>
                </title>
                <pubDate>Fri, 27 Jun 2025 05:56:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2076637</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-319-deep-dive-paul-orourke-the-new-function-of-a-cro-and-what-this-actually-means</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Paul O’Rourke, Chief Risk Officer at TabCorp, as he explores the evolving function of the Chief Risk Officer (CRO) and what it means for organizations today. Paul highlights the growing necessity for CROs to possess deep technology and cyber risk skills, emphasizing that these competencies are rapidly becoming non-negotiable in tech-reliant industries. He reflects on the historical divide between business and tech risk functions, the importance of alignment and integrated approaches such as fusion centers, and how risk professionals must now balance traditional domains with new challenges like cybercrime, AI, and rapidly emerging threats.</p>
<p>Paul O’Rourke commenced as Chief Risk Officer in June 2024.</p>
<p>Paul brings a great depth of experience in risk management, including with respect to cybersecurity and technology risk management.</p>
<p>Prior to joining Tabcorp, Paul was Managing Director and Partner of Boston Consulting Group where he led their Global Cyber and Digital Risk practice, and was also the Australian Risk Leader.</p>
<p>He was previously the Global and Asia Pacific Cybersecurity Leader at PwC, and was Chief Information Security Officer of ANZ Bank Limited.</p>
<p>Paul holds a Bachelor of Commerce (Economics) and is a Graduate Member of AICD.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Paul O’Rourke, Chief Risk Officer at TabCorp, as he explores the evolving function of the Chief Risk Officer (CRO) and what it means for organizations today. Paul highlights the growing necessity for CROs to possess deep technology and cyber risk skills, emphasizing that these competencies are rapidly becoming non-negotiable in tech-reliant industries. He reflects on the historical divide between business and tech risk functions, the importance of alignment and integrated approaches such as fusion centers, and how risk professionals must now balance traditional domains with new challenges like cybercrime, AI, and rapidly emerging threats.
Paul O’Rourke commenced as Chief Risk Officer in June 2024.
Paul brings a great depth of experience in risk management, including with respect to cybersecurity and technology risk management.
Prior to joining Tabcorp, Paul was Managing Director and Partner of Boston Consulting Group where he led their Global Cyber and Digital Risk practice, and was also the Australian Risk Leader.
He was previously the Global and Asia Pacific Cybersecurity Leader at PwC, and was Chief Information Security Officer of ANZ Bank Limited.
Paul holds a Bachelor of Commerce (Economics) and is a Graduate Member of AICD.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 319 Deep Dive: Paul O'Rourke | The New Function Of A CRO And What This Actually Means]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Paul O’Rourke, Chief Risk Officer at TabCorp, as he explores the evolving function of the Chief Risk Officer (CRO) and what it means for organizations today. Paul highlights the growing necessity for CROs to possess deep technology and cyber risk skills, emphasizing that these competencies are rapidly becoming non-negotiable in tech-reliant industries. He reflects on the historical divide between business and tech risk functions, the importance of alignment and integrated approaches such as fusion centers, and how risk professionals must now balance traditional domains with new challenges like cybercrime, AI, and rapidly emerging threats.</p>
<p>Paul O’Rourke commenced as Chief Risk Officer in June 2024.</p>
<p>Paul brings a great depth of experience in risk management, including with respect to cybersecurity and technology risk management.</p>
<p>Prior to joining Tabcorp, Paul was Managing Director and Partner of Boston Consulting Group where he led their Global Cyber and Digital Risk practice, and was also the Australian Risk Leader.</p>
<p>He was previously the Global and Asia Pacific Cybersecurity Leader at PwC, and was Chief Information Security Officer of ANZ Bank Limited.</p>
<p>Paul holds a Bachelor of Commerce (Economics) and is a Graduate Member of AICD.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2076637/c1e-jjvwh55q56fn1k29-7z37jk26sngv-nqvfrd.mp3" length="32027419"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Paul O’Rourke, Chief Risk Officer at TabCorp, as he explores the evolving function of the Chief Risk Officer (CRO) and what it means for organizations today. Paul highlights the growing necessity for CROs to possess deep technology and cyber risk skills, emphasizing that these competencies are rapidly becoming non-negotiable in tech-reliant industries. He reflects on the historical divide between business and tech risk functions, the importance of alignment and integrated approaches such as fusion centers, and how risk professionals must now balance traditional domains with new challenges like cybercrime, AI, and rapidly emerging threats.
Paul O’Rourke commenced as Chief Risk Officer in June 2024.
Paul brings a great depth of experience in risk management, including with respect to cybersecurity and technology risk management.
Prior to joining Tabcorp, Paul was Managing Director and Partner of Boston Consulting Group where he led their Global Cyber and Digital Risk practice, and was also the Australian Risk Leader.
He was previously the Global and Asia Pacific Cybersecurity Leader at PwC, and was Chief Information Security Officer of ANZ Bank Limited.
Paul holds a Bachelor of Commerce (Economics) and is a Graduate Member of AICD.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2076637/c1a-5k0v-rk489dz5an5q-qshssj.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 318 Deep Dive: Chuck Herrin | Staying Ahead of Surging API Attacks]]>
                </title>
                <pubDate>Wed, 25 Jun 2025 05:59:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2075083</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-318-deep-dive-chuck-herrin-staying-ahead-of-surging-api-attacks</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Chuck Herrin, Field CISO and Customer Advocate at F5, as he unpacks the evolving threat landscape around APIs and AI in today’s organizations. Chuck explores how APIs have transformed from simple plumbing into the primary attack surface, often outpacing defenders due to historic silos between security and development teams. He highlights the acceleration of vulnerabilities and the widening gap created by tech debt, skill shortages, and the relentless push for innovation. Chuck also discusses the enormous pressure businesses face to adopt AI rapidly, often at the expense of security, and emphasizes the importance of leadership, board-level engagement, and foundational policy shifts to balance speed and safety.</p>
<p>Chuck Herrin is the Field CISO of F5. Prior to F5, Chuck was the CTO of Wib, an API security firm that created the second generation of API security solutions designed from the ground up to provide end to end visibility, testing, and context to discover, test, and secure all APIs across a customer ecosystem. Prior to Wib, Chuck spent 19+ years as a CISO in financial services and banking, including SVP and Head of IT Security, Risk, and Compliance for all of AIG’s consumer-facing divisions and EVP and CISO of Texas Capital Bank prior to being named “Most Trusted Bank in America” by Newsweek in 2022.</p>
<p>A lifelong learner, Chuck holds a litany of industry certifications gathered over the last 25 years, as well as a bachelor’s degree in biology from Lenoir Rhyne University. When not traveling to events and customer locations, Chuck is based out of his ranch in North Dallas.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Chuck Herrin, Field CISO and Customer Advocate at F5, as he unpacks the evolving threat landscape around APIs and AI in today’s organizations. Chuck explores how APIs have transformed from simple plumbing into the primary attack surface, often outpacing defenders due to historic silos between security and development teams. He highlights the acceleration of vulnerabilities and the widening gap created by tech debt, skill shortages, and the relentless push for innovation. Chuck also discusses the enormous pressure businesses face to adopt AI rapidly, often at the expense of security, and emphasizes the importance of leadership, board-level engagement, and foundational policy shifts to balance speed and safety.
Chuck Herrin is the Field CISO of F5. Prior to F5, Chuck was the CTO of Wib, an API security firm that created the second generation of API security solutions designed from the ground up to provide end to end visibility, testing, and context to discover, test, and secure all APIs across a customer ecosystem. Prior to Wib, Chuck spent 19+ years as a CISO in financial services and banking, including SVP and Head of IT Security, Risk, and Compliance for all of AIG’s consumer-facing divisions and EVP and CISO of Texas Capital Bank prior to being named “Most Trusted Bank in America” by Newsweek in 2022.
A lifelong learner, Chuck holds a litany of industry certifications gathered over the last 25 years, as well as a bachelor’s degree in biology from Lenoir Rhyne University. When not traveling to events and customer locations, Chuck is based out of his ranch in North Dallas.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 318 Deep Dive: Chuck Herrin | Staying Ahead of Surging API Attacks]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Chuck Herrin, Field CISO and Customer Advocate at F5, as he unpacks the evolving threat landscape around APIs and AI in today’s organizations. Chuck explores how APIs have transformed from simple plumbing into the primary attack surface, often outpacing defenders due to historic silos between security and development teams. He highlights the acceleration of vulnerabilities and the widening gap created by tech debt, skill shortages, and the relentless push for innovation. Chuck also discusses the enormous pressure businesses face to adopt AI rapidly, often at the expense of security, and emphasizes the importance of leadership, board-level engagement, and foundational policy shifts to balance speed and safety.</p>
<p>Chuck Herrin is the Field CISO of F5. Prior to F5, Chuck was the CTO of Wib, an API security firm that created the second generation of API security solutions designed from the ground up to provide end to end visibility, testing, and context to discover, test, and secure all APIs across a customer ecosystem. Prior to Wib, Chuck spent 19+ years as a CISO in financial services and banking, including SVP and Head of IT Security, Risk, and Compliance for all of AIG’s consumer-facing divisions and EVP and CISO of Texas Capital Bank prior to being named “Most Trusted Bank in America” by Newsweek in 2022.</p>
<p>A lifelong learner, Chuck holds a litany of industry certifications gathered over the last 25 years, as well as a bachelor’s degree in biology from Lenoir Rhyne University. When not traveling to events and customer locations, Chuck is based out of his ranch in North Dallas.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2075083/c1e-rdnmswwn76a2kwqj-1pk14d7qt3r6-76qrto.mp3" length="37798599"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Chuck Herrin, Field CISO and Customer Advocate at F5, as he unpacks the evolving threat landscape around APIs and AI in today’s organizations. Chuck explores how APIs have transformed from simple plumbing into the primary attack surface, often outpacing defenders due to historic silos between security and development teams. He highlights the acceleration of vulnerabilities and the widening gap created by tech debt, skill shortages, and the relentless push for innovation. Chuck also discusses the enormous pressure businesses face to adopt AI rapidly, often at the expense of security, and emphasizes the importance of leadership, board-level engagement, and foundational policy shifts to balance speed and safety.
Chuck Herrin is the Field CISO of F5. Prior to F5, Chuck was the CTO of Wib, an API security firm that created the second generation of API security solutions designed from the ground up to provide end to end visibility, testing, and context to discover, test, and secure all APIs across a customer ecosystem. Prior to Wib, Chuck spent 19+ years as a CISO in financial services and banking, including SVP and Head of IT Security, Risk, and Compliance for all of AIG’s consumer-facing divisions and EVP and CISO of Texas Capital Bank prior to being named “Most Trusted Bank in America” by Newsweek in 2022.
A lifelong learner, Chuck holds a litany of industry certifications gathered over the last 25 years, as well as a bachelor’s degree in biology from Lenoir Rhyne University. When not traveling to events and customer locations, Chuck is based out of his ranch in North Dallas.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2075083/c1a-5k0v-qdmzm709a8x-y12c0y.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 317 Deep Dive: Norbert Kiss | The Importance Of Securing Machine Identities As Part Of Cybersecurity Strategies]]>
                </title>
                <pubDate>Fri, 20 Jun 2025 05:59:45 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2070520</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-317-deep-dive-norbert-kiss-the-importance-of-securing-machine-identities-as-part-of-cyber</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Norbert Kiss, Senior Vice President, Asia Pacific, from Delinea, as he unpacks the critical role of securing machine identities within a modern cybersecurity strategy. Norbert explores the immense growth of non-human identities—such as bots, AI agents, and APIs—that now vastly outnumber human identities, and the major risks this brings for organizations. He underscores the importance of starting with visibility and least privilege, noting that many companies lack awareness of just how many machine identities exist in their networks. Norbert discusses the need for parity between human and machine identity governance, the challenges posed by rapid AI adoption, and the importance of balancing robust controls with organizational productivity.</p>
<p>Norbert Kiss has been Senior Vice President for Asia Pacific (APAC) at Delinea since January 2024, bringing over 30 years of experience in scaling and leading technology businesses across the region. A seasoned executive, he has a proven track record of driving growth, expanding market presence, and building strategic partnerships in the cybersecurity and technology sectors.</p>
<p>Before joining Delinea, Norbert was Vice President, APAC at Grafana Labs, where he significantly expanded the company’s footprint, driving growth and spearheading entry into new geographic markets. Prior to that, as Vice President, APAC at NGINX, he played a pivotal role in establishing the company’s presence in the region, leading its expansion across key markets and overseeing its integration into F5 Networks following its acquisition.</p>
<p>Throughout his career, Norbert has held leadership roles at Kemp, WatchGuard, and other prominent technology and cybersecurity firms, consistently demonstrating his expertise in market expansion, business transformation, and navigating the complexities of the APAC region.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Norbert Kiss, Senior Vice President, Asia Pacific, from Delinea, as he unpacks the critical role of securing machine identities within a modern cybersecurity strategy. Norbert explores the immense growth of non-human identities—such as bots, AI agents, and APIs—that now vastly outnumber human identities, and the major risks this brings for organizations. He underscores the importance of starting with visibility and least privilege, noting that many companies lack awareness of just how many machine identities exist in their networks. Norbert discusses the need for parity between human and machine identity governance, the challenges posed by rapid AI adoption, and the importance of balancing robust controls with organizational productivity.
Norbert Kiss has been Senior Vice President for Asia Pacific (APAC) at Delinea since January 2024, bringing over 30 years of experience in scaling and leading technology businesses across the region. A seasoned executive, he has a proven track record of driving growth, expanding market presence, and building strategic partnerships in the cybersecurity and technology sectors.
Before joining Delinea, Norbert was Vice President, APAC at Grafana Labs, where he significantly expanded the company’s footprint, driving growth and spearheading entry into new geographic markets. Prior to that, as Vice President, APAC at NGINX, he played a pivotal role in establishing the company’s presence in the region, leading its expansion across key markets and overseeing its integration into F5 Networks following its acquisition.
Throughout his career, Norbert has held leadership roles at Kemp, WatchGuard, and other prominent technology and cybersecurity firms, consistently demonstrating his expertise in market expansion, business transformation, and navigating the complexities of the APAC region.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 317 Deep Dive: Norbert Kiss | The Importance Of Securing Machine Identities As Part Of Cybersecurity Strategies]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Norbert Kiss, Senior Vice President, Asia Pacific, from Delinea, as he unpacks the critical role of securing machine identities within a modern cybersecurity strategy. Norbert explores the immense growth of non-human identities—such as bots, AI agents, and APIs—that now vastly outnumber human identities, and the major risks this brings for organizations. He underscores the importance of starting with visibility and least privilege, noting that many companies lack awareness of just how many machine identities exist in their networks. Norbert discusses the need for parity between human and machine identity governance, the challenges posed by rapid AI adoption, and the importance of balancing robust controls with organizational productivity.</p>
<p>Norbert Kiss has been Senior Vice President for Asia Pacific (APAC) at Delinea since January 2024, bringing over 30 years of experience in scaling and leading technology businesses across the region. A seasoned executive, he has a proven track record of driving growth, expanding market presence, and building strategic partnerships in the cybersecurity and technology sectors.</p>
<p>Before joining Delinea, Norbert was Vice President, APAC at Grafana Labs, where he significantly expanded the company’s footprint, driving growth and spearheading entry into new geographic markets. Prior to that, as Vice President, APAC at NGINX, he played a pivotal role in establishing the company’s presence in the region, leading its expansion across key markets and overseeing its integration into F5 Networks following its acquisition.</p>
<p>Throughout his career, Norbert has held leadership roles at Kemp, WatchGuard, and other prominent technology and cybersecurity firms, consistently demonstrating his expertise in market expansion, business transformation, and navigating the complexities of the APAC region.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2070520/c1e-z9w7f7m6pncokrwj-qdm55v1db99r-6wpils.mp3" length="34445731"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Norbert Kiss, Senior Vice President, Asia Pacific, from Delinea, as he unpacks the critical role of securing machine identities within a modern cybersecurity strategy. Norbert explores the immense growth of non-human identities—such as bots, AI agents, and APIs—that now vastly outnumber human identities, and the major risks this brings for organizations. He underscores the importance of starting with visibility and least privilege, noting that many companies lack awareness of just how many machine identities exist in their networks. Norbert discusses the need for parity between human and machine identity governance, the challenges posed by rapid AI adoption, and the importance of balancing robust controls with organizational productivity.
Norbert Kiss has been Senior Vice President for Asia Pacific (APAC) at Delinea since January 2024, bringing over 30 years of experience in scaling and leading technology businesses across the region. A seasoned executive, he has a proven track record of driving growth, expanding market presence, and building strategic partnerships in the cybersecurity and technology sectors.
Before joining Delinea, Norbert was Vice President, APAC at Grafana Labs, where he significantly expanded the company’s footprint, driving growth and spearheading entry into new geographic markets. Prior to that, as Vice President, APAC at NGINX, he played a pivotal role in establishing the company’s presence in the region, leading its expansion across key markets and overseeing its integration into F5 Networks following its acquisition.
Throughout his career, Norbert has held leadership roles at Kemp, WatchGuard, and other prominent technology and cybersecurity firms, consistently demonstrating his expertise in market expansion, business transformation, and navigating the complexities of the APAC region.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2070520/c1a-5k0v-rk47vg16sk4m-oirpgu.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 316 Deep Dive: Martin Creighan | The Critical Move Towards A Cyber Resilient Future]]>
                </title>
                <pubDate>Wed, 18 Jun 2025 06:00:46 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2068450</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-316-deep-dive-martin-creighan-the-critical-move-towards-a-cyber-resilient-future</link>
                                <description>
                                            <![CDATA[<p>Martin Creighan (“Martin”) is Vice President, Asia Pacific at Commvault. He is responsible for organisational leadership, change management, business development and human resources for Commvault’s dynamic team in APAC.   </p>
<p>Martin is a highly experienced professional with a stellar record of achievement in senior leadership roles across the Australian technology sector. Having begun his professional life with the United States Navy, he applied his skills to the cyber security and cloud storage landscape across a range of roles, consistently finding success in sales growth and business development.  </p>
<p>Martin worked at AT&amp;T for 16 years, rising from the Business Development team to become Vice President and Managing Director for the A/NZ region. He moved from there to a similar leadership position at Citrix, before joining Commvault as the Vice President for Sales in A/NZ.  </p>
<p>Martin was quickly elevated to the Asia Pacific Vice President role, having gained immense success at elevating the Commvault brand and developing the business at a critical juncture in the company’s evolution. </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Martin Creighan (“Martin”) is Vice President, Asia Pacific at Commvault. He is responsible for organisational leadership, change management, business development and human resources for Commvault’s dynamic team in APAC.   
Martin is a highly experienced professional with a stellar record of achievement in senior leadership roles across the Australian technology sector. Having begun his professional life with the United States Navy, he applied his skills to the cyber security and cloud storage landscape across a range of roles, consistently finding success in sales growth and business development.  
Martin worked at AT&T for 16 years, rising from the Business Development team to become Vice President and Managing Director for the A/NZ region. He moved from there to a similar leadership position at Citrix, before joining Commvault as the Vice President for Sales in A/NZ.  
Martin was quickly elevated to the Asia Pacific Vice President role, having gained immense success at elevating the Commvault brand and developing the business at a critical juncture in the company’s evolution. ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 316 Deep Dive: Martin Creighan | The Critical Move Towards A Cyber Resilient Future]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Martin Creighan (“Martin”) is Vice President, Asia Pacific at Commvault. He is responsible for organisational leadership, change management, business development and human resources for Commvault’s dynamic team in APAC.   </p>
<p>Martin is a highly experienced professional with a stellar record of achievement in senior leadership roles across the Australian technology sector. Having begun his professional life with the United States Navy, he applied his skills to the cyber security and cloud storage landscape across a range of roles, consistently finding success in sales growth and business development.  </p>
<p>Martin worked at AT&amp;T for 16 years, rising from the Business Development team to become Vice President and Managing Director for the A/NZ region. He moved from there to a similar leadership position at Citrix, before joining Commvault as the Vice President for Sales in A/NZ.  </p>
<p>Martin was quickly elevated to the Asia Pacific Vice President role, having gained immense success at elevating the Commvault brand and developing the business at a critical juncture in the company’s evolution. </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2068450/c1e-pjr0h15zpximo9x0-wwxo79rxad23-u8z4le.mp3" length="44099334"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Martin Creighan (“Martin”) is Vice President, Asia Pacific at Commvault. He is responsible for organisational leadership, change management, business development and human resources for Commvault’s dynamic team in APAC.   
Martin is a highly experienced professional with a stellar record of achievement in senior leadership roles across the Australian technology sector. Having begun his professional life with the United States Navy, he applied his skills to the cyber security and cloud storage landscape across a range of roles, consistently finding success in sales growth and business development.  
Martin worked at AT&T for 16 years, rising from the Business Development team to become Vice President and Managing Director for the A/NZ region. He moved from there to a similar leadership position at Citrix, before joining Commvault as the Vice President for Sales in A/NZ.  
Martin was quickly elevated to the Asia Pacific Vice President role, having gained immense success at elevating the Commvault brand and developing the business at a critical juncture in the company’s evolution. ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2068450/c1a-5k0v-5zx6q6w1ivrd-dhi1kg.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 315 Deep Dive: Matt Watts | The Journey From Storage To Intelligent Data Infrastructure]]>
                </title>
                <pubDate>Fri, 13 Jun 2025 05:57:04 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2063884</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-315-deep-dive-matt-watts-the-journey-from-storage-to-intelligent-data-infrastructure</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Matt Watts, Global Data Expert, as he explores the journey from storage to intelligent data infrastructure. Matt walks us through the four major technology waves that have shaped the industry: modular technologies, virtualization, cloud computing, and the dawn of intelligent data infrastructure driven by AI. He shares insights from his book, reflecting on how each wave brought greater flexibility, innovation, and technical complexity, while also introducing new challenges around data management and technical debt. Matt unpacks the persistent struggle organizations face in managing legacy data, the evolving role of storage in cybersecurity with autonomous ransomware protection, and the impact of regulations like GDPR. He concludes with forward-looking perspectives on quantum computing as the potential fifth wave, detailing its implications for security, networking, and computational power, and emphasizing both the opportunities and responsibilities that come with rapid technological advancement.</p>
<p><strong>Matt Watts
</strong>Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples. Matt project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Matt Watts, Global Data Expert, as he explores the journey from storage to intelligent data infrastructure. Matt walks us through the four major technology waves that have shaped the industry: modular technologies, virtualization, cloud computing, and the dawn of intelligent data infrastructure driven by AI. He shares insights from his book, reflecting on how each wave brought greater flexibility, innovation, and technical complexity, while also introducing new challenges around data management and technical debt. Matt unpacks the persistent struggle organizations face in managing legacy data, the evolving role of storage in cybersecurity with autonomous ransomware protection, and the impact of regulations like GDPR. He concludes with forward-looking perspectives on quantum computing as the potential fifth wave, detailing its implications for security, networking, and computational power, and emphasizing both the opportunities and responsibilities that come with rapid technological advancement.
Matt Watts
Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples. Matt project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 315 Deep Dive: Matt Watts | The Journey From Storage To Intelligent Data Infrastructure]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Matt Watts, Global Data Expert, as he explores the journey from storage to intelligent data infrastructure. Matt walks us through the four major technology waves that have shaped the industry: modular technologies, virtualization, cloud computing, and the dawn of intelligent data infrastructure driven by AI. He shares insights from his book, reflecting on how each wave brought greater flexibility, innovation, and technical complexity, while also introducing new challenges around data management and technical debt. Matt unpacks the persistent struggle organizations face in managing legacy data, the evolving role of storage in cybersecurity with autonomous ransomware protection, and the impact of regulations like GDPR. He concludes with forward-looking perspectives on quantum computing as the potential fifth wave, detailing its implications for security, networking, and computational power, and emphasizing both the opportunities and responsibilities that come with rapid technological advancement.</p>
<p><strong>Matt Watts
</strong>Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples. Matt project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2063884/c1e-kdkxsgjdx4f941jo-1pk9nzn4ad13-cawft7.mp3" length="47751043"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Matt Watts, Global Data Expert, as he explores the journey from storage to intelligent data infrastructure. Matt walks us through the four major technology waves that have shaped the industry: modular technologies, virtualization, cloud computing, and the dawn of intelligent data infrastructure driven by AI. He shares insights from his book, reflecting on how each wave brought greater flexibility, innovation, and technical complexity, while also introducing new challenges around data management and technical debt. Matt unpacks the persistent struggle organizations face in managing legacy data, the evolving role of storage in cybersecurity with autonomous ransomware protection, and the impact of regulations like GDPR. He concludes with forward-looking perspectives on quantum computing as the potential fifth wave, detailing its implications for security, networking, and computational power, and emphasizing both the opportunities and responsibilities that come with rapid technological advancement.
Matt Watts
Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples. Matt project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2063884/c1a-5k0v-34dpko71ik93-2jw4se.png"></itunes:image>
                                                                            <itunes:duration>00:49:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World]]>
                </title>
                <pubDate>Wed, 11 Jun 2025 06:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2062042</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-314-deep-dive-imran-husain-cybersecurity-threats-in-the-manufacturing-world</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities posed by legacy systems and operational technology (OT). He shares insights on high-profile incidents like the Norsk Hydro ransomware attack, emphasizing the importance of cyber resilience, data backup, and incident recovery. Imran also offers a candid look at why critical tasks like backing up data are often neglected, the complexities of securing aging infrastructure, and the need for creative solutions such as network segmentation and IT/OT convergence.</p>
<p>A dedicated and trusted senior Cyber security professional, Imran Husain has over 22 years of Fortune 1000 experience that covers a broad array of domains which includes risk management, cloud security, SecDevOps, AI Security and OT Cyber practices. A critical, action-oriented leader Imran brings strategic and technical expertise with a proven ability to build cyber program to be proactive in their threat detection, identifying and engaging in critical areas to the business while upholding their security posture. He specializes in Manufacturing and Supply Chain Distribution focusing on how to best use security controls and processes to maximize coverage and reduce risk in a complex multi-faceted environment. A skilled communicator and change agent with bias to action who cultivates an environment of learning and creative thinking, Imran champions open communication and collaboration to empower and inspire teams to exceed in their respective cyber commitments. He is currently the Global Chief Information Security Officer (CISO) at MillerKnoll, a publicly traded American company that produces office furniture, equipment, and home furnishings.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities posed by legacy systems and operational technology (OT). He shares insights on high-profile incidents like the Norsk Hydro ransomware attack, emphasizing the importance of cyber resilience, data backup, and incident recovery. Imran also offers a candid look at why critical tasks like backing up data are often neglected, the complexities of securing aging infrastructure, and the need for creative solutions such as network segmentation and IT/OT convergence.
A dedicated and trusted senior Cyber security professional, Imran Husain has over 22 years of Fortune 1000 experience that covers a broad array of domains which includes risk management, cloud security, SecDevOps, AI Security and OT Cyber practices. A critical, action-oriented leader Imran brings strategic and technical expertise with a proven ability to build cyber program to be proactive in their threat detection, identifying and engaging in critical areas to the business while upholding their security posture. He specializes in Manufacturing and Supply Chain Distribution focusing on how to best use security controls and processes to maximize coverage and reduce risk in a complex multi-faceted environment. A skilled communicator and change agent with bias to action who cultivates an environment of learning and creative thinking, Imran champions open communication and collaboration to empower and inspire teams to exceed in their respective cyber commitments. He is currently the Global Chief Information Security Officer (CISO) at MillerKnoll, a publicly traded American company that produces office furniture, equipment, and home furnishings.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities posed by legacy systems and operational technology (OT). He shares insights on high-profile incidents like the Norsk Hydro ransomware attack, emphasizing the importance of cyber resilience, data backup, and incident recovery. Imran also offers a candid look at why critical tasks like backing up data are often neglected, the complexities of securing aging infrastructure, and the need for creative solutions such as network segmentation and IT/OT convergence.</p>
<p>A dedicated and trusted senior Cyber security professional, Imran Husain has over 22 years of Fortune 1000 experience that covers a broad array of domains which includes risk management, cloud security, SecDevOps, AI Security and OT Cyber practices. A critical, action-oriented leader Imran brings strategic and technical expertise with a proven ability to build cyber program to be proactive in their threat detection, identifying and engaging in critical areas to the business while upholding their security posture. He specializes in Manufacturing and Supply Chain Distribution focusing on how to best use security controls and processes to maximize coverage and reduce risk in a complex multi-faceted environment. A skilled communicator and change agent with bias to action who cultivates an environment of learning and creative thinking, Imran champions open communication and collaboration to empower and inspire teams to exceed in their respective cyber commitments. He is currently the Global Chief Information Security Officer (CISO) at MillerKnoll, a publicly traded American company that produces office furniture, equipment, and home furnishings.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2062042/c1e-kdkxsgjx2va941jo-z32gv631t4v1-vydfso.mp3" length="39910129"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities posed by legacy systems and operational technology (OT). He shares insights on high-profile incidents like the Norsk Hydro ransomware attack, emphasizing the importance of cyber resilience, data backup, and incident recovery. Imran also offers a candid look at why critical tasks like backing up data are often neglected, the complexities of securing aging infrastructure, and the need for creative solutions such as network segmentation and IT/OT convergence.
A dedicated and trusted senior Cyber security professional, Imran Husain has over 22 years of Fortune 1000 experience that covers a broad array of domains which includes risk management, cloud security, SecDevOps, AI Security and OT Cyber practices. A critical, action-oriented leader Imran brings strategic and technical expertise with a proven ability to build cyber program to be proactive in their threat detection, identifying and engaging in critical areas to the business while upholding their security posture. He specializes in Manufacturing and Supply Chain Distribution focusing on how to best use security controls and processes to maximize coverage and reduce risk in a complex multi-faceted environment. A skilled communicator and change agent with bias to action who cultivates an environment of learning and creative thinking, Imran champions open communication and collaboration to empower and inspire teams to exceed in their respective cyber commitments. He is currently the Global Chief Information Security Officer (CISO) at MillerKnoll, a publicly traded American company that produces office furniture, equipment, and home furnishings.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2062042/c1a-5k0v-ndn2545xi176-wa5ojf.png"></itunes:image>
                                                                            <itunes:duration>00:41:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 313 Deep Dive: Rose Alvarado & Jenna Eagle | Security Data Pipeline and the Future of SOC]]>
                </title>
                <pubDate>Fri, 06 Jun 2025 06:00:10 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2059000</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-313-deep-dive-rose-alvarado-jenna-eagle-security-data-pipeline-and-the-future-of-soc-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Rose Alvarado, Regional Sales Manager, and Jenna Eagle, Solutions Engineer Lead, from Cribl as they unpack the evolving role of the security data pipeline and the future of the SOC. Rose and Jenna discuss the increasing demand for flexibility and control over data management, highlighting how organizations are moving away from vendor lock-in to gain better cost efficiencies and visibility. They examine the challenges of managing explosive data growth, the shift from traditional SIEM solutions to data pipelines for pre-processing, and the importance of routing high-value data to appropriate platforms.</p>
<p><a href="https://www.linkedin.com/in/rose-alvarado-18602a47/">Rose Alvarado</a> is an accomplished security specialist with more than eleven years of experience in the Australian Enterprise IT industry who partners with CISOs, CIOs and IT Managers to provide them with the best IT security and data solutions that meet their needs. Currently, she is the Regional Sales Manager for NSW at Cribl, helping organisations adopt a better data management strategy, improving their security and observability operations while reducing their cost of ownership. She is passionate about cybersecurity and data management, she constantly seeks to expand her professional skills and learn from industry experts.</p>
<p><a href="https://www.linkedin.com/in/jennameagle/">Jenna</a>’s cyber journey began at Accenture Federal Services, where she collaborated with U.S. federal agencies on mission-critical projects. She then transitioned to Splunk as a Public Sector Solutions Engineer, specializing in compliance, automation, and IT and security modernisation. Now, as a Solutions Engineering Manager for ANZ at Cribl, she helps organisations take control of data growth through optimisation, data tiering, and breaking vendor lock-in. When she’s not “Cribbling,” you’ll find her exploring her new home in Australia or spending time with her American Bulldog.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Rose Alvarado, Regional Sales Manager, and Jenna Eagle, Solutions Engineer Lead, from Cribl as they unpack the evolving role of the security data pipeline and the future of the SOC. Rose and Jenna discuss the increasing demand for flexibility and control over data management, highlighting how organizations are moving away from vendor lock-in to gain better cost efficiencies and visibility. They examine the challenges of managing explosive data growth, the shift from traditional SIEM solutions to data pipelines for pre-processing, and the importance of routing high-value data to appropriate platforms.
Rose Alvarado is an accomplished security specialist with more than eleven years of experience in the Australian Enterprise IT industry who partners with CISOs, CIOs and IT Managers to provide them with the best IT security and data solutions that meet their needs. Currently, she is the Regional Sales Manager for NSW at Cribl, helping organisations adopt a better data management strategy, improving their security and observability operations while reducing their cost of ownership. She is passionate about cybersecurity and data management, she constantly seeks to expand her professional skills and learn from industry experts.
Jenna’s cyber journey began at Accenture Federal Services, where she collaborated with U.S. federal agencies on mission-critical projects. She then transitioned to Splunk as a Public Sector Solutions Engineer, specializing in compliance, automation, and IT and security modernisation. Now, as a Solutions Engineering Manager for ANZ at Cribl, she helps organisations take control of data growth through optimisation, data tiering, and breaking vendor lock-in. When she’s not “Cribbling,” you’ll find her exploring her new home in Australia or spending time with her American Bulldog.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 313 Deep Dive: Rose Alvarado & Jenna Eagle | Security Data Pipeline and the Future of SOC]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Rose Alvarado, Regional Sales Manager, and Jenna Eagle, Solutions Engineer Lead, from Cribl as they unpack the evolving role of the security data pipeline and the future of the SOC. Rose and Jenna discuss the increasing demand for flexibility and control over data management, highlighting how organizations are moving away from vendor lock-in to gain better cost efficiencies and visibility. They examine the challenges of managing explosive data growth, the shift from traditional SIEM solutions to data pipelines for pre-processing, and the importance of routing high-value data to appropriate platforms.</p>
<p><a href="https://www.linkedin.com/in/rose-alvarado-18602a47/">Rose Alvarado</a> is an accomplished security specialist with more than eleven years of experience in the Australian Enterprise IT industry who partners with CISOs, CIOs and IT Managers to provide them with the best IT security and data solutions that meet their needs. Currently, she is the Regional Sales Manager for NSW at Cribl, helping organisations adopt a better data management strategy, improving their security and observability operations while reducing their cost of ownership. She is passionate about cybersecurity and data management, she constantly seeks to expand her professional skills and learn from industry experts.</p>
<p><a href="https://www.linkedin.com/in/jennameagle/">Jenna</a>’s cyber journey began at Accenture Federal Services, where she collaborated with U.S. federal agencies on mission-critical projects. She then transitioned to Splunk as a Public Sector Solutions Engineer, specializing in compliance, automation, and IT and security modernisation. Now, as a Solutions Engineering Manager for ANZ at Cribl, she helps organisations take control of data growth through optimisation, data tiering, and breaking vendor lock-in. When she’s not “Cribbling,” you’ll find her exploring her new home in Australia or spending time with her American Bulldog.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2059000/c1e-rdnmswzgv4f2kwqj-kp4v95o5b1d9-aognie.mp3" length="39159474"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Rose Alvarado, Regional Sales Manager, and Jenna Eagle, Solutions Engineer Lead, from Cribl as they unpack the evolving role of the security data pipeline and the future of the SOC. Rose and Jenna discuss the increasing demand for flexibility and control over data management, highlighting how organizations are moving away from vendor lock-in to gain better cost efficiencies and visibility. They examine the challenges of managing explosive data growth, the shift from traditional SIEM solutions to data pipelines for pre-processing, and the importance of routing high-value data to appropriate platforms.
Rose Alvarado is an accomplished security specialist with more than eleven years of experience in the Australian Enterprise IT industry who partners with CISOs, CIOs and IT Managers to provide them with the best IT security and data solutions that meet their needs. Currently, she is the Regional Sales Manager for NSW at Cribl, helping organisations adopt a better data management strategy, improving their security and observability operations while reducing their cost of ownership. She is passionate about cybersecurity and data management, she constantly seeks to expand her professional skills and learn from industry experts.
Jenna’s cyber journey began at Accenture Federal Services, where she collaborated with U.S. federal agencies on mission-critical projects. She then transitioned to Splunk as a Public Sector Solutions Engineer, specializing in compliance, automation, and IT and security modernisation. Now, as a Solutions Engineering Manager for ANZ at Cribl, she helps organisations take control of data growth through optimisation, data tiering, and breaking vendor lock-in. When she’s not “Cribbling,” you’ll find her exploring her new home in Australia or spending time with her American Bulldog.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2059000/c1a-5k0v-xxo14350fmr1-0ooeks.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 312 Deep Dive: Agnidipta Sarkar | Why Should We Have Invested in Cyber Defence Yesterday]]>
                </title>
                <pubDate>Wed, 04 Jun 2025 06:03:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2057732</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-312-deep-dive-agnidipta-sarkar-why-should-we-have-invested-in-cyber-defence-yesterday-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Agnidipta Sarkar, Chief Evangelist at ColorTokens, as he explores why organizations should have invested in cyber defense yesterday. Agnidipta highlights the increasing pace and impact of cyberattacks despite rising cybersecurity spending, emphasizing that the real challenge is a matter of mindset rather than budget. He discusses the evolving role of boards and leadership in prioritizing digital resilience, the need to treat cyber defense as a fundamental business cost, and the critical distinction between risk and danger, especially for sectors like critical infrastructure.</p>
<p>Agni is a CxO Advisor specializing in digital resilience and cyber defense, with a primary focus on strengthening digital environments to ensure that organizations are adequately prepared for cyber attacks as they reap the benefits of digital business. With over three decades of insightful experience in the fields of cybersecurity, continuity, crisis management, privacy, and risk optimization, he actively advocates for and promotes zero-trust principles across complex systems, including on-premises, cloud, and operational technology/industrial control systems (OT/ICS) environments. Agni is a highly regarded speaker and thought leader, contributing his expertise to various industry forums and standards organizations, such as ISO and the Cloud Security Alliance, where he plays a pivotal role in shaping the future of cybersecurity practices for a safer digital landscape.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Agnidipta Sarkar, Chief Evangelist at ColorTokens, as he explores why organizations should have invested in cyber defense yesterday. Agnidipta highlights the increasing pace and impact of cyberattacks despite rising cybersecurity spending, emphasizing that the real challenge is a matter of mindset rather than budget. He discusses the evolving role of boards and leadership in prioritizing digital resilience, the need to treat cyber defense as a fundamental business cost, and the critical distinction between risk and danger, especially for sectors like critical infrastructure.
Agni is a CxO Advisor specializing in digital resilience and cyber defense, with a primary focus on strengthening digital environments to ensure that organizations are adequately prepared for cyber attacks as they reap the benefits of digital business. With over three decades of insightful experience in the fields of cybersecurity, continuity, crisis management, privacy, and risk optimization, he actively advocates for and promotes zero-trust principles across complex systems, including on-premises, cloud, and operational technology/industrial control systems (OT/ICS) environments. Agni is a highly regarded speaker and thought leader, contributing his expertise to various industry forums and standards organizations, such as ISO and the Cloud Security Alliance, where he plays a pivotal role in shaping the future of cybersecurity practices for a safer digital landscape.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 312 Deep Dive: Agnidipta Sarkar | Why Should We Have Invested in Cyber Defence Yesterday]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Agnidipta Sarkar, Chief Evangelist at ColorTokens, as he explores why organizations should have invested in cyber defense yesterday. Agnidipta highlights the increasing pace and impact of cyberattacks despite rising cybersecurity spending, emphasizing that the real challenge is a matter of mindset rather than budget. He discusses the evolving role of boards and leadership in prioritizing digital resilience, the need to treat cyber defense as a fundamental business cost, and the critical distinction between risk and danger, especially for sectors like critical infrastructure.</p>
<p>Agni is a CxO Advisor specializing in digital resilience and cyber defense, with a primary focus on strengthening digital environments to ensure that organizations are adequately prepared for cyber attacks as they reap the benefits of digital business. With over three decades of insightful experience in the fields of cybersecurity, continuity, crisis management, privacy, and risk optimization, he actively advocates for and promotes zero-trust principles across complex systems, including on-premises, cloud, and operational technology/industrial control systems (OT/ICS) environments. Agni is a highly regarded speaker and thought leader, contributing his expertise to various industry forums and standards organizations, such as ISO and the Cloud Security Alliance, where he plays a pivotal role in shaping the future of cybersecurity practices for a safer digital landscape.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2057732/c1e-o39rf29kmkb8n0xz-v6doo7m8tqxv-uu2el5.mp3" length="36492477"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Agnidipta Sarkar, Chief Evangelist at ColorTokens, as he explores why organizations should have invested in cyber defense yesterday. Agnidipta highlights the increasing pace and impact of cyberattacks despite rising cybersecurity spending, emphasizing that the real challenge is a matter of mindset rather than budget. He discusses the evolving role of boards and leadership in prioritizing digital resilience, the need to treat cyber defense as a fundamental business cost, and the critical distinction between risk and danger, especially for sectors like critical infrastructure.
Agni is a CxO Advisor specializing in digital resilience and cyber defense, with a primary focus on strengthening digital environments to ensure that organizations are adequately prepared for cyber attacks as they reap the benefits of digital business. With over three decades of insightful experience in the fields of cybersecurity, continuity, crisis management, privacy, and risk optimization, he actively advocates for and promotes zero-trust principles across complex systems, including on-premises, cloud, and operational technology/industrial control systems (OT/ICS) environments. Agni is a highly regarded speaker and thought leader, contributing his expertise to various industry forums and standards organizations, such as ISO and the Cloud Security Alliance, where he plays a pivotal role in shaping the future of cybersecurity practices for a safer digital landscape.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2057732/c1a-5k0v-okm6x01ncqnn-dcfdj8.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From AUSCERT Cyber Security Conference – KB On The Go | Ivano Bongiovanni]]>
                </title>
                <pubDate>Fri, 30 May 2025 06:02:29 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2053145</guid>
                                    <link>https://kbkast.castos.com/episodes/from-auscert-cyber-security-conference-kb-on-the-go-ivano-bongiovanni</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Ivano Bongiovanni, General Manager at AUSCERT, as he unpacks the evolving landscape of the cybersecurity profession. Ivano discusses the shift towards developing complementary skills beyond technical expertise, emphasizing the value of communication, stakeholder management, and project leadership alongside core technical abilities. He explores the concept of T-shaped professionals and advocates for hands-on, experiential learning to build these diverse skill sets. The conversation delves into the ongoing debate around the professionalization of cybersecurity, with Ivano highlighting the pros and cons of structuring the industry with formal certifications versus a more open, experience-based approach. He stresses the importance of open, constructive dialogue within the community to address these issues, ultimately focusing on the shared goal of strengthening cybersecurity and fostering a more mature, collaborative industry.</p>
<p>Ivano is a researcher, consultant, author, and speaker whose work focuses on the <strong>managerial and business implications of Cybersecurity</strong>.</p>
<p>He is the <strong>General Manager of AUSCERT</strong>, a not-for-profit organisation affiliated with UQ that delivers cybersecurity services to public and private sector organisations across Australia and New Zealand.</p>
<p>Ivano is also a <strong>Senior Lecturer in Cybersecurity Management</strong> with the UQ Business School and a member of <strong>UQ Cyber.</strong></p>
<p>Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano’s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for <strong>effective cybersecurity management</strong>. Ivano is also an experienced facilitator in the fields of <strong>Design Thinking and Design-Led innovation</strong>, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.</p>
<p>Prior to AUSCERT and UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on <strong>safety and security management</strong> in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.</p>
<p>He also worked as a <strong>Deputy Venue Security Manager</strong> at the XX Winter Olympic Games – Turin 2006 and as a <strong>Police Officer</strong> for the Italian Ministry of Interior.</p>
<p>He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).</p>
<p>A father of one and an eager snowboarder, Ivano loves soccer, American football, and writing novels and poems.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Ivano Bongiovanni, General Manager at AUSCERT, as he unpacks the evolving landscape of the cybersecurity profession. Ivano discusses the shift towards developing complementary skills beyond technical expertise, emphasizing the value of communication, stakeholder management, and project leadership alongside core technical abilities. He explores the concept of T-shaped professionals and advocates for hands-on, experiential learning to build these diverse skill sets. The conversation delves into the ongoing debate around the professionalization of cybersecurity, with Ivano highlighting the pros and cons of structuring the industry with formal certifications versus a more open, experience-based approach. He stresses the importance of open, constructive dialogue within the community to address these issues, ultimately focusing on the shared goal of strengthening cybersecurity and fostering a more mature, collaborative industry.
Ivano is a researcher, consultant, author, and speaker whose work focuses on the managerial and business implications of Cybersecurity.
He is the General Manager of AUSCERT, a not-for-profit organisation affiliated with UQ that delivers cybersecurity services to public and private sector organisations across Australia and New Zealand.
Ivano is also a Senior Lecturer in Cybersecurity Management with the UQ Business School and a member of UQ Cyber.
Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano’s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for effective cybersecurity management. Ivano is also an experienced facilitator in the fields of Design Thinking and Design-Led innovation, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.
Prior to AUSCERT and UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on safety and security management in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.
He also worked as a Deputy Venue Security Manager at the XX Winter Olympic Games – Turin 2006 and as a Police Officer for the Italian Ministry of Interior.
He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).
A father of one and an eager snowboarder, Ivano loves soccer, American football, and writing novels and poems.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From AUSCERT Cyber Security Conference – KB On The Go | Ivano Bongiovanni]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Ivano Bongiovanni, General Manager at AUSCERT, as he unpacks the evolving landscape of the cybersecurity profession. Ivano discusses the shift towards developing complementary skills beyond technical expertise, emphasizing the value of communication, stakeholder management, and project leadership alongside core technical abilities. He explores the concept of T-shaped professionals and advocates for hands-on, experiential learning to build these diverse skill sets. The conversation delves into the ongoing debate around the professionalization of cybersecurity, with Ivano highlighting the pros and cons of structuring the industry with formal certifications versus a more open, experience-based approach. He stresses the importance of open, constructive dialogue within the community to address these issues, ultimately focusing on the shared goal of strengthening cybersecurity and fostering a more mature, collaborative industry.</p>
<p>Ivano is a researcher, consultant, author, and speaker whose work focuses on the <strong>managerial and business implications of Cybersecurity</strong>.</p>
<p>He is the <strong>General Manager of AUSCERT</strong>, a not-for-profit organisation affiliated with UQ that delivers cybersecurity services to public and private sector organisations across Australia and New Zealand.</p>
<p>Ivano is also a <strong>Senior Lecturer in Cybersecurity Management</strong> with the UQ Business School and a member of <strong>UQ Cyber.</strong></p>
<p>Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano’s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for <strong>effective cybersecurity management</strong>. Ivano is also an experienced facilitator in the fields of <strong>Design Thinking and Design-Led innovation</strong>, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.</p>
<p>Prior to AUSCERT and UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on <strong>safety and security management</strong> in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.</p>
<p>He also worked as a <strong>Deputy Venue Security Manager</strong> at the XX Winter Olympic Games – Turin 2006 and as a <strong>Police Officer</strong> for the Italian Ministry of Interior.</p>
<p>He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).</p>
<p>A father of one and an eager snowboarder, Ivano loves soccer, American football, and writing novels and poems.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2053145/c1e-m1o3cqz8j2cwqk4n-7z3o876oim88-dolodi.mp3" length="19717267"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Ivano Bongiovanni, General Manager at AUSCERT, as he unpacks the evolving landscape of the cybersecurity profession. Ivano discusses the shift towards developing complementary skills beyond technical expertise, emphasizing the value of communication, stakeholder management, and project leadership alongside core technical abilities. He explores the concept of T-shaped professionals and advocates for hands-on, experiential learning to build these diverse skill sets. The conversation delves into the ongoing debate around the professionalization of cybersecurity, with Ivano highlighting the pros and cons of structuring the industry with formal certifications versus a more open, experience-based approach. He stresses the importance of open, constructive dialogue within the community to address these issues, ultimately focusing on the shared goal of strengthening cybersecurity and fostering a more mature, collaborative industry.
Ivano is a researcher, consultant, author, and speaker whose work focuses on the managerial and business implications of Cybersecurity.
He is the General Manager of AUSCERT, a not-for-profit organisation affiliated with UQ that delivers cybersecurity services to public and private sector organisations across Australia and New Zealand.
Ivano is also a Senior Lecturer in Cybersecurity Management with the UQ Business School and a member of UQ Cyber.
Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano’s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for effective cybersecurity management. Ivano is also an experienced facilitator in the fields of Design Thinking and Design-Led innovation, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.
Prior to AUSCERT and UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on safety and security management in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.
He also worked as a Deputy Venue Security Manager at the XX Winter Olympic Games – Turin 2006 and as a Police Officer for the Italian Ministry of Interior.
He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).
A father of one and an eager snowboarder, Ivano loves soccer, American football, and writing novels and poems.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2053145/c1a-5k0v-1pkwpd8osg36-sp1xzu.png"></itunes:image>
                                                                            <itunes:duration>00:20:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 311 Deep Dive: Keith Dorsey | Charting an Intentional Path Toward Corporate Board Service]]>
                </title>
                <pubDate>Wed, 28 May 2025 06:00:57 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2050387</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-311-deep-dive-keith-dorsey-charting-an-intentional-path-toward-corporate-board-service</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Dr. Keith Dorsey, founder and executive advisor at Boardroom Journey, as he discusses charting an intentional path toward corporate board service. Keith explores how board recruitment has evolved from a “club” of familiar faces to a more skills and strategy-based process, emphasizing the importance of self-reflection, understanding one’s unique value, and being intentional about board aspirations. He shares insights on how uncertainty reduction theory influences board selection, the growing demand for diverse expertise, especially in areas like technology and cybersecurity, and the need for corporate athletes who can contribute broadly. Keith also addresses the complexities of diversity, equity, and inclusion on boards, dispelling myths about meritocracy versus diversity, and encourages aspiring board members to ensure alignment with board cultures before committing.</p>
<p>Dr. Keith D. Dorsey is a researcher, author, advisor, and active board member focused on issues  of diversity, governance, and strategic growth for private and public corporate boards. His recent  research examined women executives’ pathways to securing corporate board seats, yielding  powerful insights about the barriers and facilitators unique to women candidates seeking these  positions. His book, The Boardroom Journey: Practical Guidance for Women to Secure a  Seat at the Table, combines his research insights with his extensive executive, board, and  industry experience. He speaks on topics related to governance and navigating the path to the C suite and boardroom. As an executive advisor, he is focused on increasing Optimal  DiversityTM within corporate senior management, executive, and board-level roles.  </p>
<p><strong>Board Experience and Certification  </strong></p>
<p>Keith is a National Association of Corporate Directors (NACD) Certified Director and was  recognized as an honoree of the 2023 NACD Directorship 100, an annual recognition of 100  leading corporate directors and corporate governance experts who impact boardroom practices and  performance. He serves as a board member at Vimly Benefit Solutions, a private technology and  third-party administration company; Continu, a private learning management system SaaS  company; Pepperdine University’s Graziadio Business School, Pacific Crest Trail Association;  and the Chair of the City of La Quinta’s Financial Advisory Commission. Former Board Member,  Orion Talent, a recruitment process outsourcing and talent acquisition firm. Keith is also an  Executive Leadership Council (ELC) member and a graduate, mentor, and advisor of Santa Clara  University’s Black Corporate Board Readiness program.  </p>
<p><strong>Corporate Experience  </strong></p>
<p>Keith founded the Boardroom Journey, a leadership development consultancy dedicated to  helping professionals access board education, gain needed certifications, and make efficient  progress to the C-suite and the boardroom. As a senior advisor at Boyden, a global executive search  and consulting firm, he also helps executive teams and boards enhance their governance quality  through a comprehensive set of board consulting services, including full-scale governance review,  board, committee, and director assessments, M&amp;A governance planning, board refreshment, and  CEO succession planning.  </p>
<p>In his former role as President and Executive Advisor for Dorsey Management Consulting, he  mentored and advised CxOs on their sales growth and go-to-market strategies, helped businesses  align their strategies with sales expectations, aggressively grew their bottom line and shareholder  value during significant periods of change, and optimized leadership and sales team effectiveness. </p>
<p>He has over 25 years of sales leadership experience in the Human Capital Management industry,  such as at Alight Solutions (formerly Aon Hewitt and Hewitt Associates), a $2.3B leading provider  of human capital solutions where he s...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Dr. Keith Dorsey, founder and executive advisor at Boardroom Journey, as he discusses charting an intentional path toward corporate board service. Keith explores how board recruitment has evolved from a “club” of familiar faces to a more skills and strategy-based process, emphasizing the importance of self-reflection, understanding one’s unique value, and being intentional about board aspirations. He shares insights on how uncertainty reduction theory influences board selection, the growing demand for diverse expertise, especially in areas like technology and cybersecurity, and the need for corporate athletes who can contribute broadly. Keith also addresses the complexities of diversity, equity, and inclusion on boards, dispelling myths about meritocracy versus diversity, and encourages aspiring board members to ensure alignment with board cultures before committing.
Dr. Keith D. Dorsey is a researcher, author, advisor, and active board member focused on issues  of diversity, governance, and strategic growth for private and public corporate boards. His recent  research examined women executives’ pathways to securing corporate board seats, yielding  powerful insights about the barriers and facilitators unique to women candidates seeking these  positions. His book, The Boardroom Journey: Practical Guidance for Women to Secure a  Seat at the Table, combines his research insights with his extensive executive, board, and  industry experience. He speaks on topics related to governance and navigating the path to the C suite and boardroom. As an executive advisor, he is focused on increasing Optimal  DiversityTM within corporate senior management, executive, and board-level roles.  
Board Experience and Certification  
Keith is a National Association of Corporate Directors (NACD) Certified Director and was  recognized as an honoree of the 2023 NACD Directorship 100, an annual recognition of 100  leading corporate directors and corporate governance experts who impact boardroom practices and  performance. He serves as a board member at Vimly Benefit Solutions, a private technology and  third-party administration company; Continu, a private learning management system SaaS  company; Pepperdine University’s Graziadio Business School, Pacific Crest Trail Association;  and the Chair of the City of La Quinta’s Financial Advisory Commission. Former Board Member,  Orion Talent, a recruitment process outsourcing and talent acquisition firm. Keith is also an  Executive Leadership Council (ELC) member and a graduate, mentor, and advisor of Santa Clara  University’s Black Corporate Board Readiness program.  
Corporate Experience  
Keith founded the Boardroom Journey, a leadership development consultancy dedicated to  helping professionals access board education, gain needed certifications, and make efficient  progress to the C-suite and the boardroom. As a senior advisor at Boyden, a global executive search  and consulting firm, he also helps executive teams and boards enhance their governance quality  through a comprehensive set of board consulting services, including full-scale governance review,  board, committee, and director assessments, M&A governance planning, board refreshment, and  CEO succession planning.  
In his former role as President and Executive Advisor for Dorsey Management Consulting, he  mentored and advised CxOs on their sales growth and go-to-market strategies, helped businesses  align their strategies with sales expectations, aggressively grew their bottom line and shareholder  value during significant periods of change, and optimized leadership and sales team effectiveness. 
He has over 25 years of sales leadership experience in the Human Capital Management industry,  such as at Alight Solutions (formerly Aon Hewitt and Hewitt Associates), a $2.3B leading provider  of human capital solutions where he s...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 311 Deep Dive: Keith Dorsey | Charting an Intentional Path Toward Corporate Board Service]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Dr. Keith Dorsey, founder and executive advisor at Boardroom Journey, as he discusses charting an intentional path toward corporate board service. Keith explores how board recruitment has evolved from a “club” of familiar faces to a more skills and strategy-based process, emphasizing the importance of self-reflection, understanding one’s unique value, and being intentional about board aspirations. He shares insights on how uncertainty reduction theory influences board selection, the growing demand for diverse expertise, especially in areas like technology and cybersecurity, and the need for corporate athletes who can contribute broadly. Keith also addresses the complexities of diversity, equity, and inclusion on boards, dispelling myths about meritocracy versus diversity, and encourages aspiring board members to ensure alignment with board cultures before committing.</p>
<p>Dr. Keith D. Dorsey is a researcher, author, advisor, and active board member focused on issues  of diversity, governance, and strategic growth for private and public corporate boards. His recent  research examined women executives’ pathways to securing corporate board seats, yielding  powerful insights about the barriers and facilitators unique to women candidates seeking these  positions. His book, The Boardroom Journey: Practical Guidance for Women to Secure a  Seat at the Table, combines his research insights with his extensive executive, board, and  industry experience. He speaks on topics related to governance and navigating the path to the C suite and boardroom. As an executive advisor, he is focused on increasing Optimal  DiversityTM within corporate senior management, executive, and board-level roles.  </p>
<p><strong>Board Experience and Certification  </strong></p>
<p>Keith is a National Association of Corporate Directors (NACD) Certified Director and was  recognized as an honoree of the 2023 NACD Directorship 100, an annual recognition of 100  leading corporate directors and corporate governance experts who impact boardroom practices and  performance. He serves as a board member at Vimly Benefit Solutions, a private technology and  third-party administration company; Continu, a private learning management system SaaS  company; Pepperdine University’s Graziadio Business School, Pacific Crest Trail Association;  and the Chair of the City of La Quinta’s Financial Advisory Commission. Former Board Member,  Orion Talent, a recruitment process outsourcing and talent acquisition firm. Keith is also an  Executive Leadership Council (ELC) member and a graduate, mentor, and advisor of Santa Clara  University’s Black Corporate Board Readiness program.  </p>
<p><strong>Corporate Experience  </strong></p>
<p>Keith founded the Boardroom Journey, a leadership development consultancy dedicated to  helping professionals access board education, gain needed certifications, and make efficient  progress to the C-suite and the boardroom. As a senior advisor at Boyden, a global executive search  and consulting firm, he also helps executive teams and boards enhance their governance quality  through a comprehensive set of board consulting services, including full-scale governance review,  board, committee, and director assessments, M&amp;A governance planning, board refreshment, and  CEO succession planning.  </p>
<p>In his former role as President and Executive Advisor for Dorsey Management Consulting, he  mentored and advised CxOs on their sales growth and go-to-market strategies, helped businesses  align their strategies with sales expectations, aggressively grew their bottom line and shareholder  value during significant periods of change, and optimized leadership and sales team effectiveness. </p>
<p>He has over 25 years of sales leadership experience in the Human Capital Management industry,  such as at Alight Solutions (formerly Aon Hewitt and Hewitt Associates), a $2.3B leading provider  of human capital solutions where he served as the Executive Vice President, Global Head of Sales  responsible for the overall sales growth strategy and execution. Under Keith’s executive  leadership, his sales teams consistently produced double-digit annual growth. Prior to joining  Hewitt Associates, Keith worked with Paychex, Inc., a Fortune 1000 payroll and HR outsourcing  company, for 16 years. He was a Zone Sales Manager responsible for the growth and delivery of  revenue in their Human Resource Service Division. Before Paychex, Keith spent three years in the  insurance industry and five years serving his country in the U.S. Air Force.  </p>
<p><strong>Education  </strong></p>
<p>Keith has a Doctor of Education in Organizational Change and Leadership at the University of  Southern California. His dissertation research examined gender and ethnic diversity on corporate  boards. He also holds an MBA from Pepperdine University and a BS in Business Administration  from Charter Oak State College. </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2050387/c1e-02xmsk872nagm3k5-wwxro51muord-dftr8x.mp3" length="45682981"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Dr. Keith Dorsey, founder and executive advisor at Boardroom Journey, as he discusses charting an intentional path toward corporate board service. Keith explores how board recruitment has evolved from a “club” of familiar faces to a more skills and strategy-based process, emphasizing the importance of self-reflection, understanding one’s unique value, and being intentional about board aspirations. He shares insights on how uncertainty reduction theory influences board selection, the growing demand for diverse expertise, especially in areas like technology and cybersecurity, and the need for corporate athletes who can contribute broadly. Keith also addresses the complexities of diversity, equity, and inclusion on boards, dispelling myths about meritocracy versus diversity, and encourages aspiring board members to ensure alignment with board cultures before committing.
Dr. Keith D. Dorsey is a researcher, author, advisor, and active board member focused on issues  of diversity, governance, and strategic growth for private and public corporate boards. His recent  research examined women executives’ pathways to securing corporate board seats, yielding  powerful insights about the barriers and facilitators unique to women candidates seeking these  positions. His book, The Boardroom Journey: Practical Guidance for Women to Secure a  Seat at the Table, combines his research insights with his extensive executive, board, and  industry experience. He speaks on topics related to governance and navigating the path to the C suite and boardroom. As an executive advisor, he is focused on increasing Optimal  DiversityTM within corporate senior management, executive, and board-level roles.  
Board Experience and Certification  
Keith is a National Association of Corporate Directors (NACD) Certified Director and was  recognized as an honoree of the 2023 NACD Directorship 100, an annual recognition of 100  leading corporate directors and corporate governance experts who impact boardroom practices and  performance. He serves as a board member at Vimly Benefit Solutions, a private technology and  third-party administration company; Continu, a private learning management system SaaS  company; Pepperdine University’s Graziadio Business School, Pacific Crest Trail Association;  and the Chair of the City of La Quinta’s Financial Advisory Commission. Former Board Member,  Orion Talent, a recruitment process outsourcing and talent acquisition firm. Keith is also an  Executive Leadership Council (ELC) member and a graduate, mentor, and advisor of Santa Clara  University’s Black Corporate Board Readiness program.  
Corporate Experience  
Keith founded the Boardroom Journey, a leadership development consultancy dedicated to  helping professionals access board education, gain needed certifications, and make efficient  progress to the C-suite and the boardroom. As a senior advisor at Boyden, a global executive search  and consulting firm, he also helps executive teams and boards enhance their governance quality  through a comprehensive set of board consulting services, including full-scale governance review,  board, committee, and director assessments, M&A governance planning, board refreshment, and  CEO succession planning.  
In his former role as President and Executive Advisor for Dorsey Management Consulting, he  mentored and advised CxOs on their sales growth and go-to-market strategies, helped businesses  align their strategies with sales expectations, aggressively grew their bottom line and shareholder  value during significant periods of change, and optimized leadership and sales team effectiveness. 
He has over 25 years of sales leadership experience in the Human Capital Management industry,  such as at Alight Solutions (formerly Aon Hewitt and Hewitt Associates), a $2.3B leading provider  of human capital solutions where he s...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2050387/c1a-5k0v-kp4q0q81iw4d-apmdze.jpg"></itunes:image>
                                                                            <itunes:duration>00:47:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 310 Deep Dive: Sam Mackenzie | Securing Society and the Future]]>
                </title>
                <pubDate>Fri, 23 May 2025 05:56:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2044885</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-310-deep-dive-sam-mackenzie-securing-society-and-the-future</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Sam Mackenzie, cybersecurity committee member from the Australian Computer Society (ACS), as he explores the converging worlds of cyber and physical security and what it means for securing society into the future. Sam highlights the growing risks faced by critical infrastructure, emphasizing the importance of cross-functional collaboration between IT, operational technology, and engineering teams. We dig into why many organizations still fail to capture cyber-physical risks in their enterprise risk registers, how leadership and purposeful collaboration can bridge longstanding disciplinary gaps, and why regular practice, scenario exercises, and embedded cyber champions are essential to build resilience. Sam also discusses his work with the Australian Control Rooms Network Association (ACRNA), the increasing pressures faced by control rooms due to more frequent severe weather events, and the impact of regulations and “secure by design” principles on product development and security investment.</p>
<p>Sam Mackenzie is a driven technology and cybersecurity leader with 25 years of experience dedicated to protecting and advancing critical infrastructure. As a valued committee member of both the Australian Control Rooms Network Association and the Australian Computer Society, Sam is known for his structured thinking, his talent for simplifying complex challenges, and his ability to harness culture as a catalyst for meaningful change. Sam’s career spans leadership roles with global brands and household names in Australia, where he has built high-performance teams across sectors including health, telecoms, energy, and local government. With hands-on expertise in seven of the eleven Security of Critical Infrastructure (SOCI) Act sectors, Sam’s straightforward approach and thought leadership—evident through his frequent speaking engagements, panel hosting, and published works—continue to drive high-quality technology and security outcomes.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Sam Mackenzie, cybersecurity committee member from the Australian Computer Society (ACS), as he explores the converging worlds of cyber and physical security and what it means for securing society into the future. Sam highlights the growing risks faced by critical infrastructure, emphasizing the importance of cross-functional collaboration between IT, operational technology, and engineering teams. We dig into why many organizations still fail to capture cyber-physical risks in their enterprise risk registers, how leadership and purposeful collaboration can bridge longstanding disciplinary gaps, and why regular practice, scenario exercises, and embedded cyber champions are essential to build resilience. Sam also discusses his work with the Australian Control Rooms Network Association (ACRNA), the increasing pressures faced by control rooms due to more frequent severe weather events, and the impact of regulations and “secure by design” principles on product development and security investment.
Sam Mackenzie is a driven technology and cybersecurity leader with 25 years of experience dedicated to protecting and advancing critical infrastructure. As a valued committee member of both the Australian Control Rooms Network Association and the Australian Computer Society, Sam is known for his structured thinking, his talent for simplifying complex challenges, and his ability to harness culture as a catalyst for meaningful change. Sam’s career spans leadership roles with global brands and household names in Australia, where he has built high-performance teams across sectors including health, telecoms, energy, and local government. With hands-on expertise in seven of the eleven Security of Critical Infrastructure (SOCI) Act sectors, Sam’s straightforward approach and thought leadership—evident through his frequent speaking engagements, panel hosting, and published works—continue to drive high-quality technology and security outcomes.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 310 Deep Dive: Sam Mackenzie | Securing Society and the Future]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Sam Mackenzie, cybersecurity committee member from the Australian Computer Society (ACS), as he explores the converging worlds of cyber and physical security and what it means for securing society into the future. Sam highlights the growing risks faced by critical infrastructure, emphasizing the importance of cross-functional collaboration between IT, operational technology, and engineering teams. We dig into why many organizations still fail to capture cyber-physical risks in their enterprise risk registers, how leadership and purposeful collaboration can bridge longstanding disciplinary gaps, and why regular practice, scenario exercises, and embedded cyber champions are essential to build resilience. Sam also discusses his work with the Australian Control Rooms Network Association (ACRNA), the increasing pressures faced by control rooms due to more frequent severe weather events, and the impact of regulations and “secure by design” principles on product development and security investment.</p>
<p>Sam Mackenzie is a driven technology and cybersecurity leader with 25 years of experience dedicated to protecting and advancing critical infrastructure. As a valued committee member of both the Australian Control Rooms Network Association and the Australian Computer Society, Sam is known for his structured thinking, his talent for simplifying complex challenges, and his ability to harness culture as a catalyst for meaningful change. Sam’s career spans leadership roles with global brands and household names in Australia, where he has built high-performance teams across sectors including health, telecoms, energy, and local government. With hands-on expertise in seven of the eleven Security of Critical Infrastructure (SOCI) Act sectors, Sam’s straightforward approach and thought leadership—evident through his frequent speaking engagements, panel hosting, and published works—continue to drive high-quality technology and security outcomes.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2044885/c1e-02xmsko0o1fgm3k5-jpdgg08kbj09-8dn9z0.mp3" length="32275687"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Sam Mackenzie, cybersecurity committee member from the Australian Computer Society (ACS), as he explores the converging worlds of cyber and physical security and what it means for securing society into the future. Sam highlights the growing risks faced by critical infrastructure, emphasizing the importance of cross-functional collaboration between IT, operational technology, and engineering teams. We dig into why many organizations still fail to capture cyber-physical risks in their enterprise risk registers, how leadership and purposeful collaboration can bridge longstanding disciplinary gaps, and why regular practice, scenario exercises, and embedded cyber champions are essential to build resilience. Sam also discusses his work with the Australian Control Rooms Network Association (ACRNA), the increasing pressures faced by control rooms due to more frequent severe weather events, and the impact of regulations and “secure by design” principles on product development and security investment.
Sam Mackenzie is a driven technology and cybersecurity leader with 25 years of experience dedicated to protecting and advancing critical infrastructure. As a valued committee member of both the Australian Control Rooms Network Association and the Australian Computer Society, Sam is known for his structured thinking, his talent for simplifying complex challenges, and his ability to harness culture as a catalyst for meaningful change. Sam’s career spans leadership roles with global brands and household names in Australia, where he has built high-performance teams across sectors including health, telecoms, energy, and local government. With hands-on expertise in seven of the eleven Security of Critical Infrastructure (SOCI) Act sectors, Sam’s straightforward approach and thought leadership—evident through his frequent speaking engagements, panel hosting, and published works—continue to drive high-quality technology and security outcomes.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2044885/c1a-5k0v-qdm27po7ug3-mxcfhf.png"></itunes:image>
                                                                            <itunes:duration>00:33:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 309 Deep Dive: Helmut Dansachmueller | Passwordless Authentication To Help Australia's Healthcare Industry]]>
                </title>
                <pubDate>Wed, 21 May 2025 06:00:09 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2043659</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-309-deep-dive-helmut-dansachmueller-passwordless-authentication-to-help-australias-healt</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Helmut Dansachmueller, VP RFID Products Identification Technologies at HID, as he explores the growing need for passwordless authentication in safeguarding Australia’s healthcare industry. Helmut highlights the global nature of security threats, emphasizing that seamless, user-accepted MFA and FIDO-based systems are critical for protecting patient data without imposing extra burdens on employees. The discussion covers the frustrations employees face with password management—including frequent changes and insecure storage and the importance of user education and acceptance for successful security adoption. Helmut also addresses practical challenges in clinical environments, such as the need for fast, reliable access during emergencies and robust processes for lost credentials, and looks forward to future innovations like biometrics to further streamline secure authentication in healthcare.</p>
<p>Helmut has been in the security business for more than 25 years in various management roles for some of the leading suppliers of a broad range of security solutions. He also holds some patents. Within the last 20 years he has successfully led different engineering, global product management and marketing teams. His portfolio includes one of the first VPN products ever as well as solutions for HW-based encryption solutions in combination with RFID technologies managed by his various teams. He has been with HID now for more than 15 years with a focus on RFID technologies, and is used to challenging the status quo in seeking more customer-friendly solutions and services.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Helmut Dansachmueller, VP RFID Products Identification Technologies at HID, as he explores the growing need for passwordless authentication in safeguarding Australia’s healthcare industry. Helmut highlights the global nature of security threats, emphasizing that seamless, user-accepted MFA and FIDO-based systems are critical for protecting patient data without imposing extra burdens on employees. The discussion covers the frustrations employees face with password management—including frequent changes and insecure storage and the importance of user education and acceptance for successful security adoption. Helmut also addresses practical challenges in clinical environments, such as the need for fast, reliable access during emergencies and robust processes for lost credentials, and looks forward to future innovations like biometrics to further streamline secure authentication in healthcare.
Helmut has been in the security business for more than 25 years in various management roles for some of the leading suppliers of a broad range of security solutions. He also holds some patents. Within the last 20 years he has successfully led different engineering, global product management and marketing teams. His portfolio includes one of the first VPN products ever as well as solutions for HW-based encryption solutions in combination with RFID technologies managed by his various teams. He has been with HID now for more than 15 years with a focus on RFID technologies, and is used to challenging the status quo in seeking more customer-friendly solutions and services.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 309 Deep Dive: Helmut Dansachmueller | Passwordless Authentication To Help Australia's Healthcare Industry]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Helmut Dansachmueller, VP RFID Products Identification Technologies at HID, as he explores the growing need for passwordless authentication in safeguarding Australia’s healthcare industry. Helmut highlights the global nature of security threats, emphasizing that seamless, user-accepted MFA and FIDO-based systems are critical for protecting patient data without imposing extra burdens on employees. The discussion covers the frustrations employees face with password management—including frequent changes and insecure storage and the importance of user education and acceptance for successful security adoption. Helmut also addresses practical challenges in clinical environments, such as the need for fast, reliable access during emergencies and robust processes for lost credentials, and looks forward to future innovations like biometrics to further streamline secure authentication in healthcare.</p>
<p>Helmut has been in the security business for more than 25 years in various management roles for some of the leading suppliers of a broad range of security solutions. He also holds some patents. Within the last 20 years he has successfully led different engineering, global product management and marketing teams. His portfolio includes one of the first VPN products ever as well as solutions for HW-based encryption solutions in combination with RFID technologies managed by his various teams. He has been with HID now for more than 15 years with a focus on RFID technologies, and is used to challenging the status quo in seeking more customer-friendly solutions and services.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2043659/c1e-7km5b9205wsd6vxo-47kqvq0ja77v-tjxi0o.mp3" length="34216689"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Helmut Dansachmueller, VP RFID Products Identification Technologies at HID, as he explores the growing need for passwordless authentication in safeguarding Australia’s healthcare industry. Helmut highlights the global nature of security threats, emphasizing that seamless, user-accepted MFA and FIDO-based systems are critical for protecting patient data without imposing extra burdens on employees. The discussion covers the frustrations employees face with password management—including frequent changes and insecure storage and the importance of user education and acceptance for successful security adoption. Helmut also addresses practical challenges in clinical environments, such as the need for fast, reliable access during emergencies and robust processes for lost credentials, and looks forward to future innovations like biometrics to further streamline secure authentication in healthcare.
Helmut has been in the security business for more than 25 years in various management roles for some of the leading suppliers of a broad range of security solutions. He also holds some patents. Within the last 20 years he has successfully led different engineering, global product management and marketing teams. His portfolio includes one of the first VPN products ever as well as solutions for HW-based encryption solutions in combination with RFID technologies managed by his various teams. He has been with HID now for more than 15 years with a focus on RFID technologies, and is used to challenging the status quo in seeking more customer-friendly solutions and services.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2043659/c1a-5k0v-34dqk6qqb7d9-r0czij.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 308 Deep Dive: Samuel Tseitkin | The "Golden" Age of Cybersecurity: The Quantum Era]]>
                </title>
                <pubDate>Fri, 16 May 2025 06:00:13 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2040783</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-308-deep-dive-samuel-tseitkin-the-golden-age-of-cybersecurity-the-quantum-era</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Samuel Tseitkin, Founder of ExiQuantum, as he explores the profound impact of the quantum era on cybersecurity. Samuel explains the basics of quantum computing, highlighting how quantum bits (qubits) differ from classical bits, and delves into the unique opportunities and challenges quantum technology presents. The discussion covers quantum’s unparalleled ability to solve complex optimization problems, its looming threat to existing cryptographic systems, and the exponential pace of change reminiscent of AI breakthroughs. Samuel also addresses industry skepticism, the importance of early preparation, and crypto agility in the face of pending quantum advancements. We examine real-world efforts by tech giants and governments, potential timelines for widespread adoption, and the promise of a “golden age” of cybersecurity where quantum may ultimately bolster defenses against cyber threats.</p>
<p>Samuel Tseitkin is a passionate advocate for emerging technologies, with a strong foundation in artificial intelligence and cybersecurity. During his university years, he co-founded the Artificial Intelligence Student Society (AISSOC), a hub for students collaborating on AI projects, where he contributed to and facilitated multiple initiatives.</p>
<p>After completing his Cybersecurity studies at Monash University, Samuel became deeply interested in quantum computing and its implications for digital security. Recognising the urgent need to adapt cybersecurity strategies for a post-quantum world, he founded ExeQuantum to not only raise awareness of the quantum threat but also provide cutting-edge cryptographic solutions.</p>
<p>Since then, Samuel has established himself as a thought leader in post-quantum cybersecurity, delivering lectures, leading panels, and driving discussions across Australia’s top innovation and technology hubs, including Stone &amp; Chalk, the University of Melbourne, and Monash University. His mission is clear: to ensure businesses and institutions are prepared for the next era of digital security.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Samuel Tseitkin, Founder of ExiQuantum, as he explores the profound impact of the quantum era on cybersecurity. Samuel explains the basics of quantum computing, highlighting how quantum bits (qubits) differ from classical bits, and delves into the unique opportunities and challenges quantum technology presents. The discussion covers quantum’s unparalleled ability to solve complex optimization problems, its looming threat to existing cryptographic systems, and the exponential pace of change reminiscent of AI breakthroughs. Samuel also addresses industry skepticism, the importance of early preparation, and crypto agility in the face of pending quantum advancements. We examine real-world efforts by tech giants and governments, potential timelines for widespread adoption, and the promise of a “golden age” of cybersecurity where quantum may ultimately bolster defenses against cyber threats.
Samuel Tseitkin is a passionate advocate for emerging technologies, with a strong foundation in artificial intelligence and cybersecurity. During his university years, he co-founded the Artificial Intelligence Student Society (AISSOC), a hub for students collaborating on AI projects, where he contributed to and facilitated multiple initiatives.
After completing his Cybersecurity studies at Monash University, Samuel became deeply interested in quantum computing and its implications for digital security. Recognising the urgent need to adapt cybersecurity strategies for a post-quantum world, he founded ExeQuantum to not only raise awareness of the quantum threat but also provide cutting-edge cryptographic solutions.
Since then, Samuel has established himself as a thought leader in post-quantum cybersecurity, delivering lectures, leading panels, and driving discussions across Australia’s top innovation and technology hubs, including Stone & Chalk, the University of Melbourne, and Monash University. His mission is clear: to ensure businesses and institutions are prepared for the next era of digital security.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 308 Deep Dive: Samuel Tseitkin | The "Golden" Age of Cybersecurity: The Quantum Era]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Samuel Tseitkin, Founder of ExiQuantum, as he explores the profound impact of the quantum era on cybersecurity. Samuel explains the basics of quantum computing, highlighting how quantum bits (qubits) differ from classical bits, and delves into the unique opportunities and challenges quantum technology presents. The discussion covers quantum’s unparalleled ability to solve complex optimization problems, its looming threat to existing cryptographic systems, and the exponential pace of change reminiscent of AI breakthroughs. Samuel also addresses industry skepticism, the importance of early preparation, and crypto agility in the face of pending quantum advancements. We examine real-world efforts by tech giants and governments, potential timelines for widespread adoption, and the promise of a “golden age” of cybersecurity where quantum may ultimately bolster defenses against cyber threats.</p>
<p>Samuel Tseitkin is a passionate advocate for emerging technologies, with a strong foundation in artificial intelligence and cybersecurity. During his university years, he co-founded the Artificial Intelligence Student Society (AISSOC), a hub for students collaborating on AI projects, where he contributed to and facilitated multiple initiatives.</p>
<p>After completing his Cybersecurity studies at Monash University, Samuel became deeply interested in quantum computing and its implications for digital security. Recognising the urgent need to adapt cybersecurity strategies for a post-quantum world, he founded ExeQuantum to not only raise awareness of the quantum threat but also provide cutting-edge cryptographic solutions.</p>
<p>Since then, Samuel has established himself as a thought leader in post-quantum cybersecurity, delivering lectures, leading panels, and driving discussions across Australia’s top innovation and technology hubs, including Stone &amp; Chalk, the University of Melbourne, and Monash University. His mission is clear: to ensure businesses and institutions are prepared for the next era of digital security.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2040783/c1e-6wnpcow6g6fndop0-v6djm115ujr7-ml51h1.mp3" length="36889956"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Samuel Tseitkin, Founder of ExiQuantum, as he explores the profound impact of the quantum era on cybersecurity. Samuel explains the basics of quantum computing, highlighting how quantum bits (qubits) differ from classical bits, and delves into the unique opportunities and challenges quantum technology presents. The discussion covers quantum’s unparalleled ability to solve complex optimization problems, its looming threat to existing cryptographic systems, and the exponential pace of change reminiscent of AI breakthroughs. Samuel also addresses industry skepticism, the importance of early preparation, and crypto agility in the face of pending quantum advancements. We examine real-world efforts by tech giants and governments, potential timelines for widespread adoption, and the promise of a “golden age” of cybersecurity where quantum may ultimately bolster defenses against cyber threats.
Samuel Tseitkin is a passionate advocate for emerging technologies, with a strong foundation in artificial intelligence and cybersecurity. During his university years, he co-founded the Artificial Intelligence Student Society (AISSOC), a hub for students collaborating on AI projects, where he contributed to and facilitated multiple initiatives.
After completing his Cybersecurity studies at Monash University, Samuel became deeply interested in quantum computing and its implications for digital security. Recognising the urgent need to adapt cybersecurity strategies for a post-quantum world, he founded ExeQuantum to not only raise awareness of the quantum threat but also provide cutting-edge cryptographic solutions.
Since then, Samuel has established himself as a thought leader in post-quantum cybersecurity, delivering lectures, leading panels, and driving discussions across Australia’s top innovation and technology hubs, including Stone & Chalk, the University of Melbourne, and Monash University. His mission is clear: to ensure businesses and institutions are prepared for the next era of digital security.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2040783/c1a-5k0v-jpdv17moi475-2oest4.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Oracle CloudWorld Tour 2025 Sydney – KB On The Go | Juan Loaiza and Chris Chelliah]]>
                </title>
                <pubDate>Wed, 14 May 2025 05:57:29 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2039615</guid>
                                    <link>https://kbkast.castos.com/episodes/from-oracle-cloudworld-tour-2025-sydney-kb-on-the-go-juan-loaiza-and-chris-chelliah</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, we sit down with Juan Loaiza, Executive Vice President, Mission-Critical Database Technologies, and Chris Chelliah, Senior Vice President, Technology and Customer Strategy JAPAC. Together they discuss the how enterprises are leveraging AI and cloud infrastructure, and updates on the Oracle Cloud Infrastructure (OCI) strategy in the JAPAC region.</p>
<p><strong>Juan Loaiza, Executive Vice President, Database Technologies, Oracle</strong></p>
<p>He is responsible for leading product strategy, development, and management for the world’s leading transaction processing and engineered systems technologies, in the cloud and on-premises. His team is focused on automating and converging database technologies to make application development and operations dramatically easier, saving customers time and money and allowing them to focus on what matters most to them.</p>
<p>Juan holds BS and MS degrees in computer science from the Massachusetts Institute of Technology. In 1988, he left the MIT doctoral program to join the Oracle Database engineering team and has been an innovator in database technologies ever since. In his free time, Juan is an active supporter of more than 15 organisations around the world that work to conserve wildlife and wild places, including WildAid and Wildlife Conservation Network.</p>
<p><strong>Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC</strong></p>
<p>Chris Chelliah leads Oracle’s digital transformation strategy across Japan and Asia Pacific, driving hypergrowth in cloud infrastructure and autonomous databases. He oversees cloud specialist sales teams, industry architects, and Oracle Insight experts to deliver a consultative, customer-focused approach that helps businesses achieve their goals.</p>
<p>Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors. He’s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, we sit down with Juan Loaiza, Executive Vice President, Mission-Critical Database Technologies, and Chris Chelliah, Senior Vice President, Technology and Customer Strategy JAPAC. Together they discuss the how enterprises are leveraging AI and cloud infrastructure, and updates on the Oracle Cloud Infrastructure (OCI) strategy in the JAPAC region.
Juan Loaiza, Executive Vice President, Database Technologies, Oracle
He is responsible for leading product strategy, development, and management for the world’s leading transaction processing and engineered systems technologies, in the cloud and on-premises. His team is focused on automating and converging database technologies to make application development and operations dramatically easier, saving customers time and money and allowing them to focus on what matters most to them.
Juan holds BS and MS degrees in computer science from the Massachusetts Institute of Technology. In 1988, he left the MIT doctoral program to join the Oracle Database engineering team and has been an innovator in database technologies ever since. In his free time, Juan is an active supporter of more than 15 organisations around the world that work to conserve wildlife and wild places, including WildAid and Wildlife Conservation Network.
Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC
Chris Chelliah leads Oracle’s digital transformation strategy across Japan and Asia Pacific, driving hypergrowth in cloud infrastructure and autonomous databases. He oversees cloud specialist sales teams, industry architects, and Oracle Insight experts to deliver a consultative, customer-focused approach that helps businesses achieve their goals.
Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors. He’s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Oracle CloudWorld Tour 2025 Sydney – KB On The Go | Juan Loaiza and Chris Chelliah]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, we sit down with Juan Loaiza, Executive Vice President, Mission-Critical Database Technologies, and Chris Chelliah, Senior Vice President, Technology and Customer Strategy JAPAC. Together they discuss the how enterprises are leveraging AI and cloud infrastructure, and updates on the Oracle Cloud Infrastructure (OCI) strategy in the JAPAC region.</p>
<p><strong>Juan Loaiza, Executive Vice President, Database Technologies, Oracle</strong></p>
<p>He is responsible for leading product strategy, development, and management for the world’s leading transaction processing and engineered systems technologies, in the cloud and on-premises. His team is focused on automating and converging database technologies to make application development and operations dramatically easier, saving customers time and money and allowing them to focus on what matters most to them.</p>
<p>Juan holds BS and MS degrees in computer science from the Massachusetts Institute of Technology. In 1988, he left the MIT doctoral program to join the Oracle Database engineering team and has been an innovator in database technologies ever since. In his free time, Juan is an active supporter of more than 15 organisations around the world that work to conserve wildlife and wild places, including WildAid and Wildlife Conservation Network.</p>
<p><strong>Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC</strong></p>
<p>Chris Chelliah leads Oracle’s digital transformation strategy across Japan and Asia Pacific, driving hypergrowth in cloud infrastructure and autonomous databases. He oversees cloud specialist sales teams, industry architects, and Oracle Insight experts to deliver a consultative, customer-focused approach that helps businesses achieve their goals.</p>
<p>Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors. He’s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2039615/c1e-89g7foqn55c1d8wj-jpdvdr80u04d-vumaba.mp3" length="52008794"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, we sit down with Juan Loaiza, Executive Vice President, Mission-Critical Database Technologies, and Chris Chelliah, Senior Vice President, Technology and Customer Strategy JAPAC. Together they discuss the how enterprises are leveraging AI and cloud infrastructure, and updates on the Oracle Cloud Infrastructure (OCI) strategy in the JAPAC region.
Juan Loaiza, Executive Vice President, Database Technologies, Oracle
He is responsible for leading product strategy, development, and management for the world’s leading transaction processing and engineered systems technologies, in the cloud and on-premises. His team is focused on automating and converging database technologies to make application development and operations dramatically easier, saving customers time and money and allowing them to focus on what matters most to them.
Juan holds BS and MS degrees in computer science from the Massachusetts Institute of Technology. In 1988, he left the MIT doctoral program to join the Oracle Database engineering team and has been an innovator in database technologies ever since. In his free time, Juan is an active supporter of more than 15 organisations around the world that work to conserve wildlife and wild places, including WildAid and Wildlife Conservation Network.
Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC
Chris Chelliah leads Oracle’s digital transformation strategy across Japan and Asia Pacific, driving hypergrowth in cloud infrastructure and autonomous databases. He oversees cloud specialist sales teams, industry architects, and Oracle Insight experts to deliver a consultative, customer-focused approach that helps businesses achieve their goals.
Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors. He’s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2039615/c1a-5k0v-xxojg8gduk8v-4srczp.png"></itunes:image>
                                                                            <itunes:duration>00:54:11</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 307 Deep Dive: Simon Hodgkinson | Current Affairs Of State-Sponsored Cyber Attacks And Their Evolving Tactics]]>
                </title>
                <pubDate>Fri, 09 May 2025 06:00:20 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2028261</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-307-deep-dive-simon-hodgkinson-current-affairs-of-state-sponsored-cyber-attacks-and-their</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Simon Hodgkinson, Strategic Advisor at Semperis, as he shares his insights on the persistent and evolving tactics of state sponsored cyber actors targeting Australian organizations. Simon explores motivations behind these attacks, emphasizing that their primary drivers are often espionage and the prepositioning of access in critical infrastructure rather than financial gain. He discusses the persistent targeting of Australia due to its geopolitical alliances, the growing desensitization to data breaches, and the rising threats to sectors like healthcare. Simon also highlights the dual-edged role of AI in both defending against and enabling sophisticated cyberattacks, the importance of speed in responding to incidents, and the necessity of robust foundational controls to manage growing risks.</p>
<p><strong>Simon Hodgkinson, Strategic Advisor at Semperis
</strong></p>
<p>Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.</p>
<p>Prior to becoming CISO, he was the VP for Infrastructure &amp; Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Simon Hodgkinson, Strategic Advisor at Semperis, as he shares his insights on the persistent and evolving tactics of state sponsored cyber actors targeting Australian organizations. Simon explores motivations behind these attacks, emphasizing that their primary drivers are often espionage and the prepositioning of access in critical infrastructure rather than financial gain. He discusses the persistent targeting of Australia due to its geopolitical alliances, the growing desensitization to data breaches, and the rising threats to sectors like healthcare. Simon also highlights the dual-edged role of AI in both defending against and enabling sophisticated cyberattacks, the importance of speed in responding to incidents, and the necessity of robust foundational controls to manage growing risks.
Simon Hodgkinson, Strategic Advisor at Semperis

Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.
Prior to becoming CISO, he was the VP for Infrastructure & Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply & Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 307 Deep Dive: Simon Hodgkinson | Current Affairs Of State-Sponsored Cyber Attacks And Their Evolving Tactics]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Simon Hodgkinson, Strategic Advisor at Semperis, as he shares his insights on the persistent and evolving tactics of state sponsored cyber actors targeting Australian organizations. Simon explores motivations behind these attacks, emphasizing that their primary drivers are often espionage and the prepositioning of access in critical infrastructure rather than financial gain. He discusses the persistent targeting of Australia due to its geopolitical alliances, the growing desensitization to data breaches, and the rising threats to sectors like healthcare. Simon also highlights the dual-edged role of AI in both defending against and enabling sophisticated cyberattacks, the importance of speed in responding to incidents, and the necessity of robust foundational controls to manage growing risks.</p>
<p><strong>Simon Hodgkinson, Strategic Advisor at Semperis
</strong></p>
<p>Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.</p>
<p>Prior to becoming CISO, he was the VP for Infrastructure &amp; Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2028261/c1e-41r8c1no1vsopgxk-gp3do875snjx-hjvgpt.mp3" length="38263788"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Simon Hodgkinson, Strategic Advisor at Semperis, as he shares his insights on the persistent and evolving tactics of state sponsored cyber actors targeting Australian organizations. Simon explores motivations behind these attacks, emphasizing that their primary drivers are often espionage and the prepositioning of access in critical infrastructure rather than financial gain. He discusses the persistent targeting of Australia due to its geopolitical alliances, the growing desensitization to data breaches, and the rising threats to sectors like healthcare. Simon also highlights the dual-edged role of AI in both defending against and enabling sophisticated cyberattacks, the importance of speed in responding to incidents, and the necessity of robust foundational controls to manage growing risks.
Simon Hodgkinson, Strategic Advisor at Semperis

Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.
Prior to becoming CISO, he was the VP for Infrastructure & Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply & Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2028261/c1a-5k0v-0vk4g68dfdpo-hxhodo.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 306 Deep Dive: Reuben Koh | How to Defend Against Cyberattacks on Networks and Systems]]>
                </title>
                <pubDate>Wed, 07 May 2025 06:00:13 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2026347</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-306-deep-dive-reuben-koh-how-to-defend-against-cyberattacks-on-networks-and-systems</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Reuben Koh, Director of Security Strategy APJ at Akamai, as he explores the rapidly evolving landscape of cyber threats and strategies for defense. Reuben sheds light on the significant rise in sophisticated ransomware attacks, the increased targeting of industries like healthcare and finance, and the shifting tactics of threat actors, including data theft and extortion without encryption. He also highlights the surge of hacktivism linked to geopolitical events, the growing role of AI both as a weapon for attackers and a tool for defenders, and the challenges organizations face in balancing fast-paced innovation with cybersecurity preparedness.</p>
<p>Reuben Koh is a Director of Security Technology &amp; Strategy at Akamai Technologies where he provides deep thought leadership and advisory in helping clients align security strategies with their core business initiatives and digital transformation processes.</p>
<p>He also works with Fortune 1000 enterprises and business partners across Asia Pacific &amp; Japan in providing cybersecurity guidance and expertise, especially in domains such as Web Security, Zero Trust, SASE, XDR, network security and Security Operations.</p>
<p>With close to 20 years of experience in cyber security, Reuben previously held prominent leadership roles with industry leaders such as Symantec, CA Technologies, VMware and Cisco Systems. Reuben also holds various industry certifications such as CISSP, CISA, CISM and
ITIL.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Reuben Koh, Director of Security Strategy APJ at Akamai, as he explores the rapidly evolving landscape of cyber threats and strategies for defense. Reuben sheds light on the significant rise in sophisticated ransomware attacks, the increased targeting of industries like healthcare and finance, and the shifting tactics of threat actors, including data theft and extortion without encryption. He also highlights the surge of hacktivism linked to geopolitical events, the growing role of AI both as a weapon for attackers and a tool for defenders, and the challenges organizations face in balancing fast-paced innovation with cybersecurity preparedness.
Reuben Koh is a Director of Security Technology & Strategy at Akamai Technologies where he provides deep thought leadership and advisory in helping clients align security strategies with their core business initiatives and digital transformation processes.
He also works with Fortune 1000 enterprises and business partners across Asia Pacific & Japan in providing cybersecurity guidance and expertise, especially in domains such as Web Security, Zero Trust, SASE, XDR, network security and Security Operations.
With close to 20 years of experience in cyber security, Reuben previously held prominent leadership roles with industry leaders such as Symantec, CA Technologies, VMware and Cisco Systems. Reuben also holds various industry certifications such as CISSP, CISA, CISM and
ITIL.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 306 Deep Dive: Reuben Koh | How to Defend Against Cyberattacks on Networks and Systems]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Reuben Koh, Director of Security Strategy APJ at Akamai, as he explores the rapidly evolving landscape of cyber threats and strategies for defense. Reuben sheds light on the significant rise in sophisticated ransomware attacks, the increased targeting of industries like healthcare and finance, and the shifting tactics of threat actors, including data theft and extortion without encryption. He also highlights the surge of hacktivism linked to geopolitical events, the growing role of AI both as a weapon for attackers and a tool for defenders, and the challenges organizations face in balancing fast-paced innovation with cybersecurity preparedness.</p>
<p>Reuben Koh is a Director of Security Technology &amp; Strategy at Akamai Technologies where he provides deep thought leadership and advisory in helping clients align security strategies with their core business initiatives and digital transformation processes.</p>
<p>He also works with Fortune 1000 enterprises and business partners across Asia Pacific &amp; Japan in providing cybersecurity guidance and expertise, especially in domains such as Web Security, Zero Trust, SASE, XDR, network security and Security Operations.</p>
<p>With close to 20 years of experience in cyber security, Reuben previously held prominent leadership roles with industry leaders such as Symantec, CA Technologies, VMware and Cisco Systems. Reuben also holds various industry certifications such as CISSP, CISA, CISM and
ITIL.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2026347/c1e-901kfdwgkqfdv65r-gp3djqqztdqk-gupbmo.mp3" length="42786106"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Reuben Koh, Director of Security Strategy APJ at Akamai, as he explores the rapidly evolving landscape of cyber threats and strategies for defense. Reuben sheds light on the significant rise in sophisticated ransomware attacks, the increased targeting of industries like healthcare and finance, and the shifting tactics of threat actors, including data theft and extortion without encryption. He also highlights the surge of hacktivism linked to geopolitical events, the growing role of AI both as a weapon for attackers and a tool for defenders, and the challenges organizations face in balancing fast-paced innovation with cybersecurity preparedness.
Reuben Koh is a Director of Security Technology & Strategy at Akamai Technologies where he provides deep thought leadership and advisory in helping clients align security strategies with their core business initiatives and digital transformation processes.
He also works with Fortune 1000 enterprises and business partners across Asia Pacific & Japan in providing cybersecurity guidance and expertise, especially in domains such as Web Security, Zero Trust, SASE, XDR, network security and Security Operations.
With close to 20 years of experience in cyber security, Reuben previously held prominent leadership roles with industry leaders such as Symantec, CA Technologies, VMware and Cisco Systems. Reuben also holds various industry certifications such as CISSP, CISA, CISM and
ITIL.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2026347/c1a-5k0v-7z3nz8w1ux7d-gd1ivx.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 305 Deep Dive: Chris Peake | What's Ahead for Cyber Security in Australia and Its Impact on Businesses in 2025]]>
                </title>
                <pubDate>Wed, 30 Apr 2025 06:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2022244</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-305-deep-dive-chris-peake-whats-ahead-for-cyber-security-in-australia-and-its-impact-on</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Chris Peake, Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet, as he explores what lies ahead for cybersecurity in Australia and its impact on businesses in 2025. Chris discusses the evolving role of AI—both as a tool for cyber adversaries and as an advantage for defenders—and highlights how AI-driven attacks are likely to decrease the time to exploit vulnerabilities. Chris also shares insights on communicating business enablement and risk with executives, the shift towards integrating security across all business functions, and the need for organisations to use security as a foundational business strategy in order to drive growth and customer confidence.</p>
<p>Chris Peake is the Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet. Since joining in September of 2020, he is responsible for leading the continuous improvement of the security program to better protect customers and the company in an ever-changing cyber environment, with a focus on customer enablement and a passion for building great teams.</p>
<p>Chris holds a PhD in cloud security and trust, and has over 20 years of experience in cybersecurity during which time he has supported organizations like NASA, DARPA, the Department of Defense, and ServiceNow. He enjoys biking, boating, and cheering on Auburn football.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Chris Peake, Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet, as he explores what lies ahead for cybersecurity in Australia and its impact on businesses in 2025. Chris discusses the evolving role of AI—both as a tool for cyber adversaries and as an advantage for defenders—and highlights how AI-driven attacks are likely to decrease the time to exploit vulnerabilities. Chris also shares insights on communicating business enablement and risk with executives, the shift towards integrating security across all business functions, and the need for organisations to use security as a foundational business strategy in order to drive growth and customer confidence.
Chris Peake is the Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet. Since joining in September of 2020, he is responsible for leading the continuous improvement of the security program to better protect customers and the company in an ever-changing cyber environment, with a focus on customer enablement and a passion for building great teams.
Chris holds a PhD in cloud security and trust, and has over 20 years of experience in cybersecurity during which time he has supported organizations like NASA, DARPA, the Department of Defense, and ServiceNow. He enjoys biking, boating, and cheering on Auburn football.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 305 Deep Dive: Chris Peake | What's Ahead for Cyber Security in Australia and Its Impact on Businesses in 2025]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Chris Peake, Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet, as he explores what lies ahead for cybersecurity in Australia and its impact on businesses in 2025. Chris discusses the evolving role of AI—both as a tool for cyber adversaries and as an advantage for defenders—and highlights how AI-driven attacks are likely to decrease the time to exploit vulnerabilities. Chris also shares insights on communicating business enablement and risk with executives, the shift towards integrating security across all business functions, and the need for organisations to use security as a foundational business strategy in order to drive growth and customer confidence.</p>
<p>Chris Peake is the Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet. Since joining in September of 2020, he is responsible for leading the continuous improvement of the security program to better protect customers and the company in an ever-changing cyber environment, with a focus on customer enablement and a passion for building great teams.</p>
<p>Chris holds a PhD in cloud security and trust, and has over 20 years of experience in cybersecurity during which time he has supported organizations like NASA, DARPA, the Department of Defense, and ServiceNow. He enjoys biking, boating, and cheering on Auburn football.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2022244/c1e-vzj8a7n7m8twz1vk-mk4g2kpqt86x-c85ptg.mp3" length="35847148"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Chris Peake, Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet, as he explores what lies ahead for cybersecurity in Australia and its impact on businesses in 2025. Chris discusses the evolving role of AI—both as a tool for cyber adversaries and as an advantage for defenders—and highlights how AI-driven attacks are likely to decrease the time to exploit vulnerabilities. Chris also shares insights on communicating business enablement and risk with executives, the shift towards integrating security across all business functions, and the need for organisations to use security as a foundational business strategy in order to drive growth and customer confidence.
Chris Peake is the Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet. Since joining in September of 2020, he is responsible for leading the continuous improvement of the security program to better protect customers and the company in an ever-changing cyber environment, with a focus on customer enablement and a passion for building great teams.
Chris holds a PhD in cloud security and trust, and has over 20 years of experience in cybersecurity during which time he has supported organizations like NASA, DARPA, the Department of Defense, and ServiceNow. He enjoys biking, boating, and cheering on Auburn football.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2022244/c1a-5k0v-6zo9rr42ud0n-sln5rb.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 304 Deep Dive: David Wiseman | The Eroding Trust in Consumer Messaging Apps]]>
                </title>
                <pubDate>Wed, 23 Apr 2025 06:00:10 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2018182</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-304-deep-dive-david-wiseman-the-eroding-trust-in-consumer-messaging-apps</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with David Wiseman, Vice President of Secure Communications at BlackBerry, as he discusses the growing challenges around digital sovereignty and trust in consumer messaging apps. David explores the limitations and risks of using platforms like Signal, WhatsApp, and Telegram for sensitive or official communications, highlighting issues such as identity spoofing, loss of data control, and the collection of valuable metadata by adversaries. He explains BlackBerry’s shift to software-based secure communications that provide governments and enterprises with the necessary controls for confidentiality, compliance, and usability—delivering “consumer app” simplicity with enterprise-level security.</p>
<p><strong>BlackBerry Role</strong></p>
<p>In his role as the Vice President of Secure Communications, David is a seasoned international public speaker, whose responsibilities include leading the Secure Government Communications business in the Americas and APAC. He specializes in applying technology to real life mission critical business systems with a focus in communications, security, and safety.</p>
<p>David and his team support our customers in understanding how to secure their mobile communications from the most advanced adversaries, especially in complex and highly secure sectors such as defense and military, including <a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2022/nato-clears-blackberry-secusuite-for-global-nato-secure-communications">NATO</a>. David has been with BlackBerry for ten years, joining the organization in November 2014.</p>
<p><strong>Experience</strong></p>
<p>David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security</p>
<p><strong>Notable Achievements</strong></p>
<p>David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with David Wiseman, Vice President of Secure Communications at BlackBerry, as he discusses the growing challenges around digital sovereignty and trust in consumer messaging apps. David explores the limitations and risks of using platforms like Signal, WhatsApp, and Telegram for sensitive or official communications, highlighting issues such as identity spoofing, loss of data control, and the collection of valuable metadata by adversaries. He explains BlackBerry’s shift to software-based secure communications that provide governments and enterprises with the necessary controls for confidentiality, compliance, and usability—delivering “consumer app” simplicity with enterprise-level security.
BlackBerry Role
In his role as the Vice President of Secure Communications, David is a seasoned international public speaker, whose responsibilities include leading the Secure Government Communications business in the Americas and APAC. He specializes in applying technology to real life mission critical business systems with a focus in communications, security, and safety.
David and his team support our customers in understanding how to secure their mobile communications from the most advanced adversaries, especially in complex and highly secure sectors such as defense and military, including NATO. David has been with BlackBerry for ten years, joining the organization in November 2014.
Experience
David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security
Notable Achievements
David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 304 Deep Dive: David Wiseman | The Eroding Trust in Consumer Messaging Apps]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with David Wiseman, Vice President of Secure Communications at BlackBerry, as he discusses the growing challenges around digital sovereignty and trust in consumer messaging apps. David explores the limitations and risks of using platforms like Signal, WhatsApp, and Telegram for sensitive or official communications, highlighting issues such as identity spoofing, loss of data control, and the collection of valuable metadata by adversaries. He explains BlackBerry’s shift to software-based secure communications that provide governments and enterprises with the necessary controls for confidentiality, compliance, and usability—delivering “consumer app” simplicity with enterprise-level security.</p>
<p><strong>BlackBerry Role</strong></p>
<p>In his role as the Vice President of Secure Communications, David is a seasoned international public speaker, whose responsibilities include leading the Secure Government Communications business in the Americas and APAC. He specializes in applying technology to real life mission critical business systems with a focus in communications, security, and safety.</p>
<p>David and his team support our customers in understanding how to secure their mobile communications from the most advanced adversaries, especially in complex and highly secure sectors such as defense and military, including <a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2022/nato-clears-blackberry-secusuite-for-global-nato-secure-communications">NATO</a>. David has been with BlackBerry for ten years, joining the organization in November 2014.</p>
<p><strong>Experience</strong></p>
<p>David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security</p>
<p><strong>Notable Achievements</strong></p>
<p>David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2018182/c1e-5k0vb1nwj2c0xmvo-dmz20kp8f6pg-gg8nbt.mp3" length="39798952"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with David Wiseman, Vice President of Secure Communications at BlackBerry, as he discusses the growing challenges around digital sovereignty and trust in consumer messaging apps. David explores the limitations and risks of using platforms like Signal, WhatsApp, and Telegram for sensitive or official communications, highlighting issues such as identity spoofing, loss of data control, and the collection of valuable metadata by adversaries. He explains BlackBerry’s shift to software-based secure communications that provide governments and enterprises with the necessary controls for confidentiality, compliance, and usability—delivering “consumer app” simplicity with enterprise-level security.
BlackBerry Role
In his role as the Vice President of Secure Communications, David is a seasoned international public speaker, whose responsibilities include leading the Secure Government Communications business in the Americas and APAC. He specializes in applying technology to real life mission critical business systems with a focus in communications, security, and safety.
David and his team support our customers in understanding how to secure their mobile communications from the most advanced adversaries, especially in complex and highly secure sectors such as defense and military, including NATO. David has been with BlackBerry for ten years, joining the organization in November 2014.
Experience
David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security
Notable Achievements
David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2018182/c1a-5k0v-5zxom62wa1rz-it0s4h.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:28</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 303 Deep Dive: Anand Pashupathy | Securing the Future - Confidential AI & Cyber Threats]]>
                </title>
                <pubDate>Mon, 21 Apr 2025 05:57:51 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2016610</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-303-deep-dive-anand-pashupathy-securing-the-future-confidential-ai-cyber-threats</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Anand Pashupathy, Vice President and General Manager of Product Assurance and Security at Intel, as he discusses the current state of enterprise security, emphasizing growing concerns around data exfiltration, IP leakage, and the increasing sophistication of cyber attacks fueled by AI. He provides insight into how technologies such as Intel SGX and TDX are setting new standards for data protection in use, particularly as AI transitions from cloud-centric to enterprise-wide applications. Anand also highlights the industry’s journey towards ubiquitous confidential computing, the importance of ecosystem collaboration, and the growing need to create greater awareness and education as the security landscape rapidly evolves.</p>
<p>Anand Pashupathy is Vice President and General Manager of Security Software &amp; Services (S3) Division in the Office of the Corporate Technology Officer organization where he leads a team of senior leaders whose purpose is to deliver security software technologies, services, and practices that empower our customers to achieve their security objectives. His organization’s product portfolio includes Confidential Compute, Ecosystem Enabling, Security Corporate Technology Initiative, Open Source Security Supply Chain, etc. Anand is also responsible for Intel’s Confidential Compute vision, strategy, and execution. Previously Anand has held many engineering, program wide and GM leadership roles at Intel. Additionally, Anand has been granted six patents and currently serves a governing board member of the Confidential Computing Consortium.</p>
<p>Anand is a strong advocate for women and underrepresented people in technology, he serves as the Executive Sponsor for an internal employee resource group. For his advocacy and leadership contributions to diversity and inclusion, Anand received the 2023 Global Diversity and Inclusion Achievement Award for Executive Advocate for D&amp;I. Outside of work, Anand and his family love to travel and experience cultures from around the world. He earned his MBA from the Kellogg School of Management, and a Master’s degree in Computer Science and has been with Intel since the nineties.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Anand Pashupathy, Vice President and General Manager of Product Assurance and Security at Intel, as he discusses the current state of enterprise security, emphasizing growing concerns around data exfiltration, IP leakage, and the increasing sophistication of cyber attacks fueled by AI. He provides insight into how technologies such as Intel SGX and TDX are setting new standards for data protection in use, particularly as AI transitions from cloud-centric to enterprise-wide applications. Anand also highlights the industry’s journey towards ubiquitous confidential computing, the importance of ecosystem collaboration, and the growing need to create greater awareness and education as the security landscape rapidly evolves.
Anand Pashupathy is Vice President and General Manager of Security Software & Services (S3) Division in the Office of the Corporate Technology Officer organization where he leads a team of senior leaders whose purpose is to deliver security software technologies, services, and practices that empower our customers to achieve their security objectives. His organization’s product portfolio includes Confidential Compute, Ecosystem Enabling, Security Corporate Technology Initiative, Open Source Security Supply Chain, etc. Anand is also responsible for Intel’s Confidential Compute vision, strategy, and execution. Previously Anand has held many engineering, program wide and GM leadership roles at Intel. Additionally, Anand has been granted six patents and currently serves a governing board member of the Confidential Computing Consortium.
Anand is a strong advocate for women and underrepresented people in technology, he serves as the Executive Sponsor for an internal employee resource group. For his advocacy and leadership contributions to diversity and inclusion, Anand received the 2023 Global Diversity and Inclusion Achievement Award for Executive Advocate for D&I. Outside of work, Anand and his family love to travel and experience cultures from around the world. He earned his MBA from the Kellogg School of Management, and a Master’s degree in Computer Science and has been with Intel since the nineties.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 303 Deep Dive: Anand Pashupathy | Securing the Future - Confidential AI & Cyber Threats]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Anand Pashupathy, Vice President and General Manager of Product Assurance and Security at Intel, as he discusses the current state of enterprise security, emphasizing growing concerns around data exfiltration, IP leakage, and the increasing sophistication of cyber attacks fueled by AI. He provides insight into how technologies such as Intel SGX and TDX are setting new standards for data protection in use, particularly as AI transitions from cloud-centric to enterprise-wide applications. Anand also highlights the industry’s journey towards ubiquitous confidential computing, the importance of ecosystem collaboration, and the growing need to create greater awareness and education as the security landscape rapidly evolves.</p>
<p>Anand Pashupathy is Vice President and General Manager of Security Software &amp; Services (S3) Division in the Office of the Corporate Technology Officer organization where he leads a team of senior leaders whose purpose is to deliver security software technologies, services, and practices that empower our customers to achieve their security objectives. His organization’s product portfolio includes Confidential Compute, Ecosystem Enabling, Security Corporate Technology Initiative, Open Source Security Supply Chain, etc. Anand is also responsible for Intel’s Confidential Compute vision, strategy, and execution. Previously Anand has held many engineering, program wide and GM leadership roles at Intel. Additionally, Anand has been granted six patents and currently serves a governing board member of the Confidential Computing Consortium.</p>
<p>Anand is a strong advocate for women and underrepresented people in technology, he serves as the Executive Sponsor for an internal employee resource group. For his advocacy and leadership contributions to diversity and inclusion, Anand received the 2023 Global Diversity and Inclusion Achievement Award for Executive Advocate for D&amp;I. Outside of work, Anand and his family love to travel and experience cultures from around the world. He earned his MBA from the Kellogg School of Management, and a Master’s degree in Computer Science and has been with Intel since the nineties.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2016610/c1e-z9w7f72r2jcokrwj-7z39919jigzg-3yby7s.mp3" length="35688323"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Anand Pashupathy, Vice President and General Manager of Product Assurance and Security at Intel, as he discusses the current state of enterprise security, emphasizing growing concerns around data exfiltration, IP leakage, and the increasing sophistication of cyber attacks fueled by AI. He provides insight into how technologies such as Intel SGX and TDX are setting new standards for data protection in use, particularly as AI transitions from cloud-centric to enterprise-wide applications. Anand also highlights the industry’s journey towards ubiquitous confidential computing, the importance of ecosystem collaboration, and the growing need to create greater awareness and education as the security landscape rapidly evolves.
Anand Pashupathy is Vice President and General Manager of Security Software & Services (S3) Division in the Office of the Corporate Technology Officer organization where he leads a team of senior leaders whose purpose is to deliver security software technologies, services, and practices that empower our customers to achieve their security objectives. His organization’s product portfolio includes Confidential Compute, Ecosystem Enabling, Security Corporate Technology Initiative, Open Source Security Supply Chain, etc. Anand is also responsible for Intel’s Confidential Compute vision, strategy, and execution. Previously Anand has held many engineering, program wide and GM leadership roles at Intel. Additionally, Anand has been granted six patents and currently serves a governing board member of the Confidential Computing Consortium.
Anand is a strong advocate for women and underrepresented people in technology, he serves as the Executive Sponsor for an internal employee resource group. For his advocacy and leadership contributions to diversity and inclusion, Anand received the 2023 Global Diversity and Inclusion Achievement Award for Executive Advocate for D&I. Outside of work, Anand and his family love to travel and experience cultures from around the world. He earned his MBA from the Kellogg School of Management, and a Master’s degree in Computer Science and has been with Intel since the nineties.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2016610/c1a-5k0v-kp49noj7crdd-0nwtov.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:11</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 302 Deep Dive: Doris Spielthenner | How Cybersecurity Can Take Australia To Net Zero]]>
                </title>
                <pubDate>Wed, 09 Apr 2025 06:00:34 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2009895</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-302-deep-dive-doris-spielthenner-how-cybersecurity-can-take-australia-to-net-zero</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Doris Spielthenner, Managing Director and Regional Manager APAC from SMA Australia, as she discusses the intersection of cybersecurity and Australia’s push towards net zero energy. Doris emphasizes the need for harmonization of cybersecurity standards across Australia and explores how decentralized renewable energy networks require robust cybersecurity measures to prevent potential threats. She discusses Australia’s leading position in rooftop solar penetration and the social challenges of transitioning to large-scale renewable infrastructure.</p>
<p>As Managing Director of SMA Australia and Regional Manager APAC, Doris Spielthenner heads the Residential, C&amp;I and Large Scale Utility business across ANZ, India, China and Taiwan, South East Asia, Japan and Korea. Doris Spielthenner joined SMA from senior management positions in the software and professional services industries across APAC, Europe, and the US.</p>
<p>Doris is passionate about building and growing businesses, with strong leadership across B2B and B2C, recently in the Greentech industry. She is a dynamic, results-focused leader with a top tier consulting background and strong planning and execution experience. She is also the co-founder of a global software business.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Doris Spielthenner, Managing Director and Regional Manager APAC from SMA Australia, as she discusses the intersection of cybersecurity and Australia’s push towards net zero energy. Doris emphasizes the need for harmonization of cybersecurity standards across Australia and explores how decentralized renewable energy networks require robust cybersecurity measures to prevent potential threats. She discusses Australia’s leading position in rooftop solar penetration and the social challenges of transitioning to large-scale renewable infrastructure.
As Managing Director of SMA Australia and Regional Manager APAC, Doris Spielthenner heads the Residential, C&I and Large Scale Utility business across ANZ, India, China and Taiwan, South East Asia, Japan and Korea. Doris Spielthenner joined SMA from senior management positions in the software and professional services industries across APAC, Europe, and the US.
Doris is passionate about building and growing businesses, with strong leadership across B2B and B2C, recently in the Greentech industry. She is a dynamic, results-focused leader with a top tier consulting background and strong planning and execution experience. She is also the co-founder of a global software business.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 302 Deep Dive: Doris Spielthenner | How Cybersecurity Can Take Australia To Net Zero]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Doris Spielthenner, Managing Director and Regional Manager APAC from SMA Australia, as she discusses the intersection of cybersecurity and Australia’s push towards net zero energy. Doris emphasizes the need for harmonization of cybersecurity standards across Australia and explores how decentralized renewable energy networks require robust cybersecurity measures to prevent potential threats. She discusses Australia’s leading position in rooftop solar penetration and the social challenges of transitioning to large-scale renewable infrastructure.</p>
<p>As Managing Director of SMA Australia and Regional Manager APAC, Doris Spielthenner heads the Residential, C&amp;I and Large Scale Utility business across ANZ, India, China and Taiwan, South East Asia, Japan and Korea. Doris Spielthenner joined SMA from senior management positions in the software and professional services industries across APAC, Europe, and the US.</p>
<p>Doris is passionate about building and growing businesses, with strong leadership across B2B and B2C, recently in the Greentech industry. She is a dynamic, results-focused leader with a top tier consulting background and strong planning and execution experience. She is also the co-founder of a global software business.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2009895/c1e-5k0vb1n006i0xmvo-8dr99wrjcogm-psyefd.mp3" length="33338557"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Doris Spielthenner, Managing Director and Regional Manager APAC from SMA Australia, as she discusses the intersection of cybersecurity and Australia’s push towards net zero energy. Doris emphasizes the need for harmonization of cybersecurity standards across Australia and explores how decentralized renewable energy networks require robust cybersecurity measures to prevent potential threats. She discusses Australia’s leading position in rooftop solar penetration and the social challenges of transitioning to large-scale renewable infrastructure.
As Managing Director of SMA Australia and Regional Manager APAC, Doris Spielthenner heads the Residential, C&I and Large Scale Utility business across ANZ, India, China and Taiwan, South East Asia, Japan and Korea. Doris Spielthenner joined SMA from senior management positions in the software and professional services industries across APAC, Europe, and the US.
Doris is passionate about building and growing businesses, with strong leadership across B2B and B2C, recently in the Greentech industry. She is a dynamic, results-focused leader with a top tier consulting background and strong planning and execution experience. She is also the co-founder of a global software business.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2009895/c1a-5k0v-z329d1mmtp8k-dnppyw.jpg"></itunes:image>
                                                                            <itunes:duration>00:34:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 301 Deep Dive: Ginny Badanes | Threats, AI and Influence Operations Around Elections]]>
                </title>
                <pubDate>Wed, 02 Apr 2025 04:58:20 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2004844</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-301-deep-dive-ginny-badanes-threats-ai-and-influence-operations-around-elections</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Ginny Badanes, General Manager of Democracy Forward at Microsoft, as she discusses the multifaceted threats posed by nation-state actors around elections, particularly the use of AI in influence operations. Ginny highlights the critical need for society to adopt a healthy skepticism toward information, scrutinizing the trustworthiness of sources and the potential for AI manipulation. We delve into the activities of significant nation-state actors like China, Russia, and Iran in recent elections, and the emergence of AI-driven fake news sites used for propaganda. Additionally, Ginny provides insights into the deceptive use of AI beyond political contexts, including its impact on women and financial fraud schemes.</p>
<p>Ginny Badanes is the General Manager of Microsoft’s Democracy Forward program, an initiative within Microsoft’s Technology for Fundamental Rights organisation. At Microsoft, protecting fundamental rights means promoting responsible business practices, expanding accessibility and connectivity, and advancing fair and inclusive societies. Ginny’s team is focused on addressing challenges to global democratic stability, with efforts aimed at safeguarding open and secure elections, promoting a healthy information ecosystem, and advocating for corporate civic responsibility. In 2024, a key focus of her team’s work was raising awareness about the deceptive uses of AI in elections and combating these cyber and AI enabled threats.</p>
<p>Ginny has spent her career at the intersection of politics and technology, advising presidential and senate campaigns on leveraging data and technology. She was named among Washingtonian’s 2021 &amp; 2022 “Most Influential People” list for national security and defense.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Ginny Badanes, General Manager of Democracy Forward at Microsoft, as she discusses the multifaceted threats posed by nation-state actors around elections, particularly the use of AI in influence operations. Ginny highlights the critical need for society to adopt a healthy skepticism toward information, scrutinizing the trustworthiness of sources and the potential for AI manipulation. We delve into the activities of significant nation-state actors like China, Russia, and Iran in recent elections, and the emergence of AI-driven fake news sites used for propaganda. Additionally, Ginny provides insights into the deceptive use of AI beyond political contexts, including its impact on women and financial fraud schemes.
Ginny Badanes is the General Manager of Microsoft’s Democracy Forward program, an initiative within Microsoft’s Technology for Fundamental Rights organisation. At Microsoft, protecting fundamental rights means promoting responsible business practices, expanding accessibility and connectivity, and advancing fair and inclusive societies. Ginny’s team is focused on addressing challenges to global democratic stability, with efforts aimed at safeguarding open and secure elections, promoting a healthy information ecosystem, and advocating for corporate civic responsibility. In 2024, a key focus of her team’s work was raising awareness about the deceptive uses of AI in elections and combating these cyber and AI enabled threats.
Ginny has spent her career at the intersection of politics and technology, advising presidential and senate campaigns on leveraging data and technology. She was named among Washingtonian’s 2021 & 2022 “Most Influential People” list for national security and defense.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 301 Deep Dive: Ginny Badanes | Threats, AI and Influence Operations Around Elections]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Ginny Badanes, General Manager of Democracy Forward at Microsoft, as she discusses the multifaceted threats posed by nation-state actors around elections, particularly the use of AI in influence operations. Ginny highlights the critical need for society to adopt a healthy skepticism toward information, scrutinizing the trustworthiness of sources and the potential for AI manipulation. We delve into the activities of significant nation-state actors like China, Russia, and Iran in recent elections, and the emergence of AI-driven fake news sites used for propaganda. Additionally, Ginny provides insights into the deceptive use of AI beyond political contexts, including its impact on women and financial fraud schemes.</p>
<p>Ginny Badanes is the General Manager of Microsoft’s Democracy Forward program, an initiative within Microsoft’s Technology for Fundamental Rights organisation. At Microsoft, protecting fundamental rights means promoting responsible business practices, expanding accessibility and connectivity, and advancing fair and inclusive societies. Ginny’s team is focused on addressing challenges to global democratic stability, with efforts aimed at safeguarding open and secure elections, promoting a healthy information ecosystem, and advocating for corporate civic responsibility. In 2024, a key focus of her team’s work was raising awareness about the deceptive uses of AI in elections and combating these cyber and AI enabled threats.</p>
<p>Ginny has spent her career at the intersection of politics and technology, advising presidential and senate campaigns on leveraging data and technology. She was named among Washingtonian’s 2021 &amp; 2022 “Most Influential People” list for national security and defense.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2004844/c1e-pjr0h1p4z9bmo9x0-okwr7z29u1j3-5ws9x0.mp3" length="38906191"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Ginny Badanes, General Manager of Democracy Forward at Microsoft, as she discusses the multifaceted threats posed by nation-state actors around elections, particularly the use of AI in influence operations. Ginny highlights the critical need for society to adopt a healthy skepticism toward information, scrutinizing the trustworthiness of sources and the potential for AI manipulation. We delve into the activities of significant nation-state actors like China, Russia, and Iran in recent elections, and the emergence of AI-driven fake news sites used for propaganda. Additionally, Ginny provides insights into the deceptive use of AI beyond political contexts, including its impact on women and financial fraud schemes.
Ginny Badanes is the General Manager of Microsoft’s Democracy Forward program, an initiative within Microsoft’s Technology for Fundamental Rights organisation. At Microsoft, protecting fundamental rights means promoting responsible business practices, expanding accessibility and connectivity, and advancing fair and inclusive societies. Ginny’s team is focused on addressing challenges to global democratic stability, with efforts aimed at safeguarding open and secure elections, promoting a healthy information ecosystem, and advocating for corporate civic responsibility. In 2024, a key focus of her team’s work was raising awareness about the deceptive uses of AI in elections and combating these cyber and AI enabled threats.
Ginny has spent her career at the intersection of politics and technology, advising presidential and senate campaigns on leveraging data and technology. She was named among Washingtonian’s 2021 & 2022 “Most Influential People” list for national security and defense.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2004844/c1a-5k0v-mkx8g9x0bnd-zzxgzr.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Microsoft AI Tour 2024 – KB On The Go | Mick Dunne, Ben Lamont & Helen Schneider, and Leigh Williams]]>
                </title>
                <pubDate>Fri, 28 Mar 2025 05:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/2000890</guid>
                                    <link>https://kbkast.castos.com/episodes/from-microsoft-ai-tour-2024-kb-on-the-go-mick-dunne-ben-lamont-helen-schneider-and-leigh-wil</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, we sit down with Mick Dunne, Chief Security Advisor at Microsoft, Ben Lamont, Chief Data Officer &amp; Helen Schneider Commander, ACCCE and Human Exploitation for the Australian Federal Police and Leigh Williams, Chief Information Officer, Information and Technology Executive at Brisbane Catholic Education. Together they discuss the function of the Customer Security Officer team, how the AFP is using AI to protect Australia and its people, and the impact AI has on education.</p>
<p>Mick Dunne heads the new Customer Security Officer team across Asia who are part of a global team for over 40 former CISOs, CTOs and deeply experienced SMEs. They are focused on providing trusted, deep expertise and advice to customers, Microsoft area leadership and to feedback key strategic investments and product roadmap. Prior to Microsoft Mick was the CISO at AustralianSuper, bringing a long history as a security leader and also one of the first organisations to adopt Security Copilot.</p>
<p>Ben Lamont is the Chief Data Officer at the Australian Federal Police (AFP). In this role, he is responsible for developing and implementing the AFP’s technology strategy and data management initiatives. Ben’s work focuses on addressing capability gaps and leveraging opportunities to enhance the AFP’s operational effectiveness. His leadership ensures that the AFP remains at the forefront of technological advancements in law enforcement.</p>
<p>Helen Schneider is a Commander with the Australian Federal Police (AFP). She leads the Australian Centre to Counter Child Exploitation (ACCCE), which focuses on combating online child sexual exploitation and abuse. Commander Schneider has been instrumental in coordinating significant operations, such as Operation Bakis, which led to the arrest of numerous offenders and the rescue of children from harm. Her work involves collaborating with both national and international law enforcement agencies to tackle complex and sensitive cases, ensuring the safety and protection of children.</p>
<p>Leigh Williams is the Chief Information Officer at Brisbane Catholic Education. With a career that began in teaching, Leigh has held various leadership roles, including CEO, Executive Director, and COO. She oversees digital, information, and IT infrastructure for hundreds of locations and over 13,000 staff. A passionate advocate for digital innovation and education, Leigh is a published researcher and has led keynotes and workshops globally. She holds multiple post-graduate qualifications in Education, IT, Leadership, Management, and Business.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, we sit down with Mick Dunne, Chief Security Advisor at Microsoft, Ben Lamont, Chief Data Officer & Helen Schneider Commander, ACCCE and Human Exploitation for the Australian Federal Police and Leigh Williams, Chief Information Officer, Information and Technology Executive at Brisbane Catholic Education. Together they discuss the function of the Customer Security Officer team, how the AFP is using AI to protect Australia and its people, and the impact AI has on education.
Mick Dunne heads the new Customer Security Officer team across Asia who are part of a global team for over 40 former CISOs, CTOs and deeply experienced SMEs. They are focused on providing trusted, deep expertise and advice to customers, Microsoft area leadership and to feedback key strategic investments and product roadmap. Prior to Microsoft Mick was the CISO at AustralianSuper, bringing a long history as a security leader and also one of the first organisations to adopt Security Copilot.
Ben Lamont is the Chief Data Officer at the Australian Federal Police (AFP). In this role, he is responsible for developing and implementing the AFP’s technology strategy and data management initiatives. Ben’s work focuses on addressing capability gaps and leveraging opportunities to enhance the AFP’s operational effectiveness. His leadership ensures that the AFP remains at the forefront of technological advancements in law enforcement.
Helen Schneider is a Commander with the Australian Federal Police (AFP). She leads the Australian Centre to Counter Child Exploitation (ACCCE), which focuses on combating online child sexual exploitation and abuse. Commander Schneider has been instrumental in coordinating significant operations, such as Operation Bakis, which led to the arrest of numerous offenders and the rescue of children from harm. Her work involves collaborating with both national and international law enforcement agencies to tackle complex and sensitive cases, ensuring the safety and protection of children.
Leigh Williams is the Chief Information Officer at Brisbane Catholic Education. With a career that began in teaching, Leigh has held various leadership roles, including CEO, Executive Director, and COO. She oversees digital, information, and IT infrastructure for hundreds of locations and over 13,000 staff. A passionate advocate for digital innovation and education, Leigh is a published researcher and has led keynotes and workshops globally. She holds multiple post-graduate qualifications in Education, IT, Leadership, Management, and Business.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Microsoft AI Tour 2024 – KB On The Go | Mick Dunne, Ben Lamont & Helen Schneider, and Leigh Williams]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, we sit down with Mick Dunne, Chief Security Advisor at Microsoft, Ben Lamont, Chief Data Officer &amp; Helen Schneider Commander, ACCCE and Human Exploitation for the Australian Federal Police and Leigh Williams, Chief Information Officer, Information and Technology Executive at Brisbane Catholic Education. Together they discuss the function of the Customer Security Officer team, how the AFP is using AI to protect Australia and its people, and the impact AI has on education.</p>
<p>Mick Dunne heads the new Customer Security Officer team across Asia who are part of a global team for over 40 former CISOs, CTOs and deeply experienced SMEs. They are focused on providing trusted, deep expertise and advice to customers, Microsoft area leadership and to feedback key strategic investments and product roadmap. Prior to Microsoft Mick was the CISO at AustralianSuper, bringing a long history as a security leader and also one of the first organisations to adopt Security Copilot.</p>
<p>Ben Lamont is the Chief Data Officer at the Australian Federal Police (AFP). In this role, he is responsible for developing and implementing the AFP’s technology strategy and data management initiatives. Ben’s work focuses on addressing capability gaps and leveraging opportunities to enhance the AFP’s operational effectiveness. His leadership ensures that the AFP remains at the forefront of technological advancements in law enforcement.</p>
<p>Helen Schneider is a Commander with the Australian Federal Police (AFP). She leads the Australian Centre to Counter Child Exploitation (ACCCE), which focuses on combating online child sexual exploitation and abuse. Commander Schneider has been instrumental in coordinating significant operations, such as Operation Bakis, which led to the arrest of numerous offenders and the rescue of children from harm. Her work involves collaborating with both national and international law enforcement agencies to tackle complex and sensitive cases, ensuring the safety and protection of children.</p>
<p>Leigh Williams is the Chief Information Officer at Brisbane Catholic Education. With a career that began in teaching, Leigh has held various leadership roles, including CEO, Executive Director, and COO. She oversees digital, information, and IT infrastructure for hundreds of locations and over 13,000 staff. A passionate advocate for digital innovation and education, Leigh is a published researcher and has led keynotes and workshops globally. She holds multiple post-graduate qualifications in Education, IT, Leadership, Management, and Business.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2000890/c1e-41r8c19owxfopgxk-ndomxq18h749-2yvox5.mp3" length="59414194"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, we sit down with Mick Dunne, Chief Security Advisor at Microsoft, Ben Lamont, Chief Data Officer & Helen Schneider Commander, ACCCE and Human Exploitation for the Australian Federal Police and Leigh Williams, Chief Information Officer, Information and Technology Executive at Brisbane Catholic Education. Together they discuss the function of the Customer Security Officer team, how the AFP is using AI to protect Australia and its people, and the impact AI has on education.
Mick Dunne heads the new Customer Security Officer team across Asia who are part of a global team for over 40 former CISOs, CTOs and deeply experienced SMEs. They are focused on providing trusted, deep expertise and advice to customers, Microsoft area leadership and to feedback key strategic investments and product roadmap. Prior to Microsoft Mick was the CISO at AustralianSuper, bringing a long history as a security leader and also one of the first organisations to adopt Security Copilot.
Ben Lamont is the Chief Data Officer at the Australian Federal Police (AFP). In this role, he is responsible for developing and implementing the AFP’s technology strategy and data management initiatives. Ben’s work focuses on addressing capability gaps and leveraging opportunities to enhance the AFP’s operational effectiveness. His leadership ensures that the AFP remains at the forefront of technological advancements in law enforcement.
Helen Schneider is a Commander with the Australian Federal Police (AFP). She leads the Australian Centre to Counter Child Exploitation (ACCCE), which focuses on combating online child sexual exploitation and abuse. Commander Schneider has been instrumental in coordinating significant operations, such as Operation Bakis, which led to the arrest of numerous offenders and the rescue of children from harm. Her work involves collaborating with both national and international law enforcement agencies to tackle complex and sensitive cases, ensuring the safety and protection of children.
Leigh Williams is the Chief Information Officer at Brisbane Catholic Education. With a career that began in teaching, Leigh has held various leadership roles, including CEO, Executive Director, and COO. She oversees digital, information, and IT infrastructure for hundreds of locations and over 13,000 staff. A passionate advocate for digital innovation and education, Leigh is a published researcher and has led keynotes and workshops globally. She holds multiple post-graduate qualifications in Education, IT, Leadership, Management, and Business.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/2000890/c1a-5k0v-34n8zgxpc3r2-oabyuk.png"></itunes:image>
                                                                            <itunes:duration>01:01:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Microsoft AI Tour 2024 – KB On The Go | Bret Arsenault, Janice Le, and Chris Lloyd-Jones]]>
                </title>
                <pubDate>Wed, 26 Mar 2025 04:55:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1999175</guid>
                                    <link>https://kbkast.castos.com/episodes/from-microsoft-ai-tour-2024-kb-on-the-go-bret-arsenault-janice-le-and-chris-lloyd-jones</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, we sit down with Bret Arsenault, Corporate Vice President and Chief Cybersecurity Advisor at Microsoft, Janice Le, GM of Microsoft Security, Compliance, Identity &amp; Privacy, and Chris Lloyd-Jones, Head of Architect &amp; Strategy in the Office of the CTO from Avanade. Together they discuss Microsoft’s Secure Future Initiative (SFI), securing AI, and the culture and change program needed with AI.</p>
<p>Bret Arsenault is the Corporate Vice President and Chief Cybersecurity Advisor at Microsoft. With over 30 years at the company, he leads global efforts in information security, compliance, and business continuity. Bret oversees a team dedicated to protecting Microsoft’s assets and advises Fortune 100 leaders on cybersecurity strategies. He is also the Chairman of Microsoft’s Information Risk Management Council and a founding member of the Executive Security Action Forum (ESAF).</p>
<p>Janice Le is the General Manager of Microsoft Security, Compliance, Identity &amp; Privacy. Based in the San Francisco Bay Area, she leads a global team dedicated to safeguarding Microsoft’s customers and their data. With a strong background in software development and cybersecurity, Janice drives innovation and strategic initiatives to enhance security and compliance across Microsoft’s vast ecosystem.</p>
<p>Chris Lloyd-Jones is the Head of Architect &amp; Strategy in the Office of the CTO at Avanade. He leads strategic initiatives and architectural frameworks to drive innovation and digital transformation. With a strong background in technology and leadership, Chris plays a crucial role in shaping Avanade’s technological direction and ensuring alignment with business goals.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, we sit down with Bret Arsenault, Corporate Vice President and Chief Cybersecurity Advisor at Microsoft, Janice Le, GM of Microsoft Security, Compliance, Identity & Privacy, and Chris Lloyd-Jones, Head of Architect & Strategy in the Office of the CTO from Avanade. Together they discuss Microsoft’s Secure Future Initiative (SFI), securing AI, and the culture and change program needed with AI.
Bret Arsenault is the Corporate Vice President and Chief Cybersecurity Advisor at Microsoft. With over 30 years at the company, he leads global efforts in information security, compliance, and business continuity. Bret oversees a team dedicated to protecting Microsoft’s assets and advises Fortune 100 leaders on cybersecurity strategies. He is also the Chairman of Microsoft’s Information Risk Management Council and a founding member of the Executive Security Action Forum (ESAF).
Janice Le is the General Manager of Microsoft Security, Compliance, Identity & Privacy. Based in the San Francisco Bay Area, she leads a global team dedicated to safeguarding Microsoft’s customers and their data. With a strong background in software development and cybersecurity, Janice drives innovation and strategic initiatives to enhance security and compliance across Microsoft’s vast ecosystem.
Chris Lloyd-Jones is the Head of Architect & Strategy in the Office of the CTO at Avanade. He leads strategic initiatives and architectural frameworks to drive innovation and digital transformation. With a strong background in technology and leadership, Chris plays a crucial role in shaping Avanade’s technological direction and ensuring alignment with business goals.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Microsoft AI Tour 2024 – KB On The Go | Bret Arsenault, Janice Le, and Chris Lloyd-Jones]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, we sit down with Bret Arsenault, Corporate Vice President and Chief Cybersecurity Advisor at Microsoft, Janice Le, GM of Microsoft Security, Compliance, Identity &amp; Privacy, and Chris Lloyd-Jones, Head of Architect &amp; Strategy in the Office of the CTO from Avanade. Together they discuss Microsoft’s Secure Future Initiative (SFI), securing AI, and the culture and change program needed with AI.</p>
<p>Bret Arsenault is the Corporate Vice President and Chief Cybersecurity Advisor at Microsoft. With over 30 years at the company, he leads global efforts in information security, compliance, and business continuity. Bret oversees a team dedicated to protecting Microsoft’s assets and advises Fortune 100 leaders on cybersecurity strategies. He is also the Chairman of Microsoft’s Information Risk Management Council and a founding member of the Executive Security Action Forum (ESAF).</p>
<p>Janice Le is the General Manager of Microsoft Security, Compliance, Identity &amp; Privacy. Based in the San Francisco Bay Area, she leads a global team dedicated to safeguarding Microsoft’s customers and their data. With a strong background in software development and cybersecurity, Janice drives innovation and strategic initiatives to enhance security and compliance across Microsoft’s vast ecosystem.</p>
<p>Chris Lloyd-Jones is the Head of Architect &amp; Strategy in the Office of the CTO at Avanade. He leads strategic initiatives and architectural frameworks to drive innovation and digital transformation. With a strong background in technology and leadership, Chris plays a crucial role in shaping Avanade’s technological direction and ensuring alignment with business goals.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1999175/c1e-x8jpi95qzjfn7wz6-1p417vk0so4m-ewhuiq.mp3" length="56630168"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, we sit down with Bret Arsenault, Corporate Vice President and Chief Cybersecurity Advisor at Microsoft, Janice Le, GM of Microsoft Security, Compliance, Identity & Privacy, and Chris Lloyd-Jones, Head of Architect & Strategy in the Office of the CTO from Avanade. Together they discuss Microsoft’s Secure Future Initiative (SFI), securing AI, and the culture and change program needed with AI.
Bret Arsenault is the Corporate Vice President and Chief Cybersecurity Advisor at Microsoft. With over 30 years at the company, he leads global efforts in information security, compliance, and business continuity. Bret oversees a team dedicated to protecting Microsoft’s assets and advises Fortune 100 leaders on cybersecurity strategies. He is also the Chairman of Microsoft’s Information Risk Management Council and a founding member of the Executive Security Action Forum (ESAF).
Janice Le is the General Manager of Microsoft Security, Compliance, Identity & Privacy. Based in the San Francisco Bay Area, she leads a global team dedicated to safeguarding Microsoft’s customers and their data. With a strong background in software development and cybersecurity, Janice drives innovation and strategic initiatives to enhance security and compliance across Microsoft’s vast ecosystem.
Chris Lloyd-Jones is the Head of Architect & Strategy in the Office of the CTO at Avanade. He leads strategic initiatives and architectural frameworks to drive innovation and digital transformation. With a strong background in technology and leadership, Chris plays a crucial role in shaping Avanade’s technological direction and ensuring alignment with business goals.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1999175/c1a-5k0v-gpwxv08navqq-q6zf1v.jpg"></itunes:image>
                                                                            <itunes:duration>00:59:00</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 300 Deep Dive: Tom Gillis | The Future Of Cybersecurity and the Network]]>
                </title>
                <pubDate>Wed, 19 Mar 2025 04:59:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1994872</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-300-deep-dive-tom-gillis-the-future-of-cybersecurity-and-the-network</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Tom Gillis, SVP and General Manager of the Security, Data Center, Internet and Cloud Infrastructure Group at Cisco, as he explores the future of cybersecurity and networking. Tom discusses the transformative impact of AI on the industry, highlighting the unprecedented level of innovation it brings alongside the potential challenges, such as cybercriminals leveraging AI for attacks. He emphasizes the need for companies to embrace AI fully to remain competitive and not fall into the “loser” category as the industry evolves. Additionally, Tom shares insights into the integration of security and networking, the implications of AI-powered security measures, and how these advancements might create a significant shift in the IT and infrastructure landscape.</p>
<p>Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.</p>
<p>Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.</p>
<p>Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.</p>
<p>Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.</p>
<p>Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.</p>
<p></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Tom Gillis, SVP and General Manager of the Security, Data Center, Internet and Cloud Infrastructure Group at Cisco, as he explores the future of cybersecurity and networking. Tom discusses the transformative impact of AI on the industry, highlighting the unprecedented level of innovation it brings alongside the potential challenges, such as cybercriminals leveraging AI for attacks. He emphasizes the need for companies to embrace AI fully to remain competitive and not fall into the “loser” category as the industry evolves. Additionally, Tom shares insights into the integration of security and networking, the implications of AI-powered security measures, and how these advancements might create a significant shift in the IT and infrastructure landscape.
Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.
Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.
Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.
Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.
Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 300 Deep Dive: Tom Gillis | The Future Of Cybersecurity and the Network]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Tom Gillis, SVP and General Manager of the Security, Data Center, Internet and Cloud Infrastructure Group at Cisco, as he explores the future of cybersecurity and networking. Tom discusses the transformative impact of AI on the industry, highlighting the unprecedented level of innovation it brings alongside the potential challenges, such as cybercriminals leveraging AI for attacks. He emphasizes the need for companies to embrace AI fully to remain competitive and not fall into the “loser” category as the industry evolves. Additionally, Tom shares insights into the integration of security and networking, the implications of AI-powered security measures, and how these advancements might create a significant shift in the IT and infrastructure landscape.</p>
<p>Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.</p>
<p>Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.</p>
<p>Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.</p>
<p>Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.</p>
<p>Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.</p>
<p></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1994872/c1e-89g7fo7vvdf1d8wj-47d69kj4c0x1-g6m2db.mp3" length="29836059"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Tom Gillis, SVP and General Manager of the Security, Data Center, Internet and Cloud Infrastructure Group at Cisco, as he explores the future of cybersecurity and networking. Tom discusses the transformative impact of AI on the industry, highlighting the unprecedented level of innovation it brings alongside the potential challenges, such as cybercriminals leveraging AI for attacks. He emphasizes the need for companies to embrace AI fully to remain competitive and not fall into the “loser” category as the industry evolves. Additionally, Tom shares insights into the integration of security and networking, the implications of AI-powered security measures, and how these advancements might create a significant shift in the IT and infrastructure landscape.
Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.
Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.
Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.
Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.
Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1994872/c1a-5k0v-34n6w675hj4-prjjet.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 299 Deep Dive: Gerry Sillars | Attackers Don't Take Holidays]]>
                </title>
                <pubDate>Wed, 05 Mar 2025 05:00:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1986113</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-299-deep-dive-gerry-sillars-attackers-dont-take-holidays-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Gerry Sillars, Vice President APJ from Semperis, as he discusses <strong><a href="https://kbi.media/wp-content/uploads/2025/03/semperis_holiday_ransomware_report_-_anz_-_final_-_12.4.24_1.pdf">Semperis’ Holiday Ransomware Report</a></strong>. Gerry delves into the constant threat posed by attackers who don’t take holidays, emphasizing the need for organizations to protect their networks and systems at all times. He highlights the startling statistics from the report, such as 69% of ransomware attacks occurring on weekends or holidays, and the surprising 83% of organizations targeted by ransomware in the last year alone. We also explore the challenges of striking a balance between maintaining adequate cybersecurity measures and managing business costs, as well as the importance of having a comprehensive disaster recovery plan, especially during significant corporate events.</p>
<p>Gerry Sillars is the Vice President of Asia Pacific at Semperis, a leading provider of enterprise identity protection, threat research, and incident response services headquartered in Hoboken, New Jersey. In this role, he heads the APAC operations and focuses on expanding Semperis’ footprint in Australia, ASEAN, Japan, Korea, and India while evolving the company’s channel business.</p>
<p>Gerry Sillars has over 20 years of experience building and scaling software businesses in APAC. Before joining Semperis, he played pivotal roles in Commvault Systems, Alcatel Lucent, UpGuard, and Fortanix.</p>
<p>Gerry lives in Singapore with his wife, is an Australian citizen and a native of Scotland.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Gerry Sillars, Vice President APJ from Semperis, as he discusses Semperis’ Holiday Ransomware Report. Gerry delves into the constant threat posed by attackers who don’t take holidays, emphasizing the need for organizations to protect their networks and systems at all times. He highlights the startling statistics from the report, such as 69% of ransomware attacks occurring on weekends or holidays, and the surprising 83% of organizations targeted by ransomware in the last year alone. We also explore the challenges of striking a balance between maintaining adequate cybersecurity measures and managing business costs, as well as the importance of having a comprehensive disaster recovery plan, especially during significant corporate events.
Gerry Sillars is the Vice President of Asia Pacific at Semperis, a leading provider of enterprise identity protection, threat research, and incident response services headquartered in Hoboken, New Jersey. In this role, he heads the APAC operations and focuses on expanding Semperis’ footprint in Australia, ASEAN, Japan, Korea, and India while evolving the company’s channel business.
Gerry Sillars has over 20 years of experience building and scaling software businesses in APAC. Before joining Semperis, he played pivotal roles in Commvault Systems, Alcatel Lucent, UpGuard, and Fortanix.
Gerry lives in Singapore with his wife, is an Australian citizen and a native of Scotland.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 299 Deep Dive: Gerry Sillars | Attackers Don't Take Holidays]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Gerry Sillars, Vice President APJ from Semperis, as he discusses <strong><a href="https://kbi.media/wp-content/uploads/2025/03/semperis_holiday_ransomware_report_-_anz_-_final_-_12.4.24_1.pdf">Semperis’ Holiday Ransomware Report</a></strong>. Gerry delves into the constant threat posed by attackers who don’t take holidays, emphasizing the need for organizations to protect their networks and systems at all times. He highlights the startling statistics from the report, such as 69% of ransomware attacks occurring on weekends or holidays, and the surprising 83% of organizations targeted by ransomware in the last year alone. We also explore the challenges of striking a balance between maintaining adequate cybersecurity measures and managing business costs, as well as the importance of having a comprehensive disaster recovery plan, especially during significant corporate events.</p>
<p>Gerry Sillars is the Vice President of Asia Pacific at Semperis, a leading provider of enterprise identity protection, threat research, and incident response services headquartered in Hoboken, New Jersey. In this role, he heads the APAC operations and focuses on expanding Semperis’ footprint in Australia, ASEAN, Japan, Korea, and India while evolving the company’s channel business.</p>
<p>Gerry Sillars has over 20 years of experience building and scaling software businesses in APAC. Before joining Semperis, he played pivotal roles in Commvault Systems, Alcatel Lucent, UpGuard, and Fortanix.</p>
<p>Gerry lives in Singapore with his wife, is an Australian citizen and a native of Scotland.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1986113/c1e-7km5b4dnqzbd6vxo-6z1jpqonsp16-haf5sl.mp3" length="33526221"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Gerry Sillars, Vice President APJ from Semperis, as he discusses Semperis’ Holiday Ransomware Report. Gerry delves into the constant threat posed by attackers who don’t take holidays, emphasizing the need for organizations to protect their networks and systems at all times. He highlights the startling statistics from the report, such as 69% of ransomware attacks occurring on weekends or holidays, and the surprising 83% of organizations targeted by ransomware in the last year alone. We also explore the challenges of striking a balance between maintaining adequate cybersecurity measures and managing business costs, as well as the importance of having a comprehensive disaster recovery plan, especially during significant corporate events.
Gerry Sillars is the Vice President of Asia Pacific at Semperis, a leading provider of enterprise identity protection, threat research, and incident response services headquartered in Hoboken, New Jersey. In this role, he heads the APAC operations and focuses on expanding Semperis’ footprint in Australia, ASEAN, Japan, Korea, and India while evolving the company’s channel business.
Gerry Sillars has over 20 years of experience building and scaling software businesses in APAC. Before joining Semperis, he played pivotal roles in Commvault Systems, Alcatel Lucent, UpGuard, and Fortanix.
Gerry lives in Singapore with his wife, is an Australian citizen and a native of Scotland.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1986113/c1a-5k0v-ndo6prr1uqko-iq8mw1.jpg"></itunes:image>
                                                                            <itunes:duration>00:34:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 298 Deep Dive: Grant Bourzikas | Future-proofing Security]]>
                </title>
                <pubDate>Wed, 26 Feb 2025 05:00:55 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1982007</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-298-deep-dive-grant-bourzikas-future-proofing-security</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Grant Bourzikas, Chief Security Officer from Cloudflare, as he shares what lessons he learned from 2024. Grant emphasizes the industry’s need to move beyond outdated technology to enhance security postures and reduce complexities. He discusses the impact of artificial intelligence on security, the challenges of leveraging AI, and the necessity for organizations to embrace it strategically. Furthermore, Grant highlights the importance of modernizing security infrastructures, simplifying environments, and the critical need to cultivate new talent in the field to tackle the evolving landscape.</p>
<p>Grant Bourzikas joined Cloudflare as the Chief Security Officer in 2023, where he is a driving force in helping the company achieve its mission to build a better Internet. As a critical component within Cloudflare’s ecosystem, Grant’s primary role is to protect the company from sophisticated adversaries to stay ahead in today’s cybersecurity landscape. He oversees Cloudflare’s threat intelligence services, which successfully mitigate 170+ billion attacks daily, in addition to acting as “Customer Zero” to help foster innovation across all Cloudflare products and services.</p>
<p>Grant is a seven-time CSO with over 20 years experience leading global security programs that span the private sector, having worked at a Fortune 500 critical infrastructure company, an online trading organization and within the gaming space. Most notably, Grant spent several years in the financial services industry at both HSBC and Silicon Valley Bank. Grant holds a Master’s in Data Science and Artificial Intelligence from Southern Methodist University, and a Bachelor of Science in Accounting from the University of Missouri in St. Louis. He is a CPA (Certified Public Accountant) and CISSP (Certified Information Systems Security Professional).</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Grant Bourzikas, Chief Security Officer from Cloudflare, as he shares what lessons he learned from 2024. Grant emphasizes the industry’s need to move beyond outdated technology to enhance security postures and reduce complexities. He discusses the impact of artificial intelligence on security, the challenges of leveraging AI, and the necessity for organizations to embrace it strategically. Furthermore, Grant highlights the importance of modernizing security infrastructures, simplifying environments, and the critical need to cultivate new talent in the field to tackle the evolving landscape.
Grant Bourzikas joined Cloudflare as the Chief Security Officer in 2023, where he is a driving force in helping the company achieve its mission to build a better Internet. As a critical component within Cloudflare’s ecosystem, Grant’s primary role is to protect the company from sophisticated adversaries to stay ahead in today’s cybersecurity landscape. He oversees Cloudflare’s threat intelligence services, which successfully mitigate 170+ billion attacks daily, in addition to acting as “Customer Zero” to help foster innovation across all Cloudflare products and services.
Grant is a seven-time CSO with over 20 years experience leading global security programs that span the private sector, having worked at a Fortune 500 critical infrastructure company, an online trading organization and within the gaming space. Most notably, Grant spent several years in the financial services industry at both HSBC and Silicon Valley Bank. Grant holds a Master’s in Data Science and Artificial Intelligence from Southern Methodist University, and a Bachelor of Science in Accounting from the University of Missouri in St. Louis. He is a CPA (Certified Public Accountant) and CISSP (Certified Information Systems Security Professional).]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 298 Deep Dive: Grant Bourzikas | Future-proofing Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Grant Bourzikas, Chief Security Officer from Cloudflare, as he shares what lessons he learned from 2024. Grant emphasizes the industry’s need to move beyond outdated technology to enhance security postures and reduce complexities. He discusses the impact of artificial intelligence on security, the challenges of leveraging AI, and the necessity for organizations to embrace it strategically. Furthermore, Grant highlights the importance of modernizing security infrastructures, simplifying environments, and the critical need to cultivate new talent in the field to tackle the evolving landscape.</p>
<p>Grant Bourzikas joined Cloudflare as the Chief Security Officer in 2023, where he is a driving force in helping the company achieve its mission to build a better Internet. As a critical component within Cloudflare’s ecosystem, Grant’s primary role is to protect the company from sophisticated adversaries to stay ahead in today’s cybersecurity landscape. He oversees Cloudflare’s threat intelligence services, which successfully mitigate 170+ billion attacks daily, in addition to acting as “Customer Zero” to help foster innovation across all Cloudflare products and services.</p>
<p>Grant is a seven-time CSO with over 20 years experience leading global security programs that span the private sector, having worked at a Fortune 500 critical infrastructure company, an online trading organization and within the gaming space. Most notably, Grant spent several years in the financial services industry at both HSBC and Silicon Valley Bank. Grant holds a Master’s in Data Science and Artificial Intelligence from Southern Methodist University, and a Bachelor of Science in Accounting from the University of Missouri in St. Louis. He is a CPA (Certified Public Accountant) and CISSP (Certified Information Systems Security Professional).</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1982007/c1e-3g92c59n96ikq027-9jn9nz3zt4qv-qmhprs.mp3" length="39024474"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Grant Bourzikas, Chief Security Officer from Cloudflare, as he shares what lessons he learned from 2024. Grant emphasizes the industry’s need to move beyond outdated technology to enhance security postures and reduce complexities. He discusses the impact of artificial intelligence on security, the challenges of leveraging AI, and the necessity for organizations to embrace it strategically. Furthermore, Grant highlights the importance of modernizing security infrastructures, simplifying environments, and the critical need to cultivate new talent in the field to tackle the evolving landscape.
Grant Bourzikas joined Cloudflare as the Chief Security Officer in 2023, where he is a driving force in helping the company achieve its mission to build a better Internet. As a critical component within Cloudflare’s ecosystem, Grant’s primary role is to protect the company from sophisticated adversaries to stay ahead in today’s cybersecurity landscape. He oversees Cloudflare’s threat intelligence services, which successfully mitigate 170+ billion attacks daily, in addition to acting as “Customer Zero” to help foster innovation across all Cloudflare products and services.
Grant is a seven-time CSO with over 20 years experience leading global security programs that span the private sector, having worked at a Fortune 500 critical infrastructure company, an online trading organization and within the gaming space. Most notably, Grant spent several years in the financial services industry at both HSBC and Silicon Valley Bank. Grant holds a Master’s in Data Science and Artificial Intelligence from Southern Methodist University, and a Bachelor of Science in Accounting from the University of Missouri in St. Louis. He is a CPA (Certified Public Accountant) and CISSP (Certified Information Systems Security Professional).]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1982007/c1a-5k0v-34nwnr8phq01-sptagy.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 297 Deep Dive: David Gee | Career Guide for Aspiring CISOs]]>
                </title>
                <pubDate>Fri, 21 Feb 2025 05:00:37 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1978286</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-297-deep-dive-david-gee-career-guide-for-aspiring-cisos</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with David Gee, advisor at JS Careers, Bain &amp; Company, and Emertel, as he shares insights on aspiring and growing into a CISO. David delves into the importance of international experiences, driving change, and effectively communicating with boards as key traits of a true leader. He reflects on personal experiences that shaped his leadership journey, emphasizing the need for continuous learning and adaptability. We also explore corporate dynamics, discussing the challenges of genuine leadership and the nuances of climbing the corporate ladder, as well as how to effectively navigate and implement leadership strategies in different environments.</p>
<p>David has just retired in July 2024 and is building out his portfolio. He is an Advisor with Bain Advisory Network and also an Advisor to JS Careers (Cyber Recruitment) and Emertel (Software Commercialization).</p>
<p>He is a seasoned technology executive with significant experience and has over 25 years’ experience in CIO and CISO roles across different industries and countries.  At Macquarie Group David served as Global Head Technology, Cyber and Data Risk. Previously was CISO for HSBC Asia Pacific.  His career as a CIO spans across multiple industries and geographies including – Metlife, Eli Lilly and Credit Union Australia. He was winner CIO of the Year 2014, at CUA where he successfully completed a significant Transformation of Core Banking, Online and Mobile Banking systems.</p>
<p>David is past Chairman for the FS-ISAC Strategy Committee and awarded Global Leaders Award in 2023 for his contributions to the cybersecurity industry. A regular conference keynote speaker and 150+ published articles for CIO Australia, Computerworld, ITNews and CSO (Cyber Security), David now writes for Foundry CIO.com and AICD.</p>
<p>His most recent book – the Aspiring CIO &amp; CISO was published in July 2024 and David is writing his second – A Day in the Life of a CISO with a number of CISOs from around the world for 2025.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with David Gee, advisor at JS Careers, Bain & Company, and Emertel, as he shares insights on aspiring and growing into a CISO. David delves into the importance of international experiences, driving change, and effectively communicating with boards as key traits of a true leader. He reflects on personal experiences that shaped his leadership journey, emphasizing the need for continuous learning and adaptability. We also explore corporate dynamics, discussing the challenges of genuine leadership and the nuances of climbing the corporate ladder, as well as how to effectively navigate and implement leadership strategies in different environments.
David has just retired in July 2024 and is building out his portfolio. He is an Advisor with Bain Advisory Network and also an Advisor to JS Careers (Cyber Recruitment) and Emertel (Software Commercialization).
He is a seasoned technology executive with significant experience and has over 25 years’ experience in CIO and CISO roles across different industries and countries.  At Macquarie Group David served as Global Head Technology, Cyber and Data Risk. Previously was CISO for HSBC Asia Pacific.  His career as a CIO spans across multiple industries and geographies including – Metlife, Eli Lilly and Credit Union Australia. He was winner CIO of the Year 2014, at CUA where he successfully completed a significant Transformation of Core Banking, Online and Mobile Banking systems.
David is past Chairman for the FS-ISAC Strategy Committee and awarded Global Leaders Award in 2023 for his contributions to the cybersecurity industry. A regular conference keynote speaker and 150+ published articles for CIO Australia, Computerworld, ITNews and CSO (Cyber Security), David now writes for Foundry CIO.com and AICD.
His most recent book – the Aspiring CIO & CISO was published in July 2024 and David is writing his second – A Day in the Life of a CISO with a number of CISOs from around the world for 2025.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 297 Deep Dive: David Gee | Career Guide for Aspiring CISOs]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with David Gee, advisor at JS Careers, Bain &amp; Company, and Emertel, as he shares insights on aspiring and growing into a CISO. David delves into the importance of international experiences, driving change, and effectively communicating with boards as key traits of a true leader. He reflects on personal experiences that shaped his leadership journey, emphasizing the need for continuous learning and adaptability. We also explore corporate dynamics, discussing the challenges of genuine leadership and the nuances of climbing the corporate ladder, as well as how to effectively navigate and implement leadership strategies in different environments.</p>
<p>David has just retired in July 2024 and is building out his portfolio. He is an Advisor with Bain Advisory Network and also an Advisor to JS Careers (Cyber Recruitment) and Emertel (Software Commercialization).</p>
<p>He is a seasoned technology executive with significant experience and has over 25 years’ experience in CIO and CISO roles across different industries and countries.  At Macquarie Group David served as Global Head Technology, Cyber and Data Risk. Previously was CISO for HSBC Asia Pacific.  His career as a CIO spans across multiple industries and geographies including – Metlife, Eli Lilly and Credit Union Australia. He was winner CIO of the Year 2014, at CUA where he successfully completed a significant Transformation of Core Banking, Online and Mobile Banking systems.</p>
<p>David is past Chairman for the FS-ISAC Strategy Committee and awarded Global Leaders Award in 2023 for his contributions to the cybersecurity industry. A regular conference keynote speaker and 150+ published articles for CIO Australia, Computerworld, ITNews and CSO (Cyber Security), David now writes for Foundry CIO.com and AICD.</p>
<p>His most recent book – the Aspiring CIO &amp; CISO was published in July 2024 and David is writing his second – A Day in the Life of a CISO with a number of CISOs from around the world for 2025.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1978286/c1e-q40nh25zj9s0v2x4-v625x96whprv-yh1z4c.mp3" length="36989848"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with David Gee, advisor at JS Careers, Bain & Company, and Emertel, as he shares insights on aspiring and growing into a CISO. David delves into the importance of international experiences, driving change, and effectively communicating with boards as key traits of a true leader. He reflects on personal experiences that shaped his leadership journey, emphasizing the need for continuous learning and adaptability. We also explore corporate dynamics, discussing the challenges of genuine leadership and the nuances of climbing the corporate ladder, as well as how to effectively navigate and implement leadership strategies in different environments.
David has just retired in July 2024 and is building out his portfolio. He is an Advisor with Bain Advisory Network and also an Advisor to JS Careers (Cyber Recruitment) and Emertel (Software Commercialization).
He is a seasoned technology executive with significant experience and has over 25 years’ experience in CIO and CISO roles across different industries and countries.  At Macquarie Group David served as Global Head Technology, Cyber and Data Risk. Previously was CISO for HSBC Asia Pacific.  His career as a CIO spans across multiple industries and geographies including – Metlife, Eli Lilly and Credit Union Australia. He was winner CIO of the Year 2014, at CUA where he successfully completed a significant Transformation of Core Banking, Online and Mobile Banking systems.
David is past Chairman for the FS-ISAC Strategy Committee and awarded Global Leaders Award in 2023 for his contributions to the cybersecurity industry. A regular conference keynote speaker and 150+ published articles for CIO Australia, Computerworld, ITNews and CSO (Cyber Security), David now writes for Foundry CIO.com and AICD.
His most recent book – the Aspiring CIO & CISO was published in July 2024 and David is writing his second – A Day in the Life of a CISO with a number of CISOs from around the world for 2025.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1978286/c1a-5k0v-0v5q68vghmpn-odebma.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KBI.Media Update | Cordant launches DevSecOops]]>
                </title>
                <pubDate>Wed, 19 Feb 2025 22:00:00 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1977023</guid>
                                    <link>https://kbkast.castos.com/episodes/kbimedia-update-cordant-launches-devsecoops-1</link>
                                <description>
                                            <![CDATA[<p>We are thrilled to announce the arrival of a new addition to our podcast family on KBI.FM: DevSecOps, brought to you by Cordant.</p>
<p>Hosted by the insightful trio of Tom Walker (the infrastructure tragic), Scott Fletcher (the security ninja), and James Vincent (the cloud alchemist), this show promises to deliver a deep dive into the world of cloud, security, and infrastructure.</p>
<p>Here are 3 key takeaways for you:</p>
<ul>
<li><strong>Comprehensive Expertise</strong>: Engage with content that combines expertise in infrastructure, security, and cloud, providing a holistic view of today’s technological environment.</li>
<li><strong>Diverse Perspectives</strong>: Hosted by industry specialists, the podcast brings together various outlooks, giving listeners a rich and varied understanding of complex topics.</li>
<li><strong>Part of KBI FM Network</strong>: As a part of the respected KBI.FM podcast network, expect well-curated content designed to inform and inspire.</li>
</ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[We are thrilled to announce the arrival of a new addition to our podcast family on KBI.FM: DevSecOps, brought to you by Cordant.
Hosted by the insightful trio of Tom Walker (the infrastructure tragic), Scott Fletcher (the security ninja), and James Vincent (the cloud alchemist), this show promises to deliver a deep dive into the world of cloud, security, and infrastructure.
Here are 3 key takeaways for you:

Comprehensive Expertise: Engage with content that combines expertise in infrastructure, security, and cloud, providing a holistic view of today’s technological environment.
Diverse Perspectives: Hosted by industry specialists, the podcast brings together various outlooks, giving listeners a rich and varied understanding of complex topics.
Part of KBI FM Network: As a part of the respected KBI.FM podcast network, expect well-curated content designed to inform and inspire.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KBI.Media Update | Cordant launches DevSecOops]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>We are thrilled to announce the arrival of a new addition to our podcast family on KBI.FM: DevSecOps, brought to you by Cordant.</p>
<p>Hosted by the insightful trio of Tom Walker (the infrastructure tragic), Scott Fletcher (the security ninja), and James Vincent (the cloud alchemist), this show promises to deliver a deep dive into the world of cloud, security, and infrastructure.</p>
<p>Here are 3 key takeaways for you:</p>
<ul>
<li><strong>Comprehensive Expertise</strong>: Engage with content that combines expertise in infrastructure, security, and cloud, providing a holistic view of today’s technological environment.</li>
<li><strong>Diverse Perspectives</strong>: Hosted by industry specialists, the podcast brings together various outlooks, giving listeners a rich and varied understanding of complex topics.</li>
<li><strong>Part of KBI FM Network</strong>: As a part of the respected KBI.FM podcast network, expect well-curated content designed to inform and inspire.</li>
</ul>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1977023/c1e-n439h5kmzks9o1jp-xxw5jrzmbr3k-6wt8rq.mp3" length="731889"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[We are thrilled to announce the arrival of a new addition to our podcast family on KBI.FM: DevSecOps, brought to you by Cordant.
Hosted by the insightful trio of Tom Walker (the infrastructure tragic), Scott Fletcher (the security ninja), and James Vincent (the cloud alchemist), this show promises to deliver a deep dive into the world of cloud, security, and infrastructure.
Here are 3 key takeaways for you:

Comprehensive Expertise: Engage with content that combines expertise in infrastructure, security, and cloud, providing a holistic view of today’s technological environment.
Diverse Perspectives: Hosted by industry specialists, the podcast brings together various outlooks, giving listeners a rich and varied understanding of complex topics.
Part of KBI FM Network: As a part of the respected KBI.FM podcast network, expect well-curated content designed to inform and inspire.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1977023/c1a-5k0v-pkg5ro4dsddz-6boyui.jpg"></itunes:image>
                                                                            <itunes:duration>00:00:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 296 Deep Dive: Vishwanath Nair | Emergence of IT/ Cyber Leaders as Trusted Advisors and Business Value Creators]]>
                </title>
                <pubDate>Wed, 19 Feb 2025 05:00:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1976699</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-296-deep-dive-vishwanath-nair-emergence-of-it-cyber-leaders-as-trusted-advisors-and-busi-1</link>
                                <description>
                                            <![CDATA[<p><em>“The views, thoughts, and opinions expressed in this interview are solely Vishwanath Nair’s and do not necessarily reflect the views, policies, or positions of his employer, clients, or any affiliated organizations.”</em></p>
<p>In this episode, we sit down with Vishwanath Nair, Head of Cyber Risk and Compliance at Baptist Care, as he explores the evolving partnership between IT and business. Vishwanath discusses the critical role of IT in digital transformation, the importance of data as a key business asset, and the proliferation of AI tools in enhancing IT-business alignment. He addresses the historical lack of trust between IT and business, emphasizing the need for effective communication and co-design to improve this relationship.</p>
<p>With over 25 years of experience, Vishwanath (Vish) is a leading authority in Risk Management, specializing in Information Security (InfoSec), IT Service Management, and Business Resilience on a global scale. He has led multi-million-dollar transformation initiatives across key sectors such as Public Sector, Critical Infrastructure, Healthcare, and Manufacturing.</p>
<p>Vish’s recent work as the inaugural Chief Information Security Officer (CISO) at the NSW Electoral Commission earned him the prestigious CSO30 Business Value Award 2024 by Foundry. His role was critical in safeguarding the Commission’s cybersecurity, where he developed security services from the ground up, embedding them into the organization’s processes to support the delivery of secure and transparent elections.</p>
<p>Currently, Vish serves as the Head of Cyber Risk and Compliance at BaptistCare NSW/ACT, one of Australia’s leading Aged Care providers, where he oversees the security and compliance frameworks that protect critical services.</p>
<p>Previously, as Global Continuity Lead at Emirates Airlines, Vish was responsible for enhancing IT and Business Continuity practices globally. He also established Cyber/IT Trusted Advisory services, aligning business and IT strategies for optimal results across the airline’s operations.</p>
<p>Known for his collaborative, inclusive leadership style, Vish has built and nurtured high-performing teams, maintaining exceptional retention rates. His commitment to professional development and industry advancement is reflected in his active contributions to organizations like ISACA, AISA, and BCI, where he has served on the Board of Directors for ISACA UAE and BCI UAE.</p>
<p>Vish is also a prolific public speaker and has earned numerous industry accolades, solidifying his position as a trusted leader and influential voice in the cybersecurity and risk management sectors.</p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[“The views, thoughts, and opinions expressed in this interview are solely Vishwanath Nair’s and do not necessarily reflect the views, policies, or positions of his employer, clients, or any affiliated organizations.”
In this episode, we sit down with Vishwanath Nair, Head of Cyber Risk and Compliance at Baptist Care, as he explores the evolving partnership between IT and business. Vishwanath discusses the critical role of IT in digital transformation, the importance of data as a key business asset, and the proliferation of AI tools in enhancing IT-business alignment. He addresses the historical lack of trust between IT and business, emphasizing the need for effective communication and co-design to improve this relationship.
With over 25 years of experience, Vishwanath (Vish) is a leading authority in Risk Management, specializing in Information Security (InfoSec), IT Service Management, and Business Resilience on a global scale. He has led multi-million-dollar transformation initiatives across key sectors such as Public Sector, Critical Infrastructure, Healthcare, and Manufacturing.
Vish’s recent work as the inaugural Chief Information Security Officer (CISO) at the NSW Electoral Commission earned him the prestigious CSO30 Business Value Award 2024 by Foundry. His role was critical in safeguarding the Commission’s cybersecurity, where he developed security services from the ground up, embedding them into the organization’s processes to support the delivery of secure and transparent elections.
Currently, Vish serves as the Head of Cyber Risk and Compliance at BaptistCare NSW/ACT, one of Australia’s leading Aged Care providers, where he oversees the security and compliance frameworks that protect critical services.
Previously, as Global Continuity Lead at Emirates Airlines, Vish was responsible for enhancing IT and Business Continuity practices globally. He also established Cyber/IT Trusted Advisory services, aligning business and IT strategies for optimal results across the airline’s operations.
Known for his collaborative, inclusive leadership style, Vish has built and nurtured high-performing teams, maintaining exceptional retention rates. His commitment to professional development and industry advancement is reflected in his active contributions to organizations like ISACA, AISA, and BCI, where he has served on the Board of Directors for ISACA UAE and BCI UAE.
Vish is also a prolific public speaker and has earned numerous industry accolades, solidifying his position as a trusted leader and influential voice in the cybersecurity and risk management sectors.
 ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 296 Deep Dive: Vishwanath Nair | Emergence of IT/ Cyber Leaders as Trusted Advisors and Business Value Creators]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><em>“The views, thoughts, and opinions expressed in this interview are solely Vishwanath Nair’s and do not necessarily reflect the views, policies, or positions of his employer, clients, or any affiliated organizations.”</em></p>
<p>In this episode, we sit down with Vishwanath Nair, Head of Cyber Risk and Compliance at Baptist Care, as he explores the evolving partnership between IT and business. Vishwanath discusses the critical role of IT in digital transformation, the importance of data as a key business asset, and the proliferation of AI tools in enhancing IT-business alignment. He addresses the historical lack of trust between IT and business, emphasizing the need for effective communication and co-design to improve this relationship.</p>
<p>With over 25 years of experience, Vishwanath (Vish) is a leading authority in Risk Management, specializing in Information Security (InfoSec), IT Service Management, and Business Resilience on a global scale. He has led multi-million-dollar transformation initiatives across key sectors such as Public Sector, Critical Infrastructure, Healthcare, and Manufacturing.</p>
<p>Vish’s recent work as the inaugural Chief Information Security Officer (CISO) at the NSW Electoral Commission earned him the prestigious CSO30 Business Value Award 2024 by Foundry. His role was critical in safeguarding the Commission’s cybersecurity, where he developed security services from the ground up, embedding them into the organization’s processes to support the delivery of secure and transparent elections.</p>
<p>Currently, Vish serves as the Head of Cyber Risk and Compliance at BaptistCare NSW/ACT, one of Australia’s leading Aged Care providers, where he oversees the security and compliance frameworks that protect critical services.</p>
<p>Previously, as Global Continuity Lead at Emirates Airlines, Vish was responsible for enhancing IT and Business Continuity practices globally. He also established Cyber/IT Trusted Advisory services, aligning business and IT strategies for optimal results across the airline’s operations.</p>
<p>Known for his collaborative, inclusive leadership style, Vish has built and nurtured high-performing teams, maintaining exceptional retention rates. His commitment to professional development and industry advancement is reflected in his active contributions to organizations like ISACA, AISA, and BCI, where he has served on the Board of Directors for ISACA UAE and BCI UAE.</p>
<p>Vish is also a prolific public speaker and has earned numerous industry accolades, solidifying his position as a trusted leader and influential voice in the cybersecurity and risk management sectors.</p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1976699/c1e-q40nh215mxc0v2x4-jp2gxj4dhjq1-jsbln1.mp3" length="35090224"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[“The views, thoughts, and opinions expressed in this interview are solely Vishwanath Nair’s and do not necessarily reflect the views, policies, or positions of his employer, clients, or any affiliated organizations.”
In this episode, we sit down with Vishwanath Nair, Head of Cyber Risk and Compliance at Baptist Care, as he explores the evolving partnership between IT and business. Vishwanath discusses the critical role of IT in digital transformation, the importance of data as a key business asset, and the proliferation of AI tools in enhancing IT-business alignment. He addresses the historical lack of trust between IT and business, emphasizing the need for effective communication and co-design to improve this relationship.
With over 25 years of experience, Vishwanath (Vish) is a leading authority in Risk Management, specializing in Information Security (InfoSec), IT Service Management, and Business Resilience on a global scale. He has led multi-million-dollar transformation initiatives across key sectors such as Public Sector, Critical Infrastructure, Healthcare, and Manufacturing.
Vish’s recent work as the inaugural Chief Information Security Officer (CISO) at the NSW Electoral Commission earned him the prestigious CSO30 Business Value Award 2024 by Foundry. His role was critical in safeguarding the Commission’s cybersecurity, where he developed security services from the ground up, embedding them into the organization’s processes to support the delivery of secure and transparent elections.
Currently, Vish serves as the Head of Cyber Risk and Compliance at BaptistCare NSW/ACT, one of Australia’s leading Aged Care providers, where he oversees the security and compliance frameworks that protect critical services.
Previously, as Global Continuity Lead at Emirates Airlines, Vish was responsible for enhancing IT and Business Continuity practices globally. He also established Cyber/IT Trusted Advisory services, aligning business and IT strategies for optimal results across the airline’s operations.
Known for his collaborative, inclusive leadership style, Vish has built and nurtured high-performing teams, maintaining exceptional retention rates. His commitment to professional development and industry advancement is reflected in his active contributions to organizations like ISACA, AISA, and BCI, where he has served on the Board of Directors for ISACA UAE and BCI UAE.
Vish is also a prolific public speaker and has earned numerous industry accolades, solidifying his position as a trusted leader and influential voice in the cybersecurity and risk management sectors.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1976699/c1a-5k0v-0v5q089gbj3m-27cawq.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 295 Deep Dive: Shannon Murphy | C-Suite Security Challenges]]>
                </title>
                <pubDate>Fri, 14 Feb 2025 04:59:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1973793</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-295-deep-dive-shannon-murphy-c-suite-security-challenges</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Shannon Murphy, Senior Manager, Global Security and Risk Strategy from Trend Micro, as she explores the C-suite security challenges facing organizations today. Shannon emphasizes the importance of proactivity in cybersecurity, highlighting the shift from a reactive to a predictive approach to anticipate and counteract adversary strategies. We delve into the pressures from infrastructure shifts and adversary ingenuity, discuss global cybersecurity trends, and examine the increasing customization in social engineering attacks.</p>
<p>Shannon also shares insights on the evolving role of AI in cybersecurity and the need for greater integration and proactive practices within organizations to reduce the risk of breaches.</p>
<p>Shannon brings a decade in enterprise, consumer, and cybersecurity technology experience across high-growth industries focusing on the role of security in business and the workforce of the future. A subject matter expert in emerging security operations technologies including XDR, generative AI, exposure management and Zero Trust implementations, she is at the forefront of innovations that help organisations stay ahead of evolving threats.</p>
<p>Shannon is a security champion for business leaders, helping organisations translate and validate the business value of a resilient risk posture and culture that puts security first. As a strategist, she works with cybersecurity leaders and partners to develop scalable solutions that address unique and emerging threat models.</p>
<p>Further reading:
<a href="https://www.trendmicro.com/explore/thecisocredibilitygap/2608-tl-en-rpt">How a Communication Breakdown in the Boardroom is Hurting Cyber-Resilience</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Shannon Murphy, Senior Manager, Global Security and Risk Strategy from Trend Micro, as she explores the C-suite security challenges facing organizations today. Shannon emphasizes the importance of proactivity in cybersecurity, highlighting the shift from a reactive to a predictive approach to anticipate and counteract adversary strategies. We delve into the pressures from infrastructure shifts and adversary ingenuity, discuss global cybersecurity trends, and examine the increasing customization in social engineering attacks.
Shannon also shares insights on the evolving role of AI in cybersecurity and the need for greater integration and proactive practices within organizations to reduce the risk of breaches.
Shannon brings a decade in enterprise, consumer, and cybersecurity technology experience across high-growth industries focusing on the role of security in business and the workforce of the future. A subject matter expert in emerging security operations technologies including XDR, generative AI, exposure management and Zero Trust implementations, she is at the forefront of innovations that help organisations stay ahead of evolving threats.
Shannon is a security champion for business leaders, helping organisations translate and validate the business value of a resilient risk posture and culture that puts security first. As a strategist, she works with cybersecurity leaders and partners to develop scalable solutions that address unique and emerging threat models.
Further reading:
How a Communication Breakdown in the Boardroom is Hurting Cyber-Resilience]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 295 Deep Dive: Shannon Murphy | C-Suite Security Challenges]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Shannon Murphy, Senior Manager, Global Security and Risk Strategy from Trend Micro, as she explores the C-suite security challenges facing organizations today. Shannon emphasizes the importance of proactivity in cybersecurity, highlighting the shift from a reactive to a predictive approach to anticipate and counteract adversary strategies. We delve into the pressures from infrastructure shifts and adversary ingenuity, discuss global cybersecurity trends, and examine the increasing customization in social engineering attacks.</p>
<p>Shannon also shares insights on the evolving role of AI in cybersecurity and the need for greater integration and proactive practices within organizations to reduce the risk of breaches.</p>
<p>Shannon brings a decade in enterprise, consumer, and cybersecurity technology experience across high-growth industries focusing on the role of security in business and the workforce of the future. A subject matter expert in emerging security operations technologies including XDR, generative AI, exposure management and Zero Trust implementations, she is at the forefront of innovations that help organisations stay ahead of evolving threats.</p>
<p>Shannon is a security champion for business leaders, helping organisations translate and validate the business value of a resilient risk posture and culture that puts security first. As a strategist, she works with cybersecurity leaders and partners to develop scalable solutions that address unique and emerging threat models.</p>
<p>Further reading:
<a href="https://www.trendmicro.com/explore/thecisocredibilitygap/2608-tl-en-rpt">How a Communication Breakdown in the Boardroom is Hurting Cyber-Resilience</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1973793/c1e-d5v7a6pdzjbpd4gq-7z2m75m8sv3x-in6nqc.mp3" length="36459040"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Shannon Murphy, Senior Manager, Global Security and Risk Strategy from Trend Micro, as she explores the C-suite security challenges facing organizations today. Shannon emphasizes the importance of proactivity in cybersecurity, highlighting the shift from a reactive to a predictive approach to anticipate and counteract adversary strategies. We delve into the pressures from infrastructure shifts and adversary ingenuity, discuss global cybersecurity trends, and examine the increasing customization in social engineering attacks.
Shannon also shares insights on the evolving role of AI in cybersecurity and the need for greater integration and proactive practices within organizations to reduce the risk of breaches.
Shannon brings a decade in enterprise, consumer, and cybersecurity technology experience across high-growth industries focusing on the role of security in business and the workforce of the future. A subject matter expert in emerging security operations technologies including XDR, generative AI, exposure management and Zero Trust implementations, she is at the forefront of innovations that help organisations stay ahead of evolving threats.
Shannon is a security champion for business leaders, helping organisations translate and validate the business value of a resilient risk posture and culture that puts security first. As a strategist, she works with cybersecurity leaders and partners to develop scalable solutions that address unique and emerging threat models.
Further reading:
How a Communication Breakdown in the Boardroom is Hurting Cyber-Resilience]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1973793/c1a-5k0v-z3dnzmkmamg6-mc5c3r.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 294 Deep Dive: Fred Thiele | Importance of Cyber Security for Business Resilience]]>
                </title>
                <pubDate>Wed, 12 Feb 2025 05:00:07 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1971082</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-294-deep-dive-fred-thiele-importance-of-cyber-security-for-business-resilience-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Fred Thiele, Chief Information Security Officer from Interactive, as he discusses the importance of cybersecurity for business resilience. Fred delves into the concept of business resilience, emphasizing the need to prepare for worst-case scenarios to ensure continuity during crises. He explains that understanding critical systems and establishing a clear decision-making framework are essential for effective business continuity management. We also discuss the increasing reliance on technology systems, the importance of scenario training to build muscle memory for real-life incidents, and the challenges companies face in adapting to dynamic cyber threats.</p>
<p>As Interactive’s Chief Information Security Officer, Fred is responsible for Interactive’s organisational cyber security and supporting Interactive’s customers to build resilient cyber security solutions.</p>
<p>Fred has always been interested in systems: whether it’s the mechanics of a car or the application layers of network architecture, he enjoys understanding the end-to-end process and enhancing their capabilities.</p>
<p>Whether defending a small business or a national grid, Fred focuses on proactively building the ‘castle walls’ of cyber defence to prevent incursions, rather than relying on ad-hoc threat responses.</p>
<p>Over three decades in the industry, Fred has found that cyber security isn’t just about protocols; he sees it as a holistic mindset that empowers us to thwart threats at every level, safeguarding our digital landscape.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Fred Thiele, Chief Information Security Officer from Interactive, as he discusses the importance of cybersecurity for business resilience. Fred delves into the concept of business resilience, emphasizing the need to prepare for worst-case scenarios to ensure continuity during crises. He explains that understanding critical systems and establishing a clear decision-making framework are essential for effective business continuity management. We also discuss the increasing reliance on technology systems, the importance of scenario training to build muscle memory for real-life incidents, and the challenges companies face in adapting to dynamic cyber threats.
As Interactive’s Chief Information Security Officer, Fred is responsible for Interactive’s organisational cyber security and supporting Interactive’s customers to build resilient cyber security solutions.
Fred has always been interested in systems: whether it’s the mechanics of a car or the application layers of network architecture, he enjoys understanding the end-to-end process and enhancing their capabilities.
Whether defending a small business or a national grid, Fred focuses on proactively building the ‘castle walls’ of cyber defence to prevent incursions, rather than relying on ad-hoc threat responses.
Over three decades in the industry, Fred has found that cyber security isn’t just about protocols; he sees it as a holistic mindset that empowers us to thwart threats at every level, safeguarding our digital landscape.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 294 Deep Dive: Fred Thiele | Importance of Cyber Security for Business Resilience]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Fred Thiele, Chief Information Security Officer from Interactive, as he discusses the importance of cybersecurity for business resilience. Fred delves into the concept of business resilience, emphasizing the need to prepare for worst-case scenarios to ensure continuity during crises. He explains that understanding critical systems and establishing a clear decision-making framework are essential for effective business continuity management. We also discuss the increasing reliance on technology systems, the importance of scenario training to build muscle memory for real-life incidents, and the challenges companies face in adapting to dynamic cyber threats.</p>
<p>As Interactive’s Chief Information Security Officer, Fred is responsible for Interactive’s organisational cyber security and supporting Interactive’s customers to build resilient cyber security solutions.</p>
<p>Fred has always been interested in systems: whether it’s the mechanics of a car or the application layers of network architecture, he enjoys understanding the end-to-end process and enhancing their capabilities.</p>
<p>Whether defending a small business or a national grid, Fred focuses on proactively building the ‘castle walls’ of cyber defence to prevent incursions, rather than relying on ad-hoc threat responses.</p>
<p>Over three decades in the industry, Fred has found that cyber security isn’t just about protocols; he sees it as a holistic mindset that empowers us to thwart threats at every level, safeguarding our digital landscape.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1971082/c1e-1dogsjx17dbxv9nj-47drrzdji78-nneeap.mp3" length="37910194"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Fred Thiele, Chief Information Security Officer from Interactive, as he discusses the importance of cybersecurity for business resilience. Fred delves into the concept of business resilience, emphasizing the need to prepare for worst-case scenarios to ensure continuity during crises. He explains that understanding critical systems and establishing a clear decision-making framework are essential for effective business continuity management. We also discuss the increasing reliance on technology systems, the importance of scenario training to build muscle memory for real-life incidents, and the challenges companies face in adapting to dynamic cyber threats.
As Interactive’s Chief Information Security Officer, Fred is responsible for Interactive’s organisational cyber security and supporting Interactive’s customers to build resilient cyber security solutions.
Fred has always been interested in systems: whether it’s the mechanics of a car or the application layers of network architecture, he enjoys understanding the end-to-end process and enhancing their capabilities.
Whether defending a small business or a national grid, Fred focuses on proactively building the ‘castle walls’ of cyber defence to prevent incursions, rather than relying on ad-hoc threat responses.
Over three decades in the industry, Fred has found that cyber security isn’t just about protocols; he sees it as a holistic mindset that empowers us to thwart threats at every level, safeguarding our digital landscape.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1971082/c1a-5k0v-dm4v351nfv6w-ovnkcs.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 293 Deep Dive: David Trossell | How To Move Data Faster Over WANs]]>
                </title>
                <pubDate>Fri, 07 Feb 2025 04:54:50 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1968345</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-293-deep-dive-david-trossell-how-to-move-data-faster-over-wans</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with David Trossell, CEO and CTO of Bridgeworks, as he discusses the advancement of WAN acceleration technology and its impact on data transfer speeds. David explores the historical evolution from broadband connectivity to modern-day WAN acceleration, highlighting the limitations of traditional WAN optimization methods. He explains how AI-driven parallelization can address latency issues and significantly enhance data throughput across networks.</p>
<p>Additionally, David provides insights into misconceptions about WAN acceleration and optimization, emphasizing the importance of secure backups, air-gapped systems, and the resurgence of tape technology for robust data protection against cyber threats.</p>
<p>David Trossell is a recognised leader in the storage technology industry. He is CEO and CTO of award-winning WAN Acceleration company Bridgeworks, where he holds 18 technology patents. David is also committed to supporting British STEM initiatives and developing technology leaders through UK university and college apprenticeship programmes.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with David Trossell, CEO and CTO of Bridgeworks, as he discusses the advancement of WAN acceleration technology and its impact on data transfer speeds. David explores the historical evolution from broadband connectivity to modern-day WAN acceleration, highlighting the limitations of traditional WAN optimization methods. He explains how AI-driven parallelization can address latency issues and significantly enhance data throughput across networks.
Additionally, David provides insights into misconceptions about WAN acceleration and optimization, emphasizing the importance of secure backups, air-gapped systems, and the resurgence of tape technology for robust data protection against cyber threats.
David Trossell is a recognised leader in the storage technology industry. He is CEO and CTO of award-winning WAN Acceleration company Bridgeworks, where he holds 18 technology patents. David is also committed to supporting British STEM initiatives and developing technology leaders through UK university and college apprenticeship programmes.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 293 Deep Dive: David Trossell | How To Move Data Faster Over WANs]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with David Trossell, CEO and CTO of Bridgeworks, as he discusses the advancement of WAN acceleration technology and its impact on data transfer speeds. David explores the historical evolution from broadband connectivity to modern-day WAN acceleration, highlighting the limitations of traditional WAN optimization methods. He explains how AI-driven parallelization can address latency issues and significantly enhance data throughput across networks.</p>
<p>Additionally, David provides insights into misconceptions about WAN acceleration and optimization, emphasizing the importance of secure backups, air-gapped systems, and the resurgence of tape technology for robust data protection against cyber threats.</p>
<p>David Trossell is a recognised leader in the storage technology industry. He is CEO and CTO of award-winning WAN Acceleration company Bridgeworks, where he holds 18 technology patents. David is also committed to supporting British STEM initiatives and developing technology leaders through UK university and college apprenticeship programmes.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1968345/c1e-2k31b85wmwu67jo4-qdwdm801ix1-oymmff.mp3" length="34397665"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with David Trossell, CEO and CTO of Bridgeworks, as he discusses the advancement of WAN acceleration technology and its impact on data transfer speeds. David explores the historical evolution from broadband connectivity to modern-day WAN acceleration, highlighting the limitations of traditional WAN optimization methods. He explains how AI-driven parallelization can address latency issues and significantly enhance data throughput across networks.
Additionally, David provides insights into misconceptions about WAN acceleration and optimization, emphasizing the importance of secure backups, air-gapped systems, and the resurgence of tape technology for robust data protection against cyber threats.
David Trossell is a recognised leader in the storage technology industry. He is CEO and CTO of award-winning WAN Acceleration company Bridgeworks, where he holds 18 technology patents. David is also committed to supporting British STEM initiatives and developing technology leaders through UK university and college apprenticeship programmes.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1968345/c1a-5k0v-qdwdo9kos9xo-zbbemu.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:50</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KBI.Media Update | The Launch of KBI.FM]]>
                </title>
                <pubDate>Thu, 06 Feb 2025 05:28:31 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1967655</guid>
                                    <link>https://kbkast.castos.com/episodes/kbimedia-update-the-launch-of-kbifm</link>
                                <description>
                                            <![CDATA[<p>We’re thrilled to announce the launch of KBI.FM, our dedicated podcast network and channel aimed at creating a specialized precinct for cybersecurity podcasts.</p>
<p>Here’s what you need to know:</p>
<ul>
<li>Expanding Beyond KBKAST: While our flagship podcast, KBKAST, remains a key focus, KBI,FM allows us to introduce a variety of valuable content outside of our own podcast, shedding light on areas that need attention in cybersecurity.</li>
<li>Experience That Sets Us Apart: With our podcasting journey beginning in 2018, KBI.FM benefits from years of experience. We know what it takes to build and succeed in the podcast world, offering high-quality content tailored for our audience.</li>
<li>Client Show Debuts: We’re excited to premiere some of our client shows soon, adding diverse voices and perspectives to our network. Stay tuned for releases that promise to bring insightful discussions to your ears!</li>
</ul>
<p>As we continue this journey, we’re here to deliver top-notch cybersecurity content that keeps you informed and engaged.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[We’re thrilled to announce the launch of KBI.FM, our dedicated podcast network and channel aimed at creating a specialized precinct for cybersecurity podcasts.
Here’s what you need to know:

Expanding Beyond KBKAST: While our flagship podcast, KBKAST, remains a key focus, KBI,FM allows us to introduce a variety of valuable content outside of our own podcast, shedding light on areas that need attention in cybersecurity.
Experience That Sets Us Apart: With our podcasting journey beginning in 2018, KBI.FM benefits from years of experience. We know what it takes to build and succeed in the podcast world, offering high-quality content tailored for our audience.
Client Show Debuts: We’re excited to premiere some of our client shows soon, adding diverse voices and perspectives to our network. Stay tuned for releases that promise to bring insightful discussions to your ears!

As we continue this journey, we’re here to deliver top-notch cybersecurity content that keeps you informed and engaged.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KBI.Media Update | The Launch of KBI.FM]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>We’re thrilled to announce the launch of KBI.FM, our dedicated podcast network and channel aimed at creating a specialized precinct for cybersecurity podcasts.</p>
<p>Here’s what you need to know:</p>
<ul>
<li>Expanding Beyond KBKAST: While our flagship podcast, KBKAST, remains a key focus, KBI,FM allows us to introduce a variety of valuable content outside of our own podcast, shedding light on areas that need attention in cybersecurity.</li>
<li>Experience That Sets Us Apart: With our podcasting journey beginning in 2018, KBI.FM benefits from years of experience. We know what it takes to build and succeed in the podcast world, offering high-quality content tailored for our audience.</li>
<li>Client Show Debuts: We’re excited to premiere some of our client shows soon, adding diverse voices and perspectives to our network. Stay tuned for releases that promise to bring insightful discussions to your ears!</li>
</ul>
<p>As we continue this journey, we’re here to deliver top-notch cybersecurity content that keeps you informed and engaged.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1967655/c1e-41r8c4qk76uo2xg7-0v54mdnqurzq-sb7vub.mp3" length="924150"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[We’re thrilled to announce the launch of KBI.FM, our dedicated podcast network and channel aimed at creating a specialized precinct for cybersecurity podcasts.
Here’s what you need to know:

Expanding Beyond KBKAST: While our flagship podcast, KBKAST, remains a key focus, KBI,FM allows us to introduce a variety of valuable content outside of our own podcast, shedding light on areas that need attention in cybersecurity.
Experience That Sets Us Apart: With our podcasting journey beginning in 2018, KBI.FM benefits from years of experience. We know what it takes to build and succeed in the podcast world, offering high-quality content tailored for our audience.
Client Show Debuts: We’re excited to premiere some of our client shows soon, adding diverse voices and perspectives to our network. Stay tuned for releases that promise to bring insightful discussions to your ears!

As we continue this journey, we’re here to deliver top-notch cybersecurity content that keeps you informed and engaged.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1967655/c1a-5k0v-1p4xg37ja1no-np3bsr.jpg"></itunes:image>
                                                                            <itunes:duration>00:00:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 292 Deep Dive: Mark Squirrell | From Arafat to Everest]]>
                </title>
                <pubDate>Wed, 05 Feb 2025 04:55:37 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1966657</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-292-deep-dive-mark-squirrell-from-arafat-to-everest</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Mark “Squiz” Squirrell, keynote speaker from Global Frontline, as he shares insights from his journey from Arafat to Everest. Mark emphasizes the importance of making early decisions and being flexible when dealing with unforeseen variables. He discusses the critical role of soft skills in building effective relationships, both within and outside organizations, to mitigate crises. Mark also highlights how training and preparation under simulated pressures can enhance decision-making abilities and resilience. He delves into managing stress in high-pressure situations, advocating for recognizing stress levels and ensuring time for recovery.</p>
<p>From car bombings, the Ebola Outbreak to meeting Yasser Arafat and making it to the summit of Mount Everest, Mark ‘Squiz’ Squirrell OAM has experienced more than many can dream about.</p>
<p>Squiz was awarded the coveted “Green Beret” whilst serving with the Australian Commando’s.  His tenure with the military provided him with the skills and<strong> courage</strong> to succeed amongst <strong>adversity </strong>and <strong>turmoil</strong>. It was the perfect grounding for a career as an International Aid Worker.</p>
<p>Squiz escorted food convoys through the Gaza Strip, negotiated with the Liberation Tigers of Tamel Eelam (Tamil Tigers) and brokered deals with Somali Clansmen to ensure the safe delivery of United Nations food aid.  In doing so, he has mastered the challenges of <strong>performing under pressure</strong>, <strong>communicating</strong> effectively and <strong>building relationships</strong>.</p>
<p>In addition to this, Squiz has taken the concept of being <strong>motivated</strong> at work to an all new high.  He was inspired by his organisation, the United Nations World Food Programme (WFP), and the impoverished people that it feeds, to climb to the top of the world to help raise awareness of the global hunger crisis. After a gruelling six week ordeal, Squiz raised the WFP flag on the summit of Mount Everest. The <strong>inspiring and thrilling</strong> recount across glaciers and up exposed cliffs reveal the motivation, habits and adversity skills that facilitated his success.</p>
<p>Squiz has a Bachelor of Business (HRM) and has published a memoire titled <em>From Arafat to Everest</em>. In 2019 Squiz was recognised in the Australia Day Honours List with an Order of Australia Medal (OAM) for “service to the international community through humanitarian aid”. He continues to deploy on short term assignments to emergency zones, such as the Ebola Outbreak in West Africa and Nepal Earthquake.</p>
<p> </p>
<p>Now based out of Melbourne, Squiz provides <strong>keynotes, workshops and team building activities</strong> to develop workplace performance.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Mark “Squiz” Squirrell, keynote speaker from Global Frontline, as he shares insights from his journey from Arafat to Everest. Mark emphasizes the importance of making early decisions and being flexible when dealing with unforeseen variables. He discusses the critical role of soft skills in building effective relationships, both within and outside organizations, to mitigate crises. Mark also highlights how training and preparation under simulated pressures can enhance decision-making abilities and resilience. He delves into managing stress in high-pressure situations, advocating for recognizing stress levels and ensuring time for recovery.
From car bombings, the Ebola Outbreak to meeting Yasser Arafat and making it to the summit of Mount Everest, Mark ‘Squiz’ Squirrell OAM has experienced more than many can dream about.
Squiz was awarded the coveted “Green Beret” whilst serving with the Australian Commando’s.  His tenure with the military provided him with the skills and courage to succeed amongst adversity and turmoil. It was the perfect grounding for a career as an International Aid Worker.
Squiz escorted food convoys through the Gaza Strip, negotiated with the Liberation Tigers of Tamel Eelam (Tamil Tigers) and brokered deals with Somali Clansmen to ensure the safe delivery of United Nations food aid.  In doing so, he has mastered the challenges of performing under pressure, communicating effectively and building relationships.
In addition to this, Squiz has taken the concept of being motivated at work to an all new high.  He was inspired by his organisation, the United Nations World Food Programme (WFP), and the impoverished people that it feeds, to climb to the top of the world to help raise awareness of the global hunger crisis. After a gruelling six week ordeal, Squiz raised the WFP flag on the summit of Mount Everest. The inspiring and thrilling recount across glaciers and up exposed cliffs reveal the motivation, habits and adversity skills that facilitated his success.
Squiz has a Bachelor of Business (HRM) and has published a memoire titled From Arafat to Everest. In 2019 Squiz was recognised in the Australia Day Honours List with an Order of Australia Medal (OAM) for “service to the international community through humanitarian aid”. He continues to deploy on short term assignments to emergency zones, such as the Ebola Outbreak in West Africa and Nepal Earthquake.
 
Now based out of Melbourne, Squiz provides keynotes, workshops and team building activities to develop workplace performance.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 292 Deep Dive: Mark Squirrell | From Arafat to Everest]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Mark “Squiz” Squirrell, keynote speaker from Global Frontline, as he shares insights from his journey from Arafat to Everest. Mark emphasizes the importance of making early decisions and being flexible when dealing with unforeseen variables. He discusses the critical role of soft skills in building effective relationships, both within and outside organizations, to mitigate crises. Mark also highlights how training and preparation under simulated pressures can enhance decision-making abilities and resilience. He delves into managing stress in high-pressure situations, advocating for recognizing stress levels and ensuring time for recovery.</p>
<p>From car bombings, the Ebola Outbreak to meeting Yasser Arafat and making it to the summit of Mount Everest, Mark ‘Squiz’ Squirrell OAM has experienced more than many can dream about.</p>
<p>Squiz was awarded the coveted “Green Beret” whilst serving with the Australian Commando’s.  His tenure with the military provided him with the skills and<strong> courage</strong> to succeed amongst <strong>adversity </strong>and <strong>turmoil</strong>. It was the perfect grounding for a career as an International Aid Worker.</p>
<p>Squiz escorted food convoys through the Gaza Strip, negotiated with the Liberation Tigers of Tamel Eelam (Tamil Tigers) and brokered deals with Somali Clansmen to ensure the safe delivery of United Nations food aid.  In doing so, he has mastered the challenges of <strong>performing under pressure</strong>, <strong>communicating</strong> effectively and <strong>building relationships</strong>.</p>
<p>In addition to this, Squiz has taken the concept of being <strong>motivated</strong> at work to an all new high.  He was inspired by his organisation, the United Nations World Food Programme (WFP), and the impoverished people that it feeds, to climb to the top of the world to help raise awareness of the global hunger crisis. After a gruelling six week ordeal, Squiz raised the WFP flag on the summit of Mount Everest. The <strong>inspiring and thrilling</strong> recount across glaciers and up exposed cliffs reveal the motivation, habits and adversity skills that facilitated his success.</p>
<p>Squiz has a Bachelor of Business (HRM) and has published a memoire titled <em>From Arafat to Everest</em>. In 2019 Squiz was recognised in the Australia Day Honours List with an Order of Australia Medal (OAM) for “service to the international community through humanitarian aid”. He continues to deploy on short term assignments to emergency zones, such as the Ebola Outbreak in West Africa and Nepal Earthquake.</p>
<p> </p>
<p>Now based out of Melbourne, Squiz provides <strong>keynotes, workshops and team building activities</strong> to develop workplace performance.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1966657/c1e-rdnmsjgwdxc2kwqj-okw8d5kkijmz-6iq0cc.mp3" length="49501038"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Mark “Squiz” Squirrell, keynote speaker from Global Frontline, as he shares insights from his journey from Arafat to Everest. Mark emphasizes the importance of making early decisions and being flexible when dealing with unforeseen variables. He discusses the critical role of soft skills in building effective relationships, both within and outside organizations, to mitigate crises. Mark also highlights how training and preparation under simulated pressures can enhance decision-making abilities and resilience. He delves into managing stress in high-pressure situations, advocating for recognizing stress levels and ensuring time for recovery.
From car bombings, the Ebola Outbreak to meeting Yasser Arafat and making it to the summit of Mount Everest, Mark ‘Squiz’ Squirrell OAM has experienced more than many can dream about.
Squiz was awarded the coveted “Green Beret” whilst serving with the Australian Commando’s.  His tenure with the military provided him with the skills and courage to succeed amongst adversity and turmoil. It was the perfect grounding for a career as an International Aid Worker.
Squiz escorted food convoys through the Gaza Strip, negotiated with the Liberation Tigers of Tamel Eelam (Tamil Tigers) and brokered deals with Somali Clansmen to ensure the safe delivery of United Nations food aid.  In doing so, he has mastered the challenges of performing under pressure, communicating effectively and building relationships.
In addition to this, Squiz has taken the concept of being motivated at work to an all new high.  He was inspired by his organisation, the United Nations World Food Programme (WFP), and the impoverished people that it feeds, to climb to the top of the world to help raise awareness of the global hunger crisis. After a gruelling six week ordeal, Squiz raised the WFP flag on the summit of Mount Everest. The inspiring and thrilling recount across glaciers and up exposed cliffs reveal the motivation, habits and adversity skills that facilitated his success.
Squiz has a Bachelor of Business (HRM) and has published a memoire titled From Arafat to Everest. In 2019 Squiz was recognised in the Australia Day Honours List with an Order of Australia Medal (OAM) for “service to the international community through humanitarian aid”. He continues to deploy on short term assignments to emergency zones, such as the Ebola Outbreak in West Africa and Nepal Earthquake.
 
Now based out of Melbourne, Squiz provides keynotes, workshops and team building activities to develop workplace performance.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1966657/c1a-5k0v-8dwm102qfq3x-rshzvq.jpg"></itunes:image>
                                                                            <itunes:duration>00:51:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 291 Deep Dive: Kobi Leins and Kate Carruthers | How AI Brings A New Set Of Risks To The Threat Landscape]]>
                </title>
                <pubDate>Fri, 31 Jan 2025 04:58:44 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1954679</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-291-deep-dive-kobi-leins-and-kate-carruthers-how-ai-brings-a-new-set-of-risks-to-the-thre</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Kobi Leins and Kate Carruthers, directors from Info Sphere Education, as they delve into the intertwining issues of artificial intelligence and cybersecurity. Kobi discusses how AI can expedite security breaches and the need for cybersecurity professionals to understand and mitigate AI-induced vulnerabilities. Kate expands on this by highlighting the utilization of generative AI by attackers and the importance of data and AI governance within organizations. They both explore the challenges companies face in managing these technologies, emphasizing the necessity of upskilling and proper communication between AI and cybersecurity professionals.</p>
<p>


</p><p><a href="https://katecarruthers.com/about-kate-carruthers/">Kate Carruthers</a> is an experienced data and technology leader who has expertise in analytics, AI, data management, Data Governance and AI governance. She is a passionate educator who loves sharing her knowledge and helping people to develop their own AI and data expertise.</p>
<p><a href="https://kobileins.com/about">Kobi Leins</a> is a reformed lawyer, academic in tech and law, and is a technical expert for Standards Australia. She loves to teach, learn and be challenged at the edges of tech and governance.</p>
<p><strong>The Essential Eight</strong></p>
<p>The mitigation strategies that constitute the Essential Eight are:</p>
<ul class="ak-ul">
<li>
<p>patch applications</p>
</li>
<li>
<p>patch operating systems</p>
</li>
<li>
<p>multi-factor authentication</p>
</li>
<li>
<p>restrict administrative privileges</p>
</li>
<li>
<p>application control</p>
</li>
<li>
<p>restrict Microsoft Office macros</p>
</li>
<li>
<p>user application hardening</p>
</li>
<li>
<p>regular backups.</p>
</li>
</ul>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Kobi Leins and Kate Carruthers, directors from Info Sphere Education, as they delve into the intertwining issues of artificial intelligence and cybersecurity. Kobi discusses how AI can expedite security breaches and the need for cybersecurity professionals to understand and mitigate AI-induced vulnerabilities. Kate expands on this by highlighting the utilization of generative AI by attackers and the importance of data and AI governance within organizations. They both explore the challenges companies face in managing these technologies, emphasizing the necessity of upskilling and proper communication between AI and cybersecurity professionals.



Kate Carruthers is an experienced data and technology leader who has expertise in analytics, AI, data management, Data Governance and AI governance. She is a passionate educator who loves sharing her knowledge and helping people to develop their own AI and data expertise.
Kobi Leins is a reformed lawyer, academic in tech and law, and is a technical expert for Standards Australia. She loves to teach, learn and be challenged at the edges of tech and governance.
The Essential Eight
The mitigation strategies that constitute the Essential Eight are:


patch applications


patch operating systems


multi-factor authentication


restrict administrative privileges


application control


restrict Microsoft Office macros


user application hardening


regular backups.

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 291 Deep Dive: Kobi Leins and Kate Carruthers | How AI Brings A New Set Of Risks To The Threat Landscape]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Kobi Leins and Kate Carruthers, directors from Info Sphere Education, as they delve into the intertwining issues of artificial intelligence and cybersecurity. Kobi discusses how AI can expedite security breaches and the need for cybersecurity professionals to understand and mitigate AI-induced vulnerabilities. Kate expands on this by highlighting the utilization of generative AI by attackers and the importance of data and AI governance within organizations. They both explore the challenges companies face in managing these technologies, emphasizing the necessity of upskilling and proper communication between AI and cybersecurity professionals.</p>
<p>


</p><p><a href="https://katecarruthers.com/about-kate-carruthers/">Kate Carruthers</a> is an experienced data and technology leader who has expertise in analytics, AI, data management, Data Governance and AI governance. She is a passionate educator who loves sharing her knowledge and helping people to develop their own AI and data expertise.</p>
<p><a href="https://kobileins.com/about">Kobi Leins</a> is a reformed lawyer, academic in tech and law, and is a technical expert for Standards Australia. She loves to teach, learn and be challenged at the edges of tech and governance.</p>
<p><strong>The Essential Eight</strong></p>
<p>The mitigation strategies that constitute the Essential Eight are:</p>
<ul class="ak-ul">
<li>
<p>patch applications</p>
</li>
<li>
<p>patch operating systems</p>
</li>
<li>
<p>multi-factor authentication</p>
</li>
<li>
<p>restrict administrative privileges</p>
</li>
<li>
<p>application control</p>
</li>
<li>
<p>restrict Microsoft Office macros</p>
</li>
<li>
<p>user application hardening</p>
</li>
<li>
<p>regular backups.</p>
</li>
</ul>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1954679/c1e-kdkxsj9qpou941jo-kpwo5jpquqq-pgip8t.mp3" length="39455807"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Kobi Leins and Kate Carruthers, directors from Info Sphere Education, as they delve into the intertwining issues of artificial intelligence and cybersecurity. Kobi discusses how AI can expedite security breaches and the need for cybersecurity professionals to understand and mitigate AI-induced vulnerabilities. Kate expands on this by highlighting the utilization of generative AI by attackers and the importance of data and AI governance within organizations. They both explore the challenges companies face in managing these technologies, emphasizing the necessity of upskilling and proper communication between AI and cybersecurity professionals.



Kate Carruthers is an experienced data and technology leader who has expertise in analytics, AI, data management, Data Governance and AI governance. She is a passionate educator who loves sharing her knowledge and helping people to develop their own AI and data expertise.
Kobi Leins is a reformed lawyer, academic in tech and law, and is a technical expert for Standards Australia. She loves to teach, learn and be challenged at the edges of tech and governance.
The Essential Eight
The mitigation strategies that constitute the Essential Eight are:


patch applications


patch operating systems


multi-factor authentication


restrict administrative privileges


application control


restrict Microsoft Office macros


user application hardening


regular backups.

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1954679/c1a-5k0v-0v50v2kdsqk4-hicsvy.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:06</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 290 Deep Dive: Dr. Ivano Bongiovanni | How To Get The Most From Maturity-Based And Risk-Based Approaches To Cybersecurity]]>
                </title>
                <pubDate>Wed, 29 Jan 2025 04:57:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1953434</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-290-deep-dive-dr-ivano-bongiovanni-how-to-get-the-most-from-maturity-based-and-risk-base</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Dr. Ivano Bongiovanni, General Manager at AUSCERT, as he discusses how to get the most from maturity-based and risk-based approaches in the cybersecurity arena. Ivano delves into the importance of balancing both approaches to enhance cyber resilience, the role of organizational size and industry mandates, and the need for critical assessment of cyber risks. We also explore the challenges of decision-making in risk management, the impact of subjective judgment, and the significance of quality data sources. Ivano emphasizes a collaborative approach involving various organizational constituencies and the crucial role of effective communication and storytelling in cybersecurity leadership.</p>
<p class="AbstractBookBaseParagraph">Ivano is the General Manager of AUSCERT. He is also a researcher, consultant, author, and speaker whose work focuses on the managerial and business implications of Cybersecurity.</p>
<p class="AbstractBookBaseParagraph">A Lecturer in Information Security, Governance and Leadership with the UQ Business School and a member of UQ Cyber, Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano’s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for effective cybersecurity management. Ivano is also an experienced facilitator in the fields of Design Thinking and Design-Led innovation, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.</p>
<p class="AbstractBookBaseParagraph">Prior to UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on safety and security management in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.</p>
<p class="AbstractBookBaseParagraph">He also worked as a Deputy Venue Security Manager at the XX Winter Olympic Games – Turin 2006 and as a Police Officer for the Italian Ministry of Interior.</p>
<p class="AbstractBookBaseParagraph">He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Dr. Ivano Bongiovanni, General Manager at AUSCERT, as he discusses how to get the most from maturity-based and risk-based approaches in the cybersecurity arena. Ivano delves into the importance of balancing both approaches to enhance cyber resilience, the role of organizational size and industry mandates, and the need for critical assessment of cyber risks. We also explore the challenges of decision-making in risk management, the impact of subjective judgment, and the significance of quality data sources. Ivano emphasizes a collaborative approach involving various organizational constituencies and the crucial role of effective communication and storytelling in cybersecurity leadership.
Ivano is the General Manager of AUSCERT. He is also a researcher, consultant, author, and speaker whose work focuses on the managerial and business implications of Cybersecurity.
A Lecturer in Information Security, Governance and Leadership with the UQ Business School and a member of UQ Cyber, Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano’s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for effective cybersecurity management. Ivano is also an experienced facilitator in the fields of Design Thinking and Design-Led innovation, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.
Prior to UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on safety and security management in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.
He also worked as a Deputy Venue Security Manager at the XX Winter Olympic Games – Turin 2006 and as a Police Officer for the Italian Ministry of Interior.
He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 290 Deep Dive: Dr. Ivano Bongiovanni | How To Get The Most From Maturity-Based And Risk-Based Approaches To Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Dr. Ivano Bongiovanni, General Manager at AUSCERT, as he discusses how to get the most from maturity-based and risk-based approaches in the cybersecurity arena. Ivano delves into the importance of balancing both approaches to enhance cyber resilience, the role of organizational size and industry mandates, and the need for critical assessment of cyber risks. We also explore the challenges of decision-making in risk management, the impact of subjective judgment, and the significance of quality data sources. Ivano emphasizes a collaborative approach involving various organizational constituencies and the crucial role of effective communication and storytelling in cybersecurity leadership.</p>
<p class="AbstractBookBaseParagraph">Ivano is the General Manager of AUSCERT. He is also a researcher, consultant, author, and speaker whose work focuses on the managerial and business implications of Cybersecurity.</p>
<p class="AbstractBookBaseParagraph">A Lecturer in Information Security, Governance and Leadership with the UQ Business School and a member of UQ Cyber, Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano’s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for effective cybersecurity management. Ivano is also an experienced facilitator in the fields of Design Thinking and Design-Led innovation, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.</p>
<p class="AbstractBookBaseParagraph">Prior to UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on safety and security management in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.</p>
<p class="AbstractBookBaseParagraph">He also worked as a Deputy Venue Security Manager at the XX Winter Olympic Games – Turin 2006 and as a Police Officer for the Italian Ministry of Interior.</p>
<p class="AbstractBookBaseParagraph">He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1953434/c1e-vzj8a9o5knawz1vk-6z1964w4bd4p-iwngbr.mp3" length="40672069"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Dr. Ivano Bongiovanni, General Manager at AUSCERT, as he discusses how to get the most from maturity-based and risk-based approaches in the cybersecurity arena. Ivano delves into the importance of balancing both approaches to enhance cyber resilience, the role of organizational size and industry mandates, and the need for critical assessment of cyber risks. We also explore the challenges of decision-making in risk management, the impact of subjective judgment, and the significance of quality data sources. Ivano emphasizes a collaborative approach involving various organizational constituencies and the crucial role of effective communication and storytelling in cybersecurity leadership.
Ivano is the General Manager of AUSCERT. He is also a researcher, consultant, author, and speaker whose work focuses on the managerial and business implications of Cybersecurity.
A Lecturer in Information Security, Governance and Leadership with the UQ Business School and a member of UQ Cyber, Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano’s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for effective cybersecurity management. Ivano is also an experienced facilitator in the fields of Design Thinking and Design-Led innovation, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.
Prior to UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on safety and security management in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.
He also worked as a Deputy Venue Security Manager at the XX Winter Olympic Games – Turin 2006 and as a Police Officer for the Italian Ministry of Interior.
He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1953434/c1a-5k0v-8dw05p77urgk-9betnq.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 289 Deep Dive: Jarrod Lucia | Securing AI-centric Infrastructures]]>
                </title>
                <pubDate>Wed, 22 Jan 2025 04:58:23 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1946988</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-289-deep-dive-jarrod-lucia-securing-ai-centric-infrastructures</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Jarrod Lucia, Evangelist Architect, AI and SP Infrastructure, APJC from F5, as he discusses securing AI-centric infrastructures, specifically the emerging AI factories powering today’s workload. Jarrod delves into the rise of AI factories, large data centers purpose-built for AI workloads, and the advanced sustainability measures being considered in their design, such as green energy mandates and innovative water recirculation systems.</p>
<p>We also explore the unique security demands of AI factories, explaining the need for both traditional data center precautions and modern zero-trust models. Jarrod shares insights on the various stages of AI factory development and integration, emphasizing the importance of securing data throughout its lifecycle within these specialized environments.</p>
<p>As a seasoned industry professional with over 25 years of experience in Service Provider and Cloud Engineering, Jarrod has developed a unique blend of technical expertise and leadership skills. His background in Mobile and Satellite technologies has equipped him with a deep understanding of network design, implementation, and troubleshooting.</p>
<p>He’s passionate about staying at the forefront of emerging technologies, particularly Artificial Intelligence (AI) and its applications in Cloud, Service Providers, and IoT at scale. The convergence of Edge Networks, Cloud capabilities, and AI Factories will revolutionise industry and how applications are delivered and he’s excited to explore the potential of AI infrastructure and its impact on the future of technology and business.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Jarrod Lucia, Evangelist Architect, AI and SP Infrastructure, APJC from F5, as he discusses securing AI-centric infrastructures, specifically the emerging AI factories powering today’s workload. Jarrod delves into the rise of AI factories, large data centers purpose-built for AI workloads, and the advanced sustainability measures being considered in their design, such as green energy mandates and innovative water recirculation systems.
We also explore the unique security demands of AI factories, explaining the need for both traditional data center precautions and modern zero-trust models. Jarrod shares insights on the various stages of AI factory development and integration, emphasizing the importance of securing data throughout its lifecycle within these specialized environments.
As a seasoned industry professional with over 25 years of experience in Service Provider and Cloud Engineering, Jarrod has developed a unique blend of technical expertise and leadership skills. His background in Mobile and Satellite technologies has equipped him with a deep understanding of network design, implementation, and troubleshooting.
He’s passionate about staying at the forefront of emerging technologies, particularly Artificial Intelligence (AI) and its applications in Cloud, Service Providers, and IoT at scale. The convergence of Edge Networks, Cloud capabilities, and AI Factories will revolutionise industry and how applications are delivered and he’s excited to explore the potential of AI infrastructure and its impact on the future of technology and business.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 289 Deep Dive: Jarrod Lucia | Securing AI-centric Infrastructures]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Jarrod Lucia, Evangelist Architect, AI and SP Infrastructure, APJC from F5, as he discusses securing AI-centric infrastructures, specifically the emerging AI factories powering today’s workload. Jarrod delves into the rise of AI factories, large data centers purpose-built for AI workloads, and the advanced sustainability measures being considered in their design, such as green energy mandates and innovative water recirculation systems.</p>
<p>We also explore the unique security demands of AI factories, explaining the need for both traditional data center precautions and modern zero-trust models. Jarrod shares insights on the various stages of AI factory development and integration, emphasizing the importance of securing data throughout its lifecycle within these specialized environments.</p>
<p>As a seasoned industry professional with over 25 years of experience in Service Provider and Cloud Engineering, Jarrod has developed a unique blend of technical expertise and leadership skills. His background in Mobile and Satellite technologies has equipped him with a deep understanding of network design, implementation, and troubleshooting.</p>
<p>He’s passionate about staying at the forefront of emerging technologies, particularly Artificial Intelligence (AI) and its applications in Cloud, Service Providers, and IoT at scale. The convergence of Edge Networks, Cloud capabilities, and AI Factories will revolutionise industry and how applications are delivered and he’s excited to explore the potential of AI infrastructure and its impact on the future of technology and business.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1946988/c1e-o39rfvkk95s8n0xz-okwz75xjs71v-0gowpy.mp3" length="38102456"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Jarrod Lucia, Evangelist Architect, AI and SP Infrastructure, APJC from F5, as he discusses securing AI-centric infrastructures, specifically the emerging AI factories powering today’s workload. Jarrod delves into the rise of AI factories, large data centers purpose-built for AI workloads, and the advanced sustainability measures being considered in their design, such as green energy mandates and innovative water recirculation systems.
We also explore the unique security demands of AI factories, explaining the need for both traditional data center precautions and modern zero-trust models. Jarrod shares insights on the various stages of AI factory development and integration, emphasizing the importance of securing data throughout its lifecycle within these specialized environments.
As a seasoned industry professional with over 25 years of experience in Service Provider and Cloud Engineering, Jarrod has developed a unique blend of technical expertise and leadership skills. His background in Mobile and Satellite technologies has equipped him with a deep understanding of network design, implementation, and troubleshooting.
He’s passionate about staying at the forefront of emerging technologies, particularly Artificial Intelligence (AI) and its applications in Cloud, Service Providers, and IoT at scale. The convergence of Edge Networks, Cloud capabilities, and AI Factories will revolutionise industry and how applications are delivered and he’s excited to explore the potential of AI infrastructure and its impact on the future of technology and business.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1946988/c1a-5k0v-jp2n4m2jf6jg-erfm80.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 288 Deep Dive: Venkat Balakrishnan | Platformisation And Solving The Real Problem]]>
                </title>
                <pubDate>Fri, 17 Jan 2025 05:00:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1941689</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-288-deep-dive-venkat-balakrishnan-platformisation-and-solving-the-real-problem</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Venkat Balakrishnan, CISO from TAL Australia, as he discusses the evolving concept of platformization in cybersecurity. Venkat explores how consolidating various cyber functions and tools into single platforms can drive efficiencies, reduce costs, and simplify management efforts. He emphasizes the maturity of network security and endpoint security operations as key areas ready for platformization, while also discussing the fragmented nature of identity and access management.</p>
<p>Venkat is an experienced cyber security and technology risk executive with expertise in building cyber resilience, safely enabling business growth and inspiring customer trust. Adept in building relationships and influencing stakeholders at all levels across organisations with strong customer focus to deliver pragmatic and innovative solutions to derive business value. Passionate people leader with demonstrated success of developing diverse and high performing teams. Experienced in building security practices from grassroots with innovative approaches for modernisation and by accelerating into scalable and sustainable operations.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Venkat Balakrishnan, CISO from TAL Australia, as he discusses the evolving concept of platformization in cybersecurity. Venkat explores how consolidating various cyber functions and tools into single platforms can drive efficiencies, reduce costs, and simplify management efforts. He emphasizes the maturity of network security and endpoint security operations as key areas ready for platformization, while also discussing the fragmented nature of identity and access management.
Venkat is an experienced cyber security and technology risk executive with expertise in building cyber resilience, safely enabling business growth and inspiring customer trust. Adept in building relationships and influencing stakeholders at all levels across organisations with strong customer focus to deliver pragmatic and innovative solutions to derive business value. Passionate people leader with demonstrated success of developing diverse and high performing teams. Experienced in building security practices from grassroots with innovative approaches for modernisation and by accelerating into scalable and sustainable operations.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 288 Deep Dive: Venkat Balakrishnan | Platformisation And Solving The Real Problem]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Venkat Balakrishnan, CISO from TAL Australia, as he discusses the evolving concept of platformization in cybersecurity. Venkat explores how consolidating various cyber functions and tools into single platforms can drive efficiencies, reduce costs, and simplify management efforts. He emphasizes the maturity of network security and endpoint security operations as key areas ready for platformization, while also discussing the fragmented nature of identity and access management.</p>
<p>Venkat is an experienced cyber security and technology risk executive with expertise in building cyber resilience, safely enabling business growth and inspiring customer trust. Adept in building relationships and influencing stakeholders at all levels across organisations with strong customer focus to deliver pragmatic and innovative solutions to derive business value. Passionate people leader with demonstrated success of developing diverse and high performing teams. Experienced in building security practices from grassroots with innovative approaches for modernisation and by accelerating into scalable and sustainable operations.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1941689/c1e-gkvqb3k0q5i249gd-8dwrg2qgc8dw-mb4qzn.mp3" length="42342236"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Venkat Balakrishnan, CISO from TAL Australia, as he discusses the evolving concept of platformization in cybersecurity. Venkat explores how consolidating various cyber functions and tools into single platforms can drive efficiencies, reduce costs, and simplify management efforts. He emphasizes the maturity of network security and endpoint security operations as key areas ready for platformization, while also discussing the fragmented nature of identity and access management.
Venkat is an experienced cyber security and technology risk executive with expertise in building cyber resilience, safely enabling business growth and inspiring customer trust. Adept in building relationships and influencing stakeholders at all levels across organisations with strong customer focus to deliver pragmatic and innovative solutions to derive business value. Passionate people leader with demonstrated success of developing diverse and high performing teams. Experienced in building security practices from grassroots with innovative approaches for modernisation and by accelerating into scalable and sustainable operations.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1941689/c1a-5k0v-ndon2k19f8x7-wongbw.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From AUKUS Advanced Technology Dialogue Australia – KB On The Go | Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group, Toby Jones, Founder from TJC, and Beth Sanner, Fo...]]>
                </title>
                <pubDate>Thu, 09 Jan 2025 04:53:32 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1936976</guid>
                                    <link>https://kbkast.castos.com/episodes/from-aukus-advanced-technology-dialogue-australia-kb-on-the-go-paddy-mcguinness-former-uk-deput</link>
                                <description>
                                            <![CDATA[<p>In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group, Toby Jones, Founder from TJC, and Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies as they discuss what it means to be ‘quantum-ready’, the convergence between government and industry, and the ‘Grey Zone’.</p>
<p><strong>Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group</strong></p>
<p>Paddy McGuinness is a Senior Adviser at Brunswick Group, supporting clients on crisis and resilience and the interplay between geopolitics, national security and their transactions. He works closely with the Firm’s regional and specialist leads across Technology, Cyber, Aerospace and Defence, Litigation, Geopolitical, Activism and Competition and Regulatory Affairs.</p>
<p>From 2014 – 2018, Paddy was the UK’s Deputy National Security Advisor for Intelligence, Security and Resilience and Government Chief Security Officer advising two successive British Prime Ministers on UK Homeland Security policy, capabilities and related legislation. This included the UK’s National Risk Assessment and ability to respond to and recover from all hazards and threats, national crisis response and coordination, cyber strategies and programmes, counter terrorism and approach to managing hostile state activities, including the resilience of Critical National Infrastructure. He chaired the Investment Security Group reviewing FDI and M&amp;A for National Security purposes.</p>
<p>As a Foreign Service officer Paddy led variously on Counter Terrorism, aspects of Cyber, the Middle East, Iran, Counter Proliferation and Africa. He served overseas in the Middle East and Europe and was an envoy on matters as diverse as Yemen, Counter Terrorism, and National Security and Law Enforcement access to data.</p>
<p>Away from Brunswick Paddy works with Governments on their Resilience and with Private Equity on emerging technologies, nuclear energy and space. He is a
co- founder of Oxford Digital Healthcare and of Venari Security. He sits on the advisory board of PoolRe, the UK’s Counter Terrorism Reinsurance Pool. Until the recent UK General Election he was a special advisor to the UK Parliament’s Joint Committee on the National Security Strategy.</p>
<p><strong>Toby Jones, Founder from TJC</strong></p>
<p>Toby is CEO of TJC and until recently was Head of UK’s Accelerated Capability Environment (ACE). TJC founded, mobilised and led ACE for the UK Home Office from
2017 – 2024. ACE is a Home Office capability which is highly regarded cross-sector for its mission-led innovation platform. ACE has expedited the development and deployment of £150M+ of cutting-edge capability driving forward diverse public missions in counter-terrorism and
homeland security, cybersecurity, pandemic response, healthcare, law enforcement and justice.</p>
<p>Toby is known as an inspiring and innovative leader who created ACE and who has had a multi-faceted career, grounded in national security and public safety, as a senior civil servant, in private sector with a global professional services firm and founder of a successful values-
based UK SME synonymous with powerful innovation.</p>
<p><strong>Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies</strong></p>
<p>Beth Sanner is the Director of Geopolitics and Strategy at International Capital Strategies. She has held a wide range of national security positions for over 35 years, including in the Office of the Director of National...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group, Toby Jones, Founder from TJC, and Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies as they discuss what it means to be ‘quantum-ready’, the convergence between government and industry, and the ‘Grey Zone’.
Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group
Paddy McGuinness is a Senior Adviser at Brunswick Group, supporting clients on crisis and resilience and the interplay between geopolitics, national security and their transactions. He works closely with the Firm’s regional and specialist leads across Technology, Cyber, Aerospace and Defence, Litigation, Geopolitical, Activism and Competition and Regulatory Affairs.
From 2014 – 2018, Paddy was the UK’s Deputy National Security Advisor for Intelligence, Security and Resilience and Government Chief Security Officer advising two successive British Prime Ministers on UK Homeland Security policy, capabilities and related legislation. This included the UK’s National Risk Assessment and ability to respond to and recover from all hazards and threats, national crisis response and coordination, cyber strategies and programmes, counter terrorism and approach to managing hostile state activities, including the resilience of Critical National Infrastructure. He chaired the Investment Security Group reviewing FDI and M&A for National Security purposes.
As a Foreign Service officer Paddy led variously on Counter Terrorism, aspects of Cyber, the Middle East, Iran, Counter Proliferation and Africa. He served overseas in the Middle East and Europe and was an envoy on matters as diverse as Yemen, Counter Terrorism, and National Security and Law Enforcement access to data.
Away from Brunswick Paddy works with Governments on their Resilience and with Private Equity on emerging technologies, nuclear energy and space. He is a
co- founder of Oxford Digital Healthcare and of Venari Security. He sits on the advisory board of PoolRe, the UK’s Counter Terrorism Reinsurance Pool. Until the recent UK General Election he was a special advisor to the UK Parliament’s Joint Committee on the National Security Strategy.
Toby Jones, Founder from TJC
Toby is CEO of TJC and until recently was Head of UK’s Accelerated Capability Environment (ACE). TJC founded, mobilised and led ACE for the UK Home Office from
2017 – 2024. ACE is a Home Office capability which is highly regarded cross-sector for its mission-led innovation platform. ACE has expedited the development and deployment of £150M+ of cutting-edge capability driving forward diverse public missions in counter-terrorism and
homeland security, cybersecurity, pandemic response, healthcare, law enforcement and justice.
Toby is known as an inspiring and innovative leader who created ACE and who has had a multi-faceted career, grounded in national security and public safety, as a senior civil servant, in private sector with a global professional services firm and founder of a successful values-
based UK SME synonymous with powerful innovation.
Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies
Beth Sanner is the Director of Geopolitics and Strategy at International Capital Strategies. She has held a wide range of national security positions for over 35 years, including in the Office of the Director of National...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From AUKUS Advanced Technology Dialogue Australia – KB On The Go | Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group, Toby Jones, Founder from TJC, and Beth Sanner, Fo...]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group, Toby Jones, Founder from TJC, and Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies as they discuss what it means to be ‘quantum-ready’, the convergence between government and industry, and the ‘Grey Zone’.</p>
<p><strong>Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group</strong></p>
<p>Paddy McGuinness is a Senior Adviser at Brunswick Group, supporting clients on crisis and resilience and the interplay between geopolitics, national security and their transactions. He works closely with the Firm’s regional and specialist leads across Technology, Cyber, Aerospace and Defence, Litigation, Geopolitical, Activism and Competition and Regulatory Affairs.</p>
<p>From 2014 – 2018, Paddy was the UK’s Deputy National Security Advisor for Intelligence, Security and Resilience and Government Chief Security Officer advising two successive British Prime Ministers on UK Homeland Security policy, capabilities and related legislation. This included the UK’s National Risk Assessment and ability to respond to and recover from all hazards and threats, national crisis response and coordination, cyber strategies and programmes, counter terrorism and approach to managing hostile state activities, including the resilience of Critical National Infrastructure. He chaired the Investment Security Group reviewing FDI and M&amp;A for National Security purposes.</p>
<p>As a Foreign Service officer Paddy led variously on Counter Terrorism, aspects of Cyber, the Middle East, Iran, Counter Proliferation and Africa. He served overseas in the Middle East and Europe and was an envoy on matters as diverse as Yemen, Counter Terrorism, and National Security and Law Enforcement access to data.</p>
<p>Away from Brunswick Paddy works with Governments on their Resilience and with Private Equity on emerging technologies, nuclear energy and space. He is a
co- founder of Oxford Digital Healthcare and of Venari Security. He sits on the advisory board of PoolRe, the UK’s Counter Terrorism Reinsurance Pool. Until the recent UK General Election he was a special advisor to the UK Parliament’s Joint Committee on the National Security Strategy.</p>
<p><strong>Toby Jones, Founder from TJC</strong></p>
<p>Toby is CEO of TJC and until recently was Head of UK’s Accelerated Capability Environment (ACE). TJC founded, mobilised and led ACE for the UK Home Office from
2017 – 2024. ACE is a Home Office capability which is highly regarded cross-sector for its mission-led innovation platform. ACE has expedited the development and deployment of £150M+ of cutting-edge capability driving forward diverse public missions in counter-terrorism and
homeland security, cybersecurity, pandemic response, healthcare, law enforcement and justice.</p>
<p>Toby is known as an inspiring and innovative leader who created ACE and who has had a multi-faceted career, grounded in national security and public safety, as a senior civil servant, in private sector with a global professional services firm and founder of a successful values-
based UK SME synonymous with powerful innovation.</p>
<p><strong>Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies</strong></p>
<p>Beth Sanner is the Director of Geopolitics and Strategy at International Capital Strategies. She has held a wide range of national security positions for over 35 years, including in the Office of the Director of National Intelligence, the Central Intelligence Agency, the National Security
Council, and the U.S. Department of State.</p>
<p>Beth’s last government role was as the Deputy Director of National Intelligence for Mission Integration, where she oversaw the integration of Intelligence Community collection, analysis, and programs and served as the President Trump’s intelligence briefer.</p>
<p>Prior to this role, Beth was the Director of the President’s Daily Brief, Vice Chair of the National Intelligence Council, and a senior executive in CIA’s Directorate of Analysis. Beth continues to inform both business and government leaders and everyday Americans about foreign affairs through consulting, speaking engagements, writings, and as a CNN national security contributor.</p>
<p>She also is a Distinguished Fellow at the German Marshall Fund, a Non-Resident Senior Fellow with the Intelligence Program at Harvard University’s Belfer Center, and a Senior Fellow at the U.S. Chamber Foundation.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1936976/c1e-d5v7a6q759cpd4gq-gpwkm4g3idr0-jp07ql.mp3" length="68815768"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group, Toby Jones, Founder from TJC, and Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies as they discuss what it means to be ‘quantum-ready’, the convergence between government and industry, and the ‘Grey Zone’.
Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group
Paddy McGuinness is a Senior Adviser at Brunswick Group, supporting clients on crisis and resilience and the interplay between geopolitics, national security and their transactions. He works closely with the Firm’s regional and specialist leads across Technology, Cyber, Aerospace and Defence, Litigation, Geopolitical, Activism and Competition and Regulatory Affairs.
From 2014 – 2018, Paddy was the UK’s Deputy National Security Advisor for Intelligence, Security and Resilience and Government Chief Security Officer advising two successive British Prime Ministers on UK Homeland Security policy, capabilities and related legislation. This included the UK’s National Risk Assessment and ability to respond to and recover from all hazards and threats, national crisis response and coordination, cyber strategies and programmes, counter terrorism and approach to managing hostile state activities, including the resilience of Critical National Infrastructure. He chaired the Investment Security Group reviewing FDI and M&A for National Security purposes.
As a Foreign Service officer Paddy led variously on Counter Terrorism, aspects of Cyber, the Middle East, Iran, Counter Proliferation and Africa. He served overseas in the Middle East and Europe and was an envoy on matters as diverse as Yemen, Counter Terrorism, and National Security and Law Enforcement access to data.
Away from Brunswick Paddy works with Governments on their Resilience and with Private Equity on emerging technologies, nuclear energy and space. He is a
co- founder of Oxford Digital Healthcare and of Venari Security. He sits on the advisory board of PoolRe, the UK’s Counter Terrorism Reinsurance Pool. Until the recent UK General Election he was a special advisor to the UK Parliament’s Joint Committee on the National Security Strategy.
Toby Jones, Founder from TJC
Toby is CEO of TJC and until recently was Head of UK’s Accelerated Capability Environment (ACE). TJC founded, mobilised and led ACE for the UK Home Office from
2017 – 2024. ACE is a Home Office capability which is highly regarded cross-sector for its mission-led innovation platform. ACE has expedited the development and deployment of £150M+ of cutting-edge capability driving forward diverse public missions in counter-terrorism and
homeland security, cybersecurity, pandemic response, healthcare, law enforcement and justice.
Toby is known as an inspiring and innovative leader who created ACE and who has had a multi-faceted career, grounded in national security and public safety, as a senior civil servant, in private sector with a global professional services firm and founder of a successful values-
based UK SME synonymous with powerful innovation.
Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies
Beth Sanner is the Director of Geopolitics and Strategy at International Capital Strategies. She has held a wide range of national security positions for over 35 years, including in the Office of the Director of National...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1936976/c1a-5k0v-5z1kj2wkuzv8-ytsns8.png"></itunes:image>
                                                                            <itunes:duration>01:11:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From AUKUS Advanced Technology Dialogue Australia – KB On The Go | Antony Reynolds, Vice President, Federal and National Security, Bridgeworks, Malcom Purcell, Vice President APAC, Fivecast, and Jeff Lindholm, Chief Revenue Officer, Lookout Technologie...]]>
                </title>
                <pubDate>Wed, 08 Jan 2025 05:00:06 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1936372</guid>
                                    <link>https://kbkast.castos.com/episodes/from-aukus-advanced-technology-dialogue-australia-kb-on-the-go-antony-reynolds-vice-president</link>
                                <description>
                                            <![CDATA[<p>In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Antony Reynolds, Vice President, Federal and National Security at Bridgeworks, Malcom Purcell, Vice President APAC, at Fivecast, and Jeff Lindholm, Chief Revenue Officer at Lookout Technologies as they discuss faster data delivery, how OSINT can address and ultimately reduce national security challenges, and why the the ‘bad guys’ are focusing on mobile edge.</p>
<p><strong>Antony Reynolds, Vice President, Federal and National Security at Bridgeworks</strong></p>
<p>Tony leads Public Sector and Global Channels for British AI Data Software Vendor,Bridgeworks Ltd and has extensive knowledge of enterprise software and high performance and super computing solutions. He previously worked in a variety of leadership positions with IBM to include Global
Strategic Alliance Director, North America and EMEA and was Systems Solution lead at IBM for Coca-Cola, Nike and Santander Leasing. Tony served in the Royal Air Force Reserve for 18 years until June 2024.</p>
<p>He supported deployment of Air Traffic Control and Interception Cells, (QRA), during the 2012 London Olympic Games. As well as detachments to the prestigious RAF Aerobatic Display Team, (The Red Arrows), and 32, The Royal Squadron, Tony deployed on J-2 Operations in Afghanistan, pre-deployment exercises in Africa and a humanitarian mission in the Caribbean. One of Tony’s final ceremonial duties was to represent the Royal Air Force at the parade of the Coronation of King Charles III on 6 May 2024 at Buckingham Palace.</p>
<p><strong>Malcolm Purcell, Vice President APAC, at Fivecast</strong></p>
<p>Malcolm is an experienced strategy and business development executive with broad experience working in the defence, security and intelligence sectors. Commencing his career as an Army Officer he had operational service in Iraq with the Combined Joint Special Operations Taskforce in 2003. Following a short period working for the Attorney-General’s Department, he has spent the past 18 years in sales leadership roles with multinational organizations including WSP Parsons Brinckerhoff and KPMG. Malcolm moved to Washington DC in 2020 and was instrumental in establishing Fivecast’s open-source intelligence business in North America – working closely with US &amp; Canadian Government agencies. He currently leads the Canberra office for Fivecast, with market responsibilities across Asia Pacific region.</p>
<p><strong>Jeff Lindholm, Chief Revenue Officer at Lookout Technologies</strong></p>
<p>As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Antony Reynolds, Vice President, Federal and National Security at Bridgeworks, Malcom Purcell, Vice President APAC, at Fivecast, and Jeff Lindholm, Chief Revenue Officer at Lookout Technologies as they discuss faster data delivery, how OSINT can address and ultimately reduce national security challenges, and why the the ‘bad guys’ are focusing on mobile edge.
Antony Reynolds, Vice President, Federal and National Security at Bridgeworks
Tony leads Public Sector and Global Channels for British AI Data Software Vendor,Bridgeworks Ltd and has extensive knowledge of enterprise software and high performance and super computing solutions. He previously worked in a variety of leadership positions with IBM to include Global
Strategic Alliance Director, North America and EMEA and was Systems Solution lead at IBM for Coca-Cola, Nike and Santander Leasing. Tony served in the Royal Air Force Reserve for 18 years until June 2024.
He supported deployment of Air Traffic Control and Interception Cells, (QRA), during the 2012 London Olympic Games. As well as detachments to the prestigious RAF Aerobatic Display Team, (The Red Arrows), and 32, The Royal Squadron, Tony deployed on J-2 Operations in Afghanistan, pre-deployment exercises in Africa and a humanitarian mission in the Caribbean. One of Tony’s final ceremonial duties was to represent the Royal Air Force at the parade of the Coronation of King Charles III on 6 May 2024 at Buckingham Palace.
Malcolm Purcell, Vice President APAC, at Fivecast
Malcolm is an experienced strategy and business development executive with broad experience working in the defence, security and intelligence sectors. Commencing his career as an Army Officer he had operational service in Iraq with the Combined Joint Special Operations Taskforce in 2003. Following a short period working for the Attorney-General’s Department, he has spent the past 18 years in sales leadership roles with multinational organizations including WSP Parsons Brinckerhoff and KPMG. Malcolm moved to Washington DC in 2020 and was instrumental in establishing Fivecast’s open-source intelligence business in North America – working closely with US & Canadian Government agencies. He currently leads the Canberra office for Fivecast, with market responsibilities across Asia Pacific region.
Jeff Lindholm, Chief Revenue Officer at Lookout Technologies
As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From AUKUS Advanced Technology Dialogue Australia – KB On The Go | Antony Reynolds, Vice President, Federal and National Security, Bridgeworks, Malcom Purcell, Vice President APAC, Fivecast, and Jeff Lindholm, Chief Revenue Officer, Lookout Technologie...]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Antony Reynolds, Vice President, Federal and National Security at Bridgeworks, Malcom Purcell, Vice President APAC, at Fivecast, and Jeff Lindholm, Chief Revenue Officer at Lookout Technologies as they discuss faster data delivery, how OSINT can address and ultimately reduce national security challenges, and why the the ‘bad guys’ are focusing on mobile edge.</p>
<p><strong>Antony Reynolds, Vice President, Federal and National Security at Bridgeworks</strong></p>
<p>Tony leads Public Sector and Global Channels for British AI Data Software Vendor,Bridgeworks Ltd and has extensive knowledge of enterprise software and high performance and super computing solutions. He previously worked in a variety of leadership positions with IBM to include Global
Strategic Alliance Director, North America and EMEA and was Systems Solution lead at IBM for Coca-Cola, Nike and Santander Leasing. Tony served in the Royal Air Force Reserve for 18 years until June 2024.</p>
<p>He supported deployment of Air Traffic Control and Interception Cells, (QRA), during the 2012 London Olympic Games. As well as detachments to the prestigious RAF Aerobatic Display Team, (The Red Arrows), and 32, The Royal Squadron, Tony deployed on J-2 Operations in Afghanistan, pre-deployment exercises in Africa and a humanitarian mission in the Caribbean. One of Tony’s final ceremonial duties was to represent the Royal Air Force at the parade of the Coronation of King Charles III on 6 May 2024 at Buckingham Palace.</p>
<p><strong>Malcolm Purcell, Vice President APAC, at Fivecast</strong></p>
<p>Malcolm is an experienced strategy and business development executive with broad experience working in the defence, security and intelligence sectors. Commencing his career as an Army Officer he had operational service in Iraq with the Combined Joint Special Operations Taskforce in 2003. Following a short period working for the Attorney-General’s Department, he has spent the past 18 years in sales leadership roles with multinational organizations including WSP Parsons Brinckerhoff and KPMG. Malcolm moved to Washington DC in 2020 and was instrumental in establishing Fivecast’s open-source intelligence business in North America – working closely with US &amp; Canadian Government agencies. He currently leads the Canberra office for Fivecast, with market responsibilities across Asia Pacific region.</p>
<p><strong>Jeff Lindholm, Chief Revenue Officer at Lookout Technologies</strong></p>
<p>As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1936372/c1e-5k0vbm4njkh0xmvo-pkgj8284s1v5-e3v4jf.mp3" length="73168813"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Antony Reynolds, Vice President, Federal and National Security at Bridgeworks, Malcom Purcell, Vice President APAC, at Fivecast, and Jeff Lindholm, Chief Revenue Officer at Lookout Technologies as they discuss faster data delivery, how OSINT can address and ultimately reduce national security challenges, and why the the ‘bad guys’ are focusing on mobile edge.
Antony Reynolds, Vice President, Federal and National Security at Bridgeworks
Tony leads Public Sector and Global Channels for British AI Data Software Vendor,Bridgeworks Ltd and has extensive knowledge of enterprise software and high performance and super computing solutions. He previously worked in a variety of leadership positions with IBM to include Global
Strategic Alliance Director, North America and EMEA and was Systems Solution lead at IBM for Coca-Cola, Nike and Santander Leasing. Tony served in the Royal Air Force Reserve for 18 years until June 2024.
He supported deployment of Air Traffic Control and Interception Cells, (QRA), during the 2012 London Olympic Games. As well as detachments to the prestigious RAF Aerobatic Display Team, (The Red Arrows), and 32, The Royal Squadron, Tony deployed on J-2 Operations in Afghanistan, pre-deployment exercises in Africa and a humanitarian mission in the Caribbean. One of Tony’s final ceremonial duties was to represent the Royal Air Force at the parade of the Coronation of King Charles III on 6 May 2024 at Buckingham Palace.
Malcolm Purcell, Vice President APAC, at Fivecast
Malcolm is an experienced strategy and business development executive with broad experience working in the defence, security and intelligence sectors. Commencing his career as an Army Officer he had operational service in Iraq with the Combined Joint Special Operations Taskforce in 2003. Following a short period working for the Attorney-General’s Department, he has spent the past 18 years in sales leadership roles with multinational organizations including WSP Parsons Brinckerhoff and KPMG. Malcolm moved to Washington DC in 2020 and was instrumental in establishing Fivecast’s open-source intelligence business in North America – working closely with US & Canadian Government agencies. He currently leads the Canberra office for Fivecast, with market responsibilities across Asia Pacific region.
Jeff Lindholm, Chief Revenue Officer at Lookout Technologies
As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1936372/c1a-5k0v-jp2jpxqvhp4x-coqlvr.png"></itunes:image>
                                                                            <itunes:duration>01:16:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From AUKUS Advanced Technology Dialogue Australia – KB On The Go | Michael Loewy, Co-Founder at Tide, Daniel Churches, Sales Director at ColorTokens, Simon Hodgkinson, Advisor at Semperis]]>
                </title>
                <pubDate>Tue, 07 Jan 2025 05:00:32 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1935605</guid>
                                    <link>https://kbkast.castos.com/episodes/from-aukus-advanced-technology-dialogue-australia-kb-on-the-go-michael-loewy-co-founder-at-tide</link>
                                <description>
                                            <![CDATA[<p>In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Michael Loewy, Co-Founder at Tide, Daniel Churches, Sales Director, at ColorTokens, and Simon Hodgkinson, Advisor at Semperis as they discuss why the industry is broken, ‘breach-readiness’, and identity being the foundation of the digital ecosystem.</p>
<p><strong>Michael Loewy, Co-Founder at Tide</strong></p>
<p>Michael is a Co-founder of Tide Foundation, a deep tech start-up reimagining trust in the digital world. He’s a seasoned entrepreneur with a rich C-Level history leading the productization and commercialization of transformational software for organizations like Dell, Yahoo!, News Limited, NetRegistry, Telstra, Motorola through to greenfield startups. Michael was an academic professional at the University of Illinois, and currently serves on the advisory board of the Children’s Medical Research Institute.</p>
<p><strong>Daniel Churches, Sales Director, at ColorTokens</strong></p>
<p>Dan is an Australian and Asia Pacific Sales Leader with over 25 years’ IT experience in Hardware and Software Solutions and Services, Business Development, Enterprise engagements and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation.</p>
<p>With ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens “Breach Ready” messaging focusing on halting the spread of ransomware and malware attacks across IT/OT, IoT and Legacy environments providing customers a viable Cyber Resilience ‘Uptime’ compliance capability they can report to market.</p>
<p>Dan brings a wealth of experience to his role and to startup growth. He has worked with several startups as well as global organisations from around the world. His grasp of industry, cultural relevancies, and buying behavior are proven assets when winning trust and rapport with employees, partners and customers. He has built and delivered IT sales and coaching development programs in India, Singapore, Malaysia, Indonesia, Thailand, China, Japan, Philippines, Australian, New Zealand, England and Germany.</p>
<p>Dan grew up in Denver, Colorado, lived in Bavaria, Germany for many years and is now an Australian citizen, living in Sydney, Australia. Dan continues to learn and build leadership skills and insights taking courses with Harvard Business Review and MIT Sloan. In addition to this, he finds time to travel with his wife and family, drink red wine and make homemade pasta.</p>
<p><strong>
Simon Hodgkinson, Advisor at Semperis
</strong></p>
<p>Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.</p>
<p>Prior to becoming CISO, he was the VP for Infrastructure &amp; Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Michael Loewy, Co-Founder at Tide, Daniel Churches, Sales Director, at ColorTokens, and Simon Hodgkinson, Advisor at Semperis as they discuss why the industry is broken, ‘breach-readiness’, and identity being the foundation of the digital ecosystem.
Michael Loewy, Co-Founder at Tide
Michael is a Co-founder of Tide Foundation, a deep tech start-up reimagining trust in the digital world. He’s a seasoned entrepreneur with a rich C-Level history leading the productization and commercialization of transformational software for organizations like Dell, Yahoo!, News Limited, NetRegistry, Telstra, Motorola through to greenfield startups. Michael was an academic professional at the University of Illinois, and currently serves on the advisory board of the Children’s Medical Research Institute.
Daniel Churches, Sales Director, at ColorTokens
Dan is an Australian and Asia Pacific Sales Leader with over 25 years’ IT experience in Hardware and Software Solutions and Services, Business Development, Enterprise engagements and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation.
With ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens “Breach Ready” messaging focusing on halting the spread of ransomware and malware attacks across IT/OT, IoT and Legacy environments providing customers a viable Cyber Resilience ‘Uptime’ compliance capability they can report to market.
Dan brings a wealth of experience to his role and to startup growth. He has worked with several startups as well as global organisations from around the world. His grasp of industry, cultural relevancies, and buying behavior are proven assets when winning trust and rapport with employees, partners and customers. He has built and delivered IT sales and coaching development programs in India, Singapore, Malaysia, Indonesia, Thailand, China, Japan, Philippines, Australian, New Zealand, England and Germany.
Dan grew up in Denver, Colorado, lived in Bavaria, Germany for many years and is now an Australian citizen, living in Sydney, Australia. Dan continues to learn and build leadership skills and insights taking courses with Harvard Business Review and MIT Sloan. In addition to this, he finds time to travel with his wife and family, drink red wine and make homemade pasta.

Simon Hodgkinson, Advisor at Semperis

Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.
Prior to becoming CISO, he was the VP for Infrastructure & Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply & Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From AUKUS Advanced Technology Dialogue Australia – KB On The Go | Michael Loewy, Co-Founder at Tide, Daniel Churches, Sales Director at ColorTokens, Simon Hodgkinson, Advisor at Semperis]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Michael Loewy, Co-Founder at Tide, Daniel Churches, Sales Director, at ColorTokens, and Simon Hodgkinson, Advisor at Semperis as they discuss why the industry is broken, ‘breach-readiness’, and identity being the foundation of the digital ecosystem.</p>
<p><strong>Michael Loewy, Co-Founder at Tide</strong></p>
<p>Michael is a Co-founder of Tide Foundation, a deep tech start-up reimagining trust in the digital world. He’s a seasoned entrepreneur with a rich C-Level history leading the productization and commercialization of transformational software for organizations like Dell, Yahoo!, News Limited, NetRegistry, Telstra, Motorola through to greenfield startups. Michael was an academic professional at the University of Illinois, and currently serves on the advisory board of the Children’s Medical Research Institute.</p>
<p><strong>Daniel Churches, Sales Director, at ColorTokens</strong></p>
<p>Dan is an Australian and Asia Pacific Sales Leader with over 25 years’ IT experience in Hardware and Software Solutions and Services, Business Development, Enterprise engagements and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation.</p>
<p>With ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens “Breach Ready” messaging focusing on halting the spread of ransomware and malware attacks across IT/OT, IoT and Legacy environments providing customers a viable Cyber Resilience ‘Uptime’ compliance capability they can report to market.</p>
<p>Dan brings a wealth of experience to his role and to startup growth. He has worked with several startups as well as global organisations from around the world. His grasp of industry, cultural relevancies, and buying behavior are proven assets when winning trust and rapport with employees, partners and customers. He has built and delivered IT sales and coaching development programs in India, Singapore, Malaysia, Indonesia, Thailand, China, Japan, Philippines, Australian, New Zealand, England and Germany.</p>
<p>Dan grew up in Denver, Colorado, lived in Bavaria, Germany for many years and is now an Australian citizen, living in Sydney, Australia. Dan continues to learn and build leadership skills and insights taking courses with Harvard Business Review and MIT Sloan. In addition to this, he finds time to travel with his wife and family, drink red wine and make homemade pasta.</p>
<p><strong>
Simon Hodgkinson, Advisor at Semperis
</strong></p>
<p>Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.</p>
<p>Prior to becoming CISO, he was the VP for Infrastructure &amp; Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1935605/c1e-m1o3cn9w1nbwqk4n-dm454r67b9k-fzyamo.mp3" length="57672141"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners’ Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Michael Loewy, Co-Founder at Tide, Daniel Churches, Sales Director, at ColorTokens, and Simon Hodgkinson, Advisor at Semperis as they discuss why the industry is broken, ‘breach-readiness’, and identity being the foundation of the digital ecosystem.
Michael Loewy, Co-Founder at Tide
Michael is a Co-founder of Tide Foundation, a deep tech start-up reimagining trust in the digital world. He’s a seasoned entrepreneur with a rich C-Level history leading the productization and commercialization of transformational software for organizations like Dell, Yahoo!, News Limited, NetRegistry, Telstra, Motorola through to greenfield startups. Michael was an academic professional at the University of Illinois, and currently serves on the advisory board of the Children’s Medical Research Institute.
Daniel Churches, Sales Director, at ColorTokens
Dan is an Australian and Asia Pacific Sales Leader with over 25 years’ IT experience in Hardware and Software Solutions and Services, Business Development, Enterprise engagements and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation.
With ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens “Breach Ready” messaging focusing on halting the spread of ransomware and malware attacks across IT/OT, IoT and Legacy environments providing customers a viable Cyber Resilience ‘Uptime’ compliance capability they can report to market.
Dan brings a wealth of experience to his role and to startup growth. He has worked with several startups as well as global organisations from around the world. His grasp of industry, cultural relevancies, and buying behavior are proven assets when winning trust and rapport with employees, partners and customers. He has built and delivered IT sales and coaching development programs in India, Singapore, Malaysia, Indonesia, Thailand, China, Japan, Philippines, Australian, New Zealand, England and Germany.
Dan grew up in Denver, Colorado, lived in Bavaria, Germany for many years and is now an Australian citizen, living in Sydney, Australia. Dan continues to learn and build leadership skills and insights taking courses with Harvard Business Review and MIT Sloan. In addition to this, he finds time to travel with his wife and family, drink red wine and make homemade pasta.

Simon Hodgkinson, Advisor at Semperis

Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.
Prior to becoming CISO, he was the VP for Infrastructure & Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees’ IT experience. He led the CISO function in bp Supply & Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1935605/c1a-5k0v-47d1k14ph6kd-f3tvxe.png"></itunes:image>
                                                                            <itunes:duration>01:00:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 287 Deep Dive: Leon Langlais | Sovereign Data Capability For The Physical Security Technology In The Modern World]]>
                </title>
                <pubDate>Wed, 01 Jan 2025 04:56:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1932178</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-287-deep-dive-leon-langlais-sovereign-data-capability-for-the-physical-security-technolog-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Leon Langlais, Chief Product Officer APAC at Genetec, as he discusses the pervasive cybersecurity gaps in both home and corporate networks. Leon delves into the consequences of inadequate updates and the critical need for secure, trusted devices, especially for critical infrastructures. We also explore regulatory debates, the role of state-owned vendors, and the integration of security from a product’s inception.</p>
<p>Leon has been with Genetec for five years having previously served in a multitude of technology leadership roles at Tyco across a near fifteen year tenure. Leon has previously worked as Senior Director of Growth Markets and Regional Strategy at Tyco Security Products, and Director of Product Management at Tyco Safety Products. Leon is an alumnus of the prestigious Universite de Sherbrooke and Polytechnique Montreal.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Leon Langlais, Chief Product Officer APAC at Genetec, as he discusses the pervasive cybersecurity gaps in both home and corporate networks. Leon delves into the consequences of inadequate updates and the critical need for secure, trusted devices, especially for critical infrastructures. We also explore regulatory debates, the role of state-owned vendors, and the integration of security from a product’s inception.
Leon has been with Genetec for five years having previously served in a multitude of technology leadership roles at Tyco across a near fifteen year tenure. Leon has previously worked as Senior Director of Growth Markets and Regional Strategy at Tyco Security Products, and Director of Product Management at Tyco Safety Products. Leon is an alumnus of the prestigious Universite de Sherbrooke and Polytechnique Montreal.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 287 Deep Dive: Leon Langlais | Sovereign Data Capability For The Physical Security Technology In The Modern World]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Leon Langlais, Chief Product Officer APAC at Genetec, as he discusses the pervasive cybersecurity gaps in both home and corporate networks. Leon delves into the consequences of inadequate updates and the critical need for secure, trusted devices, especially for critical infrastructures. We also explore regulatory debates, the role of state-owned vendors, and the integration of security from a product’s inception.</p>
<p>Leon has been with Genetec for five years having previously served in a multitude of technology leadership roles at Tyco across a near fifteen year tenure. Leon has previously worked as Senior Director of Growth Markets and Regional Strategy at Tyco Security Products, and Director of Product Management at Tyco Safety Products. Leon is an alumnus of the prestigious Universite de Sherbrooke and Polytechnique Montreal.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1932178/c1e-5k0vbm8jvdt0xmvo-pkjd2vdoi31g-rphih9.mp3" length="36265107"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Leon Langlais, Chief Product Officer APAC at Genetec, as he discusses the pervasive cybersecurity gaps in both home and corporate networks. Leon delves into the consequences of inadequate updates and the critical need for secure, trusted devices, especially for critical infrastructures. We also explore regulatory debates, the role of state-owned vendors, and the integration of security from a product’s inception.
Leon has been with Genetec for five years having previously served in a multitude of technology leadership roles at Tyco across a near fifteen year tenure. Leon has previously worked as Senior Director of Growth Markets and Regional Strategy at Tyco Security Products, and Director of Product Management at Tyco Safety Products. Leon is an alumnus of the prestigious Universite de Sherbrooke and Polytechnique Montreal.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1932178/c1a-5k0v-gpk470q0foro-i40agk.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:47</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 286 Deep Dive: Dean Frye | IT, IoT And OT Security As A Business Continuity Problem]]>
                </title>
                <pubDate>Wed, 18 Dec 2024 05:00:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1922199</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-286-deep-dive-dean-frye-it-iot-and-ot-security-as-a-business-continuity-problem</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Dean Frye, Solutions Architect at Nozomi Networks, as he discusses the complex landscape of IT, IoT, and OT security challenges.</p>
<p>Dean delves into the critical importance of avoiding an “us vs. them” mentality between IT and OT teams, and how security interruptions can severely impact business continuity. We explore industry-specific vulnerabilities, such as those in factory chicken farming and Tasmanian salmon farming, and emphasize the necessity for executives to have a deeper technical understanding of cybersecurity. Dean also highlights the value of telemetry and real-time reporting, the evolving role of cloud solutions in OT environments, and the importance of a well-integrated, multidisciplinary team to effectively manage cyber risks.</p>
<p>Dean Frye is a Solutions Architect for Nozomi Networks in Australia and New Zealand. Dean is an experienced security professional with a demonstrated history of providing compliance strategy, pragmatic risk mitigation, security project delivery, threat abatement and vendor interface solutions with a significant commercial background. Covering more than twenty years, his previous roles span consulting and senior leadership, including a stint at Armis as solutions architect, and another tenure at Cisco as director of security for the APJ region.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Dean Frye, Solutions Architect at Nozomi Networks, as he discusses the complex landscape of IT, IoT, and OT security challenges.
Dean delves into the critical importance of avoiding an “us vs. them” mentality between IT and OT teams, and how security interruptions can severely impact business continuity. We explore industry-specific vulnerabilities, such as those in factory chicken farming and Tasmanian salmon farming, and emphasize the necessity for executives to have a deeper technical understanding of cybersecurity. Dean also highlights the value of telemetry and real-time reporting, the evolving role of cloud solutions in OT environments, and the importance of a well-integrated, multidisciplinary team to effectively manage cyber risks.
Dean Frye is a Solutions Architect for Nozomi Networks in Australia and New Zealand. Dean is an experienced security professional with a demonstrated history of providing compliance strategy, pragmatic risk mitigation, security project delivery, threat abatement and vendor interface solutions with a significant commercial background. Covering more than twenty years, his previous roles span consulting and senior leadership, including a stint at Armis as solutions architect, and another tenure at Cisco as director of security for the APJ region.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 286 Deep Dive: Dean Frye | IT, IoT And OT Security As A Business Continuity Problem]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Dean Frye, Solutions Architect at Nozomi Networks, as he discusses the complex landscape of IT, IoT, and OT security challenges.</p>
<p>Dean delves into the critical importance of avoiding an “us vs. them” mentality between IT and OT teams, and how security interruptions can severely impact business continuity. We explore industry-specific vulnerabilities, such as those in factory chicken farming and Tasmanian salmon farming, and emphasize the necessity for executives to have a deeper technical understanding of cybersecurity. Dean also highlights the value of telemetry and real-time reporting, the evolving role of cloud solutions in OT environments, and the importance of a well-integrated, multidisciplinary team to effectively manage cyber risks.</p>
<p>Dean Frye is a Solutions Architect for Nozomi Networks in Australia and New Zealand. Dean is an experienced security professional with a demonstrated history of providing compliance strategy, pragmatic risk mitigation, security project delivery, threat abatement and vendor interface solutions with a significant commercial background. Covering more than twenty years, his previous roles span consulting and senior leadership, including a stint at Armis as solutions architect, and another tenure at Cisco as director of security for the APJ region.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1922199/c1e-z9w7fmk25pcokrwj-pkjpq353h3xp-oskild.mp3" length="36797587"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Dean Frye, Solutions Architect at Nozomi Networks, as he discusses the complex landscape of IT, IoT, and OT security challenges.
Dean delves into the critical importance of avoiding an “us vs. them” mentality between IT and OT teams, and how security interruptions can severely impact business continuity. We explore industry-specific vulnerabilities, such as those in factory chicken farming and Tasmanian salmon farming, and emphasize the necessity for executives to have a deeper technical understanding of cybersecurity. Dean also highlights the value of telemetry and real-time reporting, the evolving role of cloud solutions in OT environments, and the importance of a well-integrated, multidisciplinary team to effectively manage cyber risks.
Dean Frye is a Solutions Architect for Nozomi Networks in Australia and New Zealand. Dean is an experienced security professional with a demonstrated history of providing compliance strategy, pragmatic risk mitigation, security project delivery, threat abatement and vendor interface solutions with a significant commercial background. Covering more than twenty years, his previous roles span consulting and senior leadership, including a stint at Armis as solutions architect, and another tenure at Cisco as director of security for the APJ region.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1922199/c1a-5k0v-9j06k0gwu1m-6tjbaj.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Cisco Live 2024 Melbourne – KB On The Go | Guy Diedrich, SVP & Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy & Learning & Certification and Anupam Trehan, Vice President, People and Communities APJC, Cisco]]>
                </title>
                <pubDate>Thu, 12 Dec 2024 04:56:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1919446</guid>
                                    <link>https://kbkast.castos.com/episodes/from-cisco-live-2024-melbourne-kb-on-the-go-guy-diedrich-svp-global-innovation-officer-count-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, KB sits down with Guy Diedrich, SVP &amp; Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy &amp; Learning &amp; Certification, and Anupam Trehan, Vice President for People and Communities APJC on the ground at Cisco Live 2024 in Melbourne. Together they discuss the impact of AI on the future workforce and the evolving landscape of remote and hybrid work in the digital age.</p>
<p><strong>Guy Diedrich
SVP &amp; Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy &amp; Learning &amp; Certification</strong></p>
<p>Dr. Guy Diedrich is a Senior Vice President and the Global Innovation Officer at Cisco, where he is responsible for its Country Digital Acceleration (CDA) and Networking Academy programs, as well as Learning and Certifications (L&amp;C). In this role, Dr. Diedrich collaborates closely with government and industry leaders around the world to drive mass-scale digitization and skilling initiatives that help increase GDP, create millions of next-generation jobs, and develop sustainable innovation ecosystems around the world. Dr. Diedrich continues to grow and evolve the programs into new markets, building trust with government, industry and academic stakeholders along the way.</p>
<p>Dr. Diedrich is also a member of the Board of Directors of the Cisco Foundation, which supports nonprofits and NGOs with grants, technology donations and expertise to help solve global challenges in communities around the world.</p>
<p>Prior to his current role at Cisco Systems, Dr. Diedrich was a Vice Chancellor at the Texas A&amp;M University System where he was responsible for research, commercialization, federal government relations, state government relations and strategic initiatives.</p>
<p>Before joining Texas A&amp;M, Dr. Diedrich served as President and CEO of GRA Inc., a software development and consulting company that he co-founded and grew from a start-up to a firm employing more than 130 professionals. The company was sold to a publicly-traded technology company.</p>
<p>Dr. Diedrich holds a Bachelor of Science degree from Texas A&amp;M University, a Master’s degree from the University of Cambridge (Kings College) and a Ph.D. from Swansea University where he studied the economics of trust in organizations. Dr. Diedrich is a published author in cost accounting and medical psychology, and has worked extensively throughout Europe, the Americas, Asia, and the Middle East for more than two decades.</p>
<p><strong>Anupam Trehan</strong>
<strong>Vice President, People and Communities APJC, Cisco</strong></p>
<p>Anupam is the People &amp; Communities Leader for APJC. Anupam has been a strategic part of Cisco’s operations for a decade, having worked across different roles. Anupam is particularly passionate about talent &amp; leadership development, organizational transformation, promoting an inclusive and diverse workplace and has been a strong voice in this space sharing her thought leadership in various forums both internal and external to Cisco.</p>
<p>She has previously worked with JP Morgan, Delphi Technical Centre &amp; Tata AutoComp across various functions in HR. Anupam describes herself as a Mother, Traveler, Reader and an avid foodie.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, KB sits down with Guy Diedrich, SVP & Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy & Learning & Certification, and Anupam Trehan, Vice President for People and Communities APJC on the ground at Cisco Live 2024 in Melbourne. Together they discuss the impact of AI on the future workforce and the evolving landscape of remote and hybrid work in the digital age.
Guy Diedrich
SVP & Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy & Learning & Certification
Dr. Guy Diedrich is a Senior Vice President and the Global Innovation Officer at Cisco, where he is responsible for its Country Digital Acceleration (CDA) and Networking Academy programs, as well as Learning and Certifications (L&C). In this role, Dr. Diedrich collaborates closely with government and industry leaders around the world to drive mass-scale digitization and skilling initiatives that help increase GDP, create millions of next-generation jobs, and develop sustainable innovation ecosystems around the world. Dr. Diedrich continues to grow and evolve the programs into new markets, building trust with government, industry and academic stakeholders along the way.
Dr. Diedrich is also a member of the Board of Directors of the Cisco Foundation, which supports nonprofits and NGOs with grants, technology donations and expertise to help solve global challenges in communities around the world.
Prior to his current role at Cisco Systems, Dr. Diedrich was a Vice Chancellor at the Texas A&M University System where he was responsible for research, commercialization, federal government relations, state government relations and strategic initiatives.
Before joining Texas A&M, Dr. Diedrich served as President and CEO of GRA Inc., a software development and consulting company that he co-founded and grew from a start-up to a firm employing more than 130 professionals. The company was sold to a publicly-traded technology company.
Dr. Diedrich holds a Bachelor of Science degree from Texas A&M University, a Master’s degree from the University of Cambridge (Kings College) and a Ph.D. from Swansea University where he studied the economics of trust in organizations. Dr. Diedrich is a published author in cost accounting and medical psychology, and has worked extensively throughout Europe, the Americas, Asia, and the Middle East for more than two decades.
Anupam Trehan
Vice President, People and Communities APJC, Cisco
Anupam is the People & Communities Leader for APJC. Anupam has been a strategic part of Cisco’s operations for a decade, having worked across different roles. Anupam is particularly passionate about talent & leadership development, organizational transformation, promoting an inclusive and diverse workplace and has been a strong voice in this space sharing her thought leadership in various forums both internal and external to Cisco.
She has previously worked with JP Morgan, Delphi Technical Centre & Tata AutoComp across various functions in HR. Anupam describes herself as a Mother, Traveler, Reader and an avid foodie.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Cisco Live 2024 Melbourne – KB On The Go | Guy Diedrich, SVP & Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy & Learning & Certification and Anupam Trehan, Vice President, People and Communities APJC, Cisco]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, KB sits down with Guy Diedrich, SVP &amp; Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy &amp; Learning &amp; Certification, and Anupam Trehan, Vice President for People and Communities APJC on the ground at Cisco Live 2024 in Melbourne. Together they discuss the impact of AI on the future workforce and the evolving landscape of remote and hybrid work in the digital age.</p>
<p><strong>Guy Diedrich
SVP &amp; Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy &amp; Learning &amp; Certification</strong></p>
<p>Dr. Guy Diedrich is a Senior Vice President and the Global Innovation Officer at Cisco, where he is responsible for its Country Digital Acceleration (CDA) and Networking Academy programs, as well as Learning and Certifications (L&amp;C). In this role, Dr. Diedrich collaborates closely with government and industry leaders around the world to drive mass-scale digitization and skilling initiatives that help increase GDP, create millions of next-generation jobs, and develop sustainable innovation ecosystems around the world. Dr. Diedrich continues to grow and evolve the programs into new markets, building trust with government, industry and academic stakeholders along the way.</p>
<p>Dr. Diedrich is also a member of the Board of Directors of the Cisco Foundation, which supports nonprofits and NGOs with grants, technology donations and expertise to help solve global challenges in communities around the world.</p>
<p>Prior to his current role at Cisco Systems, Dr. Diedrich was a Vice Chancellor at the Texas A&amp;M University System where he was responsible for research, commercialization, federal government relations, state government relations and strategic initiatives.</p>
<p>Before joining Texas A&amp;M, Dr. Diedrich served as President and CEO of GRA Inc., a software development and consulting company that he co-founded and grew from a start-up to a firm employing more than 130 professionals. The company was sold to a publicly-traded technology company.</p>
<p>Dr. Diedrich holds a Bachelor of Science degree from Texas A&amp;M University, a Master’s degree from the University of Cambridge (Kings College) and a Ph.D. from Swansea University where he studied the economics of trust in organizations. Dr. Diedrich is a published author in cost accounting and medical psychology, and has worked extensively throughout Europe, the Americas, Asia, and the Middle East for more than two decades.</p>
<p><strong>Anupam Trehan</strong>
<strong>Vice President, People and Communities APJC, Cisco</strong></p>
<p>Anupam is the People &amp; Communities Leader for APJC. Anupam has been a strategic part of Cisco’s operations for a decade, having worked across different roles. Anupam is particularly passionate about talent &amp; leadership development, organizational transformation, promoting an inclusive and diverse workplace and has been a strong voice in this space sharing her thought leadership in various forums both internal and external to Cisco.</p>
<p>She has previously worked with JP Morgan, Delphi Technical Centre &amp; Tata AutoComp across various functions in HR. Anupam describes herself as a Mother, Traveler, Reader and an avid foodie.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1919446/c1e-gkvqb31kn8f249gq-pkj3nmxpizz0-qmf7fb.mp3" length="35747674"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, KB sits down with Guy Diedrich, SVP & Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy & Learning & Certification, and Anupam Trehan, Vice President for People and Communities APJC on the ground at Cisco Live 2024 in Melbourne. Together they discuss the impact of AI on the future workforce and the evolving landscape of remote and hybrid work in the digital age.
Guy Diedrich
SVP & Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy & Learning & Certification
Dr. Guy Diedrich is a Senior Vice President and the Global Innovation Officer at Cisco, where he is responsible for its Country Digital Acceleration (CDA) and Networking Academy programs, as well as Learning and Certifications (L&C). In this role, Dr. Diedrich collaborates closely with government and industry leaders around the world to drive mass-scale digitization and skilling initiatives that help increase GDP, create millions of next-generation jobs, and develop sustainable innovation ecosystems around the world. Dr. Diedrich continues to grow and evolve the programs into new markets, building trust with government, industry and academic stakeholders along the way.
Dr. Diedrich is also a member of the Board of Directors of the Cisco Foundation, which supports nonprofits and NGOs with grants, technology donations and expertise to help solve global challenges in communities around the world.
Prior to his current role at Cisco Systems, Dr. Diedrich was a Vice Chancellor at the Texas A&M University System where he was responsible for research, commercialization, federal government relations, state government relations and strategic initiatives.
Before joining Texas A&M, Dr. Diedrich served as President and CEO of GRA Inc., a software development and consulting company that he co-founded and grew from a start-up to a firm employing more than 130 professionals. The company was sold to a publicly-traded technology company.
Dr. Diedrich holds a Bachelor of Science degree from Texas A&M University, a Master’s degree from the University of Cambridge (Kings College) and a Ph.D. from Swansea University where he studied the economics of trust in organizations. Dr. Diedrich is a published author in cost accounting and medical psychology, and has worked extensively throughout Europe, the Americas, Asia, and the Middle East for more than two decades.
Anupam Trehan
Vice President, People and Communities APJC, Cisco
Anupam is the People & Communities Leader for APJC. Anupam has been a strategic part of Cisco’s operations for a decade, having worked across different roles. Anupam is particularly passionate about talent & leadership development, organizational transformation, promoting an inclusive and diverse workplace and has been a strong voice in this space sharing her thought leadership in various forums both internal and external to Cisco.
She has previously worked with JP Morgan, Delphi Technical Centre & Tata AutoComp across various functions in HR. Anupam describes herself as a Mother, Traveler, Reader and an avid foodie.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1919446/c1a-5k0v-8d9xmpk6ak4v-vgwgmm.png"></itunes:image>
                                                                            <itunes:duration>00:37:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Cisco Live 2024 Melbourne – KB On The Go | Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisc...]]>
                </title>
                <pubDate>Wed, 11 Dec 2024 04:56:30 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1918584</guid>
                                    <link>https://kbkast.castos.com/episodes/from-cisco-live-2024-melbourne-kb-on-the-go-raj-chopra-svp-chief-product-officer-security-bu-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, KB sits down with Raj Chopra, SVP &amp; Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisco on the ground at Cisco Live 2024 in Melbourne. Together they discuss Cisco’s vision of being an AI first company, data in flight, and the concept of ‘identity is the new spam’.</p>
<p><strong>Raj Chopra, </strong><strong>SVP &amp; Chief Product Officer, Security Business Group, Cisco
</strong>
Raj Chopra is SVP and Chief Product Officer of the Cisco Security Product Management organization, where he leads strategy and execution for Cisco Security and SD-WAN products, ensuring comprehensive security for all users, from any device to any network or application.|</p>
<p>Raj is a seasoned executive with a proven record of delivering market-leading innovation in security with a strong focus on user-first experiences. He is a strong advocate of supporting diverse teams and equitable environments that bring out the best in everyone.</p>
<p>Prior to taking on this role, Raj led product, design, and strategy for Proofpoint’s flagship Email Security portfolio, helping grow that business nearly 3-fold in 4 years.</p>
<p>Before Proofpoint, Raj was part of the founding team of Netskope. He built both the product and new market category of CASB (Cloud Access Security Broker) and spurred its growth into SASE (Secure Access Service Edge) and SSE (Security Services Edge). During his career, he launched more than a dozen cybersecurity products, including several in the past 15 years that rose to $250M+ in product revenue.</p>
<p>Raj holds an MBA from the Haas School of Business, UC Berkeley, and a BS in Computer Science from NIT (National Institutes of Technology) India and has a growing eagerness to go deeper into in his yoga practice.</p>
<p><strong>Angelique Medina, Head of Internet Intelligence, Cisco ThousandEyes
</strong>
Angelique Medina is Head of Internet Intelligence at Cisco ThousandEyes, where she reports on all things Internet related, from BGP routing and outages to the performance of edge and cloud-based services. She has more than a decade of experience in the networking industry.</p>
<p><strong>Matt Caulfield, Vice President of Product for Duo and Identity, Cisco
</strong>
Matt Caulfield is VP of Product for Duo and Identity at Cisco, where he leads Cisco’s strategy and thought leadership in all things identity. Previously, Matt was the Founder &amp; CEO of Oort, a venture-backed Identity Threat Detection &amp; Response (ITDR) pioneer, which was founded in 2019 and acquired by Cisco in 2023. Matt has a technical background and is an expert in identity, networking, cloud, and security domains. Until 2018, he led the Cisco Boston Innovation Team focusing on new product initiatives.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, KB sits down with Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisco on the ground at Cisco Live 2024 in Melbourne. Together they discuss Cisco’s vision of being an AI first company, data in flight, and the concept of ‘identity is the new spam’.
Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco

Raj Chopra is SVP and Chief Product Officer of the Cisco Security Product Management organization, where he leads strategy and execution for Cisco Security and SD-WAN products, ensuring comprehensive security for all users, from any device to any network or application.|
Raj is a seasoned executive with a proven record of delivering market-leading innovation in security with a strong focus on user-first experiences. He is a strong advocate of supporting diverse teams and equitable environments that bring out the best in everyone.
Prior to taking on this role, Raj led product, design, and strategy for Proofpoint’s flagship Email Security portfolio, helping grow that business nearly 3-fold in 4 years.
Before Proofpoint, Raj was part of the founding team of Netskope. He built both the product and new market category of CASB (Cloud Access Security Broker) and spurred its growth into SASE (Secure Access Service Edge) and SSE (Security Services Edge). During his career, he launched more than a dozen cybersecurity products, including several in the past 15 years that rose to $250M+ in product revenue.
Raj holds an MBA from the Haas School of Business, UC Berkeley, and a BS in Computer Science from NIT (National Institutes of Technology) India and has a growing eagerness to go deeper into in his yoga practice.
Angelique Medina, Head of Internet Intelligence, Cisco ThousandEyes

Angelique Medina is Head of Internet Intelligence at Cisco ThousandEyes, where she reports on all things Internet related, from BGP routing and outages to the performance of edge and cloud-based services. She has more than a decade of experience in the networking industry.
Matt Caulfield, Vice President of Product for Duo and Identity, Cisco

Matt Caulfield is VP of Product for Duo and Identity at Cisco, where he leads Cisco’s strategy and thought leadership in all things identity. Previously, Matt was the Founder & CEO of Oort, a venture-backed Identity Threat Detection & Response (ITDR) pioneer, which was founded in 2019 and acquired by Cisco in 2023. Matt has a technical background and is an expert in identity, networking, cloud, and security domains. Until 2018, he led the Cisco Boston Innovation Team focusing on new product initiatives.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Cisco Live 2024 Melbourne – KB On The Go | Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisc...]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, KB sits down with Raj Chopra, SVP &amp; Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisco on the ground at Cisco Live 2024 in Melbourne. Together they discuss Cisco’s vision of being an AI first company, data in flight, and the concept of ‘identity is the new spam’.</p>
<p><strong>Raj Chopra, </strong><strong>SVP &amp; Chief Product Officer, Security Business Group, Cisco
</strong>
Raj Chopra is SVP and Chief Product Officer of the Cisco Security Product Management organization, where he leads strategy and execution for Cisco Security and SD-WAN products, ensuring comprehensive security for all users, from any device to any network or application.|</p>
<p>Raj is a seasoned executive with a proven record of delivering market-leading innovation in security with a strong focus on user-first experiences. He is a strong advocate of supporting diverse teams and equitable environments that bring out the best in everyone.</p>
<p>Prior to taking on this role, Raj led product, design, and strategy for Proofpoint’s flagship Email Security portfolio, helping grow that business nearly 3-fold in 4 years.</p>
<p>Before Proofpoint, Raj was part of the founding team of Netskope. He built both the product and new market category of CASB (Cloud Access Security Broker) and spurred its growth into SASE (Secure Access Service Edge) and SSE (Security Services Edge). During his career, he launched more than a dozen cybersecurity products, including several in the past 15 years that rose to $250M+ in product revenue.</p>
<p>Raj holds an MBA from the Haas School of Business, UC Berkeley, and a BS in Computer Science from NIT (National Institutes of Technology) India and has a growing eagerness to go deeper into in his yoga practice.</p>
<p><strong>Angelique Medina, Head of Internet Intelligence, Cisco ThousandEyes
</strong>
Angelique Medina is Head of Internet Intelligence at Cisco ThousandEyes, where she reports on all things Internet related, from BGP routing and outages to the performance of edge and cloud-based services. She has more than a decade of experience in the networking industry.</p>
<p><strong>Matt Caulfield, Vice President of Product for Duo and Identity, Cisco
</strong>
Matt Caulfield is VP of Product for Duo and Identity at Cisco, where he leads Cisco’s strategy and thought leadership in all things identity. Previously, Matt was the Founder &amp; CEO of Oort, a venture-backed Identity Threat Detection &amp; Response (ITDR) pioneer, which was founded in 2019 and acquired by Cisco in 2023. Matt has a technical background and is an expert in identity, networking, cloud, and security domains. Until 2018, he led the Cisco Boston Innovation Team focusing on new product initiatives.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1918584/c1e-m1o3cnvvgwhwqk4n-z39v99n9f4kn-8nlynv.mp3" length="53773417"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, KB sits down with Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisco on the ground at Cisco Live 2024 in Melbourne. Together they discuss Cisco’s vision of being an AI first company, data in flight, and the concept of ‘identity is the new spam’.
Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco

Raj Chopra is SVP and Chief Product Officer of the Cisco Security Product Management organization, where he leads strategy and execution for Cisco Security and SD-WAN products, ensuring comprehensive security for all users, from any device to any network or application.|
Raj is a seasoned executive with a proven record of delivering market-leading innovation in security with a strong focus on user-first experiences. He is a strong advocate of supporting diverse teams and equitable environments that bring out the best in everyone.
Prior to taking on this role, Raj led product, design, and strategy for Proofpoint’s flagship Email Security portfolio, helping grow that business nearly 3-fold in 4 years.
Before Proofpoint, Raj was part of the founding team of Netskope. He built both the product and new market category of CASB (Cloud Access Security Broker) and spurred its growth into SASE (Secure Access Service Edge) and SSE (Security Services Edge). During his career, he launched more than a dozen cybersecurity products, including several in the past 15 years that rose to $250M+ in product revenue.
Raj holds an MBA from the Haas School of Business, UC Berkeley, and a BS in Computer Science from NIT (National Institutes of Technology) India and has a growing eagerness to go deeper into in his yoga practice.
Angelique Medina, Head of Internet Intelligence, Cisco ThousandEyes

Angelique Medina is Head of Internet Intelligence at Cisco ThousandEyes, where she reports on all things Internet related, from BGP routing and outages to the performance of edge and cloud-based services. She has more than a decade of experience in the networking industry.
Matt Caulfield, Vice President of Product for Duo and Identity, Cisco

Matt Caulfield is VP of Product for Duo and Identity at Cisco, where he leads Cisco’s strategy and thought leadership in all things identity. Previously, Matt was the Founder & CEO of Oort, a venture-backed Identity Threat Detection & Response (ITDR) pioneer, which was founded in 2019 and acquired by Cisco in 2023. Matt has a technical background and is an expert in identity, networking, cloud, and security domains. Until 2018, he led the Cisco Boston Innovation Team focusing on new product initiatives.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1918584/c1a-5k0v-wwm167k9b1jk-l8ny4z.png"></itunes:image>
                                                                            <itunes:duration>00:56:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From Cisco Live 2024 Melbourne – KB On The Go | Tom Gillis, SVP and General Manager, Security Business Group, AJ Shipley, Vice President, Product Management, Threat Detection & Response, and Tom Casey, Senior Vice President and GM, Products & Technolog...]]>
                </title>
                <pubDate>Tue, 10 Dec 2024 04:58:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1917439</guid>
                                    <link>https://kbkast.castos.com/episodes/from-cisco-live-2024-melbourne-kb-on-the-go-tom-gillis-svp-and-general-manager-security-busine</link>
                                <description>
                                            <![CDATA[<p>In this episode, KB is joined by Tom Gillis, SVP and General Manager, Security Business Group, AJ Shipley, Vice President, Product Management, Threat Detection &amp; Response, and Tom Casey, Senior Vice President and GM, Products &amp; Technology, Splunk, a Cisco company on the ground at Cisco Live 2024 in Melbourne. Together they dive into critical topics such as Cisco’s innovative HyperShield solution for patch management, Cisco’s acquisition of Splunk, and how they plan to integrate and enhance their products.</p>
<p> </p>
<p><strong>Tom Gillis</strong>
<strong>SVP and General Manager, Security Business Group</strong></p>
<p>Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.</p>
<p>Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.</p>
<p>Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.</p>
<p>Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.</p>
<p>Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.</p>
<p> </p>
<p><strong>AJ Shipley</strong>
<strong>Vice President, Product Management, Threat Detection &amp; Response</strong></p>
<p>Think big. Start small. Move fast. These three values drive AJ Shipley, Vice President, Product, Threat Detection &amp; Response at Cisco Security Business Group. In this role, AJ is responsible for Extended Detection and Response (Cisco SecureX, Advanced Malware Protection), Risk-Based Vulnerability Management (Kenna Security), Endpoint Detection and Response (Cisco Secure Endpoint), Network Detection and Response (Cisco Secure Analytics, Talos), and Cisco Secure Email.</p>
<p>A dedicated product executive, AJ is passionate about creating phenomenal products that solve customers’ acute cyber-security business problems. He is equally enthusiastic about building and nurturing winning teams. That combination boded well in his previous position leading Cisco’s Customer Experience (CX) product management team, where he was
responsible for managing the technical support team and offers aligned to Cisco’s security and collaboration product portfolios.</p>
<p>Having experienced both the trenches and the board room, AJ leverages his diverse background to inform his career journey and that of others. Prior to joining Cisco, AJ served as Vice President of Product Management for Palo Alto Networks Cloud Delivered Security Subscriptions, leading successful launches that he credits to the strength of the individuals and teams committed to those customer outcomes.</p>
<p>AJ has led various disciplines at multiple public and private companies — all honing his purpose and passion for developing the best pr...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, KB is joined by Tom Gillis, SVP and General Manager, Security Business Group, AJ Shipley, Vice President, Product Management, Threat Detection & Response, and Tom Casey, Senior Vice President and GM, Products & Technology, Splunk, a Cisco company on the ground at Cisco Live 2024 in Melbourne. Together they dive into critical topics such as Cisco’s innovative HyperShield solution for patch management, Cisco’s acquisition of Splunk, and how they plan to integrate and enhance their products.
 
Tom Gillis
SVP and General Manager, Security Business Group
Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.
Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.
Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.
Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.
Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.
 
AJ Shipley
Vice President, Product Management, Threat Detection & Response
Think big. Start small. Move fast. These three values drive AJ Shipley, Vice President, Product, Threat Detection & Response at Cisco Security Business Group. In this role, AJ is responsible for Extended Detection and Response (Cisco SecureX, Advanced Malware Protection), Risk-Based Vulnerability Management (Kenna Security), Endpoint Detection and Response (Cisco Secure Endpoint), Network Detection and Response (Cisco Secure Analytics, Talos), and Cisco Secure Email.
A dedicated product executive, AJ is passionate about creating phenomenal products that solve customers’ acute cyber-security business problems. He is equally enthusiastic about building and nurturing winning teams. That combination boded well in his previous position leading Cisco’s Customer Experience (CX) product management team, where he was
responsible for managing the technical support team and offers aligned to Cisco’s security and collaboration product portfolios.
Having experienced both the trenches and the board room, AJ leverages his diverse background to inform his career journey and that of others. Prior to joining Cisco, AJ served as Vice President of Product Management for Palo Alto Networks Cloud Delivered Security Subscriptions, leading successful launches that he credits to the strength of the individuals and teams committed to those customer outcomes.
AJ has led various disciplines at multiple public and private companies — all honing his purpose and passion for developing the best pr...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From Cisco Live 2024 Melbourne – KB On The Go | Tom Gillis, SVP and General Manager, Security Business Group, AJ Shipley, Vice President, Product Management, Threat Detection & Response, and Tom Casey, Senior Vice President and GM, Products & Technolog...]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, KB is joined by Tom Gillis, SVP and General Manager, Security Business Group, AJ Shipley, Vice President, Product Management, Threat Detection &amp; Response, and Tom Casey, Senior Vice President and GM, Products &amp; Technology, Splunk, a Cisco company on the ground at Cisco Live 2024 in Melbourne. Together they dive into critical topics such as Cisco’s innovative HyperShield solution for patch management, Cisco’s acquisition of Splunk, and how they plan to integrate and enhance their products.</p>
<p> </p>
<p><strong>Tom Gillis</strong>
<strong>SVP and General Manager, Security Business Group</strong></p>
<p>Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.</p>
<p>Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.</p>
<p>Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.</p>
<p>Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.</p>
<p>Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.</p>
<p> </p>
<p><strong>AJ Shipley</strong>
<strong>Vice President, Product Management, Threat Detection &amp; Response</strong></p>
<p>Think big. Start small. Move fast. These three values drive AJ Shipley, Vice President, Product, Threat Detection &amp; Response at Cisco Security Business Group. In this role, AJ is responsible for Extended Detection and Response (Cisco SecureX, Advanced Malware Protection), Risk-Based Vulnerability Management (Kenna Security), Endpoint Detection and Response (Cisco Secure Endpoint), Network Detection and Response (Cisco Secure Analytics, Talos), and Cisco Secure Email.</p>
<p>A dedicated product executive, AJ is passionate about creating phenomenal products that solve customers’ acute cyber-security business problems. He is equally enthusiastic about building and nurturing winning teams. That combination boded well in his previous position leading Cisco’s Customer Experience (CX) product management team, where he was
responsible for managing the technical support team and offers aligned to Cisco’s security and collaboration product portfolios.</p>
<p>Having experienced both the trenches and the board room, AJ leverages his diverse background to inform his career journey and that of others. Prior to joining Cisco, AJ served as Vice President of Product Management for Palo Alto Networks Cloud Delivered Security Subscriptions, leading successful launches that he credits to the strength of the individuals and teams committed to those customer outcomes.</p>
<p>AJ has led various disciplines at multiple public and private companies — all honing his purpose and passion for developing the best products and bringing out the best in people while ensuring the teams and individuals responsible for those successes have the opportunity to achieve their career aspirations.</p>
<p>AJ is a Certified Information System Security Professional (CISSP), fluent in multiple cyber security disciplines, including email security, network security gateways, threat intelligence, encryption &amp; PKI, network access control, security standards and certifications. He is a past TS/SCI clearance holder.</p>
<p>AJ holds undergraduate and graduate technical degrees in Electrical Engineering and Computer Science and a graduate degree in Business Administration from The University of North Carolina.</p>
<p> </p>
<p><strong>Tom Casey</strong>
<strong>Senior Vice President and GM, Products &amp; Technology, Splunk</strong></p>
<p>Tom Casey is the Senior Vice President and GM, Products &amp; Technology for Splunk. With over 25 years of experience, Tom is responsible for evolving Splunk’s market-leading unified security and observability platform. Prior to joining Splunk, he served as Senior Vice President, Engineering at DocuSign, where he led the company’s product strategy, including development, execution and delivery of all products worldwide. Prior to DocuSign, Tom served as Vice President, Platform and Infrastructure at Apptio, where he helped scale the Company’s SaaS platform from a single offering to a multi-product portfolio. Before that, he spent 16 years at Microsoft in a number of leadership positions in product and engineering. He holds a B.S. from the University of Arizona.</p>
<p>Executive Sponsor: <a href="https://splunkbenefits.com/us/your-wellbeing/splunk-employee-resource-groups-and-community-groups#Neurodiversity@Splunk">Neurodiversity Employee Resource Group</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1917439/c1e-wmjvurwg2vb0gmpo-ok356w64f7qj-br07jm.mp3" length="54085633"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, KB is joined by Tom Gillis, SVP and General Manager, Security Business Group, AJ Shipley, Vice President, Product Management, Threat Detection & Response, and Tom Casey, Senior Vice President and GM, Products & Technology, Splunk, a Cisco company on the ground at Cisco Live 2024 in Melbourne. Together they dive into critical topics such as Cisco’s innovative HyperShield solution for patch management, Cisco’s acquisition of Splunk, and how they plan to integrate and enhance their products.
 
Tom Gillis
SVP and General Manager, Security Business Group
Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.
Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.
Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.
Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.
Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.
 
AJ Shipley
Vice President, Product Management, Threat Detection & Response
Think big. Start small. Move fast. These three values drive AJ Shipley, Vice President, Product, Threat Detection & Response at Cisco Security Business Group. In this role, AJ is responsible for Extended Detection and Response (Cisco SecureX, Advanced Malware Protection), Risk-Based Vulnerability Management (Kenna Security), Endpoint Detection and Response (Cisco Secure Endpoint), Network Detection and Response (Cisco Secure Analytics, Talos), and Cisco Secure Email.
A dedicated product executive, AJ is passionate about creating phenomenal products that solve customers’ acute cyber-security business problems. He is equally enthusiastic about building and nurturing winning teams. That combination boded well in his previous position leading Cisco’s Customer Experience (CX) product management team, where he was
responsible for managing the technical support team and offers aligned to Cisco’s security and collaboration product portfolios.
Having experienced both the trenches and the board room, AJ leverages his diverse background to inform his career journey and that of others. Prior to joining Cisco, AJ served as Vice President of Product Management for Palo Alto Networks Cloud Delivered Security Subscriptions, leading successful launches that he credits to the strength of the individuals and teams committed to those customer outcomes.
AJ has led various disciplines at multiple public and private companies — all honing his purpose and passion for developing the best pr...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1917439/c1a-5k0v-wwm0dmx2cqro-fc7xxq.png"></itunes:image>
                                                                            <itunes:duration>00:56:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KBI.Media Update | Mark Anderson: Microsoft AI Tour 2024]]>
                </title>
                <pubDate>Mon, 09 Dec 2024 00:33:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1917302</guid>
                                    <link>https://kbkast.castos.com/episodes/kbimedia-update-mark-anderson-microsoft-ai-tour-2024-1</link>
                                <description>
                                            <![CDATA[<p>Join KB as she sits down with Mark Anderson, National Security Officer – Australia and New Zealand from Microsoft, who will give us an exclusive sneak peek into what you can expect from <a href="https://aitour.microsoft.com/en-US/sydney">Microsoft AI Tour 2024</a> happening in Sydney at the ICC on December 11th. Mark shares insights into the event’s focus on real-world AI implementations by leading Australian organizations, highlights the tour’s comprehensive cybersecurity content, including Microsoft’s Secure Future Initiative, and the establishment of a local base of the Microsoft Threat Intelligence Center (MSTIC) in Australia.</p>
<p>Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Join KB as she sits down with Mark Anderson, National Security Officer – Australia and New Zealand from Microsoft, who will give us an exclusive sneak peek into what you can expect from Microsoft AI Tour 2024 happening in Sydney at the ICC on December 11th. Mark shares insights into the event’s focus on real-world AI implementations by leading Australian organizations, highlights the tour’s comprehensive cybersecurity content, including Microsoft’s Secure Future Initiative, and the establishment of a local base of the Microsoft Threat Intelligence Center (MSTIC) in Australia.
Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia & New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KBI.Media Update | Mark Anderson: Microsoft AI Tour 2024]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Join KB as she sits down with Mark Anderson, National Security Officer – Australia and New Zealand from Microsoft, who will give us an exclusive sneak peek into what you can expect from <a href="https://aitour.microsoft.com/en-US/sydney">Microsoft AI Tour 2024</a> happening in Sydney at the ICC on December 11th. Mark shares insights into the event’s focus on real-world AI implementations by leading Australian organizations, highlights the tour’s comprehensive cybersecurity content, including Microsoft’s Secure Future Initiative, and the establishment of a local base of the Microsoft Threat Intelligence Center (MSTIC) in Australia.</p>
<p>Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1917302/c1e-1dogsjz461fxv9nj-jpj1gg4ka700-tvs8l4.mp3" length="7826328"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Join KB as she sits down with Mark Anderson, National Security Officer – Australia and New Zealand from Microsoft, who will give us an exclusive sneak peek into what you can expect from Microsoft AI Tour 2024 happening in Sydney at the ICC on December 11th. Mark shares insights into the event’s focus on real-world AI implementations by leading Australian organizations, highlights the tour’s comprehensive cybersecurity content, including Microsoft’s Secure Future Initiative, and the establishment of a local base of the Microsoft Threat Intelligence Center (MSTIC) in Australia.
Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia & New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1917302/c1a-5k0v-ok35d6dnu86-gitt2m.jpg"></itunes:image>
                                                                            <itunes:duration>00:08:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 284 Deep Dive: Kelly Sabo | Cybersecurity Essentials for SMBs]]>
                </title>
                <pubDate>Wed, 04 Dec 2024 05:00:45 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1911907</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-284-deep-dive-kelly-sabo-cybersecurity-essentials-for-smbs</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Kelly Sabo, Head of SMB and Mid Market ANZ at Cisco, as she discusses cybersecurity essentials for small and medium businesses (SMBs). Kelly delves into the misconceptions SMB owners have about their vulnerability to cyber attacks, the alarming statistic that up to 60% of SMBs risk going out of business within 6 months post-attack, and the critical need for a comprehensive approach that goes beyond IT. We also explore how SMBs can tackle these challenges with limited resources, the benefits of outsourcing cybersecurity to experts, and the role of AI in automating security tasks to enhance protection. Additionally, Kelly emphasizes practical steps SMBs can take, like implementing multi-factor authentication and conducting risk assessments, to bolster their security without incurring enterprise-level costs.</p>
<p><strong>Kelly Sabo, Leader – Small &amp; Medium Business and Commercial Mid-Market, Cisco Australia &amp; New Zealand</strong></p>
<p>With over a decade of experience in the technology sector, Kelly is dedicated to empowering small and medium businesses (SMBs) and commercial mid-market enterprises to thrive in today’s digital backdrop. As the leader for SMB and mid-market sized customers at Cisco ANZ, Kelly is deeply committed to leveraging Cisco’s cutting-edge technologies to drive growth, efficiency, and competitiveness for businesses of all sizes.</p>


<p>Kelly‘s expertise lies in understanding the unique challenges and opportunities faced by SMBs and mid-market enterprises, particularly in an environment where the adoption of cloud and software as a service solution has reshaped the industry landscape. She is passionate about helping organisations harness the power of cloud managed networking, security, and collaboration to meet the demands of the modern business world. </p>


<p>Kelly’s experience covers multiple technology companies including Oracle, NetApp and now Cisco,  from sales leadership, managing partners, distributors, account management and sales operations.</p>


<p>Since joining Cisco in 2015, Kelly has held various leadership, channel, and sales roles, gaining valuable insights into the dynamic nature of the technology ecosystem. Her extensive knowledge of the channel space provides her with a unique perspective in helping partners adapt and evolve in a rapidly changing environment.</p>


<p>As a leader in the industry who can distil complexity and boil it down to clear actions, Kelly is frequently sought after to share her insights and expertise at industry events and conferences. </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Kelly Sabo, Head of SMB and Mid Market ANZ at Cisco, as she discusses cybersecurity essentials for small and medium businesses (SMBs). Kelly delves into the misconceptions SMB owners have about their vulnerability to cyber attacks, the alarming statistic that up to 60% of SMBs risk going out of business within 6 months post-attack, and the critical need for a comprehensive approach that goes beyond IT. We also explore how SMBs can tackle these challenges with limited resources, the benefits of outsourcing cybersecurity to experts, and the role of AI in automating security tasks to enhance protection. Additionally, Kelly emphasizes practical steps SMBs can take, like implementing multi-factor authentication and conducting risk assessments, to bolster their security without incurring enterprise-level costs.
Kelly Sabo, Leader – Small & Medium Business and Commercial Mid-Market, Cisco Australia & New Zealand
With over a decade of experience in the technology sector, Kelly is dedicated to empowering small and medium businesses (SMBs) and commercial mid-market enterprises to thrive in today’s digital backdrop. As the leader for SMB and mid-market sized customers at Cisco ANZ, Kelly is deeply committed to leveraging Cisco’s cutting-edge technologies to drive growth, efficiency, and competitiveness for businesses of all sizes.


Kelly‘s expertise lies in understanding the unique challenges and opportunities faced by SMBs and mid-market enterprises, particularly in an environment where the adoption of cloud and software as a service solution has reshaped the industry landscape. She is passionate about helping organisations harness the power of cloud managed networking, security, and collaboration to meet the demands of the modern business world. 


Kelly’s experience covers multiple technology companies including Oracle, NetApp and now Cisco,  from sales leadership, managing partners, distributors, account management and sales operations.


Since joining Cisco in 2015, Kelly has held various leadership, channel, and sales roles, gaining valuable insights into the dynamic nature of the technology ecosystem. Her extensive knowledge of the channel space provides her with a unique perspective in helping partners adapt and evolve in a rapidly changing environment.


As a leader in the industry who can distil complexity and boil it down to clear actions, Kelly is frequently sought after to share her insights and expertise at industry events and conferences. ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 284 Deep Dive: Kelly Sabo | Cybersecurity Essentials for SMBs]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Kelly Sabo, Head of SMB and Mid Market ANZ at Cisco, as she discusses cybersecurity essentials for small and medium businesses (SMBs). Kelly delves into the misconceptions SMB owners have about their vulnerability to cyber attacks, the alarming statistic that up to 60% of SMBs risk going out of business within 6 months post-attack, and the critical need for a comprehensive approach that goes beyond IT. We also explore how SMBs can tackle these challenges with limited resources, the benefits of outsourcing cybersecurity to experts, and the role of AI in automating security tasks to enhance protection. Additionally, Kelly emphasizes practical steps SMBs can take, like implementing multi-factor authentication and conducting risk assessments, to bolster their security without incurring enterprise-level costs.</p>
<p><strong>Kelly Sabo, Leader – Small &amp; Medium Business and Commercial Mid-Market, Cisco Australia &amp; New Zealand</strong></p>
<p>With over a decade of experience in the technology sector, Kelly is dedicated to empowering small and medium businesses (SMBs) and commercial mid-market enterprises to thrive in today’s digital backdrop. As the leader for SMB and mid-market sized customers at Cisco ANZ, Kelly is deeply committed to leveraging Cisco’s cutting-edge technologies to drive growth, efficiency, and competitiveness for businesses of all sizes.</p>


<p>Kelly‘s expertise lies in understanding the unique challenges and opportunities faced by SMBs and mid-market enterprises, particularly in an environment where the adoption of cloud and software as a service solution has reshaped the industry landscape. She is passionate about helping organisations harness the power of cloud managed networking, security, and collaboration to meet the demands of the modern business world. </p>


<p>Kelly’s experience covers multiple technology companies including Oracle, NetApp and now Cisco,  from sales leadership, managing partners, distributors, account management and sales operations.</p>


<p>Since joining Cisco in 2015, Kelly has held various leadership, channel, and sales roles, gaining valuable insights into the dynamic nature of the technology ecosystem. Her extensive knowledge of the channel space provides her with a unique perspective in helping partners adapt and evolve in a rapidly changing environment.</p>


<p>As a leader in the industry who can distil complexity and boil it down to clear actions, Kelly is frequently sought after to share her insights and expertise at industry events and conferences. </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1911907/c1e-6wnpc2k7ovtndop0-6zwjg5xxt5wg-tjglsz.mp3" length="38839318"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Kelly Sabo, Head of SMB and Mid Market ANZ at Cisco, as she discusses cybersecurity essentials for small and medium businesses (SMBs). Kelly delves into the misconceptions SMB owners have about their vulnerability to cyber attacks, the alarming statistic that up to 60% of SMBs risk going out of business within 6 months post-attack, and the critical need for a comprehensive approach that goes beyond IT. We also explore how SMBs can tackle these challenges with limited resources, the benefits of outsourcing cybersecurity to experts, and the role of AI in automating security tasks to enhance protection. Additionally, Kelly emphasizes practical steps SMBs can take, like implementing multi-factor authentication and conducting risk assessments, to bolster their security without incurring enterprise-level costs.
Kelly Sabo, Leader – Small & Medium Business and Commercial Mid-Market, Cisco Australia & New Zealand
With over a decade of experience in the technology sector, Kelly is dedicated to empowering small and medium businesses (SMBs) and commercial mid-market enterprises to thrive in today’s digital backdrop. As the leader for SMB and mid-market sized customers at Cisco ANZ, Kelly is deeply committed to leveraging Cisco’s cutting-edge technologies to drive growth, efficiency, and competitiveness for businesses of all sizes.


Kelly‘s expertise lies in understanding the unique challenges and opportunities faced by SMBs and mid-market enterprises, particularly in an environment where the adoption of cloud and software as a service solution has reshaped the industry landscape. She is passionate about helping organisations harness the power of cloud managed networking, security, and collaboration to meet the demands of the modern business world. 


Kelly’s experience covers multiple technology companies including Oracle, NetApp and now Cisco,  from sales leadership, managing partners, distributors, account management and sales operations.


Since joining Cisco in 2015, Kelly has held various leadership, channel, and sales roles, gaining valuable insights into the dynamic nature of the technology ecosystem. Her extensive knowledge of the channel space provides her with a unique perspective in helping partners adapt and evolve in a rapidly changing environment.


As a leader in the industry who can distil complexity and boil it down to clear actions, Kelly is frequently sought after to share her insights and expertise at industry events and conferences. ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1911907/c1a-5k0v-xx8170kzsqok-hihrtg.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:28</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 284 Deep Dive: Ana Forsyth | Cyber Education – How early do we start?]]>
                </title>
                <pubDate>Wed, 27 Nov 2024 05:00:36 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1908583</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-284-deep-dive-ana-forsyth-cyber-education-how-early-do-we-start-1</link>
                                <description>
                                            <![CDATA[<p>“The views reflected in this podcast are the views of the author and do not necessarily reflect the views of KPMG Australia”.</p>
<p>In this episode, we sit down with Ana Forsyth, Associate Director from KPMG, as she discusses the fragmented state of Australia’s education system in relation to cyber education. Ana highlights the significant gaps between schools, vocational training, and higher education, stressing the need for cohesive national strategies and government accountability.</p>
<p>Ana also covers the critical role of teachers in cybersecurity education, the necessity of early cyber safety awareness, and the challenges parents face in navigating their children’s digital lives. She shares her views on current parenting trends in relation to children’s access to technology and the imperative for systemic educational reforms to build a resilient cybersecurity workforce in Australia.</p>
<p>For the past eight years, Ana has been a cyber professional consulting to Federal Government and Defence clients. Ana previously worked in event sales and hospitality management for almost a decade, but took the leap into cyber security and never looked back, successfully transferring her leadership and stakeholder engagement skills.</p>
<p>Ana completed a PhD in cyber security strategy, entitled ‘Educational pathways to national cyber resilience: the Australian story’ (ANU, 2020); the thesis focused on growing Australia’s future cyber workforce by enhancing its pipeline. She argued for strengthened higher and vocational cyber security education, but also for the need to drive more interest in STEM in primary/secondary school, bringing along not just the students, but also their teachers and carers. The research highlighted the need for support from government, academia and industry, seamlessly integrated at every level.</p>
<p>Ana also holds a Master of Arts in Strategy and Security (UNSW at ADFA, 2012), a Master of International Affairs (ANU, 2011), and a Bachelor of Business Administration and Hospitality Management (Northwood University and Hotel Institute Montreux, Switzerland, 2009). She grew up in the Middle East, and did most of her schooling in the French system.</p>
<p>[NB: if Ana could study forever, she would.]</p>
<p>Passionate about the human risk management facet of her industry, Ana is a firm believer in not only growing Australia’s future cyber workforce, but also uplifting the level of cyber skills across the board for the nation’s generations to come. She is dedicated to sparking conversation and raising awareness of the fact that future Australia needs support from us today to be the best that they can tomorrow – and as secure as possible.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[“The views reflected in this podcast are the views of the author and do not necessarily reflect the views of KPMG Australia”.
In this episode, we sit down with Ana Forsyth, Associate Director from KPMG, as she discusses the fragmented state of Australia’s education system in relation to cyber education. Ana highlights the significant gaps between schools, vocational training, and higher education, stressing the need for cohesive national strategies and government accountability.
Ana also covers the critical role of teachers in cybersecurity education, the necessity of early cyber safety awareness, and the challenges parents face in navigating their children’s digital lives. She shares her views on current parenting trends in relation to children’s access to technology and the imperative for systemic educational reforms to build a resilient cybersecurity workforce in Australia.
For the past eight years, Ana has been a cyber professional consulting to Federal Government and Defence clients. Ana previously worked in event sales and hospitality management for almost a decade, but took the leap into cyber security and never looked back, successfully transferring her leadership and stakeholder engagement skills.
Ana completed a PhD in cyber security strategy, entitled ‘Educational pathways to national cyber resilience: the Australian story’ (ANU, 2020); the thesis focused on growing Australia’s future cyber workforce by enhancing its pipeline. She argued for strengthened higher and vocational cyber security education, but also for the need to drive more interest in STEM in primary/secondary school, bringing along not just the students, but also their teachers and carers. The research highlighted the need for support from government, academia and industry, seamlessly integrated at every level.
Ana also holds a Master of Arts in Strategy and Security (UNSW at ADFA, 2012), a Master of International Affairs (ANU, 2011), and a Bachelor of Business Administration and Hospitality Management (Northwood University and Hotel Institute Montreux, Switzerland, 2009). She grew up in the Middle East, and did most of her schooling in the French system.
[NB: if Ana could study forever, she would.]
Passionate about the human risk management facet of her industry, Ana is a firm believer in not only growing Australia’s future cyber workforce, but also uplifting the level of cyber skills across the board for the nation’s generations to come. She is dedicated to sparking conversation and raising awareness of the fact that future Australia needs support from us today to be the best that they can tomorrow – and as secure as possible.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 284 Deep Dive: Ana Forsyth | Cyber Education – How early do we start?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>“The views reflected in this podcast are the views of the author and do not necessarily reflect the views of KPMG Australia”.</p>
<p>In this episode, we sit down with Ana Forsyth, Associate Director from KPMG, as she discusses the fragmented state of Australia’s education system in relation to cyber education. Ana highlights the significant gaps between schools, vocational training, and higher education, stressing the need for cohesive national strategies and government accountability.</p>
<p>Ana also covers the critical role of teachers in cybersecurity education, the necessity of early cyber safety awareness, and the challenges parents face in navigating their children’s digital lives. She shares her views on current parenting trends in relation to children’s access to technology and the imperative for systemic educational reforms to build a resilient cybersecurity workforce in Australia.</p>
<p>For the past eight years, Ana has been a cyber professional consulting to Federal Government and Defence clients. Ana previously worked in event sales and hospitality management for almost a decade, but took the leap into cyber security and never looked back, successfully transferring her leadership and stakeholder engagement skills.</p>
<p>Ana completed a PhD in cyber security strategy, entitled ‘Educational pathways to national cyber resilience: the Australian story’ (ANU, 2020); the thesis focused on growing Australia’s future cyber workforce by enhancing its pipeline. She argued for strengthened higher and vocational cyber security education, but also for the need to drive more interest in STEM in primary/secondary school, bringing along not just the students, but also their teachers and carers. The research highlighted the need for support from government, academia and industry, seamlessly integrated at every level.</p>
<p>Ana also holds a Master of Arts in Strategy and Security (UNSW at ADFA, 2012), a Master of International Affairs (ANU, 2011), and a Bachelor of Business Administration and Hospitality Management (Northwood University and Hotel Institute Montreux, Switzerland, 2009). She grew up in the Middle East, and did most of her schooling in the French system.</p>
<p>[NB: if Ana could study forever, she would.]</p>
<p>Passionate about the human risk management facet of her industry, Ana is a firm believer in not only growing Australia’s future cyber workforce, but also uplifting the level of cyber skills across the board for the nation’s generations to come. She is dedicated to sparking conversation and raising awareness of the fact that future Australia needs support from us today to be the best that they can tomorrow – and as secure as possible.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1908583/c1e-02xmsjxrz7hgm3k5-1pdwompvud5-q5vyor.mp3" length="32154061"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[“The views reflected in this podcast are the views of the author and do not necessarily reflect the views of KPMG Australia”.
In this episode, we sit down with Ana Forsyth, Associate Director from KPMG, as she discusses the fragmented state of Australia’s education system in relation to cyber education. Ana highlights the significant gaps between schools, vocational training, and higher education, stressing the need for cohesive national strategies and government accountability.
Ana also covers the critical role of teachers in cybersecurity education, the necessity of early cyber safety awareness, and the challenges parents face in navigating their children’s digital lives. She shares her views on current parenting trends in relation to children’s access to technology and the imperative for systemic educational reforms to build a resilient cybersecurity workforce in Australia.
For the past eight years, Ana has been a cyber professional consulting to Federal Government and Defence clients. Ana previously worked in event sales and hospitality management for almost a decade, but took the leap into cyber security and never looked back, successfully transferring her leadership and stakeholder engagement skills.
Ana completed a PhD in cyber security strategy, entitled ‘Educational pathways to national cyber resilience: the Australian story’ (ANU, 2020); the thesis focused on growing Australia’s future cyber workforce by enhancing its pipeline. She argued for strengthened higher and vocational cyber security education, but also for the need to drive more interest in STEM in primary/secondary school, bringing along not just the students, but also their teachers and carers. The research highlighted the need for support from government, academia and industry, seamlessly integrated at every level.
Ana also holds a Master of Arts in Strategy and Security (UNSW at ADFA, 2012), a Master of International Affairs (ANU, 2011), and a Bachelor of Business Administration and Hospitality Management (Northwood University and Hotel Institute Montreux, Switzerland, 2009). She grew up in the Middle East, and did most of her schooling in the French system.
[NB: if Ana could study forever, she would.]
Passionate about the human risk management facet of her industry, Ana is a firm believer in not only growing Australia’s future cyber workforce, but also uplifting the level of cyber skills across the board for the nation’s generations to come. She is dedicated to sparking conversation and raising awareness of the fact that future Australia needs support from us today to be the best that they can tomorrow – and as secure as possible.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1908583/c1a-5k0v-1pdwo623iwp0-tr9mri.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 283 Deep Dive: John Hare | How AI Shapes the Future of Corporate Security]]>
                </title>
                <pubDate>Wed, 13 Nov 2024 05:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1885559</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-283-deep-dive-john-hare-how-ai-shapes-the-future-of-corporate-security</link>
                                <description>
                                            <![CDATA[<p>“The views reflected in this podcast are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.”</p>
<p style="font-weight:400;">In this episode, we sit down with John Hare, Associate Partner, Cyber Security from EY as he discusses the latest EY research on what those organisations that achieve the best security outcomes (“Secure Creators”) do differently to their less secure peers (“Prone Enterprises”).</p>
<p style="font-weight:400;">We also explore how Secure Creators are responding to the recent surge in AI and GenAI use – both in the cyber function (AI for Cyber) and throughout the enterprise (Cyber for AI). John provides insights into how AI presents an opportunity for astute cyber teams to cement themselves as the true enablers of technology transformation, rather than “the department of no”.</p>
<p style="font-weight:400;">John has 25 years of professional experience, spanning cybersecurity, diplomacy and law. John began his career as an M&amp;A lawyer in London and Tokyo, before serving as a British diplomat for 9 years. John has spent the last decade working on cybersecurity, as a consultant, inside a major bank, and as a regional executive for a technology company.</p>
<p style="font-weight:400;">John advises Australia’s leading financial services organisations on their cybersecurity strategies, adopting global better practice, and making cybersecurity a value creation driver.</p>
<p> </p>
<p style="font-weight:400;">Articles:</p>
<p><a href="https://www.ey.com/en_gl/insights/consulting/transform-cybersecurity-to-accelerate-value-from-ai#:~:text=The%202023%20EY%20Global%20Cybersecurity%20Leadership%20Insights%20Study,defense%2C%20including%20the%20use%20of%20AI%20and%20automation." target="_blank" rel="noreferrer noopener">Cybersecurity an AI accelerator across the business | EY – Global</a>
<a href="https://www.ey.com/en_gl/ciso" target="_blank" rel="noreferrer noopener">Cyber and privacy leaders’ agenda | EY – Global</a></p>
<p>Listen to Decrypting The Future episodes <a href="https://podcasts.apple.com/us/podcast/decrypting-the-future/id1756190024">here</a>.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[“The views reflected in this podcast are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.”
In this episode, we sit down with John Hare, Associate Partner, Cyber Security from EY as he discusses the latest EY research on what those organisations that achieve the best security outcomes (“Secure Creators”) do differently to their less secure peers (“Prone Enterprises”).
We also explore how Secure Creators are responding to the recent surge in AI and GenAI use – both in the cyber function (AI for Cyber) and throughout the enterprise (Cyber for AI). John provides insights into how AI presents an opportunity for astute cyber teams to cement themselves as the true enablers of technology transformation, rather than “the department of no”.
John has 25 years of professional experience, spanning cybersecurity, diplomacy and law. John began his career as an M&A lawyer in London and Tokyo, before serving as a British diplomat for 9 years. John has spent the last decade working on cybersecurity, as a consultant, inside a major bank, and as a regional executive for a technology company.
John advises Australia’s leading financial services organisations on their cybersecurity strategies, adopting global better practice, and making cybersecurity a value creation driver.
 
Articles:
Cybersecurity an AI accelerator across the business | EY – Global
Cyber and privacy leaders’ agenda | EY – Global
Listen to Decrypting The Future episodes here.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 283 Deep Dive: John Hare | How AI Shapes the Future of Corporate Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>“The views reflected in this podcast are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.”</p>
<p style="font-weight:400;">In this episode, we sit down with John Hare, Associate Partner, Cyber Security from EY as he discusses the latest EY research on what those organisations that achieve the best security outcomes (“Secure Creators”) do differently to their less secure peers (“Prone Enterprises”).</p>
<p style="font-weight:400;">We also explore how Secure Creators are responding to the recent surge in AI and GenAI use – both in the cyber function (AI for Cyber) and throughout the enterprise (Cyber for AI). John provides insights into how AI presents an opportunity for astute cyber teams to cement themselves as the true enablers of technology transformation, rather than “the department of no”.</p>
<p style="font-weight:400;">John has 25 years of professional experience, spanning cybersecurity, diplomacy and law. John began his career as an M&amp;A lawyer in London and Tokyo, before serving as a British diplomat for 9 years. John has spent the last decade working on cybersecurity, as a consultant, inside a major bank, and as a regional executive for a technology company.</p>
<p style="font-weight:400;">John advises Australia’s leading financial services organisations on their cybersecurity strategies, adopting global better practice, and making cybersecurity a value creation driver.</p>
<p> </p>
<p style="font-weight:400;">Articles:</p>
<p><a href="https://www.ey.com/en_gl/insights/consulting/transform-cybersecurity-to-accelerate-value-from-ai#:~:text=The%202023%20EY%20Global%20Cybersecurity%20Leadership%20Insights%20Study,defense%2C%20including%20the%20use%20of%20AI%20and%20automation." target="_blank" rel="noreferrer noopener">Cybersecurity an AI accelerator across the business | EY – Global</a>
<a href="https://www.ey.com/en_gl/ciso" target="_blank" rel="noreferrer noopener">Cyber and privacy leaders’ agenda | EY – Global</a></p>
<p>Listen to Decrypting The Future episodes <a href="https://podcasts.apple.com/us/podcast/decrypting-the-future/id1756190024">here</a>.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1885559/c1e-1dogsj4v8rcxv9nj-qd409v81upv5-dgmdwu.mp3" length="35973372"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[“The views reflected in this podcast are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.”
In this episode, we sit down with John Hare, Associate Partner, Cyber Security from EY as he discusses the latest EY research on what those organisations that achieve the best security outcomes (“Secure Creators”) do differently to their less secure peers (“Prone Enterprises”).
We also explore how Secure Creators are responding to the recent surge in AI and GenAI use – both in the cyber function (AI for Cyber) and throughout the enterprise (Cyber for AI). John provides insights into how AI presents an opportunity for astute cyber teams to cement themselves as the true enablers of technology transformation, rather than “the department of no”.
John has 25 years of professional experience, spanning cybersecurity, diplomacy and law. John began his career as an M&A lawyer in London and Tokyo, before serving as a British diplomat for 9 years. John has spent the last decade working on cybersecurity, as a consultant, inside a major bank, and as a regional executive for a technology company.
John advises Australia’s leading financial services organisations on their cybersecurity strategies, adopting global better practice, and making cybersecurity a value creation driver.
 
Articles:
Cybersecurity an AI accelerator across the business | EY – Global
Cyber and privacy leaders’ agenda | EY – Global
Listen to Decrypting The Future episodes here.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1885559/c1a-5k0v-dm5voj19a397-0gwbx1.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 282 Deep Dive: Skeeve Stevens |  Future of Cybersecurity]]>
                </title>
                <pubDate>Wed, 06 Nov 2024 04:56:12 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1875034</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-282-deep-dive-skeeve-stevens-future-of-cybersecurity</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Skeeve Stevens, Director of Future Crime Agency, as he discusses the increasing desensitization to data breaches and the critical need for proactive government action in cybersecurity. Skeeve dives into the consequences of frequent cyber incidents, the potential for more advanced AI-powered attacks, and the urgent requirement for systemic changes to better manage personal data. We explore the inadequacies of current cybersecurity legislation, the challenges in educating the public about cyber risks, and the looming dangers posed by AI and home automation vulnerabilities. Skeeve also highlights the dire need for improved cybersecurity awareness and education to keep pace with technological advancements.</p>
<p>Skeeve Stevens is a leading authority in Australia and the APAC region on the Weaponisation of Technology. He specialises in identifying the risks and threats posed by emerging technologies and navigating the ever-evolving landscape of future technology-driven crime.</p>
<p>Future Crime transcends traditional concepts of cybercrime, representing a vast, complex, and rapidly expanding threat landscape with global reach and immediate, far-reaching consequences.</p>
<p>Skeeve provides expert advice to a diverse range of professionals, including government officials, politicians, legal advisors, lawyers, judges, law enforcement agencies, defence forces, the security sector, and businesses alike. His expertise has earned him hundreds of media appearances as a subject-matter expert, featuring on television, radio, newspapers, and podcasts across the globe.</p>
<p>Skeeve is, above all, a visionary Futurist, accomplished entrepreneur, highly sought-after keynote speaker, and renowned technology architect. As a trusted advisor to C-Level executives, he delivers exceptional insights across a broad spectrum of cutting-edge domains, including Future Crime, Artificial Intelligence, Futurism, Internet Architecture and Critical Infrastructure, the Internet of Things, and Automation. His expertise also spans Micro and Personal Robotics, as well as the sociology and psychology of human interaction with emerging technologies, offering a comprehensive perspective on how these innovations will shape society and our future.</p>
<p><strong> </strong>Skeeve is the author of the Threat Matrix, a restricted publication where he discusses potential risks using current, near Future, and emerging technologies and methodologies.</p>
<p>Skeeve is the founder of the Future Crime Agency (FCA) which specialises in the weaponisation of advanced and emerging technology and creating awareness for Law Enforcement, Military, First Responders, Private Security, and enterprises who work within those sectors.</p>
<p>Skeeve guest lectures on Cybersecurity, Technology Crime, Technology Terrorism, Infrastructure Protection, 1st Principal Thinking and Inversion Thinking at multiple academic institutions in departments such as Computer Science, Political Science, Psychology, National Security, and International Studies.</p>
<p>Skeeve is a former Director of the Internet Society of Australia and former chair of APNIC (Internet Governance) Policy Committee.  He has also represented Australia in Internet Governance issues and policy across the world.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Skeeve Stevens, Director of Future Crime Agency, as he discusses the increasing desensitization to data breaches and the critical need for proactive government action in cybersecurity. Skeeve dives into the consequences of frequent cyber incidents, the potential for more advanced AI-powered attacks, and the urgent requirement for systemic changes to better manage personal data. We explore the inadequacies of current cybersecurity legislation, the challenges in educating the public about cyber risks, and the looming dangers posed by AI and home automation vulnerabilities. Skeeve also highlights the dire need for improved cybersecurity awareness and education to keep pace with technological advancements.
Skeeve Stevens is a leading authority in Australia and the APAC region on the Weaponisation of Technology. He specialises in identifying the risks and threats posed by emerging technologies and navigating the ever-evolving landscape of future technology-driven crime.
Future Crime transcends traditional concepts of cybercrime, representing a vast, complex, and rapidly expanding threat landscape with global reach and immediate, far-reaching consequences.
Skeeve provides expert advice to a diverse range of professionals, including government officials, politicians, legal advisors, lawyers, judges, law enforcement agencies, defence forces, the security sector, and businesses alike. His expertise has earned him hundreds of media appearances as a subject-matter expert, featuring on television, radio, newspapers, and podcasts across the globe.
Skeeve is, above all, a visionary Futurist, accomplished entrepreneur, highly sought-after keynote speaker, and renowned technology architect. As a trusted advisor to C-Level executives, he delivers exceptional insights across a broad spectrum of cutting-edge domains, including Future Crime, Artificial Intelligence, Futurism, Internet Architecture and Critical Infrastructure, the Internet of Things, and Automation. His expertise also spans Micro and Personal Robotics, as well as the sociology and psychology of human interaction with emerging technologies, offering a comprehensive perspective on how these innovations will shape society and our future.
 Skeeve is the author of the Threat Matrix, a restricted publication where he discusses potential risks using current, near Future, and emerging technologies and methodologies.
Skeeve is the founder of the Future Crime Agency (FCA) which specialises in the weaponisation of advanced and emerging technology and creating awareness for Law Enforcement, Military, First Responders, Private Security, and enterprises who work within those sectors.
Skeeve guest lectures on Cybersecurity, Technology Crime, Technology Terrorism, Infrastructure Protection, 1st Principal Thinking and Inversion Thinking at multiple academic institutions in departments such as Computer Science, Political Science, Psychology, National Security, and International Studies.
Skeeve is a former Director of the Internet Society of Australia and former chair of APNIC (Internet Governance) Policy Committee.  He has also represented Australia in Internet Governance issues and policy across the world.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 282 Deep Dive: Skeeve Stevens |  Future of Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Skeeve Stevens, Director of Future Crime Agency, as he discusses the increasing desensitization to data breaches and the critical need for proactive government action in cybersecurity. Skeeve dives into the consequences of frequent cyber incidents, the potential for more advanced AI-powered attacks, and the urgent requirement for systemic changes to better manage personal data. We explore the inadequacies of current cybersecurity legislation, the challenges in educating the public about cyber risks, and the looming dangers posed by AI and home automation vulnerabilities. Skeeve also highlights the dire need for improved cybersecurity awareness and education to keep pace with technological advancements.</p>
<p>Skeeve Stevens is a leading authority in Australia and the APAC region on the Weaponisation of Technology. He specialises in identifying the risks and threats posed by emerging technologies and navigating the ever-evolving landscape of future technology-driven crime.</p>
<p>Future Crime transcends traditional concepts of cybercrime, representing a vast, complex, and rapidly expanding threat landscape with global reach and immediate, far-reaching consequences.</p>
<p>Skeeve provides expert advice to a diverse range of professionals, including government officials, politicians, legal advisors, lawyers, judges, law enforcement agencies, defence forces, the security sector, and businesses alike. His expertise has earned him hundreds of media appearances as a subject-matter expert, featuring on television, radio, newspapers, and podcasts across the globe.</p>
<p>Skeeve is, above all, a visionary Futurist, accomplished entrepreneur, highly sought-after keynote speaker, and renowned technology architect. As a trusted advisor to C-Level executives, he delivers exceptional insights across a broad spectrum of cutting-edge domains, including Future Crime, Artificial Intelligence, Futurism, Internet Architecture and Critical Infrastructure, the Internet of Things, and Automation. His expertise also spans Micro and Personal Robotics, as well as the sociology and psychology of human interaction with emerging technologies, offering a comprehensive perspective on how these innovations will shape society and our future.</p>
<p><strong> </strong>Skeeve is the author of the Threat Matrix, a restricted publication where he discusses potential risks using current, near Future, and emerging technologies and methodologies.</p>
<p>Skeeve is the founder of the Future Crime Agency (FCA) which specialises in the weaponisation of advanced and emerging technology and creating awareness for Law Enforcement, Military, First Responders, Private Security, and enterprises who work within those sectors.</p>
<p>Skeeve guest lectures on Cybersecurity, Technology Crime, Technology Terrorism, Infrastructure Protection, 1st Principal Thinking and Inversion Thinking at multiple academic institutions in departments such as Computer Science, Political Science, Psychology, National Security, and International Studies.</p>
<p>Skeeve is a former Director of the Internet Society of Australia and former chair of APNIC (Internet Governance) Policy Committee.  He has also represented Australia in Internet Governance issues and policy across the world.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1875034/c1e-vzj8a9zz7xtwz1vk-jpjk1vwot1gx-0seggj.mp3" length="73887703"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Skeeve Stevens, Director of Future Crime Agency, as he discusses the increasing desensitization to data breaches and the critical need for proactive government action in cybersecurity. Skeeve dives into the consequences of frequent cyber incidents, the potential for more advanced AI-powered attacks, and the urgent requirement for systemic changes to better manage personal data. We explore the inadequacies of current cybersecurity legislation, the challenges in educating the public about cyber risks, and the looming dangers posed by AI and home automation vulnerabilities. Skeeve also highlights the dire need for improved cybersecurity awareness and education to keep pace with technological advancements.
Skeeve Stevens is a leading authority in Australia and the APAC region on the Weaponisation of Technology. He specialises in identifying the risks and threats posed by emerging technologies and navigating the ever-evolving landscape of future technology-driven crime.
Future Crime transcends traditional concepts of cybercrime, representing a vast, complex, and rapidly expanding threat landscape with global reach and immediate, far-reaching consequences.
Skeeve provides expert advice to a diverse range of professionals, including government officials, politicians, legal advisors, lawyers, judges, law enforcement agencies, defence forces, the security sector, and businesses alike. His expertise has earned him hundreds of media appearances as a subject-matter expert, featuring on television, radio, newspapers, and podcasts across the globe.
Skeeve is, above all, a visionary Futurist, accomplished entrepreneur, highly sought-after keynote speaker, and renowned technology architect. As a trusted advisor to C-Level executives, he delivers exceptional insights across a broad spectrum of cutting-edge domains, including Future Crime, Artificial Intelligence, Futurism, Internet Architecture and Critical Infrastructure, the Internet of Things, and Automation. His expertise also spans Micro and Personal Robotics, as well as the sociology and psychology of human interaction with emerging technologies, offering a comprehensive perspective on how these innovations will shape society and our future.
 Skeeve is the author of the Threat Matrix, a restricted publication where he discusses potential risks using current, near Future, and emerging technologies and methodologies.
Skeeve is the founder of the Future Crime Agency (FCA) which specialises in the weaponisation of advanced and emerging technology and creating awareness for Law Enforcement, Military, First Responders, Private Security, and enterprises who work within those sectors.
Skeeve guest lectures on Cybersecurity, Technology Crime, Technology Terrorism, Infrastructure Protection, 1st Principal Thinking and Inversion Thinking at multiple academic institutions in departments such as Computer Science, Political Science, Psychology, National Security, and International Studies.
Skeeve is a former Director of the Internet Society of Australia and former chair of APNIC (Internet Governance) Policy Committee.  He has also represented Australia in Internet Governance issues and policy across the world.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1875034/c1a-5k0v-0v24rqnjbrk1-y7gpd2.jpg"></itunes:image>
                                                                            <itunes:duration>01:16:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 281 Deep Dive: Yuri Miloslavsky | Risks of Digital Footprint in Information Sharing]]>
                </title>
                <pubDate>Wed, 30 Oct 2024 05:00:13 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1869231</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-281-deep-dive-yuri-miloslavsky-risks-of-digital-footprint-in-information-sharing-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecurity industry’s need to simplify security processes like multi-factor authentication (MFA) to enhance user adoption, and the pivotal role of education in improving security practices. Yuri also addresses corporate privacy policies, the trade-off between convenience and security, and the necessity for tighter compliance and regulation to ensure transparent data management.</p>
<p>Yuri Miloslavsky is an IT professional and entrepreneur with over 15 years of experience in the industry. As the co-founder and CEO of SharePass, a cutting-edge digital footprint management and privacy protection platform, Yuri is at the forefront of developing secure solutions for the modern digital communication landscape. His expertise extends to building and running a successful Managed Service Provider (MSP) specializing in IT consulting and cloud services.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecurity industry’s need to simplify security processes like multi-factor authentication (MFA) to enhance user adoption, and the pivotal role of education in improving security practices. Yuri also addresses corporate privacy policies, the trade-off between convenience and security, and the necessity for tighter compliance and regulation to ensure transparent data management.
Yuri Miloslavsky is an IT professional and entrepreneur with over 15 years of experience in the industry. As the co-founder and CEO of SharePass, a cutting-edge digital footprint management and privacy protection platform, Yuri is at the forefront of developing secure solutions for the modern digital communication landscape. His expertise extends to building and running a successful Managed Service Provider (MSP) specializing in IT consulting and cloud services.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 281 Deep Dive: Yuri Miloslavsky | Risks of Digital Footprint in Information Sharing]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecurity industry’s need to simplify security processes like multi-factor authentication (MFA) to enhance user adoption, and the pivotal role of education in improving security practices. Yuri also addresses corporate privacy policies, the trade-off between convenience and security, and the necessity for tighter compliance and regulation to ensure transparent data management.</p>
<p>Yuri Miloslavsky is an IT professional and entrepreneur with over 15 years of experience in the industry. As the co-founder and CEO of SharePass, a cutting-edge digital footprint management and privacy protection platform, Yuri is at the forefront of developing secure solutions for the modern digital communication landscape. His expertise extends to building and running a successful Managed Service Provider (MSP) specializing in IT consulting and cloud services.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1869231/c1e-5k0vbm6mk6t0xmvo-471ovgmqan71-ohn1q0.mp3" length="38670880"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecurity industry’s need to simplify security processes like multi-factor authentication (MFA) to enhance user adoption, and the pivotal role of education in improving security practices. Yuri also addresses corporate privacy policies, the trade-off between convenience and security, and the necessity for tighter compliance and regulation to ensure transparent data management.
Yuri Miloslavsky is an IT professional and entrepreneur with over 15 years of experience in the industry. As the co-founder and CEO of SharePass, a cutting-edge digital footprint management and privacy protection platform, Yuri is at the forefront of developing secure solutions for the modern digital communication landscape. His expertise extends to building and running a successful Managed Service Provider (MSP) specializing in IT consulting and cloud services.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1869231/c1a-5k0v-pkjn4pwohk-4giv0p.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 280 Deep Dive: Mary D'Angelo | The Power of Dark Web Threat Intelligence]]>
                </title>
                <pubDate>Wed, 23 Oct 2024 05:00:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1847933</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-280-deep-dive-mary-dangelo-the-power-of-dark-web-threat-intelligence-1</link>
                                <description>
                                            <![CDATA[<p dir="ltr">In this episode, we sit down with Mary D’Angelo, Cyber Threat Intelligence Solutions Lead from Filigran, to explore cyber threat intelligence. Mary dives into the challenges of decision-making fatigue and discusses the essential role of integrating threat intelligence across organizational silos. She emphasizes the importance of a top-down cultural shift, advocating to demonstrate threat intelligence’s ROI to C-level executives. Highlighting real-world examples, such as the LockBit ransomware attacks on US hospitals, Mary reinforces the urgent need to democratize and streamline intelligence sharing. She also discusses the potential of AI in improving threat intelligence processes while noting the necessity for human oversight in decision-making.</p>
<p dir="ltr">Mary D’Angelo is a Dark Web Threat Advisor dedicated to empowering organizations with the knowledge and tools needed to effectively combat cyber threats. With a strong focus on threat intelligence, Mary guides businesses in leveraging advanced security strategies to thwart malicious actors.</p>
<p dir="ltr">Her commitment to raising awareness about cybersecurity risks is evident through her extensive work, including insightful interviews and thought-provoking blog posts aimed at educating the public.</p>
<p dir="ltr">Mary holds a Bachelor’s degree from the University of Washington. Actively engaged in the InfoSec community, Mary is a familiar face at industry events, contributing her expertise and staying abreast of emerging trends.</p>
<p dir="ltr">Beyond her professional endeavors, Mary is deeply invested in nurturing the next generation of cybersecurity professionals. She dedicates time to mentoring university students, sharing invaluable insights and guiding them toward successful careers in the field.</p>
<p dir="ltr">Mary’s influence extends beyond traditional realms, as she actively participates in esteemed think tanks such as the Dagstuhl Seminar 2024 and the Tortora Bradya Institute. Through collaborative efforts with leading experts, Mary continues to shape the discourse and advance cybersecurity strategies on a global scale.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Mary D’Angelo, Cyber Threat Intelligence Solutions Lead from Filigran, to explore cyber threat intelligence. Mary dives into the challenges of decision-making fatigue and discusses the essential role of integrating threat intelligence across organizational silos. She emphasizes the importance of a top-down cultural shift, advocating to demonstrate threat intelligence’s ROI to C-level executives. Highlighting real-world examples, such as the LockBit ransomware attacks on US hospitals, Mary reinforces the urgent need to democratize and streamline intelligence sharing. She also discusses the potential of AI in improving threat intelligence processes while noting the necessity for human oversight in decision-making.
Mary D’Angelo is a Dark Web Threat Advisor dedicated to empowering organizations with the knowledge and tools needed to effectively combat cyber threats. With a strong focus on threat intelligence, Mary guides businesses in leveraging advanced security strategies to thwart malicious actors.
Her commitment to raising awareness about cybersecurity risks is evident through her extensive work, including insightful interviews and thought-provoking blog posts aimed at educating the public.
Mary holds a Bachelor’s degree from the University of Washington. Actively engaged in the InfoSec community, Mary is a familiar face at industry events, contributing her expertise and staying abreast of emerging trends.
Beyond her professional endeavors, Mary is deeply invested in nurturing the next generation of cybersecurity professionals. She dedicates time to mentoring university students, sharing invaluable insights and guiding them toward successful careers in the field.
Mary’s influence extends beyond traditional realms, as she actively participates in esteemed think tanks such as the Dagstuhl Seminar 2024 and the Tortora Bradya Institute. Through collaborative efforts with leading experts, Mary continues to shape the discourse and advance cybersecurity strategies on a global scale.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 280 Deep Dive: Mary D'Angelo | The Power of Dark Web Threat Intelligence]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p dir="ltr">In this episode, we sit down with Mary D’Angelo, Cyber Threat Intelligence Solutions Lead from Filigran, to explore cyber threat intelligence. Mary dives into the challenges of decision-making fatigue and discusses the essential role of integrating threat intelligence across organizational silos. She emphasizes the importance of a top-down cultural shift, advocating to demonstrate threat intelligence’s ROI to C-level executives. Highlighting real-world examples, such as the LockBit ransomware attacks on US hospitals, Mary reinforces the urgent need to democratize and streamline intelligence sharing. She also discusses the potential of AI in improving threat intelligence processes while noting the necessity for human oversight in decision-making.</p>
<p dir="ltr">Mary D’Angelo is a Dark Web Threat Advisor dedicated to empowering organizations with the knowledge and tools needed to effectively combat cyber threats. With a strong focus on threat intelligence, Mary guides businesses in leveraging advanced security strategies to thwart malicious actors.</p>
<p dir="ltr">Her commitment to raising awareness about cybersecurity risks is evident through her extensive work, including insightful interviews and thought-provoking blog posts aimed at educating the public.</p>
<p dir="ltr">Mary holds a Bachelor’s degree from the University of Washington. Actively engaged in the InfoSec community, Mary is a familiar face at industry events, contributing her expertise and staying abreast of emerging trends.</p>
<p dir="ltr">Beyond her professional endeavors, Mary is deeply invested in nurturing the next generation of cybersecurity professionals. She dedicates time to mentoring university students, sharing invaluable insights and guiding them toward successful careers in the field.</p>
<p dir="ltr">Mary’s influence extends beyond traditional realms, as she actively participates in esteemed think tanks such as the Dagstuhl Seminar 2024 and the Tortora Bradya Institute. Through collaborative efforts with leading experts, Mary continues to shape the discourse and advance cybersecurity strategies on a global scale.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1847933/c1e-901kfng1nncdv65r-kp2mq8x7i78g-uaja4x.mp3" length="37969545"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Mary D’Angelo, Cyber Threat Intelligence Solutions Lead from Filigran, to explore cyber threat intelligence. Mary dives into the challenges of decision-making fatigue and discusses the essential role of integrating threat intelligence across organizational silos. She emphasizes the importance of a top-down cultural shift, advocating to demonstrate threat intelligence’s ROI to C-level executives. Highlighting real-world examples, such as the LockBit ransomware attacks on US hospitals, Mary reinforces the urgent need to democratize and streamline intelligence sharing. She also discusses the potential of AI in improving threat intelligence processes while noting the necessity for human oversight in decision-making.
Mary D’Angelo is a Dark Web Threat Advisor dedicated to empowering organizations with the knowledge and tools needed to effectively combat cyber threats. With a strong focus on threat intelligence, Mary guides businesses in leveraging advanced security strategies to thwart malicious actors.
Her commitment to raising awareness about cybersecurity risks is evident through her extensive work, including insightful interviews and thought-provoking blog posts aimed at educating the public.
Mary holds a Bachelor’s degree from the University of Washington. Actively engaged in the InfoSec community, Mary is a familiar face at industry events, contributing her expertise and staying abreast of emerging trends.
Beyond her professional endeavors, Mary is deeply invested in nurturing the next generation of cybersecurity professionals. She dedicates time to mentoring university students, sharing invaluable insights and guiding them toward successful careers in the field.
Mary’s influence extends beyond traditional realms, as she actively participates in esteemed think tanks such as the Dagstuhl Seminar 2024 and the Tortora Bradya Institute. Through collaborative efforts with leading experts, Mary continues to shape the discourse and advance cybersecurity strategies on a global scale.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1847933/c1a-5k0v-mk087dvdsj6q-wjyes4.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From NetApp INSIGHT – KB On The Go | Pravjit Tiwana, Senior Vice President & General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform]]>
                </title>
                <pubDate>Fri, 18 Oct 2024 05:00:01 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1856063</guid>
                                    <link>https://kbkast.castos.com/episodes/from-netapp-insight-kb-on-the-go-pravjit-tiwana-senior-vice-president-general-manager-cloud</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is joined by Pravjit Tiwana, NetApp’s Senior Vice President &amp; General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform on the ground at NetApp Insight 2024. Together, they dive into the critical topics like cloud services, unifying customer data, and the future of intelligent data infrastructure.</p>
<p>The discussion delves into the importance of building strong relationships with hyperscalers, the impact of AI on enterprises, and the challenges of data governance. Join us as we explore strategies for integrating AI with data, addressing customer needs, and effectively managing data security and insights.</p>
<p><strong>Pravjit Tiwana, Senior Vice President &amp; General Manager, Cloud Storage Business Unit</strong></p>
<p>Pravjit Tiwana is NetApp’s GM and SVP of Cloud Storage. In his role, Pravjit is responsible for continuing the acceleration of our market leading first-party services in all three public clouds.</p>
<p>Pravjit brings over 25 years of experience to the role, many of those in the cloud space. Most recently, he served as the CEO of Gemini APAC, leading a 1000 person team across engineering, product, program management, sales and Business Development functions. Prior to that, he held a variety of general manager roles at Amazon/AWS, leading the Productivity Applications business and then their Edge &amp; Network Services business. Pravjit lives in Bellevue, Washington with his wife and two teenage daughters (and his best friend, golden doodle Nemo). He is an avid golfer and marathon runner (when it isn’t raining in Seattle).</p>
<p><strong>Jeff Baxter, Vice President, Product Marketing</strong></p>
<p>Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product &amp; solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp, including serving Sr. Director of Product Management for ONTAP, Chief Evangelist for ONTAP, and Field Chief Technology Officer for the Americas at NetApp. Before joining NetApp, Jeff worked as an Associate at Booz Allen Hamilton advising multiple government clients and performing numerous in-depth storage assessments. Prior to Booz Allen, Jeff was Manager of Enterprise Systems at George Washington University, where he led a team of 15+ storage and systems administrators. He had responsibility for enterprise systems including collaboration and virtualization environments, as well as a complex storage system spanning multiple Data Centers. Jeff holds an MBA and BA from George Washington University. He is a NetApp Certified Data Management Administrator (NCDA). He has also has held VCP, SNIA, PMP, ITIL, and CISSP certifications.</p>
<p><strong>Krish Vitaldevara, Senior Vice President, Shared Platform</strong></p>
<p>Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions of consumers. Krish is the SVP for Shared Platform at NetApp, responsible for unified storage platform, manageability platform, Customer eXperience Office (CXO), and Chief Design Office (CDO). His team enables delivery of various NetApp offerings across On-Premise, Hybrid Cloud, and Data Services. Prior to joining NetApp, Krish spent six+ years at Google in multiple roles, including leading product for Android and Plays Trust and Safety and Product for Google Maps. Krish joined Google after a long stint at Microsoft where he led product teams for O365 Foundations, Outlook.com, and Microsoft Consumer Trust and Safety teams. Early in his career, Krish worked at startups such as LoudCloud, started by Ben Horowitz and Marc Andreesen, and Brience, which enabled enterprises to customize customer experiences on mo...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is joined by Pravjit Tiwana, NetApp’s Senior Vice President & General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform on the ground at NetApp Insight 2024. Together, they dive into the critical topics like cloud services, unifying customer data, and the future of intelligent data infrastructure.
The discussion delves into the importance of building strong relationships with hyperscalers, the impact of AI on enterprises, and the challenges of data governance. Join us as we explore strategies for integrating AI with data, addressing customer needs, and effectively managing data security and insights.
Pravjit Tiwana, Senior Vice President & General Manager, Cloud Storage Business Unit
Pravjit Tiwana is NetApp’s GM and SVP of Cloud Storage. In his role, Pravjit is responsible for continuing the acceleration of our market leading first-party services in all three public clouds.
Pravjit brings over 25 years of experience to the role, many of those in the cloud space. Most recently, he served as the CEO of Gemini APAC, leading a 1000 person team across engineering, product, program management, sales and Business Development functions. Prior to that, he held a variety of general manager roles at Amazon/AWS, leading the Productivity Applications business and then their Edge & Network Services business. Pravjit lives in Bellevue, Washington with his wife and two teenage daughters (and his best friend, golden doodle Nemo). He is an avid golfer and marathon runner (when it isn’t raining in Seattle).
Jeff Baxter, Vice President, Product Marketing
Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product & solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp, including serving Sr. Director of Product Management for ONTAP, Chief Evangelist for ONTAP, and Field Chief Technology Officer for the Americas at NetApp. Before joining NetApp, Jeff worked as an Associate at Booz Allen Hamilton advising multiple government clients and performing numerous in-depth storage assessments. Prior to Booz Allen, Jeff was Manager of Enterprise Systems at George Washington University, where he led a team of 15+ storage and systems administrators. He had responsibility for enterprise systems including collaboration and virtualization environments, as well as a complex storage system spanning multiple Data Centers. Jeff holds an MBA and BA from George Washington University. He is a NetApp Certified Data Management Administrator (NCDA). He has also has held VCP, SNIA, PMP, ITIL, and CISSP certifications.
Krish Vitaldevara, Senior Vice President, Shared Platform
Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions of consumers. Krish is the SVP for Shared Platform at NetApp, responsible for unified storage platform, manageability platform, Customer eXperience Office (CXO), and Chief Design Office (CDO). His team enables delivery of various NetApp offerings across On-Premise, Hybrid Cloud, and Data Services. Prior to joining NetApp, Krish spent six+ years at Google in multiple roles, including leading product for Android and Plays Trust and Safety and Product for Google Maps. Krish joined Google after a long stint at Microsoft where he led product teams for O365 Foundations, Outlook.com, and Microsoft Consumer Trust and Safety teams. Early in his career, Krish worked at startups such as LoudCloud, started by Ben Horowitz and Marc Andreesen, and Brience, which enabled enterprises to customize customer experiences on mo...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From NetApp INSIGHT – KB On The Go | Pravjit Tiwana, Senior Vice President & General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is joined by Pravjit Tiwana, NetApp’s Senior Vice President &amp; General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform on the ground at NetApp Insight 2024. Together, they dive into the critical topics like cloud services, unifying customer data, and the future of intelligent data infrastructure.</p>
<p>The discussion delves into the importance of building strong relationships with hyperscalers, the impact of AI on enterprises, and the challenges of data governance. Join us as we explore strategies for integrating AI with data, addressing customer needs, and effectively managing data security and insights.</p>
<p><strong>Pravjit Tiwana, Senior Vice President &amp; General Manager, Cloud Storage Business Unit</strong></p>
<p>Pravjit Tiwana is NetApp’s GM and SVP of Cloud Storage. In his role, Pravjit is responsible for continuing the acceleration of our market leading first-party services in all three public clouds.</p>
<p>Pravjit brings over 25 years of experience to the role, many of those in the cloud space. Most recently, he served as the CEO of Gemini APAC, leading a 1000 person team across engineering, product, program management, sales and Business Development functions. Prior to that, he held a variety of general manager roles at Amazon/AWS, leading the Productivity Applications business and then their Edge &amp; Network Services business. Pravjit lives in Bellevue, Washington with his wife and two teenage daughters (and his best friend, golden doodle Nemo). He is an avid golfer and marathon runner (when it isn’t raining in Seattle).</p>
<p><strong>Jeff Baxter, Vice President, Product Marketing</strong></p>
<p>Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product &amp; solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp, including serving Sr. Director of Product Management for ONTAP, Chief Evangelist for ONTAP, and Field Chief Technology Officer for the Americas at NetApp. Before joining NetApp, Jeff worked as an Associate at Booz Allen Hamilton advising multiple government clients and performing numerous in-depth storage assessments. Prior to Booz Allen, Jeff was Manager of Enterprise Systems at George Washington University, where he led a team of 15+ storage and systems administrators. He had responsibility for enterprise systems including collaboration and virtualization environments, as well as a complex storage system spanning multiple Data Centers. Jeff holds an MBA and BA from George Washington University. He is a NetApp Certified Data Management Administrator (NCDA). He has also has held VCP, SNIA, PMP, ITIL, and CISSP certifications.</p>
<p><strong>Krish Vitaldevara, Senior Vice President, Shared Platform</strong></p>
<p>Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions of consumers. Krish is the SVP for Shared Platform at NetApp, responsible for unified storage platform, manageability platform, Customer eXperience Office (CXO), and Chief Design Office (CDO). His team enables delivery of various NetApp offerings across On-Premise, Hybrid Cloud, and Data Services. Prior to joining NetApp, Krish spent six+ years at Google in multiple roles, including leading product for Android and Plays Trust and Safety and Product for Google Maps. Krish joined Google after a long stint at Microsoft where he led product teams for O365 Foundations, Outlook.com, and Microsoft Consumer Trust and Safety teams. Early in his career, Krish worked at startups such as LoudCloud, started by Ben Horowitz and Marc Andreesen, and Brience, which enabled enterprises to customize customer experiences on mobile. Krish is also a proven innovator and hacker with more than 30 patents, primarily in distributed systems and spam-detection models, using graphs and networks for anomaly detection.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1856063/c1e-02xmsjgk7pcgm3k5-jpj24nv0bqd6-kthg1n.mp3" length="46786812"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is joined by Pravjit Tiwana, NetApp’s Senior Vice President & General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform on the ground at NetApp Insight 2024. Together, they dive into the critical topics like cloud services, unifying customer data, and the future of intelligent data infrastructure.
The discussion delves into the importance of building strong relationships with hyperscalers, the impact of AI on enterprises, and the challenges of data governance. Join us as we explore strategies for integrating AI with data, addressing customer needs, and effectively managing data security and insights.
Pravjit Tiwana, Senior Vice President & General Manager, Cloud Storage Business Unit
Pravjit Tiwana is NetApp’s GM and SVP of Cloud Storage. In his role, Pravjit is responsible for continuing the acceleration of our market leading first-party services in all three public clouds.
Pravjit brings over 25 years of experience to the role, many of those in the cloud space. Most recently, he served as the CEO of Gemini APAC, leading a 1000 person team across engineering, product, program management, sales and Business Development functions. Prior to that, he held a variety of general manager roles at Amazon/AWS, leading the Productivity Applications business and then their Edge & Network Services business. Pravjit lives in Bellevue, Washington with his wife and two teenage daughters (and his best friend, golden doodle Nemo). He is an avid golfer and marathon runner (when it isn’t raining in Seattle).
Jeff Baxter, Vice President, Product Marketing
Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product & solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp, including serving Sr. Director of Product Management for ONTAP, Chief Evangelist for ONTAP, and Field Chief Technology Officer for the Americas at NetApp. Before joining NetApp, Jeff worked as an Associate at Booz Allen Hamilton advising multiple government clients and performing numerous in-depth storage assessments. Prior to Booz Allen, Jeff was Manager of Enterprise Systems at George Washington University, where he led a team of 15+ storage and systems administrators. He had responsibility for enterprise systems including collaboration and virtualization environments, as well as a complex storage system spanning multiple Data Centers. Jeff holds an MBA and BA from George Washington University. He is a NetApp Certified Data Management Administrator (NCDA). He has also has held VCP, SNIA, PMP, ITIL, and CISSP certifications.
Krish Vitaldevara, Senior Vice President, Shared Platform
Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions of consumers. Krish is the SVP for Shared Platform at NetApp, responsible for unified storage platform, manageability platform, Customer eXperience Office (CXO), and Chief Design Office (CDO). His team enables delivery of various NetApp offerings across On-Premise, Hybrid Cloud, and Data Services. Prior to joining NetApp, Krish spent six+ years at Google in multiple roles, including leading product for Android and Plays Trust and Safety and Product for Google Maps. Krish joined Google after a long stint at Microsoft where he led product teams for O365 Foundations, Outlook.com, and Microsoft Consumer Trust and Safety teams. Early in his career, Krish worked at startups such as LoudCloud, started by Ben Horowitz and Marc Andreesen, and Brience, which enabled enterprises to customize customer experiences on mo...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1856063/c1a-5k0v-5zkx5p3jsm43-ffjbgi.png"></itunes:image>
                                                                            <itunes:duration>00:48:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From NetApp INSIGHT - KB On The Go | Haiyan Song, Executive Vice President & General Manager, CloudOps and Sandeep Singh, Senior Vice President & General Manager, Enterprise Storage]]>
                </title>
                <pubDate>Wed, 16 Oct 2024 05:00:55 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1856057</guid>
                                    <link>https://kbkast.castos.com/episodes/from-netapp-insight-kb-on-the-go-haiyan-song-executive-vice-president-general-manager-cloudo</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is joined by Haiyan Song, NetApp’s EVP &amp; GM, CloudOps and Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage on the ground at NetApp Insight 2024. Together, they dive into the critical topics of data management, cloud operations, and cybersecurity. This conversation explores the groundbreaking shifts in technology and strategy at NetApp, focusing on the integration of intelligent services in data infrastructure, the critical role of enterprise storage, and the future of AI.</p>
<p>Tune in to discover how NetApp is not only redefining the cloud operating model but also tackling the crucial challenges of data security and ransomware protection.</p>
<p><strong>Haiyan Song, EVP &amp; GM, CloudOps – NetApp</strong></p>
<p>Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with and leveraging larger company ecosystem capabilities to accelerate success. Haiyan has held several leadership roles throughout her career tenure, including Splunk, HPE and Arcsight, all of which represent richly diverse technical experience. While her achievements are vast, one of the most notable during her time at Splunk includes her leadership in building and scaling a transformative business area that resulted in an increase in revenue of more than 15x over a seven-year period. Not only does she have a wide breadth of technical skills, but she has also worked in management roles within smaller companies, large-scale enterprises, and acquired businesses, and is experienced in change-readiness and organisational transformation.</p>
<p><strong>Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage – NetApp</strong></p>
<p>Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building innovative products, managing high-performance organisations, and delivering business results at startups and Fortune 500 technology companies. Prior to joining NetApp, Sandeep spent four years at Hewlett Packard Enterprise (HPE) in multiple roles, including Vice President of Product Management for Data Infrastructure, Vice President of Marketing for HPE Storage, and CMO for Zerto, an HPE company. Sandeep joined HPE from Pure Storage, where he led product marketing for FlashArray, and helped the company scale from pre-IPO $100M run rate to a public company with greater than $1B in revenue. Prior to Pure, Sandeep led product management and strategy for 3PAR, an enterprise storage company, from pre-revenue to greater than $1B in revenue, including four-year tenure at HP post-3PAR acquisition. Sandeep resides in the Bay Area with his wife, two daughters, and their family dog. He has completed several marathons and ultra-marathons, including a 50-mile race, and his family has backpacked more 75 miles of the John Muir Trail.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is joined by Haiyan Song, NetApp’s EVP & GM, CloudOps and Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage on the ground at NetApp Insight 2024. Together, they dive into the critical topics of data management, cloud operations, and cybersecurity. This conversation explores the groundbreaking shifts in technology and strategy at NetApp, focusing on the integration of intelligent services in data infrastructure, the critical role of enterprise storage, and the future of AI.
Tune in to discover how NetApp is not only redefining the cloud operating model but also tackling the crucial challenges of data security and ransomware protection.
Haiyan Song, EVP & GM, CloudOps – NetApp
Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with and leveraging larger company ecosystem capabilities to accelerate success. Haiyan has held several leadership roles throughout her career tenure, including Splunk, HPE and Arcsight, all of which represent richly diverse technical experience. While her achievements are vast, one of the most notable during her time at Splunk includes her leadership in building and scaling a transformative business area that resulted in an increase in revenue of more than 15x over a seven-year period. Not only does she have a wide breadth of technical skills, but she has also worked in management roles within smaller companies, large-scale enterprises, and acquired businesses, and is experienced in change-readiness and organisational transformation.
Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage – NetApp
Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building innovative products, managing high-performance organisations, and delivering business results at startups and Fortune 500 technology companies. Prior to joining NetApp, Sandeep spent four years at Hewlett Packard Enterprise (HPE) in multiple roles, including Vice President of Product Management for Data Infrastructure, Vice President of Marketing for HPE Storage, and CMO for Zerto, an HPE company. Sandeep joined HPE from Pure Storage, where he led product marketing for FlashArray, and helped the company scale from pre-IPO $100M run rate to a public company with greater than $1B in revenue. Prior to Pure, Sandeep led product management and strategy for 3PAR, an enterprise storage company, from pre-revenue to greater than $1B in revenue, including four-year tenure at HP post-3PAR acquisition. Sandeep resides in the Bay Area with his wife, two daughters, and their family dog. He has completed several marathons and ultra-marathons, including a 50-mile race, and his family has backpacked more 75 miles of the John Muir Trail.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From NetApp INSIGHT - KB On The Go | Haiyan Song, Executive Vice President & General Manager, CloudOps and Sandeep Singh, Senior Vice President & General Manager, Enterprise Storage]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is joined by Haiyan Song, NetApp’s EVP &amp; GM, CloudOps and Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage on the ground at NetApp Insight 2024. Together, they dive into the critical topics of data management, cloud operations, and cybersecurity. This conversation explores the groundbreaking shifts in technology and strategy at NetApp, focusing on the integration of intelligent services in data infrastructure, the critical role of enterprise storage, and the future of AI.</p>
<p>Tune in to discover how NetApp is not only redefining the cloud operating model but also tackling the crucial challenges of data security and ransomware protection.</p>
<p><strong>Haiyan Song, EVP &amp; GM, CloudOps – NetApp</strong></p>
<p>Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with and leveraging larger company ecosystem capabilities to accelerate success. Haiyan has held several leadership roles throughout her career tenure, including Splunk, HPE and Arcsight, all of which represent richly diverse technical experience. While her achievements are vast, one of the most notable during her time at Splunk includes her leadership in building and scaling a transformative business area that resulted in an increase in revenue of more than 15x over a seven-year period. Not only does she have a wide breadth of technical skills, but she has also worked in management roles within smaller companies, large-scale enterprises, and acquired businesses, and is experienced in change-readiness and organisational transformation.</p>
<p><strong>Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage – NetApp</strong></p>
<p>Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building innovative products, managing high-performance organisations, and delivering business results at startups and Fortune 500 technology companies. Prior to joining NetApp, Sandeep spent four years at Hewlett Packard Enterprise (HPE) in multiple roles, including Vice President of Product Management for Data Infrastructure, Vice President of Marketing for HPE Storage, and CMO for Zerto, an HPE company. Sandeep joined HPE from Pure Storage, where he led product marketing for FlashArray, and helped the company scale from pre-IPO $100M run rate to a public company with greater than $1B in revenue. Prior to Pure, Sandeep led product management and strategy for 3PAR, an enterprise storage company, from pre-revenue to greater than $1B in revenue, including four-year tenure at HP post-3PAR acquisition. Sandeep resides in the Bay Area with his wife, two daughters, and their family dog. He has completed several marathons and ultra-marathons, including a 50-mile race, and his family has backpacked more 75 miles of the John Muir Trail.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1856057/c1e-2k31b8zmq4c67jo4-gpkw2zq1bd6z-rido8g.mp3" length="27184108"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is joined by Haiyan Song, NetApp’s EVP & GM, CloudOps and Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage on the ground at NetApp Insight 2024. Together, they dive into the critical topics of data management, cloud operations, and cybersecurity. This conversation explores the groundbreaking shifts in technology and strategy at NetApp, focusing on the integration of intelligent services in data infrastructure, the critical role of enterprise storage, and the future of AI.
Tune in to discover how NetApp is not only redefining the cloud operating model but also tackling the crucial challenges of data security and ransomware protection.
Haiyan Song, EVP & GM, CloudOps – NetApp
Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with and leveraging larger company ecosystem capabilities to accelerate success. Haiyan has held several leadership roles throughout her career tenure, including Splunk, HPE and Arcsight, all of which represent richly diverse technical experience. While her achievements are vast, one of the most notable during her time at Splunk includes her leadership in building and scaling a transformative business area that resulted in an increase in revenue of more than 15x over a seven-year period. Not only does she have a wide breadth of technical skills, but she has also worked in management roles within smaller companies, large-scale enterprises, and acquired businesses, and is experienced in change-readiness and organisational transformation.
Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage – NetApp
Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building innovative products, managing high-performance organisations, and delivering business results at startups and Fortune 500 technology companies. Prior to joining NetApp, Sandeep spent four years at Hewlett Packard Enterprise (HPE) in multiple roles, including Vice President of Product Management for Data Infrastructure, Vice President of Marketing for HPE Storage, and CMO for Zerto, an HPE company. Sandeep joined HPE from Pure Storage, where he led product marketing for FlashArray, and helped the company scale from pre-IPO $100M run rate to a public company with greater than $1B in revenue. Prior to Pure, Sandeep led product management and strategy for 3PAR, an enterprise storage company, from pre-revenue to greater than $1B in revenue, including four-year tenure at HP post-3PAR acquisition. Sandeep resides in the Bay Area with his wife, two daughters, and their family dog. He has completed several marathons and ultra-marathons, including a 50-mile race, and his family has backpacked more 75 miles of the John Muir Trail.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1856057/c1a-5k0v-jpjdo08zt173-1mfrhv.png"></itunes:image>
                                                                            <itunes:duration>00:28:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From NetApp INSIGHT – KB On The Go | Ashish Dhawan, Senior Vice President/General Manager & Chief Revenue Officer, Cloud Business Unit and Gagan Gulati, General Manager, Data Services]]>
                </title>
                <pubDate>Fri, 11 Oct 2024 05:00:28 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1856052</guid>
                                    <link>https://kbkast.castos.com/episodes/from-netapp-insight-kb-on-the-go-ashish-dhawan-senior-vice-presidentgeneral-manager-chief-re-1</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is joined by Ashish Dhawan, NetApp’s Senior Vice President/General Manager &amp; Chief Revenue Officer, Cloud Business Unit and Gagan Gulati, General Manager, Data Services, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of data and AI.</p>
<p>Join us as we explore the accelerating drive towards enterprise cloud adoption with Ashish and discover the obstacles enterprises face and the strategies necessary for successful cloud integration.</p>
<p>Later in the episode, we shift focus to data protection and governance with Gagan as we discuss the crucial role of understanding and safeguarding your data in today’s digital landscape.</p>
<p><strong>Ashish Dhawan, SVP/GM and Chief Revenue Officer, Cloud Business Unit</strong></p>
<p>Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. Ashish Dhawan is a highly respected leader in the technology industry, currently serving as the Managing Director for Global Enterprise Workloads at Amazon Web Services (AWS). With a career spanning over two decades, he has been the architect of several successful businesses across the world.</p>
<p>Driving Enterprise Cloud Adoption at AWS:
Since joining AWS in 2018, Dhawan has played a pivotal role in driving cloud adoption in enterprises. He began in Asia Pacific where he built the enterprise sales team and in 3 years helped the enterprise business grow 6X. He built and nurtured lasting C-level relationships, hired and mentored talented people, and was a change agent with a focus on strategic planning and disciplined execution. He then went on to lead the Global Enterprise Workloads team which focused on migrating and modernising key enterprise workloads like Microsoft and VMware. Under his leadership, the enterprise workloads business consistently grew &gt;30% and he helped AWS achieve leadership in infrastructure and application modernization.</p>
<p>Early Career and Industry Expertise:
Dhawan began his career in technology sales, quickly establishing himself as a top performer. He honed his skills at companies like Wipro, Microsoft and Juniper, where he built businesses from scratch, created strong teams and left a legacy of strong relationships with customers and partners. Prior to joining AWS, Ashish was VP Sales at Juniper in Asia Pacific, Japan and China based out of Singapore. This experience gave him invaluable insights into the needs and challenges of enterprise customers, which has proven crucial in his current role.</p>
<p>A Visionary Leader and Motivator:
Dhawan is known for his strategic thinking, ability to build high-performing teams, and passion for innovation. He is an Amazon Bar Raiser and a highly respected leader within AWS, known for his motivational approach and commitment to employee development. He is also a frequent speaker at industry events, sharing his insights on the future of cloud computing and the impact it will have on businesses globally.</p>
<p><strong>Gagan Gulati, General Manager, Data Services – NetApp</strong></p>
<p>Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance and CVO. Prior to NetApp, Gagan was Chief Product Officer at Behavox, a security and compliance company where he helped guide the vision, strategy, and roadmap for their product portfolio. Prior to that, Gagan was at Microsoft for 16 years. He was partner and director for PM for Data Protection and Governance products, where he took multiple products—including Azure RMS, Azure Information Protection, Microsoft Information Protection, and Azure Purview— from incubation to their incredible growth, usage, and success.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is joined by Ashish Dhawan, NetApp’s Senior Vice President/General Manager & Chief Revenue Officer, Cloud Business Unit and Gagan Gulati, General Manager, Data Services, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of data and AI.
Join us as we explore the accelerating drive towards enterprise cloud adoption with Ashish and discover the obstacles enterprises face and the strategies necessary for successful cloud integration.
Later in the episode, we shift focus to data protection and governance with Gagan as we discuss the crucial role of understanding and safeguarding your data in today’s digital landscape.
Ashish Dhawan, SVP/GM and Chief Revenue Officer, Cloud Business Unit
Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. Ashish Dhawan is a highly respected leader in the technology industry, currently serving as the Managing Director for Global Enterprise Workloads at Amazon Web Services (AWS). With a career spanning over two decades, he has been the architect of several successful businesses across the world.
Driving Enterprise Cloud Adoption at AWS:
Since joining AWS in 2018, Dhawan has played a pivotal role in driving cloud adoption in enterprises. He began in Asia Pacific where he built the enterprise sales team and in 3 years helped the enterprise business grow 6X. He built and nurtured lasting C-level relationships, hired and mentored talented people, and was a change agent with a focus on strategic planning and disciplined execution. He then went on to lead the Global Enterprise Workloads team which focused on migrating and modernising key enterprise workloads like Microsoft and VMware. Under his leadership, the enterprise workloads business consistently grew >30% and he helped AWS achieve leadership in infrastructure and application modernization.
Early Career and Industry Expertise:
Dhawan began his career in technology sales, quickly establishing himself as a top performer. He honed his skills at companies like Wipro, Microsoft and Juniper, where he built businesses from scratch, created strong teams and left a legacy of strong relationships with customers and partners. Prior to joining AWS, Ashish was VP Sales at Juniper in Asia Pacific, Japan and China based out of Singapore. This experience gave him invaluable insights into the needs and challenges of enterprise customers, which has proven crucial in his current role.
A Visionary Leader and Motivator:
Dhawan is known for his strategic thinking, ability to build high-performing teams, and passion for innovation. He is an Amazon Bar Raiser and a highly respected leader within AWS, known for his motivational approach and commitment to employee development. He is also a frequent speaker at industry events, sharing his insights on the future of cloud computing and the impact it will have on businesses globally.
Gagan Gulati, General Manager, Data Services – NetApp
Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance and CVO. Prior to NetApp, Gagan was Chief Product Officer at Behavox, a security and compliance company where he helped guide the vision, strategy, and roadmap for their product portfolio. Prior to that, Gagan was at Microsoft for 16 years. He was partner and director for PM for Data Protection and Governance products, where he took multiple products—including Azure RMS, Azure Information Protection, Microsoft Information Protection, and Azure Purview— from incubation to their incredible growth, usage, and success.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From NetApp INSIGHT – KB On The Go | Ashish Dhawan, Senior Vice President/General Manager & Chief Revenue Officer, Cloud Business Unit and Gagan Gulati, General Manager, Data Services]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is joined by Ashish Dhawan, NetApp’s Senior Vice President/General Manager &amp; Chief Revenue Officer, Cloud Business Unit and Gagan Gulati, General Manager, Data Services, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of data and AI.</p>
<p>Join us as we explore the accelerating drive towards enterprise cloud adoption with Ashish and discover the obstacles enterprises face and the strategies necessary for successful cloud integration.</p>
<p>Later in the episode, we shift focus to data protection and governance with Gagan as we discuss the crucial role of understanding and safeguarding your data in today’s digital landscape.</p>
<p><strong>Ashish Dhawan, SVP/GM and Chief Revenue Officer, Cloud Business Unit</strong></p>
<p>Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. Ashish Dhawan is a highly respected leader in the technology industry, currently serving as the Managing Director for Global Enterprise Workloads at Amazon Web Services (AWS). With a career spanning over two decades, he has been the architect of several successful businesses across the world.</p>
<p>Driving Enterprise Cloud Adoption at AWS:
Since joining AWS in 2018, Dhawan has played a pivotal role in driving cloud adoption in enterprises. He began in Asia Pacific where he built the enterprise sales team and in 3 years helped the enterprise business grow 6X. He built and nurtured lasting C-level relationships, hired and mentored talented people, and was a change agent with a focus on strategic planning and disciplined execution. He then went on to lead the Global Enterprise Workloads team which focused on migrating and modernising key enterprise workloads like Microsoft and VMware. Under his leadership, the enterprise workloads business consistently grew &gt;30% and he helped AWS achieve leadership in infrastructure and application modernization.</p>
<p>Early Career and Industry Expertise:
Dhawan began his career in technology sales, quickly establishing himself as a top performer. He honed his skills at companies like Wipro, Microsoft and Juniper, where he built businesses from scratch, created strong teams and left a legacy of strong relationships with customers and partners. Prior to joining AWS, Ashish was VP Sales at Juniper in Asia Pacific, Japan and China based out of Singapore. This experience gave him invaluable insights into the needs and challenges of enterprise customers, which has proven crucial in his current role.</p>
<p>A Visionary Leader and Motivator:
Dhawan is known for his strategic thinking, ability to build high-performing teams, and passion for innovation. He is an Amazon Bar Raiser and a highly respected leader within AWS, known for his motivational approach and commitment to employee development. He is also a frequent speaker at industry events, sharing his insights on the future of cloud computing and the impact it will have on businesses globally.</p>
<p><strong>Gagan Gulati, General Manager, Data Services – NetApp</strong></p>
<p>Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance and CVO. Prior to NetApp, Gagan was Chief Product Officer at Behavox, a security and compliance company where he helped guide the vision, strategy, and roadmap for their product portfolio. Prior to that, Gagan was at Microsoft for 16 years. He was partner and director for PM for Data Protection and Governance products, where he took multiple products—including Azure RMS, Azure Information Protection, Microsoft Information Protection, and Azure Purview— from incubation to their incredible growth, usage, and success.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1856052/c1e-q40nh29d7ji0v2x4-ok3w4mo5a5-jnsr7g.mp3" length="21945407"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is joined by Ashish Dhawan, NetApp’s Senior Vice President/General Manager & Chief Revenue Officer, Cloud Business Unit and Gagan Gulati, General Manager, Data Services, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of data and AI.
Join us as we explore the accelerating drive towards enterprise cloud adoption with Ashish and discover the obstacles enterprises face and the strategies necessary for successful cloud integration.
Later in the episode, we shift focus to data protection and governance with Gagan as we discuss the crucial role of understanding and safeguarding your data in today’s digital landscape.
Ashish Dhawan, SVP/GM and Chief Revenue Officer, Cloud Business Unit
Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. Ashish Dhawan is a highly respected leader in the technology industry, currently serving as the Managing Director for Global Enterprise Workloads at Amazon Web Services (AWS). With a career spanning over two decades, he has been the architect of several successful businesses across the world.
Driving Enterprise Cloud Adoption at AWS:
Since joining AWS in 2018, Dhawan has played a pivotal role in driving cloud adoption in enterprises. He began in Asia Pacific where he built the enterprise sales team and in 3 years helped the enterprise business grow 6X. He built and nurtured lasting C-level relationships, hired and mentored talented people, and was a change agent with a focus on strategic planning and disciplined execution. He then went on to lead the Global Enterprise Workloads team which focused on migrating and modernising key enterprise workloads like Microsoft and VMware. Under his leadership, the enterprise workloads business consistently grew >30% and he helped AWS achieve leadership in infrastructure and application modernization.
Early Career and Industry Expertise:
Dhawan began his career in technology sales, quickly establishing himself as a top performer. He honed his skills at companies like Wipro, Microsoft and Juniper, where he built businesses from scratch, created strong teams and left a legacy of strong relationships with customers and partners. Prior to joining AWS, Ashish was VP Sales at Juniper in Asia Pacific, Japan and China based out of Singapore. This experience gave him invaluable insights into the needs and challenges of enterprise customers, which has proven crucial in his current role.
A Visionary Leader and Motivator:
Dhawan is known for his strategic thinking, ability to build high-performing teams, and passion for innovation. He is an Amazon Bar Raiser and a highly respected leader within AWS, known for his motivational approach and commitment to employee development. He is also a frequent speaker at industry events, sharing his insights on the future of cloud computing and the impact it will have on businesses globally.
Gagan Gulati, General Manager, Data Services – NetApp
Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance and CVO. Prior to NetApp, Gagan was Chief Product Officer at Behavox, a security and compliance company where he helped guide the vision, strategy, and roadmap for their product portfolio. Prior to that, Gagan was at Microsoft for 16 years. He was partner and director for PM for Data Protection and Governance products, where he took multiple products—including Azure RMS, Azure Information Protection, Microsoft Information Protection, and Azure Purview— from incubation to their incredible growth, usage, and success.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1856052/c1a-5k0v-wwm6z1m7h9qg-kr63to.png"></itunes:image>
                                                                            <itunes:duration>00:22:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: Oracle CloudWorld Las Vegas]]>
                </title>
                <pubDate>Wed, 09 Oct 2024 05:00:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1854080</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-oracle-cloudworld-las-vegas-1</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is on the go at Oracle CloudWorld in Las Vegas to find more about Oracle’s latest cloud technology, AI advancements, and innovative strategies. She sits down with Oracle executives Stephen Bovis, Stephanie Trunzo, and Pradeep Vincent as they explore Oracle’s shift from product-focused origins to a service-oriented approach, the vital role of AI in industry applications, and their efforts to bridge the gap between technological advancements and customer engagement.</p>
<p><strong>Stephen Bovis, Regional Managing Director, Australia and New Zealand, Oracle</strong></p>
<p>Stephen Bovis is responsible for Oracle’s overall business in Australia and New Zealand and ensuring it delivers on its values of trust, customer success, innovation, and equality for its customers, partners, and communities across the region.</p>
<p>Stephen has more than 30 years of experience in the IT industry across a wide range of roles, functions, and marketing segments. Most recently, he was at Hewlett Packard Enterprise, where he was vice president and managing director of the South Pacific region.</p>
<p>Prior to that, he was based in Singapore leading HP’s Enterprise Group sales account management team for Asia Pacific, whose portfolio included hardware, services, and software.</p>
<p><strong>Stephanie Trunzo, Senior Vice President &amp; General Manager, Oracle Industries</strong></p>
<p>Expanding upon the success of launching Oracle Health as a complete portfolio that spans Oracle’s applications and infrastructure, Stephanie leads an industry-informed approach to Applied AI, Industry Clouds, and One Oracle model. In addition to Health and Life Sciences, Stephanie’s team drives Go To Market strategies for Financial Services, Retail, Hospitality, Restaurants/F&amp;B, Energy &amp; Water, Communications, Engineering &amp; Construction, and Public Safety. Stephanie’s scope spans an $8B business with over 50k employees, including multiple acquisitions and organic growth.</p>
<p>Oracle’s Global Industries organisation solves some of industries’ toughest challenges with innovative yet practical applications built as best-practice examples of Oracle’s technology stack. By partnering with our clients, and hiring industry experts, we are building the most flexible and robust industry clouds in the market.</p>
<p><strong>Pradeep Vincent, Senior Vice President &amp; Chief Technical Architect, OCI, Oracle</strong></p>
<p>Pradeep Vincent is the Chief Technical Architect and Senior Vice President at Oracle Cloud Infrastructure (OCI). He is a technology and software architect with more than 20 years of experience in tech companies such as Oracle, AWS, and IBM. He has a deep understanding of Cloud Infrastructure, Compute, Storage and Networking. Pradeep has been with Oracle for more than eight years leading a team of architects and software engineers building Oracle’s Public Cloud. He also leads OCI’s Architecture and Engineering Community initiatives.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is on the go at Oracle CloudWorld in Las Vegas to find more about Oracle’s latest cloud technology, AI advancements, and innovative strategies. She sits down with Oracle executives Stephen Bovis, Stephanie Trunzo, and Pradeep Vincent as they explore Oracle’s shift from product-focused origins to a service-oriented approach, the vital role of AI in industry applications, and their efforts to bridge the gap between technological advancements and customer engagement.
Stephen Bovis, Regional Managing Director, Australia and New Zealand, Oracle
Stephen Bovis is responsible for Oracle’s overall business in Australia and New Zealand and ensuring it delivers on its values of trust, customer success, innovation, and equality for its customers, partners, and communities across the region.
Stephen has more than 30 years of experience in the IT industry across a wide range of roles, functions, and marketing segments. Most recently, he was at Hewlett Packard Enterprise, where he was vice president and managing director of the South Pacific region.
Prior to that, he was based in Singapore leading HP’s Enterprise Group sales account management team for Asia Pacific, whose portfolio included hardware, services, and software.
Stephanie Trunzo, Senior Vice President & General Manager, Oracle Industries
Expanding upon the success of launching Oracle Health as a complete portfolio that spans Oracle’s applications and infrastructure, Stephanie leads an industry-informed approach to Applied AI, Industry Clouds, and One Oracle model. In addition to Health and Life Sciences, Stephanie’s team drives Go To Market strategies for Financial Services, Retail, Hospitality, Restaurants/F&B, Energy & Water, Communications, Engineering & Construction, and Public Safety. Stephanie’s scope spans an $8B business with over 50k employees, including multiple acquisitions and organic growth.
Oracle’s Global Industries organisation solves some of industries’ toughest challenges with innovative yet practical applications built as best-practice examples of Oracle’s technology stack. By partnering with our clients, and hiring industry experts, we are building the most flexible and robust industry clouds in the market.
Pradeep Vincent, Senior Vice President & Chief Technical Architect, OCI, Oracle
Pradeep Vincent is the Chief Technical Architect and Senior Vice President at Oracle Cloud Infrastructure (OCI). He is a technology and software architect with more than 20 years of experience in tech companies such as Oracle, AWS, and IBM. He has a deep understanding of Cloud Infrastructure, Compute, Storage and Networking. Pradeep has been with Oracle for more than eight years leading a team of architects and software engineers building Oracle’s Public Cloud. He also leads OCI’s Architecture and Engineering Community initiatives.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: Oracle CloudWorld Las Vegas]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is on the go at Oracle CloudWorld in Las Vegas to find more about Oracle’s latest cloud technology, AI advancements, and innovative strategies. She sits down with Oracle executives Stephen Bovis, Stephanie Trunzo, and Pradeep Vincent as they explore Oracle’s shift from product-focused origins to a service-oriented approach, the vital role of AI in industry applications, and their efforts to bridge the gap between technological advancements and customer engagement.</p>
<p><strong>Stephen Bovis, Regional Managing Director, Australia and New Zealand, Oracle</strong></p>
<p>Stephen Bovis is responsible for Oracle’s overall business in Australia and New Zealand and ensuring it delivers on its values of trust, customer success, innovation, and equality for its customers, partners, and communities across the region.</p>
<p>Stephen has more than 30 years of experience in the IT industry across a wide range of roles, functions, and marketing segments. Most recently, he was at Hewlett Packard Enterprise, where he was vice president and managing director of the South Pacific region.</p>
<p>Prior to that, he was based in Singapore leading HP’s Enterprise Group sales account management team for Asia Pacific, whose portfolio included hardware, services, and software.</p>
<p><strong>Stephanie Trunzo, Senior Vice President &amp; General Manager, Oracle Industries</strong></p>
<p>Expanding upon the success of launching Oracle Health as a complete portfolio that spans Oracle’s applications and infrastructure, Stephanie leads an industry-informed approach to Applied AI, Industry Clouds, and One Oracle model. In addition to Health and Life Sciences, Stephanie’s team drives Go To Market strategies for Financial Services, Retail, Hospitality, Restaurants/F&amp;B, Energy &amp; Water, Communications, Engineering &amp; Construction, and Public Safety. Stephanie’s scope spans an $8B business with over 50k employees, including multiple acquisitions and organic growth.</p>
<p>Oracle’s Global Industries organisation solves some of industries’ toughest challenges with innovative yet practical applications built as best-practice examples of Oracle’s technology stack. By partnering with our clients, and hiring industry experts, we are building the most flexible and robust industry clouds in the market.</p>
<p><strong>Pradeep Vincent, Senior Vice President &amp; Chief Technical Architect, OCI, Oracle</strong></p>
<p>Pradeep Vincent is the Chief Technical Architect and Senior Vice President at Oracle Cloud Infrastructure (OCI). He is a technology and software architect with more than 20 years of experience in tech companies such as Oracle, AWS, and IBM. He has a deep understanding of Cloud Infrastructure, Compute, Storage and Networking. Pradeep has been with Oracle for more than eight years leading a team of architects and software engineers building Oracle’s Public Cloud. He also leads OCI’s Architecture and Engineering Community initiatives.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1854080/c1e-pjr0h538kmbmo9x0-xx88r13vi6dg-ouqzxa.mp3" length="71079853"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is on the go at Oracle CloudWorld in Las Vegas to find more about Oracle’s latest cloud technology, AI advancements, and innovative strategies. She sits down with Oracle executives Stephen Bovis, Stephanie Trunzo, and Pradeep Vincent as they explore Oracle’s shift from product-focused origins to a service-oriented approach, the vital role of AI in industry applications, and their efforts to bridge the gap between technological advancements and customer engagement.
Stephen Bovis, Regional Managing Director, Australia and New Zealand, Oracle
Stephen Bovis is responsible for Oracle’s overall business in Australia and New Zealand and ensuring it delivers on its values of trust, customer success, innovation, and equality for its customers, partners, and communities across the region.
Stephen has more than 30 years of experience in the IT industry across a wide range of roles, functions, and marketing segments. Most recently, he was at Hewlett Packard Enterprise, where he was vice president and managing director of the South Pacific region.
Prior to that, he was based in Singapore leading HP’s Enterprise Group sales account management team for Asia Pacific, whose portfolio included hardware, services, and software.
Stephanie Trunzo, Senior Vice President & General Manager, Oracle Industries
Expanding upon the success of launching Oracle Health as a complete portfolio that spans Oracle’s applications and infrastructure, Stephanie leads an industry-informed approach to Applied AI, Industry Clouds, and One Oracle model. In addition to Health and Life Sciences, Stephanie’s team drives Go To Market strategies for Financial Services, Retail, Hospitality, Restaurants/F&B, Energy & Water, Communications, Engineering & Construction, and Public Safety. Stephanie’s scope spans an $8B business with over 50k employees, including multiple acquisitions and organic growth.
Oracle’s Global Industries organisation solves some of industries’ toughest challenges with innovative yet practical applications built as best-practice examples of Oracle’s technology stack. By partnering with our clients, and hiring industry experts, we are building the most flexible and robust industry clouds in the market.
Pradeep Vincent, Senior Vice President & Chief Technical Architect, OCI, Oracle
Pradeep Vincent is the Chief Technical Architect and Senior Vice President at Oracle Cloud Infrastructure (OCI). He is a technology and software architect with more than 20 years of experience in tech companies such as Oracle, AWS, and IBM. He has a deep understanding of Cloud Infrastructure, Compute, Storage and Networking. Pradeep has been with Oracle for more than eight years leading a team of architects and software engineers building Oracle’s Public Cloud. He also leads OCI’s Architecture and Engineering Community initiatives.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1854080/c1a-5k0v-1pddq40pbdwg-be3ia8.png"></itunes:image>
                                                                            <itunes:duration>01:14:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 279 Deep Dive: Courtenay Farquharson | The Final Cog In DevOps Data Protection]]>
                </title>
                <pubDate>Tue, 08 Oct 2024 23:00:42 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1854088</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-279-deep-dive-courtenay-farquharson-the-final-cog-in-devops-data-protection</link>
                                <description>
                                            <![CDATA[<p>Courtenay Farquharson is the founder and Chief Technology Officer of Backrightup and has over 20 years experience in the cybersecurity, backup and devops specifically. Backrightup was founded by Courtenay Farquharson in 2021 to address the data protection, compliance and business continuity challenges with storing your important code and associated metadata in the cloud (GitHub, Azure Devops and GitLab).  </p>
<p>In a world where unintended cloud data loss scenarios like UniSuper in May 2024 are a very real possibility, Courtenay is passionate about educating organizations in shift-left DevSecOps processes and integrating backup into the SDLC together with other Developer Security Platforms (SAST, ASPM etc)</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Courtenay Farquharson is the founder and Chief Technology Officer of Backrightup and has over 20 years experience in the cybersecurity, backup and devops specifically. Backrightup was founded by Courtenay Farquharson in 2021 to address the data protection, compliance and business continuity challenges with storing your important code and associated metadata in the cloud (GitHub, Azure Devops and GitLab).  
In a world where unintended cloud data loss scenarios like UniSuper in May 2024 are a very real possibility, Courtenay is passionate about educating organizations in shift-left DevSecOps processes and integrating backup into the SDLC together with other Developer Security Platforms (SAST, ASPM etc)]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 279 Deep Dive: Courtenay Farquharson | The Final Cog In DevOps Data Protection]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Courtenay Farquharson is the founder and Chief Technology Officer of Backrightup and has over 20 years experience in the cybersecurity, backup and devops specifically. Backrightup was founded by Courtenay Farquharson in 2021 to address the data protection, compliance and business continuity challenges with storing your important code and associated metadata in the cloud (GitHub, Azure Devops and GitLab).  </p>
<p>In a world where unintended cloud data loss scenarios like UniSuper in May 2024 are a very real possibility, Courtenay is passionate about educating organizations in shift-left DevSecOps processes and integrating backup into the SDLC together with other Developer Security Platforms (SAST, ASPM etc)</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1854088/c1e-wmjvur1d2gf0gmpo-dm55ngwph32d-ntqwgk.mp3" length="35852581"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Courtenay Farquharson is the founder and Chief Technology Officer of Backrightup and has over 20 years experience in the cybersecurity, backup and devops specifically. Backrightup was founded by Courtenay Farquharson in 2021 to address the data protection, compliance and business continuity challenges with storing your important code and associated metadata in the cloud (GitHub, Azure Devops and GitLab).  
In a world where unintended cloud data loss scenarios like UniSuper in May 2024 are a very real possibility, Courtenay is passionate about educating organizations in shift-left DevSecOps processes and integrating backup into the SDLC together with other Developer Security Platforms (SAST, ASPM etc)]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1854088/c1a-5k0v-5zkk2dj8amo5-7ob6ly.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: ISACA Beyond Tomorrow]]>
                </title>
                <pubDate>Fri, 04 Oct 2024 04:00:56 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1850403</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-isaca-beyond-tomorrow-1</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is on the go at ISACA’s Beyond Tomorrow Conference in Melbourne. KB sits down with industry leaders like Erik Prusch, CEO of ISACA, as he discusses the organization’s expanding global influence and their pivotal role in career development for their 180,000 members. They also delve into the critical topics of AI’s transformative power across sectors, the intricacies of third-party risk management, and the indispensable importance of mastering basic cybersecurity practices. Erik is joined by fellow experts such as Jamie Norton, Chirag Joshi, Francine Hoo, Kate Raulings, Richard Magalad, Sam Mackenzie, and Wayne Rodriguez, who also bring their expertise and stories to the table, sharing the newest developments and challenges in cybersecurity and critical infrastructure.</p>
<p><strong>Erik Prusch</strong></p>
<p>Erik is an experienced CEO and board director for major tech companies. Prior to joining ISACA, he was most recently chief executive officer at Harland Clarke Holdings Corp., a provider of integrated payment solutions and integrated marketing services. He has also served as CEO for Outerwall, Lumension, NetMotion Wireless, Clearwire and Borland Software Corporation. Additionally, he has been a board member for RealNetworks, WASH, Calero Software and Keynote Systems. Previously in his career, Erik served as chief financial officer for a number of public companies, such as Identix and Borland, and for divisions of public companies, such as Gateway Computers and PepsiCo. He began his career at Deloitte &amp; Touche (then Touche Ross). Erik holds a bachelor’s degree from Yale University and an MBA from NYU’s Stern School of Business.</p>
<p><strong>Jamie Norton</strong></p>
<p>Jamie Norton, CISA, CISM, CGEIT, CISSP, CIPM is a Partner at McGrathNicol, a specialist Advisory and Restructuring firm committed to helping businesses improve performance, manage risk, and achieve stability and growth. He also serves on the Advisory Board at Avertro, a cybersecurity startup enabling informed and defensible data-driven decisions about organisational cyber resilience and AI safety. He has over 25 years’ experience in managing security resilience for State and Federal Government agencies and commercial organisations. He is the former Chief Information Security Officer (CISO) at the Australian Taxation Office (ATO), one of Australia’s largest federal government agencies, where he led the security governance, risk, intelligence &amp; operations, testing and forensics teams. He has chaired and supported several senior industry and interdepartmental committees on cyber strategy and resilience and the senior Australian representative at international government forums on cybercrime. He has previously held leadership roles at NEC, Tenable, Check Point, and the World Health Organization.</p>
<p>Jamie has been involved with ISACA for nearly 20 years, at the local chapter board, conference organiser and most recently with the CISM Certification Working Group. He holds degrees in accounting and information technology from the Australian National University and is an affiliate member of Chartered Accountants Australia and New Zealand. Jamie is a regular and accomplished industry speaker and media commentator on cyber security. He is based in Australia.</p>
<p><strong>Chirag Joshi</strong></p>
<p>Chirag Joshi, a multi-award winning cyber security executive, brings extensive experience in leading cyber security and risk management programs across various industries, including critical infrastructure sectors such as financial services and energy. His expertise in both IT and OT environments, coupled with his experience in managing cyber security through mergers and acquisitions, makes him uniquely qualified to address the challenges of the SOCI Act. As the author of bestselling books on cyber security and a recognised thought leader, Chirag offers valuable insights into practical implementation strategies and behavioural a...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is on the go at ISACA’s Beyond Tomorrow Conference in Melbourne. KB sits down with industry leaders like Erik Prusch, CEO of ISACA, as he discusses the organization’s expanding global influence and their pivotal role in career development for their 180,000 members. They also delve into the critical topics of AI’s transformative power across sectors, the intricacies of third-party risk management, and the indispensable importance of mastering basic cybersecurity practices. Erik is joined by fellow experts such as Jamie Norton, Chirag Joshi, Francine Hoo, Kate Raulings, Richard Magalad, Sam Mackenzie, and Wayne Rodriguez, who also bring their expertise and stories to the table, sharing the newest developments and challenges in cybersecurity and critical infrastructure.
Erik Prusch
Erik is an experienced CEO and board director for major tech companies. Prior to joining ISACA, he was most recently chief executive officer at Harland Clarke Holdings Corp., a provider of integrated payment solutions and integrated marketing services. He has also served as CEO for Outerwall, Lumension, NetMotion Wireless, Clearwire and Borland Software Corporation. Additionally, he has been a board member for RealNetworks, WASH, Calero Software and Keynote Systems. Previously in his career, Erik served as chief financial officer for a number of public companies, such as Identix and Borland, and for divisions of public companies, such as Gateway Computers and PepsiCo. He began his career at Deloitte & Touche (then Touche Ross). Erik holds a bachelor’s degree from Yale University and an MBA from NYU’s Stern School of Business.
Jamie Norton
Jamie Norton, CISA, CISM, CGEIT, CISSP, CIPM is a Partner at McGrathNicol, a specialist Advisory and Restructuring firm committed to helping businesses improve performance, manage risk, and achieve stability and growth. He also serves on the Advisory Board at Avertro, a cybersecurity startup enabling informed and defensible data-driven decisions about organisational cyber resilience and AI safety. He has over 25 years’ experience in managing security resilience for State and Federal Government agencies and commercial organisations. He is the former Chief Information Security Officer (CISO) at the Australian Taxation Office (ATO), one of Australia’s largest federal government agencies, where he led the security governance, risk, intelligence & operations, testing and forensics teams. He has chaired and supported several senior industry and interdepartmental committees on cyber strategy and resilience and the senior Australian representative at international government forums on cybercrime. He has previously held leadership roles at NEC, Tenable, Check Point, and the World Health Organization.
Jamie has been involved with ISACA for nearly 20 years, at the local chapter board, conference organiser and most recently with the CISM Certification Working Group. He holds degrees in accounting and information technology from the Australian National University and is an affiliate member of Chartered Accountants Australia and New Zealand. Jamie is a regular and accomplished industry speaker and media commentator on cyber security. He is based in Australia.
Chirag Joshi
Chirag Joshi, a multi-award winning cyber security executive, brings extensive experience in leading cyber security and risk management programs across various industries, including critical infrastructure sectors such as financial services and energy. His expertise in both IT and OT environments, coupled with his experience in managing cyber security through mergers and acquisitions, makes him uniquely qualified to address the challenges of the SOCI Act. As the author of bestselling books on cyber security and a recognised thought leader, Chirag offers valuable insights into practical implementation strategies and behavioural a...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: ISACA Beyond Tomorrow]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is on the go at ISACA’s Beyond Tomorrow Conference in Melbourne. KB sits down with industry leaders like Erik Prusch, CEO of ISACA, as he discusses the organization’s expanding global influence and their pivotal role in career development for their 180,000 members. They also delve into the critical topics of AI’s transformative power across sectors, the intricacies of third-party risk management, and the indispensable importance of mastering basic cybersecurity practices. Erik is joined by fellow experts such as Jamie Norton, Chirag Joshi, Francine Hoo, Kate Raulings, Richard Magalad, Sam Mackenzie, and Wayne Rodriguez, who also bring their expertise and stories to the table, sharing the newest developments and challenges in cybersecurity and critical infrastructure.</p>
<p><strong>Erik Prusch</strong></p>
<p>Erik is an experienced CEO and board director for major tech companies. Prior to joining ISACA, he was most recently chief executive officer at Harland Clarke Holdings Corp., a provider of integrated payment solutions and integrated marketing services. He has also served as CEO for Outerwall, Lumension, NetMotion Wireless, Clearwire and Borland Software Corporation. Additionally, he has been a board member for RealNetworks, WASH, Calero Software and Keynote Systems. Previously in his career, Erik served as chief financial officer for a number of public companies, such as Identix and Borland, and for divisions of public companies, such as Gateway Computers and PepsiCo. He began his career at Deloitte &amp; Touche (then Touche Ross). Erik holds a bachelor’s degree from Yale University and an MBA from NYU’s Stern School of Business.</p>
<p><strong>Jamie Norton</strong></p>
<p>Jamie Norton, CISA, CISM, CGEIT, CISSP, CIPM is a Partner at McGrathNicol, a specialist Advisory and Restructuring firm committed to helping businesses improve performance, manage risk, and achieve stability and growth. He also serves on the Advisory Board at Avertro, a cybersecurity startup enabling informed and defensible data-driven decisions about organisational cyber resilience and AI safety. He has over 25 years’ experience in managing security resilience for State and Federal Government agencies and commercial organisations. He is the former Chief Information Security Officer (CISO) at the Australian Taxation Office (ATO), one of Australia’s largest federal government agencies, where he led the security governance, risk, intelligence &amp; operations, testing and forensics teams. He has chaired and supported several senior industry and interdepartmental committees on cyber strategy and resilience and the senior Australian representative at international government forums on cybercrime. He has previously held leadership roles at NEC, Tenable, Check Point, and the World Health Organization.</p>
<p>Jamie has been involved with ISACA for nearly 20 years, at the local chapter board, conference organiser and most recently with the CISM Certification Working Group. He holds degrees in accounting and information technology from the Australian National University and is an affiliate member of Chartered Accountants Australia and New Zealand. Jamie is a regular and accomplished industry speaker and media commentator on cyber security. He is based in Australia.</p>
<p><strong>Chirag Joshi</strong></p>
<p>Chirag Joshi, a multi-award winning cyber security executive, brings extensive experience in leading cyber security and risk management programs across various industries, including critical infrastructure sectors such as financial services and energy. His expertise in both IT and OT environments, coupled with his experience in managing cyber security through mergers and acquisitions, makes him uniquely qualified to address the challenges of the SOCI Act. As the author of bestselling books on cyber security and a recognised thought leader, Chirag offers valuable insights into practical implementation strategies and behavioural aspects of security awareness. His role as Founder and CISO at 7 Rules Cyber, combined with his experience in leading multi-million-dollar cyber transformation initiatives, positions him to provide actionable advice on navigating the complex landscape of critical infrastructure protection, supply chain resilience, and cyber risk management in the context of the SOCI Act and beyond.</p>
<p><strong>Francine Hoo</strong></p>
<p>Francine is a Director with KPMG’s Data team focusing on building trusted data practices. She has helped build, assure and audit multiple frameworks including governance, data management, data analytics practices, privacy, risk and compliance. Having started in audit, she leverages her combined experience to help build evidenced based, human centric, ethical and trustworthy data practices. She’s helped teams build AI Assurance frameworks to ensure safer and reliable deployment of AI based outcomes. She passionately believes that humans are accountable for the right use of data and therefore the sufficient and appropriate risk management of data operations in all its forms – including AI and automation. The future of data driven outcomes including AI is dependent and strengthened by the partnership of a diversity of thinking, where humans collaborate with tech.</p>
<p><strong>Kate Raulings</strong></p>
<p>Kate didn’t start her career in cyber security. Computers and internet connected devices weren’t common at the time. She has a deep understanding of business imperatives developed over a decade’s experience in senior communications and innovation roles before focusing on IT strategy, governance and cyber security for the last 8 years. She regularly briefs senior executive, audit and risk committees and boards on privacy and cyber security matters and has supported numerous organisations through notifiable data breaches. Kate has a Masters in Marketing and an MBA from the University of Melbourne as well as CISM certification. She has won local and global recognition for her success in digital communication and was a finalist in the Women in ICT Awards in 2022 and 2023. She is a member of the Australian Women in Security Network and an ISACA member. Kate is the CISO at EPA Victoria.</p>
<p><strong>Richard Magalad</strong></p>
<p>Richard is a 30 year veteran of the ICT industry starting at the Commonwealth bank and was a 10-year IT director from 2010 at a mining company with gold and diamond projects in Australia, Laos and Canada.
Current projects are systems integration for two of the large Telcos, several agencies in the Australian Federal Government. He is a hands-on tech with a philosophy to never separate Cyber Security from Information Technology, just as he was trained in highly secure arena in banking and government
He consulted and trained cyber security in SE Asia to governments and critical infrastructure enterprises on missions for Dept of Foreign Affairs and Trade and with RMIT University, where he now lectures cyber security to professional students.
He was an executive committee and secretary at the Australia Computer Society (Victoria) until 2022 and the current chairperson of Cloud Branch with the Australian Information Security Association.</p>
<p><strong>Sam Mackenzie</strong></p>
<p>Sam Mackenzie, is a Cybersecurity committee member with ACS Victoria Branch and brings 25 years of experience, where he speaks straightforward cybersecurity and technology with business leaders.
Having worked with global brands overseas and household names in Australia, he’s known for creating high-performance teams across the sectors of health, telecoms, energy and more recently local government. His approach is characterised by structured thinking, simplifying complexity and developing culture as a catalyst for change.</p>
<p><strong>Wayne Rodrigues</strong></p>
<p>Wayne Rodrigues is currently a Security Architect at Insignia Financial and an active member of the cybersecurity community.</p>
<p>Having been involved with ISACA Melbourne in the very early stages of his career, he has remained an active member and volunteer for the past 12 years. He is also part of various other initiatives such as the Purple Team Australia mentoring program and the EC-Council Career mentoring program. Being a keen advocate for continuous learning and growth, he loves mentoring others in the industry. Wayne believes these initiatives an excellent opportunity to give back to the community and help mould the next generation of industry professionals.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1850403/c1e-o39rfv7k50i8n0xz-mk10qk9kh4x3-8lfyoz.mp3" length="45958834"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is on the go at ISACA’s Beyond Tomorrow Conference in Melbourne. KB sits down with industry leaders like Erik Prusch, CEO of ISACA, as he discusses the organization’s expanding global influence and their pivotal role in career development for their 180,000 members. They also delve into the critical topics of AI’s transformative power across sectors, the intricacies of third-party risk management, and the indispensable importance of mastering basic cybersecurity practices. Erik is joined by fellow experts such as Jamie Norton, Chirag Joshi, Francine Hoo, Kate Raulings, Richard Magalad, Sam Mackenzie, and Wayne Rodriguez, who also bring their expertise and stories to the table, sharing the newest developments and challenges in cybersecurity and critical infrastructure.
Erik Prusch
Erik is an experienced CEO and board director for major tech companies. Prior to joining ISACA, he was most recently chief executive officer at Harland Clarke Holdings Corp., a provider of integrated payment solutions and integrated marketing services. He has also served as CEO for Outerwall, Lumension, NetMotion Wireless, Clearwire and Borland Software Corporation. Additionally, he has been a board member for RealNetworks, WASH, Calero Software and Keynote Systems. Previously in his career, Erik served as chief financial officer for a number of public companies, such as Identix and Borland, and for divisions of public companies, such as Gateway Computers and PepsiCo. He began his career at Deloitte & Touche (then Touche Ross). Erik holds a bachelor’s degree from Yale University and an MBA from NYU’s Stern School of Business.
Jamie Norton
Jamie Norton, CISA, CISM, CGEIT, CISSP, CIPM is a Partner at McGrathNicol, a specialist Advisory and Restructuring firm committed to helping businesses improve performance, manage risk, and achieve stability and growth. He also serves on the Advisory Board at Avertro, a cybersecurity startup enabling informed and defensible data-driven decisions about organisational cyber resilience and AI safety. He has over 25 years’ experience in managing security resilience for State and Federal Government agencies and commercial organisations. He is the former Chief Information Security Officer (CISO) at the Australian Taxation Office (ATO), one of Australia’s largest federal government agencies, where he led the security governance, risk, intelligence & operations, testing and forensics teams. He has chaired and supported several senior industry and interdepartmental committees on cyber strategy and resilience and the senior Australian representative at international government forums on cybercrime. He has previously held leadership roles at NEC, Tenable, Check Point, and the World Health Organization.
Jamie has been involved with ISACA for nearly 20 years, at the local chapter board, conference organiser and most recently with the CISM Certification Working Group. He holds degrees in accounting and information technology from the Australian National University and is an affiliate member of Chartered Accountants Australia and New Zealand. Jamie is a regular and accomplished industry speaker and media commentator on cyber security. He is based in Australia.
Chirag Joshi
Chirag Joshi, a multi-award winning cyber security executive, brings extensive experience in leading cyber security and risk management programs across various industries, including critical infrastructure sectors such as financial services and energy. His expertise in both IT and OT environments, coupled with his experience in managing cyber security through mergers and acquisitions, makes him uniquely qualified to address the challenges of the SOCI Act. As the author of bestselling books on cyber security and a recognised thought leader, Chirag offers valuable insights into practical implementation strategies and behavioural a...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1850403/c1a-5k0v-z39zo59gb71j-nn7sr4.png"></itunes:image>
                                                                            <itunes:duration>00:47:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From NetApp INSIGHT - KB On The Go | Mignona Coté, Global Chief Security Officer and Matt Watts, Chief Technology Evangelist]]>
                </title>
                <pubDate>Thu, 03 Oct 2024 06:00:39 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1848741</guid>
                                    <link>https://kbkast.castos.com/episodes/from-netapp-insight-kb-on-the-go-mignona-cote-global-chief-security-officer-and-matt-watts-chi</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is joined by Mignona Coté, NetApp’s Global Chief Security Officer, and Matt Watts, NetApp’s Chief Technology Evangelist, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of technology and business. Coté brings her three decades of cybersecurity experience to discuss autonomous anti-ransomware systems, highlighting both the emotional and technical challenges faced by IT professionals in securing data and ensuring business continuity. She also delves into the importance of backup testing and the regulatory landscape that drives preparedness across industries. Watts, on the other hand, sheds light on the evolving role of sustainability within tech enterprises, emphasizing concrete measures NetApp is taking to support environmental goals while addressing the challenges of data waste. The episode explores the intersection of cybersecurity, sustainability, and emerging technologies like AI, offering listeners valuable insights into managing data efficiently while staying ahead of disruptive trends.</p>
<p><strong>Mignona Coté, Global Chief Security Officer – NetApp</strong></p>
<p>Mignona Cote, SVP and chief security officer at NetApp, has become a world leader in multi-cloud security, building solutions in high-tech, healthcare, insurance, and large financial institutions. Under her leadership, her team has unified security accountability internally to protect NetApp as well as externally to protect customers ultimately by moving NetApp to a SuperCloud architecture, which combines edge computing, multi-cloud, and multi-location recourses to create a powerful computing environment. She holds a Bachelor of Science in Computer and Information Systems from Northwestern State University and a MBA from Louisiana State University.</p>
<p><strong>Matt Watts, Chief Technology Evangelist – NetApp</strong></p>
<p>As Chief Technology Evangelist, Matt Watts provides guidance on NetApp’s overall strategy and technology solutions to a wide base of customers and the global partner community. Matt is also part of the portfolio leadership team, providing advice and guidance on technology and transformation.</p>
<p>Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples.</p>
<p>Prior to this role, Matt Project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is joined by Mignona Coté, NetApp’s Global Chief Security Officer, and Matt Watts, NetApp’s Chief Technology Evangelist, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of technology and business. Coté brings her three decades of cybersecurity experience to discuss autonomous anti-ransomware systems, highlighting both the emotional and technical challenges faced by IT professionals in securing data and ensuring business continuity. She also delves into the importance of backup testing and the regulatory landscape that drives preparedness across industries. Watts, on the other hand, sheds light on the evolving role of sustainability within tech enterprises, emphasizing concrete measures NetApp is taking to support environmental goals while addressing the challenges of data waste. The episode explores the intersection of cybersecurity, sustainability, and emerging technologies like AI, offering listeners valuable insights into managing data efficiently while staying ahead of disruptive trends.
Mignona Coté, Global Chief Security Officer – NetApp
Mignona Cote, SVP and chief security officer at NetApp, has become a world leader in multi-cloud security, building solutions in high-tech, healthcare, insurance, and large financial institutions. Under her leadership, her team has unified security accountability internally to protect NetApp as well as externally to protect customers ultimately by moving NetApp to a SuperCloud architecture, which combines edge computing, multi-cloud, and multi-location recourses to create a powerful computing environment. She holds a Bachelor of Science in Computer and Information Systems from Northwestern State University and a MBA from Louisiana State University.
Matt Watts, Chief Technology Evangelist – NetApp
As Chief Technology Evangelist, Matt Watts provides guidance on NetApp’s overall strategy and technology solutions to a wide base of customers and the global partner community. Matt is also part of the portfolio leadership team, providing advice and guidance on technology and transformation.
Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples.
Prior to this role, Matt Project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From NetApp INSIGHT - KB On The Go | Mignona Coté, Global Chief Security Officer and Matt Watts, Chief Technology Evangelist]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is joined by Mignona Coté, NetApp’s Global Chief Security Officer, and Matt Watts, NetApp’s Chief Technology Evangelist, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of technology and business. Coté brings her three decades of cybersecurity experience to discuss autonomous anti-ransomware systems, highlighting both the emotional and technical challenges faced by IT professionals in securing data and ensuring business continuity. She also delves into the importance of backup testing and the regulatory landscape that drives preparedness across industries. Watts, on the other hand, sheds light on the evolving role of sustainability within tech enterprises, emphasizing concrete measures NetApp is taking to support environmental goals while addressing the challenges of data waste. The episode explores the intersection of cybersecurity, sustainability, and emerging technologies like AI, offering listeners valuable insights into managing data efficiently while staying ahead of disruptive trends.</p>
<p><strong>Mignona Coté, Global Chief Security Officer – NetApp</strong></p>
<p>Mignona Cote, SVP and chief security officer at NetApp, has become a world leader in multi-cloud security, building solutions in high-tech, healthcare, insurance, and large financial institutions. Under her leadership, her team has unified security accountability internally to protect NetApp as well as externally to protect customers ultimately by moving NetApp to a SuperCloud architecture, which combines edge computing, multi-cloud, and multi-location recourses to create a powerful computing environment. She holds a Bachelor of Science in Computer and Information Systems from Northwestern State University and a MBA from Louisiana State University.</p>
<p><strong>Matt Watts, Chief Technology Evangelist – NetApp</strong></p>
<p>As Chief Technology Evangelist, Matt Watts provides guidance on NetApp’s overall strategy and technology solutions to a wide base of customers and the global partner community. Matt is also part of the portfolio leadership team, providing advice and guidance on technology and transformation.</p>
<p>Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples.</p>
<p>Prior to this role, Matt Project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1848741/c1e-901kfngvr8idv65r-xxvzqxdjto30-ezsyoq.mp3" length="37583768"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is joined by Mignona Coté, NetApp’s Global Chief Security Officer, and Matt Watts, NetApp’s Chief Technology Evangelist, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of technology and business. Coté brings her three decades of cybersecurity experience to discuss autonomous anti-ransomware systems, highlighting both the emotional and technical challenges faced by IT professionals in securing data and ensuring business continuity. She also delves into the importance of backup testing and the regulatory landscape that drives preparedness across industries. Watts, on the other hand, sheds light on the evolving role of sustainability within tech enterprises, emphasizing concrete measures NetApp is taking to support environmental goals while addressing the challenges of data waste. The episode explores the intersection of cybersecurity, sustainability, and emerging technologies like AI, offering listeners valuable insights into managing data efficiently while staying ahead of disruptive trends.
Mignona Coté, Global Chief Security Officer – NetApp
Mignona Cote, SVP and chief security officer at NetApp, has become a world leader in multi-cloud security, building solutions in high-tech, healthcare, insurance, and large financial institutions. Under her leadership, her team has unified security accountability internally to protect NetApp as well as externally to protect customers ultimately by moving NetApp to a SuperCloud architecture, which combines edge computing, multi-cloud, and multi-location recourses to create a powerful computing environment. She holds a Bachelor of Science in Computer and Information Systems from Northwestern State University and a MBA from Louisiana State University.
Matt Watts, Chief Technology Evangelist – NetApp
As Chief Technology Evangelist, Matt Watts provides guidance on NetApp’s overall strategy and technology solutions to a wide base of customers and the global partner community. Matt is also part of the portfolio leadership team, providing advice and guidance on technology and transformation.
Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples.
Prior to this role, Matt Project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1848741/c1a-5k0v-gpk2d133urdk-u5oosi.png"></itunes:image>
                                                                            <itunes:duration>00:39:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[From NetApp INSIGHT - KB On The Go | Kristen Verderame, Vice President, Global Government Relations and Michelle Rudnicki, President, US Public Sector]]>
                </title>
                <pubDate>Wed, 02 Oct 2024 06:00:03 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1848737</guid>
                                    <link>https://kbkast.castos.com/episodes/from-netapp-insight-kb-on-the-go-kristen-verderame-vice-president-global-government-relations</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is on the go at the NetApp Insight 2024 Conference in the MGM Grand, Las Vegas. KB sits down with two remarkable leaders from NetApp—Kristen Verderame, Vice President of Global Government Relations, and Michelle Rudnicki, President of the U.S. Public Sector.</p>
<p>Kristen shares her expertise on the intricate landscape of government relations and public affairs, explaining how NetApp supports various government missions across the globe, from AI strategies to the U.S. Space Force. Later, Michelle delves into leadership in the U.S. public sector, highlighting the importance of data security and the role of NetApp’s intelligent data infrastructure in enhancing data governance.</p>
<p><strong>Kristen Verderame, Vice President, Global Government Relations – NetApp</strong></p>
<p>Based in Washington DC, Kristen currently serves as the Vice President of Global Government Relations for NetApp, a $20B market cap technology company based in San Jose, CA. In that role, Kristen represents the company in front of Congress and Executive Branch agencies as well as government bodies around the world to support NetApp’s policy positions and enhance business development opportunities for the company. Kristen has spent over twenty-five years working in government relations and public affairs, and has extensive experience in cyber security, telecommunications and technology, and designing and running international lobbying campaigns and programs to support business objectives.</p>
<p>Prior to joining NetApp, Kristen worked with a number of other Fortune 100 companies to build their Government Relations functions through her firm, Pondera International LLC, including BT (British Telecom) Americas, Booz Allen Hamilton, Mandiant and FireEye. As an attorney, Ms. Verderame also worked through her firm to provide outside general counsel and business consulting services to major corporates, startups and small businesses.</p>
<p>Before founding her own firm, Kristen spent over ten years in a variety of roles within BT (British Telecom) Group plc. Her most recent role was Vice President and General Counsel for the company’s US operations where she was a leading member of the management team that drove 150% revenue growth (to US$3B) and a quadrupling of the workforce, with the non-organic growth requiring numerous reviews with the Committee on Foreign Investment in the US (CFIUS) which she led. Also throughout her tenure, Kristen served as the head of BT’s lobbying and government affairs office in Washington, D.C. in which she was the senior advocate for the company’s interests in front of U.S. Government agencies and Washington-based policymakers and led the company’s international trade policy efforts.</p>
<p>Kristen holds several advisory roles outside of NetApp. She currently serves as an officer on the IT Sector Coordinating Council at the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security, having served on its Executive Committee for the last several years, and serves on the National Risk Management ICT Supply Chain Task Force. She also currently serves on the board of TPG Corporation Ltd. (Australia) as its Security Director responsible for ensuring compliance with US Government national security requirements. Over the years she has been actively involved in the network of British-American organisations in the US and UK, serving as board member, Vice President and general counsel of the British American Business Council, the international umbrella organisation that represents over 2,500 British and American businesses across 25 chapters in the US and the UK, and also serving as President of the Washington, D.C. chapter. Kristen has also served as the General Counsel to the Transatlantic Business Council, as the CEO of the European-American Business Council, and as a US Non-Executive Director for UK Trade &amp; Investment.</p>
<p>Kristen received her Juris Doctor from the Un...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is on the go at the NetApp Insight 2024 Conference in the MGM Grand, Las Vegas. KB sits down with two remarkable leaders from NetApp—Kristen Verderame, Vice President of Global Government Relations, and Michelle Rudnicki, President of the U.S. Public Sector.
Kristen shares her expertise on the intricate landscape of government relations and public affairs, explaining how NetApp supports various government missions across the globe, from AI strategies to the U.S. Space Force. Later, Michelle delves into leadership in the U.S. public sector, highlighting the importance of data security and the role of NetApp’s intelligent data infrastructure in enhancing data governance.
Kristen Verderame, Vice President, Global Government Relations – NetApp
Based in Washington DC, Kristen currently serves as the Vice President of Global Government Relations for NetApp, a $20B market cap technology company based in San Jose, CA. In that role, Kristen represents the company in front of Congress and Executive Branch agencies as well as government bodies around the world to support NetApp’s policy positions and enhance business development opportunities for the company. Kristen has spent over twenty-five years working in government relations and public affairs, and has extensive experience in cyber security, telecommunications and technology, and designing and running international lobbying campaigns and programs to support business objectives.
Prior to joining NetApp, Kristen worked with a number of other Fortune 100 companies to build their Government Relations functions through her firm, Pondera International LLC, including BT (British Telecom) Americas, Booz Allen Hamilton, Mandiant and FireEye. As an attorney, Ms. Verderame also worked through her firm to provide outside general counsel and business consulting services to major corporates, startups and small businesses.
Before founding her own firm, Kristen spent over ten years in a variety of roles within BT (British Telecom) Group plc. Her most recent role was Vice President and General Counsel for the company’s US operations where she was a leading member of the management team that drove 150% revenue growth (to US$3B) and a quadrupling of the workforce, with the non-organic growth requiring numerous reviews with the Committee on Foreign Investment in the US (CFIUS) which she led. Also throughout her tenure, Kristen served as the head of BT’s lobbying and government affairs office in Washington, D.C. in which she was the senior advocate for the company’s interests in front of U.S. Government agencies and Washington-based policymakers and led the company’s international trade policy efforts.
Kristen holds several advisory roles outside of NetApp. She currently serves as an officer on the IT Sector Coordinating Council at the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security, having served on its Executive Committee for the last several years, and serves on the National Risk Management ICT Supply Chain Task Force. She also currently serves on the board of TPG Corporation Ltd. (Australia) as its Security Director responsible for ensuring compliance with US Government national security requirements. Over the years she has been actively involved in the network of British-American organisations in the US and UK, serving as board member, Vice President and general counsel of the British American Business Council, the international umbrella organisation that represents over 2,500 British and American businesses across 25 chapters in the US and the UK, and also serving as President of the Washington, D.C. chapter. Kristen has also served as the General Counsel to the Transatlantic Business Council, as the CEO of the European-American Business Council, and as a US Non-Executive Director for UK Trade & Investment.
Kristen received her Juris Doctor from the Un...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[From NetApp INSIGHT - KB On The Go | Kristen Verderame, Vice President, Global Government Relations and Michelle Rudnicki, President, US Public Sector]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is on the go at the NetApp Insight 2024 Conference in the MGM Grand, Las Vegas. KB sits down with two remarkable leaders from NetApp—Kristen Verderame, Vice President of Global Government Relations, and Michelle Rudnicki, President of the U.S. Public Sector.</p>
<p>Kristen shares her expertise on the intricate landscape of government relations and public affairs, explaining how NetApp supports various government missions across the globe, from AI strategies to the U.S. Space Force. Later, Michelle delves into leadership in the U.S. public sector, highlighting the importance of data security and the role of NetApp’s intelligent data infrastructure in enhancing data governance.</p>
<p><strong>Kristen Verderame, Vice President, Global Government Relations – NetApp</strong></p>
<p>Based in Washington DC, Kristen currently serves as the Vice President of Global Government Relations for NetApp, a $20B market cap technology company based in San Jose, CA. In that role, Kristen represents the company in front of Congress and Executive Branch agencies as well as government bodies around the world to support NetApp’s policy positions and enhance business development opportunities for the company. Kristen has spent over twenty-five years working in government relations and public affairs, and has extensive experience in cyber security, telecommunications and technology, and designing and running international lobbying campaigns and programs to support business objectives.</p>
<p>Prior to joining NetApp, Kristen worked with a number of other Fortune 100 companies to build their Government Relations functions through her firm, Pondera International LLC, including BT (British Telecom) Americas, Booz Allen Hamilton, Mandiant and FireEye. As an attorney, Ms. Verderame also worked through her firm to provide outside general counsel and business consulting services to major corporates, startups and small businesses.</p>
<p>Before founding her own firm, Kristen spent over ten years in a variety of roles within BT (British Telecom) Group plc. Her most recent role was Vice President and General Counsel for the company’s US operations where she was a leading member of the management team that drove 150% revenue growth (to US$3B) and a quadrupling of the workforce, with the non-organic growth requiring numerous reviews with the Committee on Foreign Investment in the US (CFIUS) which she led. Also throughout her tenure, Kristen served as the head of BT’s lobbying and government affairs office in Washington, D.C. in which she was the senior advocate for the company’s interests in front of U.S. Government agencies and Washington-based policymakers and led the company’s international trade policy efforts.</p>
<p>Kristen holds several advisory roles outside of NetApp. She currently serves as an officer on the IT Sector Coordinating Council at the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security, having served on its Executive Committee for the last several years, and serves on the National Risk Management ICT Supply Chain Task Force. She also currently serves on the board of TPG Corporation Ltd. (Australia) as its Security Director responsible for ensuring compliance with US Government national security requirements. Over the years she has been actively involved in the network of British-American organisations in the US and UK, serving as board member, Vice President and general counsel of the British American Business Council, the international umbrella organisation that represents over 2,500 British and American businesses across 25 chapters in the US and the UK, and also serving as President of the Washington, D.C. chapter. Kristen has also served as the General Counsel to the Transatlantic Business Council, as the CEO of the European-American Business Council, and as a US Non-Executive Director for UK Trade &amp; Investment.</p>
<p>Kristen received her Juris Doctor from the University of Michigan Law School, and her BA degree from Albion College, Summa Cum Laude, Phi Beta Kappa, with Honors. Kristen has also completed post-JD course work at the Georgetown University Law Center. Kristen holds a Top-Secret security clearance. She has two young-adult children, and in her spare time teaches yoga and races in duathlons.</p>
<p><strong>Michelle Rudnicki, President, US Public Sector – NetApp</strong></p>
<p>Michelle Rudnicki serves as Vice President of NetApp’s U.S. Public Sector business where she focuses on supporting government’s important and complex missions. She is passionate about and dedicated to helping public sector clients find technology solutions to manage their data most effectively and migrate to the cloud in this era of distributed, dynamic, and diverse data. She is responsible for leading the team to achieve strategic, financial, operational, and business objectives as they relate to NetApp’s public sector customers and channels.</p>
<p>Prior to NetApp, Michelle served as the vice president of Public Sector at Virtustream. Before that, she enjoyed a long tenure at IBM in leadership roles – including VP of Federal Systems – that spanned decades working with public sector clients to transform the way they interacted with their clients, citizens, and patients, progressing their digital services through the use of technology such as analytics, cognitive computing, mobile, and cloud.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1848737/c1e-2k31b8d4z4s67jo4-z3z5x3nrfd5q-ny6xey.mp3" length="27210857"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is on the go at the NetApp Insight 2024 Conference in the MGM Grand, Las Vegas. KB sits down with two remarkable leaders from NetApp—Kristen Verderame, Vice President of Global Government Relations, and Michelle Rudnicki, President of the U.S. Public Sector.
Kristen shares her expertise on the intricate landscape of government relations and public affairs, explaining how NetApp supports various government missions across the globe, from AI strategies to the U.S. Space Force. Later, Michelle delves into leadership in the U.S. public sector, highlighting the importance of data security and the role of NetApp’s intelligent data infrastructure in enhancing data governance.
Kristen Verderame, Vice President, Global Government Relations – NetApp
Based in Washington DC, Kristen currently serves as the Vice President of Global Government Relations for NetApp, a $20B market cap technology company based in San Jose, CA. In that role, Kristen represents the company in front of Congress and Executive Branch agencies as well as government bodies around the world to support NetApp’s policy positions and enhance business development opportunities for the company. Kristen has spent over twenty-five years working in government relations and public affairs, and has extensive experience in cyber security, telecommunications and technology, and designing and running international lobbying campaigns and programs to support business objectives.
Prior to joining NetApp, Kristen worked with a number of other Fortune 100 companies to build their Government Relations functions through her firm, Pondera International LLC, including BT (British Telecom) Americas, Booz Allen Hamilton, Mandiant and FireEye. As an attorney, Ms. Verderame also worked through her firm to provide outside general counsel and business consulting services to major corporates, startups and small businesses.
Before founding her own firm, Kristen spent over ten years in a variety of roles within BT (British Telecom) Group plc. Her most recent role was Vice President and General Counsel for the company’s US operations where she was a leading member of the management team that drove 150% revenue growth (to US$3B) and a quadrupling of the workforce, with the non-organic growth requiring numerous reviews with the Committee on Foreign Investment in the US (CFIUS) which she led. Also throughout her tenure, Kristen served as the head of BT’s lobbying and government affairs office in Washington, D.C. in which she was the senior advocate for the company’s interests in front of U.S. Government agencies and Washington-based policymakers and led the company’s international trade policy efforts.
Kristen holds several advisory roles outside of NetApp. She currently serves as an officer on the IT Sector Coordinating Council at the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security, having served on its Executive Committee for the last several years, and serves on the National Risk Management ICT Supply Chain Task Force. She also currently serves on the board of TPG Corporation Ltd. (Australia) as its Security Director responsible for ensuring compliance with US Government national security requirements. Over the years she has been actively involved in the network of British-American organisations in the US and UK, serving as board member, Vice President and general counsel of the British American Business Council, the international umbrella organisation that represents over 2,500 British and American businesses across 25 chapters in the US and the UK, and also serving as President of the Washington, D.C. chapter. Kristen has also served as the General Counsel to the Transatlantic Business Council, as the CEO of the European-American Business Council, and as a US Non-Executive Director for UK Trade & Investment.
Kristen received her Juris Doctor from the Un...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1848737/c1a-5k0v-34gk3vq3fqqw-1cut7j.png"></itunes:image>
                                                                            <itunes:duration>00:28:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 278 Deep Dive: William Glazier | Why Is There A Focus on API Security in 2024?]]>
                </title>
                <pubDate>Wed, 25 Sep 2024 06:00:46 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1842303</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-278-deep-dive-william-glazier-why-is-there-a-focus-on-api-security-in-2024-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Will Glazier, Head of the Cequence Prime Threat Research Team from Cequence Security, as he discusses the intricate landscape of API security in 2024. Will delves into the essential intertwining of API security and bot management, emphasizing why these cannot be handled independently. The conversation covers the diverse nature of API security issues, from inventory and compliance to active threat protection, and the industry’s shift towards consolidated security tools. Will also highlights the often-overlooked but critical importance of API security, compared to more tangible threats like business email compromise, and stresses the necessity of integrating security within CI/CD pipelines to mitigate risks.</p>
<p>William Glazier  is Head of Cequence Security’s new Cequence Prime Threat Research Team, whose mission is to help the security industry better understand how cybercriminals execute automated, malicious bot attacks against web, mobile, and API-based applications. As Head of CQ Research, Will focuses on the rapidly escalating problems of account takeover, fake account creation and content scraping at scale. He has an extensive background in fraud and abuse prevention, as well as building threat intelligence systems and databases. He has also extensively studied the shared attacker infrastructure and network fingerprints of tools used by cybercriminals to carry out these attacks, and has presented research at various security conferences such as BotConf, Hack.lu and GreHack.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Will Glazier, Head of the Cequence Prime Threat Research Team from Cequence Security, as he discusses the intricate landscape of API security in 2024. Will delves into the essential intertwining of API security and bot management, emphasizing why these cannot be handled independently. The conversation covers the diverse nature of API security issues, from inventory and compliance to active threat protection, and the industry’s shift towards consolidated security tools. Will also highlights the often-overlooked but critical importance of API security, compared to more tangible threats like business email compromise, and stresses the necessity of integrating security within CI/CD pipelines to mitigate risks.
William Glazier  is Head of Cequence Security’s new Cequence Prime Threat Research Team, whose mission is to help the security industry better understand how cybercriminals execute automated, malicious bot attacks against web, mobile, and API-based applications. As Head of CQ Research, Will focuses on the rapidly escalating problems of account takeover, fake account creation and content scraping at scale. He has an extensive background in fraud and abuse prevention, as well as building threat intelligence systems and databases. He has also extensively studied the shared attacker infrastructure and network fingerprints of tools used by cybercriminals to carry out these attacks, and has presented research at various security conferences such as BotConf, Hack.lu and GreHack.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 278 Deep Dive: William Glazier | Why Is There A Focus on API Security in 2024?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Will Glazier, Head of the Cequence Prime Threat Research Team from Cequence Security, as he discusses the intricate landscape of API security in 2024. Will delves into the essential intertwining of API security and bot management, emphasizing why these cannot be handled independently. The conversation covers the diverse nature of API security issues, from inventory and compliance to active threat protection, and the industry’s shift towards consolidated security tools. Will also highlights the often-overlooked but critical importance of API security, compared to more tangible threats like business email compromise, and stresses the necessity of integrating security within CI/CD pipelines to mitigate risks.</p>
<p>William Glazier  is Head of Cequence Security’s new Cequence Prime Threat Research Team, whose mission is to help the security industry better understand how cybercriminals execute automated, malicious bot attacks against web, mobile, and API-based applications. As Head of CQ Research, Will focuses on the rapidly escalating problems of account takeover, fake account creation and content scraping at scale. He has an extensive background in fraud and abuse prevention, as well as building threat intelligence systems and databases. He has also extensively studied the shared attacker infrastructure and network fingerprints of tools used by cybercriminals to carry out these attacks, and has presented research at various security conferences such as BotConf, Hack.lu and GreHack.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1842303/c1e-n439h57dogu9z48n-qdrnrx27svwm-ki2eea.mp3" length="40216495"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Will Glazier, Head of the Cequence Prime Threat Research Team from Cequence Security, as he discusses the intricate landscape of API security in 2024. Will delves into the essential intertwining of API security and bot management, emphasizing why these cannot be handled independently. The conversation covers the diverse nature of API security issues, from inventory and compliance to active threat protection, and the industry’s shift towards consolidated security tools. Will also highlights the often-overlooked but critical importance of API security, compared to more tangible threats like business email compromise, and stresses the necessity of integrating security within CI/CD pipelines to mitigate risks.
William Glazier  is Head of Cequence Security’s new Cequence Prime Threat Research Team, whose mission is to help the security industry better understand how cybercriminals execute automated, malicious bot attacks against web, mobile, and API-based applications. As Head of CQ Research, Will focuses on the rapidly escalating problems of account takeover, fake account creation and content scraping at scale. He has an extensive background in fraud and abuse prevention, as well as building threat intelligence systems and databases. He has also extensively studied the shared attacker infrastructure and network fingerprints of tools used by cybercriminals to carry out these attacks, and has presented research at various security conferences such as BotConf, Hack.lu and GreHack.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1842303/c1a-5k0v-47g8g885b5wz-ezgtjx.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: Zenith Live 2024 (Part 2)]]>
                </title>
                <pubDate>Thu, 19 Sep 2024 02:00:44 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1835341</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-zenith-live-2024-part-2-1</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, we’re joined by Claudionor Coelho, Chief AI Officer, and Deepen Desai, Chief Security Officer &amp; Head of Security Research at Zscaler as they share the latest in zero trust networking and AI security to protect and enable organizations. Claudionor discusses the societal implications of AI, the fears of obsolescence, and the generational changes in communication, providing a comprehensive look at the future of AI in both the digital and human landscapes. Deepen highlights the incredible potential of AI in transforming cybersecurity through initiatives like Zscaler’s “copilot” technology and the use of predictive models to foresee and mitigate breaches and the pivotal shift from reactive to proactive cybersecurity measures, underscoring the necessity of a zero trust architecture to minimize breach impacts.</p>
<p><strong>Claudionor Coelho, Chief AI Officer, Zscaler
</strong></p>
<p>Claudionor Coelho brings a wealth of expertise to help Zscaler deliver a competitive technology advantage through the development of AI and ML innovations. Prior to joining Zscaler, Coelho served as the Chief AI Officer and SVP of Engineering at Advantest, where he spearheaded the development of a Zero Trust private cloud solution tailored for the semiconductor manufacturing market. Before Advantest, Coelho was the VP/Fellow of AI and the Head of AI Labs at Palo Alto Networks where he led the charge in AI, AIOps and Neuro-symbolic AI, an advanced form of AI that enables reasoning, learning, and cognitive modeling, to help revolutionize time series analysis tools on a massive scale. Coelho’s career also includes vital roles in ML and Deep Learning at Google, where he developed a state-of-the-art Deep Learning technology designed for automatic quantization and model compression which played a pivotal function in the search for subatomic particles at CERN..</p>
<p><strong>Deepen Desai, Chief Security Officer &amp; Head of Security Research, Zscaler</strong></p>
<p>As Chief Security Officer &amp; Head of Security Research at Zscaler, Deepen Desai is responsible for running the global security research operations as well as working with the product group to ensure that the Zscaler platform and services are secure. Deepen has been actively involved in the field of cybersecurity for the past 15 years. Prior to joining Zscaler, he held a security leadership role at Dell SonicWALL.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, we’re joined by Claudionor Coelho, Chief AI Officer, and Deepen Desai, Chief Security Officer & Head of Security Research at Zscaler as they share the latest in zero trust networking and AI security to protect and enable organizations. Claudionor discusses the societal implications of AI, the fears of obsolescence, and the generational changes in communication, providing a comprehensive look at the future of AI in both the digital and human landscapes. Deepen highlights the incredible potential of AI in transforming cybersecurity through initiatives like Zscaler’s “copilot” technology and the use of predictive models to foresee and mitigate breaches and the pivotal shift from reactive to proactive cybersecurity measures, underscoring the necessity of a zero trust architecture to minimize breach impacts.
Claudionor Coelho, Chief AI Officer, Zscaler

Claudionor Coelho brings a wealth of expertise to help Zscaler deliver a competitive technology advantage through the development of AI and ML innovations. Prior to joining Zscaler, Coelho served as the Chief AI Officer and SVP of Engineering at Advantest, where he spearheaded the development of a Zero Trust private cloud solution tailored for the semiconductor manufacturing market. Before Advantest, Coelho was the VP/Fellow of AI and the Head of AI Labs at Palo Alto Networks where he led the charge in AI, AIOps and Neuro-symbolic AI, an advanced form of AI that enables reasoning, learning, and cognitive modeling, to help revolutionize time series analysis tools on a massive scale. Coelho’s career also includes vital roles in ML and Deep Learning at Google, where he developed a state-of-the-art Deep Learning technology designed for automatic quantization and model compression which played a pivotal function in the search for subatomic particles at CERN..
Deepen Desai, Chief Security Officer & Head of Security Research, Zscaler
As Chief Security Officer & Head of Security Research at Zscaler, Deepen Desai is responsible for running the global security research operations as well as working with the product group to ensure that the Zscaler platform and services are secure. Deepen has been actively involved in the field of cybersecurity for the past 15 years. Prior to joining Zscaler, he held a security leadership role at Dell SonicWALL.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: Zenith Live 2024 (Part 2)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, we’re joined by Claudionor Coelho, Chief AI Officer, and Deepen Desai, Chief Security Officer &amp; Head of Security Research at Zscaler as they share the latest in zero trust networking and AI security to protect and enable organizations. Claudionor discusses the societal implications of AI, the fears of obsolescence, and the generational changes in communication, providing a comprehensive look at the future of AI in both the digital and human landscapes. Deepen highlights the incredible potential of AI in transforming cybersecurity through initiatives like Zscaler’s “copilot” technology and the use of predictive models to foresee and mitigate breaches and the pivotal shift from reactive to proactive cybersecurity measures, underscoring the necessity of a zero trust architecture to minimize breach impacts.</p>
<p><strong>Claudionor Coelho, Chief AI Officer, Zscaler
</strong></p>
<p>Claudionor Coelho brings a wealth of expertise to help Zscaler deliver a competitive technology advantage through the development of AI and ML innovations. Prior to joining Zscaler, Coelho served as the Chief AI Officer and SVP of Engineering at Advantest, where he spearheaded the development of a Zero Trust private cloud solution tailored for the semiconductor manufacturing market. Before Advantest, Coelho was the VP/Fellow of AI and the Head of AI Labs at Palo Alto Networks where he led the charge in AI, AIOps and Neuro-symbolic AI, an advanced form of AI that enables reasoning, learning, and cognitive modeling, to help revolutionize time series analysis tools on a massive scale. Coelho’s career also includes vital roles in ML and Deep Learning at Google, where he developed a state-of-the-art Deep Learning technology designed for automatic quantization and model compression which played a pivotal function in the search for subatomic particles at CERN..</p>
<p><strong>Deepen Desai, Chief Security Officer &amp; Head of Security Research, Zscaler</strong></p>
<p>As Chief Security Officer &amp; Head of Security Research at Zscaler, Deepen Desai is responsible for running the global security research operations as well as working with the product group to ensure that the Zscaler platform and services are secure. Deepen has been actively involved in the field of cybersecurity for the past 15 years. Prior to joining Zscaler, he held a security leadership role at Dell SonicWALL.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1835341/c1e-pjr0h5qgmdamo9x2-1p068rrmc34j-kaivg7.mp3" length="41479150"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, we’re joined by Claudionor Coelho, Chief AI Officer, and Deepen Desai, Chief Security Officer & Head of Security Research at Zscaler as they share the latest in zero trust networking and AI security to protect and enable organizations. Claudionor discusses the societal implications of AI, the fears of obsolescence, and the generational changes in communication, providing a comprehensive look at the future of AI in both the digital and human landscapes. Deepen highlights the incredible potential of AI in transforming cybersecurity through initiatives like Zscaler’s “copilot” technology and the use of predictive models to foresee and mitigate breaches and the pivotal shift from reactive to proactive cybersecurity measures, underscoring the necessity of a zero trust architecture to minimize breach impacts.
Claudionor Coelho, Chief AI Officer, Zscaler

Claudionor Coelho brings a wealth of expertise to help Zscaler deliver a competitive technology advantage through the development of AI and ML innovations. Prior to joining Zscaler, Coelho served as the Chief AI Officer and SVP of Engineering at Advantest, where he spearheaded the development of a Zero Trust private cloud solution tailored for the semiconductor manufacturing market. Before Advantest, Coelho was the VP/Fellow of AI and the Head of AI Labs at Palo Alto Networks where he led the charge in AI, AIOps and Neuro-symbolic AI, an advanced form of AI that enables reasoning, learning, and cognitive modeling, to help revolutionize time series analysis tools on a massive scale. Coelho’s career also includes vital roles in ML and Deep Learning at Google, where he developed a state-of-the-art Deep Learning technology designed for automatic quantization and model compression which played a pivotal function in the search for subatomic particles at CERN..
Deepen Desai, Chief Security Officer & Head of Security Research, Zscaler
As Chief Security Officer & Head of Security Research at Zscaler, Deepen Desai is responsible for running the global security research operations as well as working with the product group to ensure that the Zscaler platform and services are secure. Deepen has been actively involved in the field of cybersecurity for the past 15 years. Prior to joining Zscaler, he held a security leadership role at Dell SonicWALL.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1835341/c1a-5k0v-pkjj4ww3im9p-qmiwf5.png"></itunes:image>
                                                                            <itunes:duration>00:43:13</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 277 Deep Dive: Jagdish Mahapatra | Microsegmentation and the Path Forward]]>
                </title>
                <pubDate>Wed, 18 Sep 2024 06:00:39 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1835360</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-277-deep-dive-jagdish-mahapatra-microsegmentation-and-the-path-forward-1</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we’re joined by Jagdish Mahapatra, Chief Revenue Officer of ColorTokens, as he discusses the imperative of achieving digital resilience against cyber attacks. Jag delves into the critical role of the right partners in business digital security, the importance of microsegmentation in preventing lateral movement within networks, and why businesses should focus on breach containment rather than just prevention. He also sheds light on the importance of maintaining business continuity through digital resiliency, the need for ongoing support from vendors, and how businesses can better prepare for inevitable cyber breaches.</p>
<p>Jagdish Mahapatra is the Chief Revenue Officer of ColorTokens, a leader in Cybersecurity  industry in helping organisations “ Be Breach Ready”. He is responsible for the Global Go to  Market strategy of ColorTokens. </p>
<p>Prior to joining ColorTokens Jagdish Mahapatra was the Vice President for CrowdStrike for  Asia Region which included South East Asia, North Asia and South Asia. His key responsibilities  included Building a Strong Business for Asia Region with the focus on providing next Gen  Cybersecurity solutions to Enterprise customer and Govt. and build Strategic Alliances for  CrowdStrike. Aside from growing business in hypergrowth mode which made Asia one of the  fastest growing regions in the world for CrowdStrike, he topk a lot of pride in incubating a </p>
<p>culture of a highly engaged team with CrowdStrike Singapore being amongst the Top 5 Workplaces of 2022 and CrowdStrike India in Top 10 Workplaces in 2023. ( GPTW). </p>
<p>Jagdish has previously worked for Cisco and McAfee. In Cisco he built a Strong Enterprise  business of 250M USD when he took charge as the Managing Director for McAfee India.  Having built a successful business and culture in McAfee India, he went to run the Strategic  Alliances for APJ for McAfee before joining CrowdStrike. </p>
<p>He was recognized as one of the Top 40 Executives in India Inc under 40 in 2011 by Business  World.  </p>
<p>He has delivered a TED talk for Star TV which was aired in Jan 2018 where he spoke about how  we should keep our kids safe in the online world. He has also spoken as TEDx speaker in Feb  2018 on Cybersecurity and impact of Digital footprints. </p>
<p>In the formative part of his career, he was instrumental in creating the manufacturing off  shoring model in India which emerged as a significant game changing industry phenomenon  during his stint at Larsen and Toubro, a large Engineering Conglomerate in India.  </p>
<p>On the academic front, Jagdish is an Electrical Engineer with MBA in Marketing and Finance.  Jagdish loves to explore travel to experience cultures, food and local mythology and loves to  relate the stories to work. Born in the holy city of Puri, one of the 4 top pilgrimages of India,  he finds Indian mythology inspiring to fulfil todays’ life. He is an avid reader from fiction to  Business and Technology and loves to blog regularly on all topics on Social media. Right now,  his passion is to rekindle his music desires with Piano and Drums. </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we’re joined by Jagdish Mahapatra, Chief Revenue Officer of ColorTokens, as he discusses the imperative of achieving digital resilience against cyber attacks. Jag delves into the critical role of the right partners in business digital security, the importance of microsegmentation in preventing lateral movement within networks, and why businesses should focus on breach containment rather than just prevention. He also sheds light on the importance of maintaining business continuity through digital resiliency, the need for ongoing support from vendors, and how businesses can better prepare for inevitable cyber breaches.
Jagdish Mahapatra is the Chief Revenue Officer of ColorTokens, a leader in Cybersecurity  industry in helping organisations “ Be Breach Ready”. He is responsible for the Global Go to  Market strategy of ColorTokens. 
Prior to joining ColorTokens Jagdish Mahapatra was the Vice President for CrowdStrike for  Asia Region which included South East Asia, North Asia and South Asia. His key responsibilities  included Building a Strong Business for Asia Region with the focus on providing next Gen  Cybersecurity solutions to Enterprise customer and Govt. and build Strategic Alliances for  CrowdStrike. Aside from growing business in hypergrowth mode which made Asia one of the  fastest growing regions in the world for CrowdStrike, he topk a lot of pride in incubating a 
culture of a highly engaged team with CrowdStrike Singapore being amongst the Top 5 Workplaces of 2022 and CrowdStrike India in Top 10 Workplaces in 2023. ( GPTW). 
Jagdish has previously worked for Cisco and McAfee. In Cisco he built a Strong Enterprise  business of 250M USD when he took charge as the Managing Director for McAfee India.  Having built a successful business and culture in McAfee India, he went to run the Strategic  Alliances for APJ for McAfee before joining CrowdStrike. 
He was recognized as one of the Top 40 Executives in India Inc under 40 in 2011 by Business  World.  
He has delivered a TED talk for Star TV which was aired in Jan 2018 where he spoke about how  we should keep our kids safe in the online world. He has also spoken as TEDx speaker in Feb  2018 on Cybersecurity and impact of Digital footprints. 
In the formative part of his career, he was instrumental in creating the manufacturing off  shoring model in India which emerged as a significant game changing industry phenomenon  during his stint at Larsen and Toubro, a large Engineering Conglomerate in India.  
On the academic front, Jagdish is an Electrical Engineer with MBA in Marketing and Finance.  Jagdish loves to explore travel to experience cultures, food and local mythology and loves to  relate the stories to work. Born in the holy city of Puri, one of the 4 top pilgrimages of India,  he finds Indian mythology inspiring to fulfil todays’ life. He is an avid reader from fiction to  Business and Technology and loves to blog regularly on all topics on Social media. Right now,  his passion is to rekindle his music desires with Piano and Drums. ]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 277 Deep Dive: Jagdish Mahapatra | Microsegmentation and the Path Forward]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we’re joined by Jagdish Mahapatra, Chief Revenue Officer of ColorTokens, as he discusses the imperative of achieving digital resilience against cyber attacks. Jag delves into the critical role of the right partners in business digital security, the importance of microsegmentation in preventing lateral movement within networks, and why businesses should focus on breach containment rather than just prevention. He also sheds light on the importance of maintaining business continuity through digital resiliency, the need for ongoing support from vendors, and how businesses can better prepare for inevitable cyber breaches.</p>
<p>Jagdish Mahapatra is the Chief Revenue Officer of ColorTokens, a leader in Cybersecurity  industry in helping organisations “ Be Breach Ready”. He is responsible for the Global Go to  Market strategy of ColorTokens. </p>
<p>Prior to joining ColorTokens Jagdish Mahapatra was the Vice President for CrowdStrike for  Asia Region which included South East Asia, North Asia and South Asia. His key responsibilities  included Building a Strong Business for Asia Region with the focus on providing next Gen  Cybersecurity solutions to Enterprise customer and Govt. and build Strategic Alliances for  CrowdStrike. Aside from growing business in hypergrowth mode which made Asia one of the  fastest growing regions in the world for CrowdStrike, he topk a lot of pride in incubating a </p>
<p>culture of a highly engaged team with CrowdStrike Singapore being amongst the Top 5 Workplaces of 2022 and CrowdStrike India in Top 10 Workplaces in 2023. ( GPTW). </p>
<p>Jagdish has previously worked for Cisco and McAfee. In Cisco he built a Strong Enterprise  business of 250M USD when he took charge as the Managing Director for McAfee India.  Having built a successful business and culture in McAfee India, he went to run the Strategic  Alliances for APJ for McAfee before joining CrowdStrike. </p>
<p>He was recognized as one of the Top 40 Executives in India Inc under 40 in 2011 by Business  World.  </p>
<p>He has delivered a TED talk for Star TV which was aired in Jan 2018 where he spoke about how  we should keep our kids safe in the online world. He has also spoken as TEDx speaker in Feb  2018 on Cybersecurity and impact of Digital footprints. </p>
<p>In the formative part of his career, he was instrumental in creating the manufacturing off  shoring model in India which emerged as a significant game changing industry phenomenon  during his stint at Larsen and Toubro, a large Engineering Conglomerate in India.  </p>
<p>On the academic front, Jagdish is an Electrical Engineer with MBA in Marketing and Finance.  Jagdish loves to explore travel to experience cultures, food and local mythology and loves to  relate the stories to work. Born in the holy city of Puri, one of the 4 top pilgrimages of India,  he finds Indian mythology inspiring to fulfil todays’ life. He is an avid reader from fiction to  Business and Technology and loves to blog regularly on all topics on Social media. Right now,  his passion is to rekindle his music desires with Piano and Drums. </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1835360/c1e-m1o3cn8v5dcwqk4n-wwzo1wx4bx1g-mlb5rh.mp3" length="37917718"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we’re joined by Jagdish Mahapatra, Chief Revenue Officer of ColorTokens, as he discusses the imperative of achieving digital resilience against cyber attacks. Jag delves into the critical role of the right partners in business digital security, the importance of microsegmentation in preventing lateral movement within networks, and why businesses should focus on breach containment rather than just prevention. He also sheds light on the importance of maintaining business continuity through digital resiliency, the need for ongoing support from vendors, and how businesses can better prepare for inevitable cyber breaches.
Jagdish Mahapatra is the Chief Revenue Officer of ColorTokens, a leader in Cybersecurity  industry in helping organisations “ Be Breach Ready”. He is responsible for the Global Go to  Market strategy of ColorTokens. 
Prior to joining ColorTokens Jagdish Mahapatra was the Vice President for CrowdStrike for  Asia Region which included South East Asia, North Asia and South Asia. His key responsibilities  included Building a Strong Business for Asia Region with the focus on providing next Gen  Cybersecurity solutions to Enterprise customer and Govt. and build Strategic Alliances for  CrowdStrike. Aside from growing business in hypergrowth mode which made Asia one of the  fastest growing regions in the world for CrowdStrike, he topk a lot of pride in incubating a 
culture of a highly engaged team with CrowdStrike Singapore being amongst the Top 5 Workplaces of 2022 and CrowdStrike India in Top 10 Workplaces in 2023. ( GPTW). 
Jagdish has previously worked for Cisco and McAfee. In Cisco he built a Strong Enterprise  business of 250M USD when he took charge as the Managing Director for McAfee India.  Having built a successful business and culture in McAfee India, he went to run the Strategic  Alliances for APJ for McAfee before joining CrowdStrike. 
He was recognized as one of the Top 40 Executives in India Inc under 40 in 2011 by Business  World.  
He has delivered a TED talk for Star TV which was aired in Jan 2018 where he spoke about how  we should keep our kids safe in the online world. He has also spoken as TEDx speaker in Feb  2018 on Cybersecurity and impact of Digital footprints. 
In the formative part of his career, he was instrumental in creating the manufacturing off  shoring model in India which emerged as a significant game changing industry phenomenon  during his stint at Larsen and Toubro, a large Engineering Conglomerate in India.  
On the academic front, Jagdish is an Electrical Engineer with MBA in Marketing and Finance.  Jagdish loves to explore travel to experience cultures, food and local mythology and loves to  relate the stories to work. Born in the holy city of Puri, one of the 4 top pilgrimages of India,  he finds Indian mythology inspiring to fulfil todays’ life. He is an avid reader from fiction to  Business and Technology and loves to blog regularly on all topics on Social media. Right now,  his passion is to rekindle his music desires with Piano and Drums. ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1835360/c1a-5k0v-8d42xdkduv79-iyculu.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: Zenith Live 2024 (Part 1)]]>
                </title>
                <pubDate>Tue, 17 Sep 2024 02:00:27 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1835286</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-zenith-live-2024-part-1-1</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, we sit down with Kavitha Mariappan, Executive Vice President, Customer Experience &amp; Transformation and Dhawal Sharma, Senior Vice President &amp; General Manager as they share the latest in zero trust networking and AI security to protect and enable organizations. Kavitha provides insights into the rising use of AI in cybersecurity, both defensively and offensively, and the challenges organizations face transitioning to zero trust environments. Dhawal delves into the concept of adaptive access and its role in real-time anomaly detection and zero trust security models, emphasizing the need for geo-location aware policies and the integration of step-up authentication. They also explore the impacts of recent cyber incidents in the ANZ region, the significance of network segmentation, and the collaborative efforts with industry giants like Google and NVIDIA to enhance security capabilities through AI technologies.</p>
<p> </p>
<p><strong>Kavitha Mariappan, Executive Vice President, Customer Experience &amp; Transformation, Zscaler</strong></p>
<p>Kavitha Mariappan is a seasoned go-to-market executive with a penchant for rapidly translating technology into customer-centric value, mobilizing global teams and operations, and transforming them into high-growth businesses. Over her 20+ year tenure spanning enterprise software and service providers, she has held various high-impact roles spanning marketing, product management, and engineering at industry-leading companies including Databricks, Riverbed, Cisco, and Philips Electronics.</p>
<p>Prior to joining Zscaler, she served as CMO at Split Software, a venture-backed startup where she built the company’s go-to-market engine from the ground up and was instrumental in defining a new category for product decisions. Kavitha is responsible for driving global transformation and innovation across all facets of Zscaler’s business, customers, strategy, products, and operations, with a strong focus on customer value creation.
Kavitha holds a Bachelor of Engineering in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and a Master of Science in Cybersecurity Risk and Strategy from New York University School of Law and Tandon School of Engineering.</p>
<p> </p>
<p><strong>Dhawal Sharma, Senior Vice President &amp; General Manager, Product Management, Zscaler</strong></p>
<p>Dhawal Sharma is Senior Vice President &amp; General Manager of Product Management at Zscaler. He led all core product management from 2012 to 2018 and currently leads all emerging product and core platform responsibilities. His specialties are in cloud security, networking, data path, IoT, NFV, NPM, DLP, and compliance.</p>
<p>Prior to joining Zscaler, he has worked in product management, product marketing and head of sales roles in the space of security, networking, compliance and network management at large companies such as Cisco as well as in tech startups.</p>
<p>Dhawal has a technical MBA degree from Symbiosis Center for IT where he achieved the best academic performance with a specialization in Networking and IT Infrastructure and he also holds a Bachelors in Engineering degree specializing in Computer Science. Dhawal also holds multiple patents in the security space along with many technical certifications in the past.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, we sit down with Kavitha Mariappan, Executive Vice President, Customer Experience & Transformation and Dhawal Sharma, Senior Vice President & General Manager as they share the latest in zero trust networking and AI security to protect and enable organizations. Kavitha provides insights into the rising use of AI in cybersecurity, both defensively and offensively, and the challenges organizations face transitioning to zero trust environments. Dhawal delves into the concept of adaptive access and its role in real-time anomaly detection and zero trust security models, emphasizing the need for geo-location aware policies and the integration of step-up authentication. They also explore the impacts of recent cyber incidents in the ANZ region, the significance of network segmentation, and the collaborative efforts with industry giants like Google and NVIDIA to enhance security capabilities through AI technologies.
 
Kavitha Mariappan, Executive Vice President, Customer Experience & Transformation, Zscaler
Kavitha Mariappan is a seasoned go-to-market executive with a penchant for rapidly translating technology into customer-centric value, mobilizing global teams and operations, and transforming them into high-growth businesses. Over her 20+ year tenure spanning enterprise software and service providers, she has held various high-impact roles spanning marketing, product management, and engineering at industry-leading companies including Databricks, Riverbed, Cisco, and Philips Electronics.
Prior to joining Zscaler, she served as CMO at Split Software, a venture-backed startup where she built the company’s go-to-market engine from the ground up and was instrumental in defining a new category for product decisions. Kavitha is responsible for driving global transformation and innovation across all facets of Zscaler’s business, customers, strategy, products, and operations, with a strong focus on customer value creation.
Kavitha holds a Bachelor of Engineering in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and a Master of Science in Cybersecurity Risk and Strategy from New York University School of Law and Tandon School of Engineering.
 
Dhawal Sharma, Senior Vice President & General Manager, Product Management, Zscaler
Dhawal Sharma is Senior Vice President & General Manager of Product Management at Zscaler. He led all core product management from 2012 to 2018 and currently leads all emerging product and core platform responsibilities. His specialties are in cloud security, networking, data path, IoT, NFV, NPM, DLP, and compliance.
Prior to joining Zscaler, he has worked in product management, product marketing and head of sales roles in the space of security, networking, compliance and network management at large companies such as Cisco as well as in tech startups.
Dhawal has a technical MBA degree from Symbiosis Center for IT where he achieved the best academic performance with a specialization in Networking and IT Infrastructure and he also holds a Bachelors in Engineering degree specializing in Computer Science. Dhawal also holds multiple patents in the security space along with many technical certifications in the past.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: Zenith Live 2024 (Part 1)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, we sit down with Kavitha Mariappan, Executive Vice President, Customer Experience &amp; Transformation and Dhawal Sharma, Senior Vice President &amp; General Manager as they share the latest in zero trust networking and AI security to protect and enable organizations. Kavitha provides insights into the rising use of AI in cybersecurity, both defensively and offensively, and the challenges organizations face transitioning to zero trust environments. Dhawal delves into the concept of adaptive access and its role in real-time anomaly detection and zero trust security models, emphasizing the need for geo-location aware policies and the integration of step-up authentication. They also explore the impacts of recent cyber incidents in the ANZ region, the significance of network segmentation, and the collaborative efforts with industry giants like Google and NVIDIA to enhance security capabilities through AI technologies.</p>
<p> </p>
<p><strong>Kavitha Mariappan, Executive Vice President, Customer Experience &amp; Transformation, Zscaler</strong></p>
<p>Kavitha Mariappan is a seasoned go-to-market executive with a penchant for rapidly translating technology into customer-centric value, mobilizing global teams and operations, and transforming them into high-growth businesses. Over her 20+ year tenure spanning enterprise software and service providers, she has held various high-impact roles spanning marketing, product management, and engineering at industry-leading companies including Databricks, Riverbed, Cisco, and Philips Electronics.</p>
<p>Prior to joining Zscaler, she served as CMO at Split Software, a venture-backed startup where she built the company’s go-to-market engine from the ground up and was instrumental in defining a new category for product decisions. Kavitha is responsible for driving global transformation and innovation across all facets of Zscaler’s business, customers, strategy, products, and operations, with a strong focus on customer value creation.
Kavitha holds a Bachelor of Engineering in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and a Master of Science in Cybersecurity Risk and Strategy from New York University School of Law and Tandon School of Engineering.</p>
<p> </p>
<p><strong>Dhawal Sharma, Senior Vice President &amp; General Manager, Product Management, Zscaler</strong></p>
<p>Dhawal Sharma is Senior Vice President &amp; General Manager of Product Management at Zscaler. He led all core product management from 2012 to 2018 and currently leads all emerging product and core platform responsibilities. His specialties are in cloud security, networking, data path, IoT, NFV, NPM, DLP, and compliance.</p>
<p>Prior to joining Zscaler, he has worked in product management, product marketing and head of sales roles in the space of security, networking, compliance and network management at large companies such as Cisco as well as in tech startups.</p>
<p>Dhawal has a technical MBA degree from Symbiosis Center for IT where he achieved the best academic performance with a specialization in Networking and IT Infrastructure and he also holds a Bachelors in Engineering degree specializing in Computer Science. Dhawal also holds multiple patents in the security space along with many technical certifications in the past.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1835286/c1e-02xmsjzxkkfgm3k5-gp2r82ogbo0n-d7vkwk.mp3" length="40534978"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, we sit down with Kavitha Mariappan, Executive Vice President, Customer Experience & Transformation and Dhawal Sharma, Senior Vice President & General Manager as they share the latest in zero trust networking and AI security to protect and enable organizations. Kavitha provides insights into the rising use of AI in cybersecurity, both defensively and offensively, and the challenges organizations face transitioning to zero trust environments. Dhawal delves into the concept of adaptive access and its role in real-time anomaly detection and zero trust security models, emphasizing the need for geo-location aware policies and the integration of step-up authentication. They also explore the impacts of recent cyber incidents in the ANZ region, the significance of network segmentation, and the collaborative efforts with industry giants like Google and NVIDIA to enhance security capabilities through AI technologies.
 
Kavitha Mariappan, Executive Vice President, Customer Experience & Transformation, Zscaler
Kavitha Mariappan is a seasoned go-to-market executive with a penchant for rapidly translating technology into customer-centric value, mobilizing global teams and operations, and transforming them into high-growth businesses. Over her 20+ year tenure spanning enterprise software and service providers, she has held various high-impact roles spanning marketing, product management, and engineering at industry-leading companies including Databricks, Riverbed, Cisco, and Philips Electronics.
Prior to joining Zscaler, she served as CMO at Split Software, a venture-backed startup where she built the company’s go-to-market engine from the ground up and was instrumental in defining a new category for product decisions. Kavitha is responsible for driving global transformation and innovation across all facets of Zscaler’s business, customers, strategy, products, and operations, with a strong focus on customer value creation.
Kavitha holds a Bachelor of Engineering in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and a Master of Science in Cybersecurity Risk and Strategy from New York University School of Law and Tandon School of Engineering.
 
Dhawal Sharma, Senior Vice President & General Manager, Product Management, Zscaler
Dhawal Sharma is Senior Vice President & General Manager of Product Management at Zscaler. He led all core product management from 2012 to 2018 and currently leads all emerging product and core platform responsibilities. His specialties are in cloud security, networking, data path, IoT, NFV, NPM, DLP, and compliance.
Prior to joining Zscaler, he has worked in product management, product marketing and head of sales roles in the space of security, networking, compliance and network management at large companies such as Cisco as well as in tech startups.
Dhawal has a technical MBA degree from Symbiosis Center for IT where he achieved the best academic performance with a specialization in Networking and IT Infrastructure and he also holds a Bachelors in Engineering degree specializing in Computer Science. Dhawal also holds multiple patents in the security space along with many technical certifications in the past.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1835286/c1a-5k0v-1pddkrdxb8n3-5vl45u.png"></itunes:image>
                                                                            <itunes:duration>00:42:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 276 Deep Dive: Mahesh Thiagarajan | Oracle's Approach to the Cloud]]>
                </title>
                <pubDate>Wed, 11 Sep 2024 05:00:49 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1832094</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-276-deep-dive-mahesh-thiagarajan-oracles-approach-to-the-cloud</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Mahesh Thiagarajan, Executive Vice President at Oracle Cloud Infrastructure (OCI), as he discusses the evolving landscape of cloud security and cloud adoption. Mahesh delves into the shared responsibility model of cloud security, emphasizing the critical roles played by both customers and cloud providers in maintaining secure environments. He also discusses the various challenges developers face, the innovative solutions offered by Oracle Cloud to prevent misconfigurations, and the significant advantages Oracle gains from its later entry into the cloud market.</p>
<p><strong>Oracle CloudWorld 2024 is happening on September 9 to 12, 2024. Learn more about the event <a href="https://www.oracle.com/cloudworld/">here</a>.</strong></p>
<p>Mahesh Thiagarajan serves as the Executive Vice President at Oracle Cloud Infrastructure (OCI), overseeing the development of core infrastructure services that includes Hardware, Supply Chain, Datacenter, Compute, Networking, and Storage. His team is devoted to constructing a distributed cloud infrastructure that offers customers a comprehensive, high-performance cloud computing environment. The primary objective is to empower customers to innovate, scale efficiently, and manage costs effectively.</p>
<p>Mahesh was pivotal in the 2016 launch of Oracle Cloud Infrastructure, contributing to strategic planning and overseeing various product launches related to security, application development, computing, database, and big data services. He also played a crucial role in establishing partnerships with Microsoft and VMware.</p>
<p>In his prior role as EVP for Security &amp; Developer Platform, Mahesh led a team in developing security and observability products, cloud security measures, privacy solutions, compliance features, and services tailored for cloud-native applications development.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Mahesh Thiagarajan, Executive Vice President at Oracle Cloud Infrastructure (OCI), as he discusses the evolving landscape of cloud security and cloud adoption. Mahesh delves into the shared responsibility model of cloud security, emphasizing the critical roles played by both customers and cloud providers in maintaining secure environments. He also discusses the various challenges developers face, the innovative solutions offered by Oracle Cloud to prevent misconfigurations, and the significant advantages Oracle gains from its later entry into the cloud market.
Oracle CloudWorld 2024 is happening on September 9 to 12, 2024. Learn more about the event here.
Mahesh Thiagarajan serves as the Executive Vice President at Oracle Cloud Infrastructure (OCI), overseeing the development of core infrastructure services that includes Hardware, Supply Chain, Datacenter, Compute, Networking, and Storage. His team is devoted to constructing a distributed cloud infrastructure that offers customers a comprehensive, high-performance cloud computing environment. The primary objective is to empower customers to innovate, scale efficiently, and manage costs effectively.
Mahesh was pivotal in the 2016 launch of Oracle Cloud Infrastructure, contributing to strategic planning and overseeing various product launches related to security, application development, computing, database, and big data services. He also played a crucial role in establishing partnerships with Microsoft and VMware.
In his prior role as EVP for Security & Developer Platform, Mahesh led a team in developing security and observability products, cloud security measures, privacy solutions, compliance features, and services tailored for cloud-native applications development.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 276 Deep Dive: Mahesh Thiagarajan | Oracle's Approach to the Cloud]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Mahesh Thiagarajan, Executive Vice President at Oracle Cloud Infrastructure (OCI), as he discusses the evolving landscape of cloud security and cloud adoption. Mahesh delves into the shared responsibility model of cloud security, emphasizing the critical roles played by both customers and cloud providers in maintaining secure environments. He also discusses the various challenges developers face, the innovative solutions offered by Oracle Cloud to prevent misconfigurations, and the significant advantages Oracle gains from its later entry into the cloud market.</p>
<p><strong>Oracle CloudWorld 2024 is happening on September 9 to 12, 2024. Learn more about the event <a href="https://www.oracle.com/cloudworld/">here</a>.</strong></p>
<p>Mahesh Thiagarajan serves as the Executive Vice President at Oracle Cloud Infrastructure (OCI), overseeing the development of core infrastructure services that includes Hardware, Supply Chain, Datacenter, Compute, Networking, and Storage. His team is devoted to constructing a distributed cloud infrastructure that offers customers a comprehensive, high-performance cloud computing environment. The primary objective is to empower customers to innovate, scale efficiently, and manage costs effectively.</p>
<p>Mahesh was pivotal in the 2016 launch of Oracle Cloud Infrastructure, contributing to strategic planning and overseeing various product launches related to security, application development, computing, database, and big data services. He also played a crucial role in establishing partnerships with Microsoft and VMware.</p>
<p>In his prior role as EVP for Security &amp; Developer Platform, Mahesh led a team in developing security and observability products, cloud security measures, privacy solutions, compliance features, and services tailored for cloud-native applications development.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1832094/c1e-wmjvurqqp3s0gmpo-v61g2q5dug9n-0hzfpb.mp3" length="35686652"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Mahesh Thiagarajan, Executive Vice President at Oracle Cloud Infrastructure (OCI), as he discusses the evolving landscape of cloud security and cloud adoption. Mahesh delves into the shared responsibility model of cloud security, emphasizing the critical roles played by both customers and cloud providers in maintaining secure environments. He also discusses the various challenges developers face, the innovative solutions offered by Oracle Cloud to prevent misconfigurations, and the significant advantages Oracle gains from its later entry into the cloud market.
Oracle CloudWorld 2024 is happening on September 9 to 12, 2024. Learn more about the event here.
Mahesh Thiagarajan serves as the Executive Vice President at Oracle Cloud Infrastructure (OCI), overseeing the development of core infrastructure services that includes Hardware, Supply Chain, Datacenter, Compute, Networking, and Storage. His team is devoted to constructing a distributed cloud infrastructure that offers customers a comprehensive, high-performance cloud computing environment. The primary objective is to empower customers to innovate, scale efficiently, and manage costs effectively.
Mahesh was pivotal in the 2016 launch of Oracle Cloud Infrastructure, contributing to strategic planning and overseeing various product launches related to security, application development, computing, database, and big data services. He also played a crucial role in establishing partnerships with Microsoft and VMware.
In his prior role as EVP for Security & Developer Platform, Mahesh led a team in developing security and observability products, cloud security measures, privacy solutions, compliance features, and services tailored for cloud-native applications development.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1832094/c1a-5k0v-7z4dxw22c23d-kclbit.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:11</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KBI.Media Update | Gabie Boko: NetApp INSIGHT 2024]]>
                </title>
                <pubDate>Thu, 05 Sep 2024 14:00:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1829520</guid>
                                    <link>https://kbkast.castos.com/episodes/kbimedia-update-gabie-boko-netapp-insight-2024</link>
                                <description>
                                            <![CDATA[<p>Join KB as she sits down with Gabie Boko, Chief Marketing Officer of NetApp, who will give us an exclusive sneak peek into what you can expect from <a href="https://insight.netapp.com/">NetApp INSIGHTS 2024</a>. Gabie explores topics such as sustainability, cloud technology, and how AI is revolutionizing the way businesses manage data. Gabie also highlights the exciting new announcements, partner collaborations, and customer success stories that will be showcased at the event.</p>
<p>Gabie Boko is a business trailblazer currently serving as Chief Marketing Officer (CMO) at NetApp. She draws on her deep experience as a business, marketing, and technology leader to help shape NetApp’s evolution as the industry leader in intelligent data infrastructure.</p>
<p>A 25-year veteran in the tech industry, Gabie is known for her work spearheading business transformations at high-impact companies such as HPE, SAP, Sage, and Cognos. Prior to becoming NetApp CMO in January 2023, Gabie led the company’s Portfolio Marketing organization.</p>
<p>As a visionary business leader, Gabie relentlessly prioritizes a customer-first mindset. Among traditional marketing practices, she applies distinct strategies that anticipate future trends and adeptly navigate uncharted territories. This is driven by her proven certitude that marketing is much more than promotion and branding, it is about driving high impact outcomes and thinking for the business and industry as a whole. Gabie is resolute in her commitment to revolutionize the face of marketing and amplify its influence on business growth, strategy and vision.</p>
<p>Having grown up in the beautiful state of Alaska, Gabie is a strong advocate for the protection of rural communities.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Join KB as she sits down with Gabie Boko, Chief Marketing Officer of NetApp, who will give us an exclusive sneak peek into what you can expect from NetApp INSIGHTS 2024. Gabie explores topics such as sustainability, cloud technology, and how AI is revolutionizing the way businesses manage data. Gabie also highlights the exciting new announcements, partner collaborations, and customer success stories that will be showcased at the event.
Gabie Boko is a business trailblazer currently serving as Chief Marketing Officer (CMO) at NetApp. She draws on her deep experience as a business, marketing, and technology leader to help shape NetApp’s evolution as the industry leader in intelligent data infrastructure.
A 25-year veteran in the tech industry, Gabie is known for her work spearheading business transformations at high-impact companies such as HPE, SAP, Sage, and Cognos. Prior to becoming NetApp CMO in January 2023, Gabie led the company’s Portfolio Marketing organization.
As a visionary business leader, Gabie relentlessly prioritizes a customer-first mindset. Among traditional marketing practices, she applies distinct strategies that anticipate future trends and adeptly navigate uncharted territories. This is driven by her proven certitude that marketing is much more than promotion and branding, it is about driving high impact outcomes and thinking for the business and industry as a whole. Gabie is resolute in her commitment to revolutionize the face of marketing and amplify its influence on business growth, strategy and vision.
Having grown up in the beautiful state of Alaska, Gabie is a strong advocate for the protection of rural communities.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KBI.Media Update | Gabie Boko: NetApp INSIGHT 2024]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Join KB as she sits down with Gabie Boko, Chief Marketing Officer of NetApp, who will give us an exclusive sneak peek into what you can expect from <a href="https://insight.netapp.com/">NetApp INSIGHTS 2024</a>. Gabie explores topics such as sustainability, cloud technology, and how AI is revolutionizing the way businesses manage data. Gabie also highlights the exciting new announcements, partner collaborations, and customer success stories that will be showcased at the event.</p>
<p>Gabie Boko is a business trailblazer currently serving as Chief Marketing Officer (CMO) at NetApp. She draws on her deep experience as a business, marketing, and technology leader to help shape NetApp’s evolution as the industry leader in intelligent data infrastructure.</p>
<p>A 25-year veteran in the tech industry, Gabie is known for her work spearheading business transformations at high-impact companies such as HPE, SAP, Sage, and Cognos. Prior to becoming NetApp CMO in January 2023, Gabie led the company’s Portfolio Marketing organization.</p>
<p>As a visionary business leader, Gabie relentlessly prioritizes a customer-first mindset. Among traditional marketing practices, she applies distinct strategies that anticipate future trends and adeptly navigate uncharted territories. This is driven by her proven certitude that marketing is much more than promotion and branding, it is about driving high impact outcomes and thinking for the business and industry as a whole. Gabie is resolute in her commitment to revolutionize the face of marketing and amplify its influence on business growth, strategy and vision.</p>
<p>Having grown up in the beautiful state of Alaska, Gabie is a strong advocate for the protection of rural communities.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1829520/c1e-6wnpc2pqogundop0-pk9op3wdh8gk-42wudu.mp3" length="7078181"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Join KB as she sits down with Gabie Boko, Chief Marketing Officer of NetApp, who will give us an exclusive sneak peek into what you can expect from NetApp INSIGHTS 2024. Gabie explores topics such as sustainability, cloud technology, and how AI is revolutionizing the way businesses manage data. Gabie also highlights the exciting new announcements, partner collaborations, and customer success stories that will be showcased at the event.
Gabie Boko is a business trailblazer currently serving as Chief Marketing Officer (CMO) at NetApp. She draws on her deep experience as a business, marketing, and technology leader to help shape NetApp’s evolution as the industry leader in intelligent data infrastructure.
A 25-year veteran in the tech industry, Gabie is known for her work spearheading business transformations at high-impact companies such as HPE, SAP, Sage, and Cognos. Prior to becoming NetApp CMO in January 2023, Gabie led the company’s Portfolio Marketing organization.
As a visionary business leader, Gabie relentlessly prioritizes a customer-first mindset. Among traditional marketing practices, she applies distinct strategies that anticipate future trends and adeptly navigate uncharted territories. This is driven by her proven certitude that marketing is much more than promotion and branding, it is about driving high impact outcomes and thinking for the business and industry as a whole. Gabie is resolute in her commitment to revolutionize the face of marketing and amplify its influence on business growth, strategy and vision.
Having grown up in the beautiful state of Alaska, Gabie is a strong advocate for the protection of rural communities.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1829520/c1a-5k0v-qdr3533xt3dj-fnrr7o.jpg"></itunes:image>
                                                                            <itunes:duration>00:07:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 275 Deep Dive: Shannon Sedgwick | Geopolitics and Cyber Risk]]>
                </title>
                <pubDate>Wed, 04 Sep 2024 06:00:30 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1827853</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-275-deep-dive-shannon-sedgwick-geopolitics-and-cyber-risk</link>
                                <description>
                                            <![CDATA[<p>In this episode, Shannon Sedgwick, Partner – National Cybersecurity Practice from MinterEllison, comes back on the show to talk about cyber warfare and its potential to precede physical warfare, especially targeting critical infrastructure. He also shares his insights on the intersection of geopolitics, technology, and cybersecurity, exploring the potential for AI to exacerbate global divisions and influence economic landscapes. The conversation also dives into the impact of increasing cyber threats, the challenges of AI regulation, and Australia’s position in the international technology landscape.</p>
<p>After two decades of working globally, consulting on risk and cybersecurity, Shannon has keen insight into what makes an organisation both protected and resilient from cyber threats. Shannon’s focus is on cyber risk governance and providing strategic advice to executive leadership and boards. Shannon works with government and corporate clients to develop solutions to incorporate cyber risk into their strategies. Shannon helps clients meet risk-reduction and compliance objectives and advises on the implementation of new and evolving technologies by ensuring they are secure, fit-for-purpose, scalable, and continually driving efficiencies. By employing his unique blend of experience in finance and cybersecurity, he assists in uplifting internal due diligence capabilities, focused on reducing risks and increasing return on investment.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Shannon Sedgwick, Partner – National Cybersecurity Practice from MinterEllison, comes back on the show to talk about cyber warfare and its potential to precede physical warfare, especially targeting critical infrastructure. He also shares his insights on the intersection of geopolitics, technology, and cybersecurity, exploring the potential for AI to exacerbate global divisions and influence economic landscapes. The conversation also dives into the impact of increasing cyber threats, the challenges of AI regulation, and Australia’s position in the international technology landscape.
After two decades of working globally, consulting on risk and cybersecurity, Shannon has keen insight into what makes an organisation both protected and resilient from cyber threats. Shannon’s focus is on cyber risk governance and providing strategic advice to executive leadership and boards. Shannon works with government and corporate clients to develop solutions to incorporate cyber risk into their strategies. Shannon helps clients meet risk-reduction and compliance objectives and advises on the implementation of new and evolving technologies by ensuring they are secure, fit-for-purpose, scalable, and continually driving efficiencies. By employing his unique blend of experience in finance and cybersecurity, he assists in uplifting internal due diligence capabilities, focused on reducing risks and increasing return on investment.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 275 Deep Dive: Shannon Sedgwick | Geopolitics and Cyber Risk]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Shannon Sedgwick, Partner – National Cybersecurity Practice from MinterEllison, comes back on the show to talk about cyber warfare and its potential to precede physical warfare, especially targeting critical infrastructure. He also shares his insights on the intersection of geopolitics, technology, and cybersecurity, exploring the potential for AI to exacerbate global divisions and influence economic landscapes. The conversation also dives into the impact of increasing cyber threats, the challenges of AI regulation, and Australia’s position in the international technology landscape.</p>
<p>After two decades of working globally, consulting on risk and cybersecurity, Shannon has keen insight into what makes an organisation both protected and resilient from cyber threats. Shannon’s focus is on cyber risk governance and providing strategic advice to executive leadership and boards. Shannon works with government and corporate clients to develop solutions to incorporate cyber risk into their strategies. Shannon helps clients meet risk-reduction and compliance objectives and advises on the implementation of new and evolving technologies by ensuring they are secure, fit-for-purpose, scalable, and continually driving efficiencies. By employing his unique blend of experience in finance and cybersecurity, he assists in uplifting internal due diligence capabilities, focused on reducing risks and increasing return on investment.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1827853/c1e-2k31b8x8kda67jon-mk0595x0boo-ctobae.mp3" length="41563996"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Shannon Sedgwick, Partner – National Cybersecurity Practice from MinterEllison, comes back on the show to talk about cyber warfare and its potential to precede physical warfare, especially targeting critical infrastructure. He also shares his insights on the intersection of geopolitics, technology, and cybersecurity, exploring the potential for AI to exacerbate global divisions and influence economic landscapes. The conversation also dives into the impact of increasing cyber threats, the challenges of AI regulation, and Australia’s position in the international technology landscape.
After two decades of working globally, consulting on risk and cybersecurity, Shannon has keen insight into what makes an organisation both protected and resilient from cyber threats. Shannon’s focus is on cyber risk governance and providing strategic advice to executive leadership and boards. Shannon works with government and corporate clients to develop solutions to incorporate cyber risk into their strategies. Shannon helps clients meet risk-reduction and compliance objectives and advises on the implementation of new and evolving technologies by ensuring they are secure, fit-for-purpose, scalable, and continually driving efficiencies. By employing his unique blend of experience in finance and cybersecurity, he assists in uplifting internal due diligence capabilities, focused on reducing risks and increasing return on investment.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1827853/c1a-5k0v-1p032943bg0g-ra6vax.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 274 Deep Dive: Josh Goldfarb | Visibility and Blindness in Complex Environments]]>
                </title>
                <pubDate>Fri, 30 Aug 2024 06:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1823234</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-274-deep-dive-josh-goldfarb-visibility-and-blindness-in-complex-environments</link>
                                <description>
                                            <![CDATA[<p>In this episode, we’re joined by Josh Goldfarb, Global Solutions Architect – Security at F5, as he delves into the challenges of getting buy-in for security initiatives from management and executives. Josh discusses the struggle of presenting informative metrics to decision-makers and the need to bridge the gap between security professionals and business leaders. He also talks about the importance of modernizing security guidance to addressing the visibility challenge in complex environments.</p>
<p>Josh (Twitter: @ananalytical) is Global Solutions Architect – Security, at F5. Previously, Josh served as VP, CTO – Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT. In addition to Josh’s blogging and public speaking appearances, he is also a regular contributor to DarkReading and SecurityWeek.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we’re joined by Josh Goldfarb, Global Solutions Architect – Security at F5, as he delves into the challenges of getting buy-in for security initiatives from management and executives. Josh discusses the struggle of presenting informative metrics to decision-makers and the need to bridge the gap between security professionals and business leaders. He also talks about the importance of modernizing security guidance to addressing the visibility challenge in complex environments.
Josh (Twitter: @ananalytical) is Global Solutions Architect – Security, at F5. Previously, Josh served as VP, CTO – Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT. In addition to Josh’s blogging and public speaking appearances, he is also a regular contributor to DarkReading and SecurityWeek.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 274 Deep Dive: Josh Goldfarb | Visibility and Blindness in Complex Environments]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we’re joined by Josh Goldfarb, Global Solutions Architect – Security at F5, as he delves into the challenges of getting buy-in for security initiatives from management and executives. Josh discusses the struggle of presenting informative metrics to decision-makers and the need to bridge the gap between security professionals and business leaders. He also talks about the importance of modernizing security guidance to addressing the visibility challenge in complex environments.</p>
<p>Josh (Twitter: @ananalytical) is Global Solutions Architect – Security, at F5. Previously, Josh served as VP, CTO – Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT. In addition to Josh’s blogging and public speaking appearances, he is also a regular contributor to DarkReading and SecurityWeek.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1823234/c1e-3g92c5qvnxckq02n-pk9q7n6rtmp6-kujec1.mp3" length="37498089"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we’re joined by Josh Goldfarb, Global Solutions Architect – Security at F5, as he delves into the challenges of getting buy-in for security initiatives from management and executives. Josh discusses the struggle of presenting informative metrics to decision-makers and the need to bridge the gap between security professionals and business leaders. He also talks about the importance of modernizing security guidance to addressing the visibility challenge in complex environments.
Josh (Twitter: @ananalytical) is Global Solutions Architect – Security, at F5. Previously, Josh served as VP, CTO – Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT. In addition to Josh’s blogging and public speaking appearances, he is also a regular contributor to DarkReading and SecurityWeek.]]>
                </itunes:summary>
                                                                            <itunes:duration>00:39:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: TechLeaders 2024]]>
                </title>
                <pubDate>Wed, 28 Aug 2024 06:00:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1819553</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-techleaders-2024-1</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, we dive into the world of tech leadership and the challenges and opportunities surrounding the adoption of generative AI, ethical considerations, and data security at TechLeaders 2024.</p>
<p>Chris Diffley from Optus, announces the launch of the Optus managed threat monitoring service powered by Devo Technology, emphasizing the use of AI and ML to automate threat monitoring and detection. Chris “Gonzo” Gondek from NetApp highlights the importance of data storage conversations, storage technology flexibility, and autonomous ransomware protection. Gavin Jones from Elastic addresses the evolving nature of technology and the lag in Australia’s adoption of generative AI, while Geoff Schomburgk emphasizes the importance of a positive approach to encourage MFA adoption.</p>
<p><strong>Chris Diffley, Senior Director for Client Security, Enterprise and Business,Optus</strong></p>
<p>Chris is an experienced Information Security Manager and Security Director with over 20 years of experience in Telecommunications, Security, Operations and Consulting. He’s lead teams across enterprise, midmarket and small businesses and has deep understanding of implementing and upholding a number of frameworks and standards across businesses.</p>
<p><strong>Chris “Gonzo” Gondek, Solutions Engineer Manager, Australia &amp; New Zealand, NetApp</strong></p>
<p>Chris “Gonzo” Gondek is a technology evangelist who plays a crucial role in driving NetApp’s technical solutions specialists (TSS) to greater heights. As our TSS Leader, Chris and his team collaborate closely with our sales and channel business units to drive innovation, develop new opportunities, enhance our solution offerings, and ensure that our customers’ needs are not just met, but exceeded. Chris spent the past 4 years working in the NetApp Partner eco-system as a Technical Partner Manager, as well as spokesperson at our channel and alliance events. Prior to NetApp, Chris partnered with us at Commvault and worked as a solutions specialist at Symantec. With 25 years in the tech sector, Chris is a seasoned industry leader with a proven track record of delivering innovative solutions and driving customer success.</p>
<p><strong>Gavin Jones, Area Vice President and Country Manager, Australia &amp; New Zealand, Elastic</strong></p>
<p>Gavin brings over two decades of enterprise software experience, with a track record of leadership in banking and financial services, telecommunications, and public sector verticals. Joining Elastic as an Area Vice President and Country Manager in Australia and New Zealand (ANZ), he assumes a pivotal role in overseeing ANZ market operations, driving business development, and shaping the company’s strategy. Prior to joining Elastic, Gavin served as Vice President of ANZ at Confluent, where he spearheaded their transition towards vision and value-based selling. His focus was on high-value and priority use cases for the clientele. Preceding this role, he held the position of Country Manager for Tableau Software ANZ for two and a half years. In this capacity, he played a key role in shaping the BI/analytics category as a leader and a subsidiary of salesforce.com. His responsibilities included developing and executing the ANZ go-to-market strategy, as well as navigating the integration with Salesforce. Gavin is motivated by his ambition to lead a dynamic and inspired team within an innovative, growth-oriented organisation. His expertise spans strategic account management, new business development, and the skillful negotiation of large-scale, complex deals and partnerships.</p>
<p><strong>Geoff Schomburgk, Vice President, Asia Pacific and Japan (APJ), Yubico</strong></p>
<p>At Yubico, Geoff is responsible for driving the Yubico business across the Asia Pacific and Japan (APJ) region, working with partners and enterprise customers to implement modern phishing-resistant authentication, helping make the internet safer for all.</p>
<p>Geoff brings a stro...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, we dive into the world of tech leadership and the challenges and opportunities surrounding the adoption of generative AI, ethical considerations, and data security at TechLeaders 2024.
Chris Diffley from Optus, announces the launch of the Optus managed threat monitoring service powered by Devo Technology, emphasizing the use of AI and ML to automate threat monitoring and detection. Chris “Gonzo” Gondek from NetApp highlights the importance of data storage conversations, storage technology flexibility, and autonomous ransomware protection. Gavin Jones from Elastic addresses the evolving nature of technology and the lag in Australia’s adoption of generative AI, while Geoff Schomburgk emphasizes the importance of a positive approach to encourage MFA adoption.
Chris Diffley, Senior Director for Client Security, Enterprise and Business,Optus
Chris is an experienced Information Security Manager and Security Director with over 20 years of experience in Telecommunications, Security, Operations and Consulting. He’s lead teams across enterprise, midmarket and small businesses and has deep understanding of implementing and upholding a number of frameworks and standards across businesses.
Chris “Gonzo” Gondek, Solutions Engineer Manager, Australia & New Zealand, NetApp
Chris “Gonzo” Gondek is a technology evangelist who plays a crucial role in driving NetApp’s technical solutions specialists (TSS) to greater heights. As our TSS Leader, Chris and his team collaborate closely with our sales and channel business units to drive innovation, develop new opportunities, enhance our solution offerings, and ensure that our customers’ needs are not just met, but exceeded. Chris spent the past 4 years working in the NetApp Partner eco-system as a Technical Partner Manager, as well as spokesperson at our channel and alliance events. Prior to NetApp, Chris partnered with us at Commvault and worked as a solutions specialist at Symantec. With 25 years in the tech sector, Chris is a seasoned industry leader with a proven track record of delivering innovative solutions and driving customer success.
Gavin Jones, Area Vice President and Country Manager, Australia & New Zealand, Elastic
Gavin brings over two decades of enterprise software experience, with a track record of leadership in banking and financial services, telecommunications, and public sector verticals. Joining Elastic as an Area Vice President and Country Manager in Australia and New Zealand (ANZ), he assumes a pivotal role in overseeing ANZ market operations, driving business development, and shaping the company’s strategy. Prior to joining Elastic, Gavin served as Vice President of ANZ at Confluent, where he spearheaded their transition towards vision and value-based selling. His focus was on high-value and priority use cases for the clientele. Preceding this role, he held the position of Country Manager for Tableau Software ANZ for two and a half years. In this capacity, he played a key role in shaping the BI/analytics category as a leader and a subsidiary of salesforce.com. His responsibilities included developing and executing the ANZ go-to-market strategy, as well as navigating the integration with Salesforce. Gavin is motivated by his ambition to lead a dynamic and inspired team within an innovative, growth-oriented organisation. His expertise spans strategic account management, new business development, and the skillful negotiation of large-scale, complex deals and partnerships.
Geoff Schomburgk, Vice President, Asia Pacific and Japan (APJ), Yubico
At Yubico, Geoff is responsible for driving the Yubico business across the Asia Pacific and Japan (APJ) region, working with partners and enterprise customers to implement modern phishing-resistant authentication, helping make the internet safer for all.
Geoff brings a stro...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: TechLeaders 2024]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, we dive into the world of tech leadership and the challenges and opportunities surrounding the adoption of generative AI, ethical considerations, and data security at TechLeaders 2024.</p>
<p>Chris Diffley from Optus, announces the launch of the Optus managed threat monitoring service powered by Devo Technology, emphasizing the use of AI and ML to automate threat monitoring and detection. Chris “Gonzo” Gondek from NetApp highlights the importance of data storage conversations, storage technology flexibility, and autonomous ransomware protection. Gavin Jones from Elastic addresses the evolving nature of technology and the lag in Australia’s adoption of generative AI, while Geoff Schomburgk emphasizes the importance of a positive approach to encourage MFA adoption.</p>
<p><strong>Chris Diffley, Senior Director for Client Security, Enterprise and Business,Optus</strong></p>
<p>Chris is an experienced Information Security Manager and Security Director with over 20 years of experience in Telecommunications, Security, Operations and Consulting. He’s lead teams across enterprise, midmarket and small businesses and has deep understanding of implementing and upholding a number of frameworks and standards across businesses.</p>
<p><strong>Chris “Gonzo” Gondek, Solutions Engineer Manager, Australia &amp; New Zealand, NetApp</strong></p>
<p>Chris “Gonzo” Gondek is a technology evangelist who plays a crucial role in driving NetApp’s technical solutions specialists (TSS) to greater heights. As our TSS Leader, Chris and his team collaborate closely with our sales and channel business units to drive innovation, develop new opportunities, enhance our solution offerings, and ensure that our customers’ needs are not just met, but exceeded. Chris spent the past 4 years working in the NetApp Partner eco-system as a Technical Partner Manager, as well as spokesperson at our channel and alliance events. Prior to NetApp, Chris partnered with us at Commvault and worked as a solutions specialist at Symantec. With 25 years in the tech sector, Chris is a seasoned industry leader with a proven track record of delivering innovative solutions and driving customer success.</p>
<p><strong>Gavin Jones, Area Vice President and Country Manager, Australia &amp; New Zealand, Elastic</strong></p>
<p>Gavin brings over two decades of enterprise software experience, with a track record of leadership in banking and financial services, telecommunications, and public sector verticals. Joining Elastic as an Area Vice President and Country Manager in Australia and New Zealand (ANZ), he assumes a pivotal role in overseeing ANZ market operations, driving business development, and shaping the company’s strategy. Prior to joining Elastic, Gavin served as Vice President of ANZ at Confluent, where he spearheaded their transition towards vision and value-based selling. His focus was on high-value and priority use cases for the clientele. Preceding this role, he held the position of Country Manager for Tableau Software ANZ for two and a half years. In this capacity, he played a key role in shaping the BI/analytics category as a leader and a subsidiary of salesforce.com. His responsibilities included developing and executing the ANZ go-to-market strategy, as well as navigating the integration with Salesforce. Gavin is motivated by his ambition to lead a dynamic and inspired team within an innovative, growth-oriented organisation. His expertise spans strategic account management, new business development, and the skillful negotiation of large-scale, complex deals and partnerships.</p>
<p><strong>Geoff Schomburgk, Vice President, Asia Pacific and Japan (APJ), Yubico</strong></p>
<p>At Yubico, Geoff is responsible for driving the Yubico business across the Asia Pacific and Japan (APJ) region, working with partners and enterprise customers to implement modern phishing-resistant authentication, helping make the internet safer for all.</p>
<p>Geoff brings a strong customer focus and a proven ability to implement complex technology solutions across various industries, including telecommunications, utility and transport sectors across Australia, Asia and Europe. Critical to the success of these projects is the definition and realisation of tangible business value, where the combination of Geoff’s business consulting approach and project delivery experience consistently delivers business value.</p>
<p>Geoff is an experienced senior executive with a background in engineering and strategy consulting and over 30 years of experience in the global information and communications technology (ICT) industry. Geoff has a Bachelor of Engineering (Honours) and an MBA. He is also a qualified Company Director (FAICD) with current Board and business mentor roles for several Not-for-profit (NFP) organisations.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1819553/c1e-02xmsjvg05igm3kp-wwzr59v9ugqj-uicg2d.mp3" length="36222477"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, we dive into the world of tech leadership and the challenges and opportunities surrounding the adoption of generative AI, ethical considerations, and data security at TechLeaders 2024.
Chris Diffley from Optus, announces the launch of the Optus managed threat monitoring service powered by Devo Technology, emphasizing the use of AI and ML to automate threat monitoring and detection. Chris “Gonzo” Gondek from NetApp highlights the importance of data storage conversations, storage technology flexibility, and autonomous ransomware protection. Gavin Jones from Elastic addresses the evolving nature of technology and the lag in Australia’s adoption of generative AI, while Geoff Schomburgk emphasizes the importance of a positive approach to encourage MFA adoption.
Chris Diffley, Senior Director for Client Security, Enterprise and Business,Optus
Chris is an experienced Information Security Manager and Security Director with over 20 years of experience in Telecommunications, Security, Operations and Consulting. He’s lead teams across enterprise, midmarket and small businesses and has deep understanding of implementing and upholding a number of frameworks and standards across businesses.
Chris “Gonzo” Gondek, Solutions Engineer Manager, Australia & New Zealand, NetApp
Chris “Gonzo” Gondek is a technology evangelist who plays a crucial role in driving NetApp’s technical solutions specialists (TSS) to greater heights. As our TSS Leader, Chris and his team collaborate closely with our sales and channel business units to drive innovation, develop new opportunities, enhance our solution offerings, and ensure that our customers’ needs are not just met, but exceeded. Chris spent the past 4 years working in the NetApp Partner eco-system as a Technical Partner Manager, as well as spokesperson at our channel and alliance events. Prior to NetApp, Chris partnered with us at Commvault and worked as a solutions specialist at Symantec. With 25 years in the tech sector, Chris is a seasoned industry leader with a proven track record of delivering innovative solutions and driving customer success.
Gavin Jones, Area Vice President and Country Manager, Australia & New Zealand, Elastic
Gavin brings over two decades of enterprise software experience, with a track record of leadership in banking and financial services, telecommunications, and public sector verticals. Joining Elastic as an Area Vice President and Country Manager in Australia and New Zealand (ANZ), he assumes a pivotal role in overseeing ANZ market operations, driving business development, and shaping the company’s strategy. Prior to joining Elastic, Gavin served as Vice President of ANZ at Confluent, where he spearheaded their transition towards vision and value-based selling. His focus was on high-value and priority use cases for the clientele. Preceding this role, he held the position of Country Manager for Tableau Software ANZ for two and a half years. In this capacity, he played a key role in shaping the BI/analytics category as a leader and a subsidiary of salesforce.com. His responsibilities included developing and executing the ANZ go-to-market strategy, as well as navigating the integration with Salesforce. Gavin is motivated by his ambition to lead a dynamic and inspired team within an innovative, growth-oriented organisation. His expertise spans strategic account management, new business development, and the skillful negotiation of large-scale, complex deals and partnerships.
Geoff Schomburgk, Vice President, Asia Pacific and Japan (APJ), Yubico
At Yubico, Geoff is responsible for driving the Yubico business across the Asia Pacific and Japan (APJ) region, working with partners and enterprise customers to implement modern phishing-resistant authentication, helping make the internet safer for all.
Geoff brings a stro...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1819553/c1a-5k0v-z3zqgdkkt1z9-bfxhr2.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 273 Deep Dive: Jeetu Patel | The Future of Security]]>
                </title>
                <pubDate>Fri, 23 Aug 2024 04:32:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1819320</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-273-deep-dive-jeetu-patel-the-future-of-security-1</link>
                                <description>
                                            <![CDATA[<p>In this episode, we welcome Jeetu Patel, Executive Vice President and Chief Product Officer at Cisco, to delve into the future of cybersecurity and its impact on cloud-based software. Jeetu shares his insights on the detrimental effects of monopolies in the industry and the complexities faced by Chief Information Security Officers (CISOs). He emphasizes the importance of resilience, updates, and collaboration in addressing security challenges and predicting exponential innovation.</p>
<p>Jeetu Patel is Cisco’s Executive Vice President and General Manager of Security and Collaboration. He leverages a diverse set of capabilities to lead the strategy and development for these businesses and also owns P&amp;L responsibility for this multibillion-dollar portfolio. Jeetu combines a bold vision, steeped in product design and development expertise, operational rigor and innate market understanding to create high growth Software as a Service (SaaS) businesses.</p>
<p>A member of the Executive Leadership Team, Jeetu is helping to redefine Cisco’s SaaS business and strategy to further accelerate the company’s transformation and growth. His mission is to build world class, subscription-based products that solve Cisco customers’ biggest problems. His team is creating and designing meaningfully differentiated products that diverge in the way they’re conceived, built, priced, packaged and sold.</p>
<p>Prior to joining Cisco, Jeetu was the Chief Product Officer (CPO) and Chief Strategy Officer (CSO) at Box, a role he pioneered. He led the company’s product and platform strategy, setting the company’s long-term vision and roadmap for cloud content management in the enterprise. He transformed Box from a single product application to a multi-product platform used by 100K customers representing 69% of the Fortune 500. The discipline, quality standards, performance metrics, and stability Jeetu instilled fueled the platform’s growth – nearly quadrupling revenues to $700M+. Box’s growth scaled to reach over 60M users with over 50% of customers using multiple products. He also created the Box Platform business unit where he led product strategy, marketing and developer relations – driving products from incubation stage to mature offerings.</p>
<p>Before joining Box, Jeetu was General Manager and Chief Executive of EMC’s newly acquired Syncplicity business unit, a cloud service for Enterprise File Sync Sharing (EFSS) and collaboration. One of the first SaaS-based solutions offered by EMC, Jeetu spearheaded the company’s acquisition. He created a world class leadership team, secured some of the market’s largest customers and led the group to become one of the fastest growing EFSS companies in a highly competitive market. Other key roles at EMC included CMO for the Information Intelligence Group and Chief Strategy Officer, where he drove the organic and inorganic strategy for the division’s cloud and mobile growth.</p>
<p>Previously, Jeetu was President of Doculabs, a research and advisory firm co-owned by Forrester Research. The firm focused on collaboration and content management across a range of industries including financial services, insurance, energy, manufacturing and life sciences.</p>
<p>He currently serves on the boards of JLL, an American commercial real estate services company, and Equinix, the world’s digital infrastructure company.</p>
<p>Jeetu holds a B.S. in Information Decision Sciences from the University of Illinois, Chicago, and lives in the San Francisco Bay Area with his family.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we welcome Jeetu Patel, Executive Vice President and Chief Product Officer at Cisco, to delve into the future of cybersecurity and its impact on cloud-based software. Jeetu shares his insights on the detrimental effects of monopolies in the industry and the complexities faced by Chief Information Security Officers (CISOs). He emphasizes the importance of resilience, updates, and collaboration in addressing security challenges and predicting exponential innovation.
Jeetu Patel is Cisco’s Executive Vice President and General Manager of Security and Collaboration. He leverages a diverse set of capabilities to lead the strategy and development for these businesses and also owns P&L responsibility for this multibillion-dollar portfolio. Jeetu combines a bold vision, steeped in product design and development expertise, operational rigor and innate market understanding to create high growth Software as a Service (SaaS) businesses.
A member of the Executive Leadership Team, Jeetu is helping to redefine Cisco’s SaaS business and strategy to further accelerate the company’s transformation and growth. His mission is to build world class, subscription-based products that solve Cisco customers’ biggest problems. His team is creating and designing meaningfully differentiated products that diverge in the way they’re conceived, built, priced, packaged and sold.
Prior to joining Cisco, Jeetu was the Chief Product Officer (CPO) and Chief Strategy Officer (CSO) at Box, a role he pioneered. He led the company’s product and platform strategy, setting the company’s long-term vision and roadmap for cloud content management in the enterprise. He transformed Box from a single product application to a multi-product platform used by 100K customers representing 69% of the Fortune 500. The discipline, quality standards, performance metrics, and stability Jeetu instilled fueled the platform’s growth – nearly quadrupling revenues to $700M+. Box’s growth scaled to reach over 60M users with over 50% of customers using multiple products. He also created the Box Platform business unit where he led product strategy, marketing and developer relations – driving products from incubation stage to mature offerings.
Before joining Box, Jeetu was General Manager and Chief Executive of EMC’s newly acquired Syncplicity business unit, a cloud service for Enterprise File Sync Sharing (EFSS) and collaboration. One of the first SaaS-based solutions offered by EMC, Jeetu spearheaded the company’s acquisition. He created a world class leadership team, secured some of the market’s largest customers and led the group to become one of the fastest growing EFSS companies in a highly competitive market. Other key roles at EMC included CMO for the Information Intelligence Group and Chief Strategy Officer, where he drove the organic and inorganic strategy for the division’s cloud and mobile growth.
Previously, Jeetu was President of Doculabs, a research and advisory firm co-owned by Forrester Research. The firm focused on collaboration and content management across a range of industries including financial services, insurance, energy, manufacturing and life sciences.
He currently serves on the boards of JLL, an American commercial real estate services company, and Equinix, the world’s digital infrastructure company.
Jeetu holds a B.S. in Information Decision Sciences from the University of Illinois, Chicago, and lives in the San Francisco Bay Area with his family.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 273 Deep Dive: Jeetu Patel | The Future of Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we welcome Jeetu Patel, Executive Vice President and Chief Product Officer at Cisco, to delve into the future of cybersecurity and its impact on cloud-based software. Jeetu shares his insights on the detrimental effects of monopolies in the industry and the complexities faced by Chief Information Security Officers (CISOs). He emphasizes the importance of resilience, updates, and collaboration in addressing security challenges and predicting exponential innovation.</p>
<p>Jeetu Patel is Cisco’s Executive Vice President and General Manager of Security and Collaboration. He leverages a diverse set of capabilities to lead the strategy and development for these businesses and also owns P&amp;L responsibility for this multibillion-dollar portfolio. Jeetu combines a bold vision, steeped in product design and development expertise, operational rigor and innate market understanding to create high growth Software as a Service (SaaS) businesses.</p>
<p>A member of the Executive Leadership Team, Jeetu is helping to redefine Cisco’s SaaS business and strategy to further accelerate the company’s transformation and growth. His mission is to build world class, subscription-based products that solve Cisco customers’ biggest problems. His team is creating and designing meaningfully differentiated products that diverge in the way they’re conceived, built, priced, packaged and sold.</p>
<p>Prior to joining Cisco, Jeetu was the Chief Product Officer (CPO) and Chief Strategy Officer (CSO) at Box, a role he pioneered. He led the company’s product and platform strategy, setting the company’s long-term vision and roadmap for cloud content management in the enterprise. He transformed Box from a single product application to a multi-product platform used by 100K customers representing 69% of the Fortune 500. The discipline, quality standards, performance metrics, and stability Jeetu instilled fueled the platform’s growth – nearly quadrupling revenues to $700M+. Box’s growth scaled to reach over 60M users with over 50% of customers using multiple products. He also created the Box Platform business unit where he led product strategy, marketing and developer relations – driving products from incubation stage to mature offerings.</p>
<p>Before joining Box, Jeetu was General Manager and Chief Executive of EMC’s newly acquired Syncplicity business unit, a cloud service for Enterprise File Sync Sharing (EFSS) and collaboration. One of the first SaaS-based solutions offered by EMC, Jeetu spearheaded the company’s acquisition. He created a world class leadership team, secured some of the market’s largest customers and led the group to become one of the fastest growing EFSS companies in a highly competitive market. Other key roles at EMC included CMO for the Information Intelligence Group and Chief Strategy Officer, where he drove the organic and inorganic strategy for the division’s cloud and mobile growth.</p>
<p>Previously, Jeetu was President of Doculabs, a research and advisory firm co-owned by Forrester Research. The firm focused on collaboration and content management across a range of industries including financial services, insurance, energy, manufacturing and life sciences.</p>
<p>He currently serves on the boards of JLL, an American commercial real estate services company, and Equinix, the world’s digital infrastructure company.</p>
<p>Jeetu holds a B.S. in Information Decision Sciences from the University of Illinois, Chicago, and lives in the San Francisco Bay Area with his family.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1819320/c1e-41r8c452d9hopgxj-ok429x0ds2z-pjeoff.mp3" length="41419382"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we welcome Jeetu Patel, Executive Vice President and Chief Product Officer at Cisco, to delve into the future of cybersecurity and its impact on cloud-based software. Jeetu shares his insights on the detrimental effects of monopolies in the industry and the complexities faced by Chief Information Security Officers (CISOs). He emphasizes the importance of resilience, updates, and collaboration in addressing security challenges and predicting exponential innovation.
Jeetu Patel is Cisco’s Executive Vice President and General Manager of Security and Collaboration. He leverages a diverse set of capabilities to lead the strategy and development for these businesses and also owns P&L responsibility for this multibillion-dollar portfolio. Jeetu combines a bold vision, steeped in product design and development expertise, operational rigor and innate market understanding to create high growth Software as a Service (SaaS) businesses.
A member of the Executive Leadership Team, Jeetu is helping to redefine Cisco’s SaaS business and strategy to further accelerate the company’s transformation and growth. His mission is to build world class, subscription-based products that solve Cisco customers’ biggest problems. His team is creating and designing meaningfully differentiated products that diverge in the way they’re conceived, built, priced, packaged and sold.
Prior to joining Cisco, Jeetu was the Chief Product Officer (CPO) and Chief Strategy Officer (CSO) at Box, a role he pioneered. He led the company’s product and platform strategy, setting the company’s long-term vision and roadmap for cloud content management in the enterprise. He transformed Box from a single product application to a multi-product platform used by 100K customers representing 69% of the Fortune 500. The discipline, quality standards, performance metrics, and stability Jeetu instilled fueled the platform’s growth – nearly quadrupling revenues to $700M+. Box’s growth scaled to reach over 60M users with over 50% of customers using multiple products. He also created the Box Platform business unit where he led product strategy, marketing and developer relations – driving products from incubation stage to mature offerings.
Before joining Box, Jeetu was General Manager and Chief Executive of EMC’s newly acquired Syncplicity business unit, a cloud service for Enterprise File Sync Sharing (EFSS) and collaboration. One of the first SaaS-based solutions offered by EMC, Jeetu spearheaded the company’s acquisition. He created a world class leadership team, secured some of the market’s largest customers and led the group to become one of the fastest growing EFSS companies in a highly competitive market. Other key roles at EMC included CMO for the Information Intelligence Group and Chief Strategy Officer, where he drove the organic and inorganic strategy for the division’s cloud and mobile growth.
Previously, Jeetu was President of Doculabs, a research and advisory firm co-owned by Forrester Research. The firm focused on collaboration and content management across a range of industries including financial services, insurance, energy, manufacturing and life sciences.
He currently serves on the boards of JLL, an American commercial real estate services company, and Equinix, the world’s digital infrastructure company.
Jeetu holds a B.S. in Information Decision Sciences from the University of Illinois, Chicago, and lives in the San Francisco Bay Area with his family.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1819320/c1a-5k0v-ndwk37jri560-f0kgmj.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 272 Deep Dive: Wendy Thomas | Rethinking Trust and Security]]>
                </title>
                <pubDate>Fri, 09 Aug 2024 16:00:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1800122</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-272-deep-dive-wendy-thomas-rethinking-trust-and-security</link>
                                <description>
                                            <![CDATA[<p>In this episode, we’re joined by Wendy Thomas, CEO of Secureworks, as she talks about the pivotal importance of truth and consistency in executive and marketing communications, emphasizing the need for companies to demonstrate genuine change and sustained effort over time. She elaborates on the key elements of a sincere apology and recovery, pointing out the importance of understanding, action, and compensation to rebuild trust with customers. Wendy further emphasizes the economic lens through which trust and security should be viewed, underlining the interconnectedness and dependence on technology in daily life. Additionally, she addresses the harm of giving away personal data, the impact of data breaches, and the trade-off between security and convenience for businesses, ultimately calling for shared responsibility and collective investment in building trust and enhancing security.</p>
<p>As CEO, Wendy Thomas leads Secureworks to fulfill their purpose of securing human progress via innovative, battle-tested security solutions. She first joined Secureworks in 2008 leading Financial Planning &amp; Analysis (FP&amp;A), where she helped to execute strategic acquisitions that scaled the business and Secureworks’ IPO in 2016. As Strategy lead and Chief Product Officer, she developed the vision for Secureworks’ future, fueling the team that built and launched Secureworks® Taegis™. Prior to becoming CEO, Wendy served as President of Customer Success, where she drove a customer-centric approach to help organizations achieve better security outcomes. In this role, Wendy was recognized in the number one position in The Software Report’s “Top 25 Women Leaders in Cybersecurity of 2021.”</p>
<p>Wendy leverages over 25 years of experience in strategic and functional leadership roles, and has worked across multiple technology-driven companies such as FirstData, BellSouth, and Internap Network Services, Inc. Wendy is a graduate of the University of Virginia, with a double major in Economics and Foreign Affairs, and she holds an International MBA from the University of South Carolina School of Business.</p>
<p>Wendy currently serves on the Board at IonQ, an industry leader in quantum computing. Additionally, she serves as a Liaison for AFS Intercultural Programs, an international youth exchange organization, and is a member of The Executive Committee of the Metro Atlanta Chamber of Commerce. Wendy is an alumna of Leadership Midtown Atlanta, a program designed to propel established leaders to further serve their communities.</p>
<p> </p>
<p>About Secureworks</p>
<blockquote>
<div>
<div dir="ltr">
<div dir="ltr" align="left">
<table>
<tbody>
<tr>
<td>
<div>
<blockquote>
<div class="gmail_quote">
<blockquote class="gmail_quote">
<div><span style="color:#000000;">Secureworks Taegis™, is a SaaS-based, open XDR platform built on 20+ years of real-world detection data, security operations expertise, and threat intelligence and research. Taegis is embedded in the security operations of thousands of organisations around the world including in Australia who use its advanced, AI-driven capabilities to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. </span></div>
<p><span style="color:#000000;"> </span></p>
<div><span style="color:#000000;">Secureworks generated $85.7 million in revenue for Q1FY25, with revenue from its Taegis platform growing 10% year-over-year in the first quarter, to $69.1 million. Taegis adoption in Australia is accelerating. The company processes approximately five trillion cybersecurity-related events across its global customer base each week, giving Secureworks a rapidly growing and diverse security telemetry of more than 50 petabytes across endpoint, network, cloud, identity and other business systems. </span></div>
</blockquote>
</div>
</blockquote>
</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
</blockquote>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we’re joined by Wendy Thomas, CEO of Secureworks, as she talks about the pivotal importance of truth and consistency in executive and marketing communications, emphasizing the need for companies to demonstrate genuine change and sustained effort over time. She elaborates on the key elements of a sincere apology and recovery, pointing out the importance of understanding, action, and compensation to rebuild trust with customers. Wendy further emphasizes the economic lens through which trust and security should be viewed, underlining the interconnectedness and dependence on technology in daily life. Additionally, she addresses the harm of giving away personal data, the impact of data breaches, and the trade-off between security and convenience for businesses, ultimately calling for shared responsibility and collective investment in building trust and enhancing security.
As CEO, Wendy Thomas leads Secureworks to fulfill their purpose of securing human progress via innovative, battle-tested security solutions. She first joined Secureworks in 2008 leading Financial Planning & Analysis (FP&A), where she helped to execute strategic acquisitions that scaled the business and Secureworks’ IPO in 2016. As Strategy lead and Chief Product Officer, she developed the vision for Secureworks’ future, fueling the team that built and launched Secureworks® Taegis™. Prior to becoming CEO, Wendy served as President of Customer Success, where she drove a customer-centric approach to help organizations achieve better security outcomes. In this role, Wendy was recognized in the number one position in The Software Report’s “Top 25 Women Leaders in Cybersecurity of 2021.”
Wendy leverages over 25 years of experience in strategic and functional leadership roles, and has worked across multiple technology-driven companies such as FirstData, BellSouth, and Internap Network Services, Inc. Wendy is a graduate of the University of Virginia, with a double major in Economics and Foreign Affairs, and she holds an International MBA from the University of South Carolina School of Business.
Wendy currently serves on the Board at IonQ, an industry leader in quantum computing. Additionally, she serves as a Liaison for AFS Intercultural Programs, an international youth exchange organization, and is a member of The Executive Committee of the Metro Atlanta Chamber of Commerce. Wendy is an alumna of Leadership Midtown Atlanta, a program designed to propel established leaders to further serve their communities.
 
About Secureworks












Secureworks Taegis™, is a SaaS-based, open XDR platform built on 20+ years of real-world detection data, security operations expertise, and threat intelligence and research. Taegis is embedded in the security operations of thousands of organisations around the world including in Australia who use its advanced, AI-driven capabilities to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. 
 
Secureworks generated $85.7 million in revenue for Q1FY25, with revenue from its Taegis platform growing 10% year-over-year in the first quarter, to $69.1 million. Taegis adoption in Australia is accelerating. The company processes approximately five trillion cybersecurity-related events across its global customer base each week, giving Secureworks a rapidly growing and diverse security telemetry of more than 50 petabytes across endpoint, network, cloud, identity and other business systems. 












]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 272 Deep Dive: Wendy Thomas | Rethinking Trust and Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we’re joined by Wendy Thomas, CEO of Secureworks, as she talks about the pivotal importance of truth and consistency in executive and marketing communications, emphasizing the need for companies to demonstrate genuine change and sustained effort over time. She elaborates on the key elements of a sincere apology and recovery, pointing out the importance of understanding, action, and compensation to rebuild trust with customers. Wendy further emphasizes the economic lens through which trust and security should be viewed, underlining the interconnectedness and dependence on technology in daily life. Additionally, she addresses the harm of giving away personal data, the impact of data breaches, and the trade-off between security and convenience for businesses, ultimately calling for shared responsibility and collective investment in building trust and enhancing security.</p>
<p>As CEO, Wendy Thomas leads Secureworks to fulfill their purpose of securing human progress via innovative, battle-tested security solutions. She first joined Secureworks in 2008 leading Financial Planning &amp; Analysis (FP&amp;A), where she helped to execute strategic acquisitions that scaled the business and Secureworks’ IPO in 2016. As Strategy lead and Chief Product Officer, she developed the vision for Secureworks’ future, fueling the team that built and launched Secureworks® Taegis™. Prior to becoming CEO, Wendy served as President of Customer Success, where she drove a customer-centric approach to help organizations achieve better security outcomes. In this role, Wendy was recognized in the number one position in The Software Report’s “Top 25 Women Leaders in Cybersecurity of 2021.”</p>
<p>Wendy leverages over 25 years of experience in strategic and functional leadership roles, and has worked across multiple technology-driven companies such as FirstData, BellSouth, and Internap Network Services, Inc. Wendy is a graduate of the University of Virginia, with a double major in Economics and Foreign Affairs, and she holds an International MBA from the University of South Carolina School of Business.</p>
<p>Wendy currently serves on the Board at IonQ, an industry leader in quantum computing. Additionally, she serves as a Liaison for AFS Intercultural Programs, an international youth exchange organization, and is a member of The Executive Committee of the Metro Atlanta Chamber of Commerce. Wendy is an alumna of Leadership Midtown Atlanta, a program designed to propel established leaders to further serve their communities.</p>
<p> </p>
<p>About Secureworks</p>
<blockquote>
<div>
<div dir="ltr">
<div dir="ltr" align="left">
<table>
<tbody>
<tr>
<td>
<div>
<blockquote>
<div class="gmail_quote">
<blockquote class="gmail_quote">
<div><span style="color:#000000;">Secureworks Taegis™, is a SaaS-based, open XDR platform built on 20+ years of real-world detection data, security operations expertise, and threat intelligence and research. Taegis is embedded in the security operations of thousands of organisations around the world including in Australia who use its advanced, AI-driven capabilities to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. </span></div>
<p><span style="color:#000000;"> </span></p>
<div><span style="color:#000000;">Secureworks generated $85.7 million in revenue for Q1FY25, with revenue from its Taegis platform growing 10% year-over-year in the first quarter, to $69.1 million. Taegis adoption in Australia is accelerating. The company processes approximately five trillion cybersecurity-related events across its global customer base each week, giving Secureworks a rapidly growing and diverse security telemetry of more than 50 petabytes across endpoint, network, cloud, identity and other business systems. </span></div>
</blockquote>
</div>
</blockquote>
</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
</blockquote>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1800122/c1e-jjvwhqgqq0bn1k2x-47g7g1zji5o7-h56ioo.mp3" length="38286778"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we’re joined by Wendy Thomas, CEO of Secureworks, as she talks about the pivotal importance of truth and consistency in executive and marketing communications, emphasizing the need for companies to demonstrate genuine change and sustained effort over time. She elaborates on the key elements of a sincere apology and recovery, pointing out the importance of understanding, action, and compensation to rebuild trust with customers. Wendy further emphasizes the economic lens through which trust and security should be viewed, underlining the interconnectedness and dependence on technology in daily life. Additionally, she addresses the harm of giving away personal data, the impact of data breaches, and the trade-off between security and convenience for businesses, ultimately calling for shared responsibility and collective investment in building trust and enhancing security.
As CEO, Wendy Thomas leads Secureworks to fulfill their purpose of securing human progress via innovative, battle-tested security solutions. She first joined Secureworks in 2008 leading Financial Planning & Analysis (FP&A), where she helped to execute strategic acquisitions that scaled the business and Secureworks’ IPO in 2016. As Strategy lead and Chief Product Officer, she developed the vision for Secureworks’ future, fueling the team that built and launched Secureworks® Taegis™. Prior to becoming CEO, Wendy served as President of Customer Success, where she drove a customer-centric approach to help organizations achieve better security outcomes. In this role, Wendy was recognized in the number one position in The Software Report’s “Top 25 Women Leaders in Cybersecurity of 2021.”
Wendy leverages over 25 years of experience in strategic and functional leadership roles, and has worked across multiple technology-driven companies such as FirstData, BellSouth, and Internap Network Services, Inc. Wendy is a graduate of the University of Virginia, with a double major in Economics and Foreign Affairs, and she holds an International MBA from the University of South Carolina School of Business.
Wendy currently serves on the Board at IonQ, an industry leader in quantum computing. Additionally, she serves as a Liaison for AFS Intercultural Programs, an international youth exchange organization, and is a member of The Executive Committee of the Metro Atlanta Chamber of Commerce. Wendy is an alumna of Leadership Midtown Atlanta, a program designed to propel established leaders to further serve their communities.
 
About Secureworks












Secureworks Taegis™, is a SaaS-based, open XDR platform built on 20+ years of real-world detection data, security operations expertise, and threat intelligence and research. Taegis is embedded in the security operations of thousands of organisations around the world including in Australia who use its advanced, AI-driven capabilities to detect advanced threats, streamline and collaborate on investigations, and automate the right actions. 
 
Secureworks generated $85.7 million in revenue for Q1FY25, with revenue from its Taegis platform growing 10% year-over-year in the first quarter, to $69.1 million. Taegis adoption in Australia is accelerating. The company processes approximately five trillion cybersecurity-related events across its global customer base each week, giving Secureworks a rapidly growing and diverse security telemetry of more than 50 petabytes across endpoint, network, cloud, identity and other business systems. 












]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1800122/c1a-5k0v-gp2p8jz4t8m-hhvr7g.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 271 Deep Dive: Nathan Wenzler | The Dangers of Public Sector Employees Using AI Tools Privately]]>
                </title>
                <pubDate>Wed, 07 Aug 2024 16:00:30 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1799347</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-271-deep-dive-nathan-wenzler-the-dangers-of-public-sector-employees-using-ai-tools-privately</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, Nathan Wenzler, Chief Security Strategist at Tenable, joins us once again to discuss the critical importance of ensuring the accuracy and legitimacy of data within back-end databases to provide reliable responses from AI tools. We explore the shift towards AI reliance and the associated concerns about data integrity. Nathan emphasizes the need for purpose-built AI tools to ensure data accuracy, especially within government organizations. Additionally, we uncover the potential for AI to automate low-level tasks and emphasize the value of AI as a skills augmentation rather than job replacement. We also address the challenges of balancing AI innovation with security concerns and the need for practical implementations of AI tools to mitigate risks.</p>
<p>Nathan Wenzler is the Chief Security Strategist at Tenable, the Exposure Management company. he has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.</p>
<p>As the Chief Security Strategist for Tenable, he brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, Nathan Wenzler, Chief Security Strategist at Tenable, joins us once again to discuss the critical importance of ensuring the accuracy and legitimacy of data within back-end databases to provide reliable responses from AI tools. We explore the shift towards AI reliance and the associated concerns about data integrity. Nathan emphasizes the need for purpose-built AI tools to ensure data accuracy, especially within government organizations. Additionally, we uncover the potential for AI to automate low-level tasks and emphasize the value of AI as a skills augmentation rather than job replacement. We also address the challenges of balancing AI innovation with security concerns and the need for practical implementations of AI tools to mitigate risks.
Nathan Wenzler is the Chief Security Strategist at Tenable, the Exposure Management company. he has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.
As the Chief Security Strategist for Tenable, he brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 271 Deep Dive: Nathan Wenzler | The Dangers of Public Sector Employees Using AI Tools Privately]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, Nathan Wenzler, Chief Security Strategist at Tenable, joins us once again to discuss the critical importance of ensuring the accuracy and legitimacy of data within back-end databases to provide reliable responses from AI tools. We explore the shift towards AI reliance and the associated concerns about data integrity. Nathan emphasizes the need for purpose-built AI tools to ensure data accuracy, especially within government organizations. Additionally, we uncover the potential for AI to automate low-level tasks and emphasize the value of AI as a skills augmentation rather than job replacement. We also address the challenges of balancing AI innovation with security concerns and the need for practical implementations of AI tools to mitigate risks.</p>
<p>Nathan Wenzler is the Chief Security Strategist at Tenable, the Exposure Management company. he has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.</p>
<p>As the Chief Security Strategist for Tenable, he brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1799347/c1e-2k31b870g2t67jon-6zd062jvho33-ybwqtn.mp3" length="40857227"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, Nathan Wenzler, Chief Security Strategist at Tenable, joins us once again to discuss the critical importance of ensuring the accuracy and legitimacy of data within back-end databases to provide reliable responses from AI tools. We explore the shift towards AI reliance and the associated concerns about data integrity. Nathan emphasizes the need for purpose-built AI tools to ensure data accuracy, especially within government organizations. Additionally, we uncover the potential for AI to automate low-level tasks and emphasize the value of AI as a skills augmentation rather than job replacement. We also address the challenges of balancing AI innovation with security concerns and the need for practical implementations of AI tools to mitigate risks.
Nathan Wenzler is the Chief Security Strategist at Tenable, the Exposure Management company. he has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.
As the Chief Security Strategist for Tenable, he brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1799347/c1a-5k0v-5zgr66z0b0pz-7l7bfl.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 270 Deep Dive: Richard Seiersen | How to Measure and Communicate What Matters in Cybersecurity Risk]]>
                </title>
                <pubDate>Wed, 31 Jul 2024 16:00:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1795047</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-270-deep-dive-richard-seiersen-how-to-measure-and-communicate-what-matters-in-cybersecurity-risk</link>
                                <description>
                                            <![CDATA[<p>In this episode, Richard Seiersen, Chief Risk Technology Officer from Qualys, joins us to talk about the critical topic of third-party risks in business operations. Richard emphasizes the need for risk management professionals to measure and mitigate these risks, as well as understand the necessity of business resilience through risk transfer and capital reserves, particularly in the context of increasing third-party usage. He advocates for a shift in the security industry towards a more business-aligned approach, stressing the need for better measurement practices and the integration of concepts such as understanding the impact of breaches on customer attrition and brand trust.</p>
<p>Richard is focused on cybersecurity risk management – as a modern enterprise practice and leadership skill. His books, speaking, and work support security leaders who need to align security practice with business goals. That alignment is at the heart of cybersecurity risk management.</p>
<p>As the Chief Risk Technology Officer at Qualys, Richard helps customers and the broader security community measure, communicate, and eliminate risk. With over 10 years of experience as a CISO, he has led and supported security strategy, operations, and governance across various industries and orgs, including Twilio, GE, and LendingClub.</p>
<p>He is also a published author and a faculty member at IANS, where he share his insights and knowledge on security metrics and risk management. His books, “How To Measure Anything In Cybersecurity Risk” and “The Metrics Manifesto: Confronting Security With Data”, provide practical and innovative approaches to quantifying and reducing security risk.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Richard Seiersen, Chief Risk Technology Officer from Qualys, joins us to talk about the critical topic of third-party risks in business operations. Richard emphasizes the need for risk management professionals to measure and mitigate these risks, as well as understand the necessity of business resilience through risk transfer and capital reserves, particularly in the context of increasing third-party usage. He advocates for a shift in the security industry towards a more business-aligned approach, stressing the need for better measurement practices and the integration of concepts such as understanding the impact of breaches on customer attrition and brand trust.
Richard is focused on cybersecurity risk management – as a modern enterprise practice and leadership skill. His books, speaking, and work support security leaders who need to align security practice with business goals. That alignment is at the heart of cybersecurity risk management.
As the Chief Risk Technology Officer at Qualys, Richard helps customers and the broader security community measure, communicate, and eliminate risk. With over 10 years of experience as a CISO, he has led and supported security strategy, operations, and governance across various industries and orgs, including Twilio, GE, and LendingClub.
He is also a published author and a faculty member at IANS, where he share his insights and knowledge on security metrics and risk management. His books, “How To Measure Anything In Cybersecurity Risk” and “The Metrics Manifesto: Confronting Security With Data”, provide practical and innovative approaches to quantifying and reducing security risk.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 270 Deep Dive: Richard Seiersen | How to Measure and Communicate What Matters in Cybersecurity Risk]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Richard Seiersen, Chief Risk Technology Officer from Qualys, joins us to talk about the critical topic of third-party risks in business operations. Richard emphasizes the need for risk management professionals to measure and mitigate these risks, as well as understand the necessity of business resilience through risk transfer and capital reserves, particularly in the context of increasing third-party usage. He advocates for a shift in the security industry towards a more business-aligned approach, stressing the need for better measurement practices and the integration of concepts such as understanding the impact of breaches on customer attrition and brand trust.</p>
<p>Richard is focused on cybersecurity risk management – as a modern enterprise practice and leadership skill. His books, speaking, and work support security leaders who need to align security practice with business goals. That alignment is at the heart of cybersecurity risk management.</p>
<p>As the Chief Risk Technology Officer at Qualys, Richard helps customers and the broader security community measure, communicate, and eliminate risk. With over 10 years of experience as a CISO, he has led and supported security strategy, operations, and governance across various industries and orgs, including Twilio, GE, and LendingClub.</p>
<p>He is also a published author and a faculty member at IANS, where he share his insights and knowledge on security metrics and risk management. His books, “How To Measure Anything In Cybersecurity Risk” and “The Metrics Manifesto: Confronting Security With Data”, provide practical and innovative approaches to quantifying and reducing security risk.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1795047/c1e-q40nh2kgk8i0v2x1-dm6jzqgqc281-ts09ce.mp3" length="46293622"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Richard Seiersen, Chief Risk Technology Officer from Qualys, joins us to talk about the critical topic of third-party risks in business operations. Richard emphasizes the need for risk management professionals to measure and mitigate these risks, as well as understand the necessity of business resilience through risk transfer and capital reserves, particularly in the context of increasing third-party usage. He advocates for a shift in the security industry towards a more business-aligned approach, stressing the need for better measurement practices and the integration of concepts such as understanding the impact of breaches on customer attrition and brand trust.
Richard is focused on cybersecurity risk management – as a modern enterprise practice and leadership skill. His books, speaking, and work support security leaders who need to align security practice with business goals. That alignment is at the heart of cybersecurity risk management.
As the Chief Risk Technology Officer at Qualys, Richard helps customers and the broader security community measure, communicate, and eliminate risk. With over 10 years of experience as a CISO, he has led and supported security strategy, operations, and governance across various industries and orgs, including Twilio, GE, and LendingClub.
He is also a published author and a faculty member at IANS, where he share his insights and knowledge on security metrics and risk management. His books, “How To Measure Anything In Cybersecurity Risk” and “The Metrics Manifesto: Confronting Security With Data”, provide practical and innovative approaches to quantifying and reducing security risk.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1795047/c1a-5k0v-ndwrz407czg2-ructft.jpg"></itunes:image>
                                                                            <itunes:duration>00:48:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 269 Deep Dive: Sam Mackenzie | Critical Infrastructure Defence is Doable]]>
                </title>
                <pubDate>Fri, 26 Jul 2024 16:00:12 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1791545</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-269-deep-dive-sam-mackenzie-critical-infrastructure-defence-is-doable</link>
                                <description>
                                            <![CDATA[<p>In this episode, Sam Mackenzie, cybersecurity committee member from the Australian Computer Society, sheds light on the crucial aspects of protecting essential services from cyber threats. Offering valuable insights, Sam emphasizes the need for good practice, sharing learnings, threat intelligence, network segmentation, and clear communication of risk to address leadership challenges. Sam highlights the challenges and importance of protecting society from cyber-physical outcomes, the evolving threat landscape for professionals in critical infrastructure, and the significance of defending against social engineering attacks.</p>
<p>Sam speaks straightforward cybersecurity and technology with business leaders in critical infrastructure. With 25 years’ experience at international corporations and household names in Australia, he’s created and led high performance teams in health, telecoms, energy and more recently in local government, focusing on using structured thinking and making the complex simple.</p>
<p>Sam’s recent research project involves interviewing leaders of critical infrastructure in Australia to gain valuable industry insights. Sam also serves on the Cybersecurity Committee for the Australian Computer Society (ACS) and is building a new community of driven professionals, passionate about protecting critical infrastructure and keeping society safe.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Sam Mackenzie, cybersecurity committee member from the Australian Computer Society, sheds light on the crucial aspects of protecting essential services from cyber threats. Offering valuable insights, Sam emphasizes the need for good practice, sharing learnings, threat intelligence, network segmentation, and clear communication of risk to address leadership challenges. Sam highlights the challenges and importance of protecting society from cyber-physical outcomes, the evolving threat landscape for professionals in critical infrastructure, and the significance of defending against social engineering attacks.
Sam speaks straightforward cybersecurity and technology with business leaders in critical infrastructure. With 25 years’ experience at international corporations and household names in Australia, he’s created and led high performance teams in health, telecoms, energy and more recently in local government, focusing on using structured thinking and making the complex simple.
Sam’s recent research project involves interviewing leaders of critical infrastructure in Australia to gain valuable industry insights. Sam also serves on the Cybersecurity Committee for the Australian Computer Society (ACS) and is building a new community of driven professionals, passionate about protecting critical infrastructure and keeping society safe.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 269 Deep Dive: Sam Mackenzie | Critical Infrastructure Defence is Doable]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Sam Mackenzie, cybersecurity committee member from the Australian Computer Society, sheds light on the crucial aspects of protecting essential services from cyber threats. Offering valuable insights, Sam emphasizes the need for good practice, sharing learnings, threat intelligence, network segmentation, and clear communication of risk to address leadership challenges. Sam highlights the challenges and importance of protecting society from cyber-physical outcomes, the evolving threat landscape for professionals in critical infrastructure, and the significance of defending against social engineering attacks.</p>
<p>Sam speaks straightforward cybersecurity and technology with business leaders in critical infrastructure. With 25 years’ experience at international corporations and household names in Australia, he’s created and led high performance teams in health, telecoms, energy and more recently in local government, focusing on using structured thinking and making the complex simple.</p>
<p>Sam’s recent research project involves interviewing leaders of critical infrastructure in Australia to gain valuable industry insights. Sam also serves on the Cybersecurity Committee for the Australian Computer Society (ACS) and is building a new community of driven professionals, passionate about protecting critical infrastructure and keeping society safe.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1791545/c1e-41r8c4j28ouopgxj-47gm0rg0f0q-h8mp30.mp3" length="38102040"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Sam Mackenzie, cybersecurity committee member from the Australian Computer Society, sheds light on the crucial aspects of protecting essential services from cyber threats. Offering valuable insights, Sam emphasizes the need for good practice, sharing learnings, threat intelligence, network segmentation, and clear communication of risk to address leadership challenges. Sam highlights the challenges and importance of protecting society from cyber-physical outcomes, the evolving threat landscape for professionals in critical infrastructure, and the significance of defending against social engineering attacks.
Sam speaks straightforward cybersecurity and technology with business leaders in critical infrastructure. With 25 years’ experience at international corporations and household names in Australia, he’s created and led high performance teams in health, telecoms, energy and more recently in local government, focusing on using structured thinking and making the complex simple.
Sam’s recent research project involves interviewing leaders of critical infrastructure in Australia to gain valuable industry insights. Sam also serves on the Cybersecurity Committee for the Australian Computer Society (ACS) and is building a new community of driven professionals, passionate about protecting critical infrastructure and keeping society safe.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1791545/c1a-5k0v-v61pm317u5m2-1e7zot.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 268 Deep Dive: Matt Preswick | Democratising Cloud Security – Will Security Become the Enabler to AI Usage?]]>
                </title>
                <pubDate>Fri, 12 Jul 2024 16:00:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1783560</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-268-deep-dive-matt-preswick-democratising-cloud-security-will-security-become-the-enabler-to-ai-usage</link>
                                <description>
                                            <![CDATA[<p>In today’s episode, we’re joined by Matt Preswick, Principal Solutions Engineer from Wiz, in the company’s first podcast appearance, to talk about cloud security and the intersection of AI with security in organizations. Matt emphasizes the critical need for evaluating security risks and compliance states within cloud infrastructure, addressing the potential for false positives in identifying security vulnerabilities. He also sheds light on the challenges posed by cloud-native threats, urging organizations to integrate security into early-stage application and infrastructure design cycles for efficient prevention of incidents. Matt’s insights underscore the importance of collaboration between security and AI teams, aligning initiatives with organizational goals and customer needs.</p>
<p>Matt Preswick is the Principal Solutions Engineer from Wiz in APJ, with experience in network, email and cloud security at leading security vendors in EMEA and APAC. Before joining Wiz, he lead operations at a Sydney based network analytics startup before returning to Cloud security with Wiz.</p>
<p>Matt is passionate about developing scalable and actionable security practices within APJs largest organisations.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In today’s episode, we’re joined by Matt Preswick, Principal Solutions Engineer from Wiz, in the company’s first podcast appearance, to talk about cloud security and the intersection of AI with security in organizations. Matt emphasizes the critical need for evaluating security risks and compliance states within cloud infrastructure, addressing the potential for false positives in identifying security vulnerabilities. He also sheds light on the challenges posed by cloud-native threats, urging organizations to integrate security into early-stage application and infrastructure design cycles for efficient prevention of incidents. Matt’s insights underscore the importance of collaboration between security and AI teams, aligning initiatives with organizational goals and customer needs.
Matt Preswick is the Principal Solutions Engineer from Wiz in APJ, with experience in network, email and cloud security at leading security vendors in EMEA and APAC. Before joining Wiz, he lead operations at a Sydney based network analytics startup before returning to Cloud security with Wiz.
Matt is passionate about developing scalable and actionable security practices within APJs largest organisations.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 268 Deep Dive: Matt Preswick | Democratising Cloud Security – Will Security Become the Enabler to AI Usage?]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In today’s episode, we’re joined by Matt Preswick, Principal Solutions Engineer from Wiz, in the company’s first podcast appearance, to talk about cloud security and the intersection of AI with security in organizations. Matt emphasizes the critical need for evaluating security risks and compliance states within cloud infrastructure, addressing the potential for false positives in identifying security vulnerabilities. He also sheds light on the challenges posed by cloud-native threats, urging organizations to integrate security into early-stage application and infrastructure design cycles for efficient prevention of incidents. Matt’s insights underscore the importance of collaboration between security and AI teams, aligning initiatives with organizational goals and customer needs.</p>
<p>Matt Preswick is the Principal Solutions Engineer from Wiz in APJ, with experience in network, email and cloud security at leading security vendors in EMEA and APAC. Before joining Wiz, he lead operations at a Sydney based network analytics startup before returning to Cloud security with Wiz.</p>
<p>Matt is passionate about developing scalable and actionable security practices within APJs largest organisations.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1783560/c1e-kdkxsjqmwmu941jk-gp2wzq77boxg-fjua6f.mp3" length="39861230"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In today’s episode, we’re joined by Matt Preswick, Principal Solutions Engineer from Wiz, in the company’s first podcast appearance, to talk about cloud security and the intersection of AI with security in organizations. Matt emphasizes the critical need for evaluating security risks and compliance states within cloud infrastructure, addressing the potential for false positives in identifying security vulnerabilities. He also sheds light on the challenges posed by cloud-native threats, urging organizations to integrate security into early-stage application and infrastructure design cycles for efficient prevention of incidents. Matt’s insights underscore the importance of collaboration between security and AI teams, aligning initiatives with organizational goals and customer needs.
Matt Preswick is the Principal Solutions Engineer from Wiz in APJ, with experience in network, email and cloud security at leading security vendors in EMEA and APAC. Before joining Wiz, he lead operations at a Sydney based network analytics startup before returning to Cloud security with Wiz.
Matt is passionate about developing scalable and actionable security practices within APJs largest organisations.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1783560/c1a-5k0v-wwz6p69vs7on-hobwcu.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 267 Deep Dive: Alex Tilley | Digital Estate Planning]]>
                </title>
                <pubDate>Wed, 10 Jul 2024 16:00:30 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1782362</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-267-deep-dive-alex-tilley-digital-estate-planning</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we welcome back Alex Tilley, Intelligence and Research Lead, APJ from Secureworks, to explore the often overlooked topic of digital estate planning. Alex shares personal experiences and highlights the challenges of accessing digital assets after a loved one’s passing. He dives into the complexities of managing deceased loved ones’ digital accounts, the importance of notarized copies of death certificates, and the challenges posed by 2-factor authentication and security practices. Alex also stresses the need for open discussions and better preparation for managing digital estates, especially in the context of an aging population, urging individuals to start the estate planning conversation and document important digital information for their loved ones.</p>
<p>With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia’s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia’s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police’s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover “who” the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals.  During this time Alex become a key member of the operations team responsible for many high profile cases.</p>
<p>Alex is now head of Threat Intelligence and research for Asia Pacific Japan (APJ) for Secureworks a global IT security and research leading company. Where we uses his wealth of experience to help organisations at all levels from the board to operational techs understand the organisational and technical aspects of State-sponsored cyber attacks as well as cybercrime in all its forms.</p>
<p>Find more about Security2Cure <a href="https://www.security2cure.com.au/">here</a>.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we welcome back Alex Tilley, Intelligence and Research Lead, APJ from Secureworks, to explore the often overlooked topic of digital estate planning. Alex shares personal experiences and highlights the challenges of accessing digital assets after a loved one’s passing. He dives into the complexities of managing deceased loved ones’ digital accounts, the importance of notarized copies of death certificates, and the challenges posed by 2-factor authentication and security practices. Alex also stresses the need for open discussions and better preparation for managing digital estates, especially in the context of an aging population, urging individuals to start the estate planning conversation and document important digital information for their loved ones.
With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia’s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia’s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police’s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover “who” the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals.  During this time Alex become a key member of the operations team responsible for many high profile cases.
Alex is now head of Threat Intelligence and research for Asia Pacific Japan (APJ) for Secureworks a global IT security and research leading company. Where we uses his wealth of experience to help organisations at all levels from the board to operational techs understand the organisational and technical aspects of State-sponsored cyber attacks as well as cybercrime in all its forms.
Find more about Security2Cure here.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 267 Deep Dive: Alex Tilley | Digital Estate Planning]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we welcome back Alex Tilley, Intelligence and Research Lead, APJ from Secureworks, to explore the often overlooked topic of digital estate planning. Alex shares personal experiences and highlights the challenges of accessing digital assets after a loved one’s passing. He dives into the complexities of managing deceased loved ones’ digital accounts, the importance of notarized copies of death certificates, and the challenges posed by 2-factor authentication and security practices. Alex also stresses the need for open discussions and better preparation for managing digital estates, especially in the context of an aging population, urging individuals to start the estate planning conversation and document important digital information for their loved ones.</p>
<p>With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia’s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia’s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police’s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover “who” the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals.  During this time Alex become a key member of the operations team responsible for many high profile cases.</p>
<p>Alex is now head of Threat Intelligence and research for Asia Pacific Japan (APJ) for Secureworks a global IT security and research leading company. Where we uses his wealth of experience to help organisations at all levels from the board to operational techs understand the organisational and technical aspects of State-sponsored cyber attacks as well as cybercrime in all its forms.</p>
<p>Find more about Security2Cure <a href="https://www.security2cure.com.au/">here</a>.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1782362/c1e-n439h58n24s9z48n-rk0dxg3guqk-cil6fk.mp3" length="43824319"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we welcome back Alex Tilley, Intelligence and Research Lead, APJ from Secureworks, to explore the often overlooked topic of digital estate planning. Alex shares personal experiences and highlights the challenges of accessing digital assets after a loved one’s passing. He dives into the complexities of managing deceased loved ones’ digital accounts, the importance of notarized copies of death certificates, and the challenges posed by 2-factor authentication and security practices. Alex also stresses the need for open discussions and better preparation for managing digital estates, especially in the context of an aging population, urging individuals to start the estate planning conversation and document important digital information for their loved ones.
With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia’s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia’s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police’s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover “who” the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals.  During this time Alex become a key member of the operations team responsible for many high profile cases.
Alex is now head of Threat Intelligence and research for Asia Pacific Japan (APJ) for Secureworks a global IT security and research leading company. Where we uses his wealth of experience to help organisations at all levels from the board to operational techs understand the organisational and technical aspects of State-sponsored cyber attacks as well as cybercrime in all its forms.
Find more about Security2Cure here.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1782362/c1a-5k0v-rk0dmmdwax8z-ky65gp.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 266 Deep Dive: Poornima DeBolle | Enhancing Browser Security]]>
                </title>
                <pubDate>Wed, 03 Jul 2024 16:00:31 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1776701</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-266-deep-dive-poornima-debolle-enhancing-browser-security</link>
                                <description>
                                            <![CDATA[<p>In this episode, Poornima DeBolle, Co-founder and Chief Product Officer of Menlo Security, joins us as we tackle the evolving landscape of web browser security. Poornima sheds light on the potential risks associated with trusting links from popular email and file hosting services, urging enterprises to reevaluate their security stack and adapt to the current technological landscape. She also emphasizes the need for organizations to manage browsers as applications and highlights the gap in control and understanding between endpoint security and network security.</p>
<p><b>Poornima DeBolle</b></p>
<p><b><i>Co-founder &amp; Chief Product Officer</i></b><b><i><br />
</i></b><b><i>Official Member – Forbes Technology Council</i></b></p>
<p><span style="font-weight:400;">Poornima co-founded Menlo Security, bringing years of product management experience to the table. Before Menlo, she was a product management executive at Juniper Networks, responsible for cloud security, security management, and security analytics. She joined Juniper via its acquisition of Altor Networks, where she was vice president of product management and business development. Prior to that, she was head of business development at Check Point in product management and engineering roles. Poormina holds an MSCS from Arizona State University.</span></p>
<ul>
<li style="font-weight:400;"><a href="https://www.linkedin.com/in/poornima-debolle-b0428/"><span style="font-weight:400;">https://www.linkedin.com/in/poornima-debolle-b0428/</span></a></li>
<li style="font-weight:400;"><a href="https://www.menlosecurity.com/management/"><span style="font-weight:400;">https://www.menlosecurity.com/management/</span></a></li>
</ul>
<p><b><i>Recent Accolades:</i></b></p>
<ul>
<li style="font-weight:400;"><a href="https://www.forbes.com/profile/poornima-debolle/?sh=684a3da01f45"><span style="font-weight:400;">Forbes: 50 Over 50: Entrepreneurs (2022)</span></a></li>
<li style="font-weight:400;"><a href="https://www.inc.com/profile/poornima-debolle"><span style="font-weight:400;">Inc.: 200 Female Founders (2023)</span></a></li>
</ul>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Poornima DeBolle, Co-founder and Chief Product Officer of Menlo Security, joins us as we tackle the evolving landscape of web browser security. Poornima sheds light on the potential risks associated with trusting links from popular email and file hosting services, urging enterprises to reevaluate their security stack and adapt to the current technological landscape. She also emphasizes the need for organizations to manage browsers as applications and highlights the gap in control and understanding between endpoint security and network security.
Poornima DeBolle
Co-founder & Chief Product Officer
Official Member – Forbes Technology Council
Poornima co-founded Menlo Security, bringing years of product management experience to the table. Before Menlo, she was a product management executive at Juniper Networks, responsible for cloud security, security management, and security analytics. She joined Juniper via its acquisition of Altor Networks, where she was vice president of product management and business development. Prior to that, she was head of business development at Check Point in product management and engineering roles. Poormina holds an MSCS from Arizona State University.

https://www.linkedin.com/in/poornima-debolle-b0428/
https://www.menlosecurity.com/management/

Recent Accolades:

Forbes: 50 Over 50: Entrepreneurs (2022)
Inc.: 200 Female Founders (2023)

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 266 Deep Dive: Poornima DeBolle | Enhancing Browser Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Poornima DeBolle, Co-founder and Chief Product Officer of Menlo Security, joins us as we tackle the evolving landscape of web browser security. Poornima sheds light on the potential risks associated with trusting links from popular email and file hosting services, urging enterprises to reevaluate their security stack and adapt to the current technological landscape. She also emphasizes the need for organizations to manage browsers as applications and highlights the gap in control and understanding between endpoint security and network security.</p>
<p><b>Poornima DeBolle</b></p>
<p><b><i>Co-founder &amp; Chief Product Officer</i></b><b><i><br />
</i></b><b><i>Official Member – Forbes Technology Council</i></b></p>
<p><span style="font-weight:400;">Poornima co-founded Menlo Security, bringing years of product management experience to the table. Before Menlo, she was a product management executive at Juniper Networks, responsible for cloud security, security management, and security analytics. She joined Juniper via its acquisition of Altor Networks, where she was vice president of product management and business development. Prior to that, she was head of business development at Check Point in product management and engineering roles. Poormina holds an MSCS from Arizona State University.</span></p>
<ul>
<li style="font-weight:400;"><a href="https://www.linkedin.com/in/poornima-debolle-b0428/"><span style="font-weight:400;">https://www.linkedin.com/in/poornima-debolle-b0428/</span></a></li>
<li style="font-weight:400;"><a href="https://www.menlosecurity.com/management/"><span style="font-weight:400;">https://www.menlosecurity.com/management/</span></a></li>
</ul>
<p><b><i>Recent Accolades:</i></b></p>
<ul>
<li style="font-weight:400;"><a href="https://www.forbes.com/profile/poornima-debolle/?sh=684a3da01f45"><span style="font-weight:400;">Forbes: 50 Over 50: Entrepreneurs (2022)</span></a></li>
<li style="font-weight:400;"><a href="https://www.inc.com/profile/poornima-debolle"><span style="font-weight:400;">Inc.: 200 Female Founders (2023)</span></a></li>
</ul>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1776701/c1e-o39rfvn57vf8n0xg-v0nnmo02sqg9-3w6c4b.mp3" length="37524420"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Poornima DeBolle, Co-founder and Chief Product Officer of Menlo Security, joins us as we tackle the evolving landscape of web browser security. Poornima sheds light on the potential risks associated with trusting links from popular email and file hosting services, urging enterprises to reevaluate their security stack and adapt to the current technological landscape. She also emphasizes the need for organizations to manage browsers as applications and highlights the gap in control and understanding between endpoint security and network security.
Poornima DeBolle
Co-founder & Chief Product Officer
Official Member – Forbes Technology Council
Poornima co-founded Menlo Security, bringing years of product management experience to the table. Before Menlo, she was a product management executive at Juniper Networks, responsible for cloud security, security management, and security analytics. She joined Juniper via its acquisition of Altor Networks, where she was vice president of product management and business development. Prior to that, she was head of business development at Check Point in product management and engineering roles. Poormina holds an MSCS from Arizona State University.

https://www.linkedin.com/in/poornima-debolle-b0428/
https://www.menlosecurity.com/management/

Recent Accolades:

Forbes: 50 Over 50: Entrepreneurs (2022)
Inc.: 200 Female Founders (2023)

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1776701/c1a-5k0v-rowwvkxzcx35-ggdphr.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:06</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: Insights from the Oracle CloudWorld Tour Singapore (Part 2)]]>
                </title>
                <pubDate>Mon, 01 Jul 2024 12:00:13 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1772066</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-insights-from-the-oracle-cloudworld-tour-singapore-part-ii</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Ashish Ray (Vice President, Product Management) and Sunil Wahi (Vice President, Fusion Cloud Applications) to get their insights on Oracle’s solution to solve business challenges.</p>
<p><strong>Ashish Ray, Vice President, Product Management</strong></p>
<p>Ashish Ray is Vice President, Product Management within Oracle’s core database development organisation. His product responsibilities include Exadata, Zero Data Loss Recovery Appliance, Oracle Database’s High Availability Solutions (Maximum Availability Architecture), and all associated Platform as a Service (PaaS) Cloud Services.</p>
<p>His team is responsible for all technical product management and product strategy for Oracle’s mission-critical database technologies, including Exadata and Autonomous Database, across on-premises, public cloud, and cloud at customer. Team responsibilities include defining and driving product strategies, corralling requirements and framing roadmap based on market/business demands, articulating product positioning and value proposition, launching and evangelising products and cloud services that solve complex enterprise problems, building and managing cross-functional teams and strategic partnerships.</p>
<p><strong>Sunil Wahi, Vice President, Fusion Cloud Applications</strong></p>
<p>Sunil is a Vice President and Head of Solution Engineering at Oracle, where he leads the Cloud Solutions Innovation Portfolio for ERP, Supply Chain, CX, and Human Capital across Asia Pacific. He is also heading the Strategy and Execution of the Large Deals Program. He is a Chicago Booth MBA Graduate, a Certified Information Systems Auditor (CISA) with over 25 years of experience in enterprise software sales and consulting.</p>
<p>As part of the APAC Senior Leadership Team at Oracle heading Fusion Applications Large Deals Strategy and Execution, Sunil advises and executes the Go to Market Plans and Business Strategy for the Fusion Cloud Applications Business, driving revenue growth, customer satisfaction, and market share. He also leverages his industry expertise and business process re-engineering knowledge to help customers achieve excellence and embrace world-class solutions. He specialises in Finance Transformations, Supply Chain &amp; Logistics Strategies. He has exposure and advisory work in entrepreneurial technology startup business plans, investment, and funding strategies.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Ashish Ray (Vice President, Product Management) and Sunil Wahi (Vice President, Fusion Cloud Applications) to get their insights on Oracle’s solution to solve business challenges.
Ashish Ray, Vice President, Product Management
Ashish Ray is Vice President, Product Management within Oracle’s core database development organisation. His product responsibilities include Exadata, Zero Data Loss Recovery Appliance, Oracle Database’s High Availability Solutions (Maximum Availability Architecture), and all associated Platform as a Service (PaaS) Cloud Services.
His team is responsible for all technical product management and product strategy for Oracle’s mission-critical database technologies, including Exadata and Autonomous Database, across on-premises, public cloud, and cloud at customer. Team responsibilities include defining and driving product strategies, corralling requirements and framing roadmap based on market/business demands, articulating product positioning and value proposition, launching and evangelising products and cloud services that solve complex enterprise problems, building and managing cross-functional teams and strategic partnerships.
Sunil Wahi, Vice President, Fusion Cloud Applications
Sunil is a Vice President and Head of Solution Engineering at Oracle, where he leads the Cloud Solutions Innovation Portfolio for ERP, Supply Chain, CX, and Human Capital across Asia Pacific. He is also heading the Strategy and Execution of the Large Deals Program. He is a Chicago Booth MBA Graduate, a Certified Information Systems Auditor (CISA) with over 25 years of experience in enterprise software sales and consulting.
As part of the APAC Senior Leadership Team at Oracle heading Fusion Applications Large Deals Strategy and Execution, Sunil advises and executes the Go to Market Plans and Business Strategy for the Fusion Cloud Applications Business, driving revenue growth, customer satisfaction, and market share. He also leverages his industry expertise and business process re-engineering knowledge to help customers achieve excellence and embrace world-class solutions. He specialises in Finance Transformations, Supply Chain & Logistics Strategies. He has exposure and advisory work in entrepreneurial technology startup business plans, investment, and funding strategies.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: Insights from the Oracle CloudWorld Tour Singapore (Part 2)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Ashish Ray (Vice President, Product Management) and Sunil Wahi (Vice President, Fusion Cloud Applications) to get their insights on Oracle’s solution to solve business challenges.</p>
<p><strong>Ashish Ray, Vice President, Product Management</strong></p>
<p>Ashish Ray is Vice President, Product Management within Oracle’s core database development organisation. His product responsibilities include Exadata, Zero Data Loss Recovery Appliance, Oracle Database’s High Availability Solutions (Maximum Availability Architecture), and all associated Platform as a Service (PaaS) Cloud Services.</p>
<p>His team is responsible for all technical product management and product strategy for Oracle’s mission-critical database technologies, including Exadata and Autonomous Database, across on-premises, public cloud, and cloud at customer. Team responsibilities include defining and driving product strategies, corralling requirements and framing roadmap based on market/business demands, articulating product positioning and value proposition, launching and evangelising products and cloud services that solve complex enterprise problems, building and managing cross-functional teams and strategic partnerships.</p>
<p><strong>Sunil Wahi, Vice President, Fusion Cloud Applications</strong></p>
<p>Sunil is a Vice President and Head of Solution Engineering at Oracle, where he leads the Cloud Solutions Innovation Portfolio for ERP, Supply Chain, CX, and Human Capital across Asia Pacific. He is also heading the Strategy and Execution of the Large Deals Program. He is a Chicago Booth MBA Graduate, a Certified Information Systems Auditor (CISA) with over 25 years of experience in enterprise software sales and consulting.</p>
<p>As part of the APAC Senior Leadership Team at Oracle heading Fusion Applications Large Deals Strategy and Execution, Sunil advises and executes the Go to Market Plans and Business Strategy for the Fusion Cloud Applications Business, driving revenue growth, customer satisfaction, and market share. He also leverages his industry expertise and business process re-engineering knowledge to help customers achieve excellence and embrace world-class solutions. He specialises in Finance Transformations, Supply Chain &amp; Logistics Strategies. He has exposure and advisory work in entrepreneurial technology startup business plans, investment, and funding strategies.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1772066/c1e-vzj8a9p8qncwz1vx-mq83kg9jimr0-n9b6ia.mp3" length="43920449"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Ashish Ray (Vice President, Product Management) and Sunil Wahi (Vice President, Fusion Cloud Applications) to get their insights on Oracle’s solution to solve business challenges.
Ashish Ray, Vice President, Product Management
Ashish Ray is Vice President, Product Management within Oracle’s core database development organisation. His product responsibilities include Exadata, Zero Data Loss Recovery Appliance, Oracle Database’s High Availability Solutions (Maximum Availability Architecture), and all associated Platform as a Service (PaaS) Cloud Services.
His team is responsible for all technical product management and product strategy for Oracle’s mission-critical database technologies, including Exadata and Autonomous Database, across on-premises, public cloud, and cloud at customer. Team responsibilities include defining and driving product strategies, corralling requirements and framing roadmap based on market/business demands, articulating product positioning and value proposition, launching and evangelising products and cloud services that solve complex enterprise problems, building and managing cross-functional teams and strategic partnerships.
Sunil Wahi, Vice President, Fusion Cloud Applications
Sunil is a Vice President and Head of Solution Engineering at Oracle, where he leads the Cloud Solutions Innovation Portfolio for ERP, Supply Chain, CX, and Human Capital across Asia Pacific. He is also heading the Strategy and Execution of the Large Deals Program. He is a Chicago Booth MBA Graduate, a Certified Information Systems Auditor (CISA) with over 25 years of experience in enterprise software sales and consulting.
As part of the APAC Senior Leadership Team at Oracle heading Fusion Applications Large Deals Strategy and Execution, Sunil advises and executes the Go to Market Plans and Business Strategy for the Fusion Cloud Applications Business, driving revenue growth, customer satisfaction, and market share. He also leverages his industry expertise and business process re-engineering knowledge to help customers achieve excellence and embrace world-class solutions. He specialises in Finance Transformations, Supply Chain & Logistics Strategies. He has exposure and advisory work in entrepreneurial technology startup business plans, investment, and funding strategies.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1772066/c1a-5k0v-qxjndd13fp1-fwrxyn.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: Insights from the Oracle CloudWorld Tour Singapore (Part 1)]]>
                </title>
                <pubDate>Fri, 28 Jun 2024 12:00:57 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1772055</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-insights-from-the-oracle-cloudworld-tour-singapore-part-1</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Jae Evans (Global Chief Information Officer and Executive Vice President) and Chris Chelliah (Senior Vice President, Technology and Customer Strategy) to get their insights on Oracle’s solution to solve business challenges.</p>
<p><strong>Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC</strong></p>
<p>Chris Chelliah is responsible for driving digital transformation for Oracle’s customers in the Japan and Asia Pacific region. He’s accountable for the organisation’s hypergrowth in cloud infrastructure and autonomous database. Chris leads cloud specialist sales teams, industry architects, and the Oracle Insight team to bring together the expertise needed to provide a collaborative, consultative approach to help customers achieve their objectives.</p>
<p>Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors, implementing disruptive and innovative software solutions.</p>
<p>Chris holds a postgraduate degree in computer science and mathematics from the University of Western Australia. He’s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.</p>
<p><strong>Jae Evans, Global Chief Information Officer and Executive Vice President, Oracle</strong></p>
<p>Jae Evans is Oracle’s global chief information officer and executive vice president of Oracle Cloud Infrastructure (OCI) Platform Services. She’s responsible for accelerating Oracle IT’s cloud transformation across thousands of environments, and her team provides IT services to Oracle’s 170,000 employees and developers worldwide.</p>
<p>Jae also leads OCI’s platform services consisting of commercial systems including billing, subscription management, and cost management, as well as other core platforms such as console services and marketplace. In addition, her organisation is responsible for ensuring the highest level of security, compliance, operations and support for OCI.</p>
<p>She has more than 20 years of experience building and leading global teams and managing mission-critical production services across various industries, including ecommerce, enterprise cloud, online gaming, retail, and telecommunications. Jae is passionate about bringing diversity and inclusion (D&amp;I) into the workplace. She’s the executive sponsor of D&amp;I for OCI, a member of Oracle’s Executive D&amp;I Council, and an active participant in and champion of various Oracle Professional Asian Leadership and Women in Tech events.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Jae Evans (Global Chief Information Officer and Executive Vice President) and Chris Chelliah (Senior Vice President, Technology and Customer Strategy) to get their insights on Oracle’s solution to solve business challenges.
Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC
Chris Chelliah is responsible for driving digital transformation for Oracle’s customers in the Japan and Asia Pacific region. He’s accountable for the organisation’s hypergrowth in cloud infrastructure and autonomous database. Chris leads cloud specialist sales teams, industry architects, and the Oracle Insight team to bring together the expertise needed to provide a collaborative, consultative approach to help customers achieve their objectives.
Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors, implementing disruptive and innovative software solutions.
Chris holds a postgraduate degree in computer science and mathematics from the University of Western Australia. He’s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.
Jae Evans, Global Chief Information Officer and Executive Vice President, Oracle
Jae Evans is Oracle’s global chief information officer and executive vice president of Oracle Cloud Infrastructure (OCI) Platform Services. She’s responsible for accelerating Oracle IT’s cloud transformation across thousands of environments, and her team provides IT services to Oracle’s 170,000 employees and developers worldwide.
Jae also leads OCI’s platform services consisting of commercial systems including billing, subscription management, and cost management, as well as other core platforms such as console services and marketplace. In addition, her organisation is responsible for ensuring the highest level of security, compliance, operations and support for OCI.
She has more than 20 years of experience building and leading global teams and managing mission-critical production services across various industries, including ecommerce, enterprise cloud, online gaming, retail, and telecommunications. Jae is passionate about bringing diversity and inclusion (D&I) into the workplace. She’s the executive sponsor of D&I for OCI, a member of Oracle’s Executive D&I Council, and an active participant in and champion of various Oracle Professional Asian Leadership and Women in Tech events.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: Insights from the Oracle CloudWorld Tour Singapore (Part 1)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Jae Evans (Global Chief Information Officer and Executive Vice President) and Chris Chelliah (Senior Vice President, Technology and Customer Strategy) to get their insights on Oracle’s solution to solve business challenges.</p>
<p><strong>Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC</strong></p>
<p>Chris Chelliah is responsible for driving digital transformation for Oracle’s customers in the Japan and Asia Pacific region. He’s accountable for the organisation’s hypergrowth in cloud infrastructure and autonomous database. Chris leads cloud specialist sales teams, industry architects, and the Oracle Insight team to bring together the expertise needed to provide a collaborative, consultative approach to help customers achieve their objectives.</p>
<p>Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors, implementing disruptive and innovative software solutions.</p>
<p>Chris holds a postgraduate degree in computer science and mathematics from the University of Western Australia. He’s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.</p>
<p><strong>Jae Evans, Global Chief Information Officer and Executive Vice President, Oracle</strong></p>
<p>Jae Evans is Oracle’s global chief information officer and executive vice president of Oracle Cloud Infrastructure (OCI) Platform Services. She’s responsible for accelerating Oracle IT’s cloud transformation across thousands of environments, and her team provides IT services to Oracle’s 170,000 employees and developers worldwide.</p>
<p>Jae also leads OCI’s platform services consisting of commercial systems including billing, subscription management, and cost management, as well as other core platforms such as console services and marketplace. In addition, her organisation is responsible for ensuring the highest level of security, compliance, operations and support for OCI.</p>
<p>She has more than 20 years of experience building and leading global teams and managing mission-critical production services across various industries, including ecommerce, enterprise cloud, online gaming, retail, and telecommunications. Jae is passionate about bringing diversity and inclusion (D&amp;I) into the workplace. She’s the executive sponsor of D&amp;I for OCI, a member of Oracle’s Executive D&amp;I Council, and an active participant in and champion of various Oracle Professional Asian Leadership and Women in Tech events.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1772055/c1e-o39rfvn9p1b8n0xg-qxjn7590tx6n-lqrwma.mp3" length="46033233"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Jae Evans (Global Chief Information Officer and Executive Vice President) and Chris Chelliah (Senior Vice President, Technology and Customer Strategy) to get their insights on Oracle’s solution to solve business challenges.
Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC
Chris Chelliah is responsible for driving digital transformation for Oracle’s customers in the Japan and Asia Pacific region. He’s accountable for the organisation’s hypergrowth in cloud infrastructure and autonomous database. Chris leads cloud specialist sales teams, industry architects, and the Oracle Insight team to bring together the expertise needed to provide a collaborative, consultative approach to help customers achieve their objectives.
Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors, implementing disruptive and innovative software solutions.
Chris holds a postgraduate degree in computer science and mathematics from the University of Western Australia. He’s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.
Jae Evans, Global Chief Information Officer and Executive Vice President, Oracle
Jae Evans is Oracle’s global chief information officer and executive vice president of Oracle Cloud Infrastructure (OCI) Platform Services. She’s responsible for accelerating Oracle IT’s cloud transformation across thousands of environments, and her team provides IT services to Oracle’s 170,000 employees and developers worldwide.
Jae also leads OCI’s platform services consisting of commercial systems including billing, subscription management, and cost management, as well as other core platforms such as console services and marketplace. In addition, her organisation is responsible for ensuring the highest level of security, compliance, operations and support for OCI.
She has more than 20 years of experience building and leading global teams and managing mission-critical production services across various industries, including ecommerce, enterprise cloud, online gaming, retail, and telecommunications. Jae is passionate about bringing diversity and inclusion (D&I) into the workplace. She’s the executive sponsor of D&I for OCI, a member of Oracle’s Executive D&I Council, and an active participant in and champion of various Oracle Professional Asian Leadership and Women in Tech events.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1772055/c1a-5k0v-xmzpxx7os134-pah5vl.jpg"></itunes:image>
                                                                            <itunes:duration>00:47:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 265 Deep Dive: Luke Hargreaves | Sustainable Technology – What Really Matters]]>
                </title>
                <pubDate>Fri, 21 Jun 2024 16:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1765662</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-265-deep-dive-luke-hargreaves-sustainable-technology-what-really-matters</link>
                                <description>
                                            <![CDATA[<p>In today’s episode, we’re joined by with Luke Hargreaves, Founder &amp; CEO of Aquainnis, as we discuss sustainability and its crucial role in modern businesses. He discusses the economic benefits of sustainability, including cost savings and improved brand awareness, as well as the introduction of legislation and shareholder accountability in reporting. We delve into the concept of greenwashing and the significance of education, emphasizing that sustainability is not just an environmental issue, but also an economic and social one.</p>
<p>A highly driven technical professional with 20+ years of experience in the IT industry. Luke believes in the limitless potential of technology to sustainably transform the lives of people, and the world as a whole. He derives genuine joy to be doing what he is doing, and brings this enthusiasm everywhere he goes..</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In today’s episode, we’re joined by with Luke Hargreaves, Founder & CEO of Aquainnis, as we discuss sustainability and its crucial role in modern businesses. He discusses the economic benefits of sustainability, including cost savings and improved brand awareness, as well as the introduction of legislation and shareholder accountability in reporting. We delve into the concept of greenwashing and the significance of education, emphasizing that sustainability is not just an environmental issue, but also an economic and social one.
A highly driven technical professional with 20+ years of experience in the IT industry. Luke believes in the limitless potential of technology to sustainably transform the lives of people, and the world as a whole. He derives genuine joy to be doing what he is doing, and brings this enthusiasm everywhere he goes..
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 265 Deep Dive: Luke Hargreaves | Sustainable Technology – What Really Matters]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In today’s episode, we’re joined by with Luke Hargreaves, Founder &amp; CEO of Aquainnis, as we discuss sustainability and its crucial role in modern businesses. He discusses the economic benefits of sustainability, including cost savings and improved brand awareness, as well as the introduction of legislation and shareholder accountability in reporting. We delve into the concept of greenwashing and the significance of education, emphasizing that sustainability is not just an environmental issue, but also an economic and social one.</p>
<p>A highly driven technical professional with 20+ years of experience in the IT industry. Luke believes in the limitless potential of technology to sustainably transform the lives of people, and the world as a whole. He derives genuine joy to be doing what he is doing, and brings this enthusiasm everywhere he goes..</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1765662/c1e-x8jpim17v9an7wz4-04rnq0qdfvnz-crpsv9.mp3" length="39068361"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In today’s episode, we’re joined by with Luke Hargreaves, Founder & CEO of Aquainnis, as we discuss sustainability and its crucial role in modern businesses. He discusses the economic benefits of sustainability, including cost savings and improved brand awareness, as well as the introduction of legislation and shareholder accountability in reporting. We delve into the concept of greenwashing and the significance of education, emphasizing that sustainability is not just an environmental issue, but also an economic and social one.
A highly driven technical professional with 20+ years of experience in the IT industry. Luke believes in the limitless potential of technology to sustainably transform the lives of people, and the world as a whole. He derives genuine joy to be doing what he is doing, and brings this enthusiasm everywhere he goes..
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1765662/c1a-5k0v-qxj85854tnk0-drvorr.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 264 Deep Dive: Christy Wyatt | Cyber Resilience In Today’s Threat Environment]]>
                </title>
                <pubDate>Wed, 19 Jun 2024 16:00:40 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1764010</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-264-deep-dive-christy-wyatt-cyber-resilience-in-todays-threat-environment</link>
                                <description>
                                            <![CDATA[<p>In this episode, Christy Wyatt, President and CEO of Absolute Security, brings attention to the lack of maturity in the cybersecurity ecosystem compared to the regulatory environment. Her discussion delves into the disparity between the accountability on a Chief Security Officer (CSO) and a Chief Financial Officer (CFO), and the importance of responsible behavior, accountability, and conversations about risk tolerance and investments to mitigate risks in cybersecurity. Christy also emphasizes the need for continuous testing, measuring impact and probability, building roadmaps, aligning risk appetite, and maintaining resilience in the cybersecurity journey. She tackles the significance of cyber resilience in maintaining security posture and responding to incidents, along with the key steps involved.</p>
<p>Christy is President and CEO of Absolute, the only provider of self-healing, intelligent security solutions and the only endpoint provider embedded in over 600 million devices globally.</p>
<p>A Silicon Valley veteran, Christy has deep experience and expertise spanning cybersecurity, enterprise mobility, embedded platforms, IoT, enterprise software, and data science. Prior to Absolute, she served as the CEO of Dtex Systems and Chairman, President, and CEO of Good Technology (acquired by Blackberry). Christy has also held a variety of technology leadership roles at Citigroup, Motorola, Apple, Palm, and Sun Microsystems. She currently serves on the board of directors of LM Ericsson and Silicon Labs, and has previously served on the boards of Quotient Technologies, Good Technology, Dtex, Centrify, and the Linux Foundation.</p>
<p>Christy was recently recognized as CEO of the Year by Globe and Mail. She has also been awarded one of the Top 50 Women Leaders in SaaS in 2019, and has been named one of Inc. Magazine’s Top 50 Women Entrepreneurs of America, Information Security’s CEO of the Year, and a Fierce Wireless “Most Influential Women in Wireless.”</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Christy Wyatt, President and CEO of Absolute Security, brings attention to the lack of maturity in the cybersecurity ecosystem compared to the regulatory environment. Her discussion delves into the disparity between the accountability on a Chief Security Officer (CSO) and a Chief Financial Officer (CFO), and the importance of responsible behavior, accountability, and conversations about risk tolerance and investments to mitigate risks in cybersecurity. Christy also emphasizes the need for continuous testing, measuring impact and probability, building roadmaps, aligning risk appetite, and maintaining resilience in the cybersecurity journey. She tackles the significance of cyber resilience in maintaining security posture and responding to incidents, along with the key steps involved.
Christy is President and CEO of Absolute, the only provider of self-healing, intelligent security solutions and the only endpoint provider embedded in over 600 million devices globally.
A Silicon Valley veteran, Christy has deep experience and expertise spanning cybersecurity, enterprise mobility, embedded platforms, IoT, enterprise software, and data science. Prior to Absolute, she served as the CEO of Dtex Systems and Chairman, President, and CEO of Good Technology (acquired by Blackberry). Christy has also held a variety of technology leadership roles at Citigroup, Motorola, Apple, Palm, and Sun Microsystems. She currently serves on the board of directors of LM Ericsson and Silicon Labs, and has previously served on the boards of Quotient Technologies, Good Technology, Dtex, Centrify, and the Linux Foundation.
Christy was recently recognized as CEO of the Year by Globe and Mail. She has also been awarded one of the Top 50 Women Leaders in SaaS in 2019, and has been named one of Inc. Magazine’s Top 50 Women Entrepreneurs of America, Information Security’s CEO of the Year, and a Fierce Wireless “Most Influential Women in Wireless.”
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 264 Deep Dive: Christy Wyatt | Cyber Resilience In Today’s Threat Environment]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Christy Wyatt, President and CEO of Absolute Security, brings attention to the lack of maturity in the cybersecurity ecosystem compared to the regulatory environment. Her discussion delves into the disparity between the accountability on a Chief Security Officer (CSO) and a Chief Financial Officer (CFO), and the importance of responsible behavior, accountability, and conversations about risk tolerance and investments to mitigate risks in cybersecurity. Christy also emphasizes the need for continuous testing, measuring impact and probability, building roadmaps, aligning risk appetite, and maintaining resilience in the cybersecurity journey. She tackles the significance of cyber resilience in maintaining security posture and responding to incidents, along with the key steps involved.</p>
<p>Christy is President and CEO of Absolute, the only provider of self-healing, intelligent security solutions and the only endpoint provider embedded in over 600 million devices globally.</p>
<p>A Silicon Valley veteran, Christy has deep experience and expertise spanning cybersecurity, enterprise mobility, embedded platforms, IoT, enterprise software, and data science. Prior to Absolute, she served as the CEO of Dtex Systems and Chairman, President, and CEO of Good Technology (acquired by Blackberry). Christy has also held a variety of technology leadership roles at Citigroup, Motorola, Apple, Palm, and Sun Microsystems. She currently serves on the board of directors of LM Ericsson and Silicon Labs, and has previously served on the boards of Quotient Technologies, Good Technology, Dtex, Centrify, and the Linux Foundation.</p>
<p>Christy was recently recognized as CEO of the Year by Globe and Mail. She has also been awarded one of the Top 50 Women Leaders in SaaS in 2019, and has been named one of Inc. Magazine’s Top 50 Women Entrepreneurs of America, Information Security’s CEO of the Year, and a Fierce Wireless “Most Influential Women in Wireless.”</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1764010/c1e-vzj8a95gqxswz1vx-9247n86wcq2p-omp0at.mp3" length="42116120"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Christy Wyatt, President and CEO of Absolute Security, brings attention to the lack of maturity in the cybersecurity ecosystem compared to the regulatory environment. Her discussion delves into the disparity between the accountability on a Chief Security Officer (CSO) and a Chief Financial Officer (CFO), and the importance of responsible behavior, accountability, and conversations about risk tolerance and investments to mitigate risks in cybersecurity. Christy also emphasizes the need for continuous testing, measuring impact and probability, building roadmaps, aligning risk appetite, and maintaining resilience in the cybersecurity journey. She tackles the significance of cyber resilience in maintaining security posture and responding to incidents, along with the key steps involved.
Christy is President and CEO of Absolute, the only provider of self-healing, intelligent security solutions and the only endpoint provider embedded in over 600 million devices globally.
A Silicon Valley veteran, Christy has deep experience and expertise spanning cybersecurity, enterprise mobility, embedded platforms, IoT, enterprise software, and data science. Prior to Absolute, she served as the CEO of Dtex Systems and Chairman, President, and CEO of Good Technology (acquired by Blackberry). Christy has also held a variety of technology leadership roles at Citigroup, Motorola, Apple, Palm, and Sun Microsystems. She currently serves on the board of directors of LM Ericsson and Silicon Labs, and has previously served on the boards of Quotient Technologies, Good Technology, Dtex, Centrify, and the Linux Foundation.
Christy was recently recognized as CEO of the Year by Globe and Mail. She has also been awarded one of the Top 50 Women Leaders in SaaS in 2019, and has been named one of Inc. Magazine’s Top 50 Women Entrepreneurs of America, Information Security’s CEO of the Year, and a Fierce Wireless “Most Influential Women in Wireless.”
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1764010/c1a-5k0v-wngd6d34cown-cnowwk.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 263 Deep Dive: Naran McClung | The Benefits of In-House SOCs vs Outsourcing]]>
                </title>
                <pubDate>Fri, 14 Jun 2024 16:00:52 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1762166</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-263-deep-dive-naran-mcclung-the-benefits-of-in-house-socs-vs-outsourcing</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Naran McClung, Head of Azure, Macquarie Cloud Services from Macquarie Technology Group, as he shares invaluable insights into the world of Security Operations Centers (SOCs). Naran discusses the pros and cons of in house SOCs versus outsourcing, shedding light on the expectations businesses have for outsourced SOC services and the challenges of maintaining an in-house SOC. He emphasizes the importance of efficiency in building runbooks, standing up SOC operations, and the significance of minimal downtime. Stay tuned as Naran McClung provides a wealth of knowledge on managing 24/7 operations, structuring SLAs, and much more. So, let’s jump right into this fascinating discussion on SOC operations, security posture, and the evolving landscape of cybersecurity.</p>
<p>Naran McClung is an experienced IT professional and business leader, with an international career spanning over 20 years. He has defined and led significant technology transformation programmes within Finance and Media verticals, and has executed strategic engagements throughout the UK, Europe and the US.</p>
<p>Naran McClung runs the Azure business for Macquarie Cloud Services (MCS). The business was incepted in 2019 and publicly launched February of 2020 to coincide with the inking of a unique and strategic agreement with Microsoft.</p>
<p>MCS has consciously chosen to only work with the Azure Cloud Platform, believing in strength in depth and a truly committed Partnership with Microsoft. MCS is now the fastest growing Azure Managed Services business in Australia, and the only Azure Expert MSP to also be a Microsoft Intelligent Security Association (MISA) member.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Naran McClung, Head of Azure, Macquarie Cloud Services from Macquarie Technology Group, as he shares invaluable insights into the world of Security Operations Centers (SOCs). Naran discusses the pros and cons of in house SOCs versus outsourcing, shedding light on the expectations businesses have for outsourced SOC services and the challenges of maintaining an in-house SOC. He emphasizes the importance of efficiency in building runbooks, standing up SOC operations, and the significance of minimal downtime. Stay tuned as Naran McClung provides a wealth of knowledge on managing 24/7 operations, structuring SLAs, and much more. So, let’s jump right into this fascinating discussion on SOC operations, security posture, and the evolving landscape of cybersecurity.
Naran McClung is an experienced IT professional and business leader, with an international career spanning over 20 years. He has defined and led significant technology transformation programmes within Finance and Media verticals, and has executed strategic engagements throughout the UK, Europe and the US.
Naran McClung runs the Azure business for Macquarie Cloud Services (MCS). The business was incepted in 2019 and publicly launched February of 2020 to coincide with the inking of a unique and strategic agreement with Microsoft.
MCS has consciously chosen to only work with the Azure Cloud Platform, believing in strength in depth and a truly committed Partnership with Microsoft. MCS is now the fastest growing Azure Managed Services business in Australia, and the only Azure Expert MSP to also be a Microsoft Intelligent Security Association (MISA) member.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 263 Deep Dive: Naran McClung | The Benefits of In-House SOCs vs Outsourcing]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Naran McClung, Head of Azure, Macquarie Cloud Services from Macquarie Technology Group, as he shares invaluable insights into the world of Security Operations Centers (SOCs). Naran discusses the pros and cons of in house SOCs versus outsourcing, shedding light on the expectations businesses have for outsourced SOC services and the challenges of maintaining an in-house SOC. He emphasizes the importance of efficiency in building runbooks, standing up SOC operations, and the significance of minimal downtime. Stay tuned as Naran McClung provides a wealth of knowledge on managing 24/7 operations, structuring SLAs, and much more. So, let’s jump right into this fascinating discussion on SOC operations, security posture, and the evolving landscape of cybersecurity.</p>
<p>Naran McClung is an experienced IT professional and business leader, with an international career spanning over 20 years. He has defined and led significant technology transformation programmes within Finance and Media verticals, and has executed strategic engagements throughout the UK, Europe and the US.</p>
<p>Naran McClung runs the Azure business for Macquarie Cloud Services (MCS). The business was incepted in 2019 and publicly launched February of 2020 to coincide with the inking of a unique and strategic agreement with Microsoft.</p>
<p>MCS has consciously chosen to only work with the Azure Cloud Platform, believing in strength in depth and a truly committed Partnership with Microsoft. MCS is now the fastest growing Azure Managed Services business in Australia, and the only Azure Expert MSP to also be a Microsoft Intelligent Security Association (MISA) member.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1762166/c1e-z9w7fm343vfokrw5-p8dpjomph5mj-xynmuz.mp3" length="36869060"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Naran McClung, Head of Azure, Macquarie Cloud Services from Macquarie Technology Group, as he shares invaluable insights into the world of Security Operations Centers (SOCs). Naran discusses the pros and cons of in house SOCs versus outsourcing, shedding light on the expectations businesses have for outsourced SOC services and the challenges of maintaining an in-house SOC. He emphasizes the importance of efficiency in building runbooks, standing up SOC operations, and the significance of minimal downtime. Stay tuned as Naran McClung provides a wealth of knowledge on managing 24/7 operations, structuring SLAs, and much more. So, let’s jump right into this fascinating discussion on SOC operations, security posture, and the evolving landscape of cybersecurity.
Naran McClung is an experienced IT professional and business leader, with an international career spanning over 20 years. He has defined and led significant technology transformation programmes within Finance and Media verticals, and has executed strategic engagements throughout the UK, Europe and the US.
Naran McClung runs the Azure business for Macquarie Cloud Services (MCS). The business was incepted in 2019 and publicly launched February of 2020 to coincide with the inking of a unique and strategic agreement with Microsoft.
MCS has consciously chosen to only work with the Azure Cloud Platform, believing in strength in depth and a truly committed Partnership with Microsoft. MCS is now the fastest growing Azure Managed Services business in Australia, and the only Azure Expert MSP to also be a Microsoft Intelligent Security Association (MISA) member.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1762166/c1a-5k0v-mq8z1vxzi5n8-gjllmv.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 262 Deep Dive: Chris Hockings | IBM’s latest X-Force Data Reveals Top Spam Trends, Campaigns, and Cyber Weapons of Choice in 2023]]>
                </title>
                <pubDate>Wed, 12 Jun 2024 16:00:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1760038</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-262-deep-dive-chris-hockings-ibms-latest-x-force-data-reveals-top-spam-trends-campaigns-and-cyber-weapons-of-choice-in-2023</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sit down with Chris Hockings, CTO Security Asia Pacific, from IBM as he discusses IBM’s X-Force Threat Intelligence Index 2024. Chris delves into the shifting tactics of ransomware groups, the need for quick innovation in response to cyber threats, and the importance of mitigating vulnerabilities in critical infrastructure. We also discuss the rising use of valid accounts by cybercriminals, the challenges of implementing advanced detection and response mechanisms at scale, and the fundamental building blocks of cybersecurity. Join us as we uncover key insights from IBM’s X-Force Threat Intelligence Index 2024 and gain valuable knowledge on cybersecurity trends and strategies to address today’s biggest security challenges.</p>
<p><em>Chris Hockings is the CTO for IBM Security Asia Pacific.  He represents the IBM global security strategy and vision across the region and in doing so engages with leaders across government, industry, and partnerships. Chris has been a leader across all facets of software, including global research and development, support, service, and market engagement.</em></p>
<p>Read the <a href="https://www.ibm.com/reports/threat-intelligence">IBM Security X-Force Threat Intelligence Index 2024</a>.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sit down with Chris Hockings, CTO Security Asia Pacific, from IBM as he discusses IBM’s X-Force Threat Intelligence Index 2024. Chris delves into the shifting tactics of ransomware groups, the need for quick innovation in response to cyber threats, and the importance of mitigating vulnerabilities in critical infrastructure. We also discuss the rising use of valid accounts by cybercriminals, the challenges of implementing advanced detection and response mechanisms at scale, and the fundamental building blocks of cybersecurity. Join us as we uncover key insights from IBM’s X-Force Threat Intelligence Index 2024 and gain valuable knowledge on cybersecurity trends and strategies to address today’s biggest security challenges.
Chris Hockings is the CTO for IBM Security Asia Pacific.  He represents the IBM global security strategy and vision across the region and in doing so engages with leaders across government, industry, and partnerships. Chris has been a leader across all facets of software, including global research and development, support, service, and market engagement.
Read the IBM Security X-Force Threat Intelligence Index 2024.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 262 Deep Dive: Chris Hockings | IBM’s latest X-Force Data Reveals Top Spam Trends, Campaigns, and Cyber Weapons of Choice in 2023]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sit down with Chris Hockings, CTO Security Asia Pacific, from IBM as he discusses IBM’s X-Force Threat Intelligence Index 2024. Chris delves into the shifting tactics of ransomware groups, the need for quick innovation in response to cyber threats, and the importance of mitigating vulnerabilities in critical infrastructure. We also discuss the rising use of valid accounts by cybercriminals, the challenges of implementing advanced detection and response mechanisms at scale, and the fundamental building blocks of cybersecurity. Join us as we uncover key insights from IBM’s X-Force Threat Intelligence Index 2024 and gain valuable knowledge on cybersecurity trends and strategies to address today’s biggest security challenges.</p>
<p><em>Chris Hockings is the CTO for IBM Security Asia Pacific.  He represents the IBM global security strategy and vision across the region and in doing so engages with leaders across government, industry, and partnerships. Chris has been a leader across all facets of software, including global research and development, support, service, and market engagement.</em></p>
<p>Read the <a href="https://www.ibm.com/reports/threat-intelligence">IBM Security X-Force Threat Intelligence Index 2024</a>.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1760038/c1e-901kfn22rzfdv65n-mq8do58ju2j-9c9pwb.mp3" length="34566523"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sit down with Chris Hockings, CTO Security Asia Pacific, from IBM as he discusses IBM’s X-Force Threat Intelligence Index 2024. Chris delves into the shifting tactics of ransomware groups, the need for quick innovation in response to cyber threats, and the importance of mitigating vulnerabilities in critical infrastructure. We also discuss the rising use of valid accounts by cybercriminals, the challenges of implementing advanced detection and response mechanisms at scale, and the fundamental building blocks of cybersecurity. Join us as we uncover key insights from IBM’s X-Force Threat Intelligence Index 2024 and gain valuable knowledge on cybersecurity trends and strategies to address today’s biggest security challenges.
Chris Hockings is the CTO for IBM Security Asia Pacific.  He represents the IBM global security strategy and vision across the region and in doing so engages with leaders across government, industry, and partnerships. Chris has been a leader across all facets of software, including global research and development, support, service, and market engagement.
Read the IBM Security X-Force Threat Intelligence Index 2024.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1760038/c1a-5k0v-o87o9o9df7r-rherts.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 261 Deep Dive: Thomas Fikentscher | The Executive Leadership’s (C-Suite) Role in Staying Informed and Ensuring the Right Investment is in place to comply with the Critical Infrastructure Risk Management Program (CIRMP) requirements]]>
                </title>
                <pubDate>Fri, 07 Jun 2024 16:00:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1757797</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-261-deep-dive-thomas-fikentscher-the-executive-leaderships-c-suite-role-in-staying-informed-and-ensuring-the-right-investment-is-in-place-to-comply-with-the-critical-infrastructure-risk</link>
                                <description>
                                            <![CDATA[<p>In this episode, we’re joined by Thomas Fikentscher, Area Vice President ANZ from CyberArk, as we delve into the critical topic of effective communication in the context of government concerns and cybersecurity risks for businesses. With a focus on the evolving landscape of legislation and compliance, Thomas shares invaluable insights on the proactive strategies, challenges, and collaboration needed for organizations to navigate and implement robust security architectures and risk management programs. Join us as we explore the complexities, uncertainties, and promising developments in this crucial area of business operations.</p>
<p style="font-weight:400;">Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk’s emerging cloud business in the region.</p>
<p style="font-weight:400;">Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years’ experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience – particularly in the cloud domain – has been invaluable to CyberArk, helping grow demand for Identity Security solutions.</p>
<p style="font-weight:400;">When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we’re joined by Thomas Fikentscher, Area Vice President ANZ from CyberArk, as we delve into the critical topic of effective communication in the context of government concerns and cybersecurity risks for businesses. With a focus on the evolving landscape of legislation and compliance, Thomas shares invaluable insights on the proactive strategies, challenges, and collaboration needed for organizations to navigate and implement robust security architectures and risk management programs. Join us as we explore the complexities, uncertainties, and promising developments in this crucial area of business operations.
Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk’s emerging cloud business in the region.
Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years’ experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience – particularly in the cloud domain – has been invaluable to CyberArk, helping grow demand for Identity Security solutions.
When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 261 Deep Dive: Thomas Fikentscher | The Executive Leadership’s (C-Suite) Role in Staying Informed and Ensuring the Right Investment is in place to comply with the Critical Infrastructure Risk Management Program (CIRMP) requirements]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we’re joined by Thomas Fikentscher, Area Vice President ANZ from CyberArk, as we delve into the critical topic of effective communication in the context of government concerns and cybersecurity risks for businesses. With a focus on the evolving landscape of legislation and compliance, Thomas shares invaluable insights on the proactive strategies, challenges, and collaboration needed for organizations to navigate and implement robust security architectures and risk management programs. Join us as we explore the complexities, uncertainties, and promising developments in this crucial area of business operations.</p>
<p style="font-weight:400;">Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk’s emerging cloud business in the region.</p>
<p style="font-weight:400;">Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years’ experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience – particularly in the cloud domain – has been invaluable to CyberArk, helping grow demand for Identity Security solutions.</p>
<p style="font-weight:400;">When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1757797/c1e-pjr0h5w06damo9x2-60kgqvg0c3xm-n7w4y6.mp3" length="32381850"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we’re joined by Thomas Fikentscher, Area Vice President ANZ from CyberArk, as we delve into the critical topic of effective communication in the context of government concerns and cybersecurity risks for businesses. With a focus on the evolving landscape of legislation and compliance, Thomas shares invaluable insights on the proactive strategies, challenges, and collaboration needed for organizations to navigate and implement robust security architectures and risk management programs. Join us as we explore the complexities, uncertainties, and promising developments in this crucial area of business operations.
Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk’s emerging cloud business in the region.
Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years’ experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience – particularly in the cloud domain – has been invaluable to CyberArk, helping grow demand for Identity Security solutions.
When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1757797/c1a-5k0v-92483d1ghpxp-mvw3mj.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 260 Deep Dive: Christina Arcane | Guiding Your Cyber Champions with Cyber Risk Education]]>
                </title>
                <pubDate>Wed, 05 Jun 2024 16:00:25 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1756796</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-260-deep-dive-christina-arcane-guiding-your-cyber-champions-with-cyber-risk-education</link>
                                <description>
                                            <![CDATA[<p>In this episode, Christina Arcane, Director from Inspire Cyber, sits down with us to discuss the crucial topic of cybersecurity awareness and training. She discusses the importance of aligning training with an organization’s brand and culture, distinguishing between cyber risk and awareness, and the challenges in effectively engaging employees in training. The conversation covers a wide range of issues, such as the need for comprehensive, personalized training, the impact of poorly executed online modules, and the critical role of engaging and effective delivery in cybersecurity training. Tune in to gain valuable insights into cybersecurity training strategies and the importance of driving behavioral change across organizations.</p>
<p>For her entire cyber security career Christina has been translating cyber security concepts and providing high quality awareness and training to all roles – from the company graduates right up to the board.</p>
<p>With a wide range of experiences across financial services and technology industries, working with startups, SMB’s and large multinational organisations, Christina has built a career on the intersection of cyber threats, risk and business objectives. In 2016 she co-founded cyber security SaaS startup <em>BreachAware</em>, leading its operations right through to acquisition in 2020. Recently she dived back into the world of entrepreneurship to reimagine security awareness offerings and provide her expertise through her new company, Inspire Cyber.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Christina Arcane, Director from Inspire Cyber, sits down with us to discuss the crucial topic of cybersecurity awareness and training. She discusses the importance of aligning training with an organization’s brand and culture, distinguishing between cyber risk and awareness, and the challenges in effectively engaging employees in training. The conversation covers a wide range of issues, such as the need for comprehensive, personalized training, the impact of poorly executed online modules, and the critical role of engaging and effective delivery in cybersecurity training. Tune in to gain valuable insights into cybersecurity training strategies and the importance of driving behavioral change across organizations.
For her entire cyber security career Christina has been translating cyber security concepts and providing high quality awareness and training to all roles – from the company graduates right up to the board.
With a wide range of experiences across financial services and technology industries, working with startups, SMB’s and large multinational organisations, Christina has built a career on the intersection of cyber threats, risk and business objectives. In 2016 she co-founded cyber security SaaS startup BreachAware, leading its operations right through to acquisition in 2020. Recently she dived back into the world of entrepreneurship to reimagine security awareness offerings and provide her expertise through her new company, Inspire Cyber.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 260 Deep Dive: Christina Arcane | Guiding Your Cyber Champions with Cyber Risk Education]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Christina Arcane, Director from Inspire Cyber, sits down with us to discuss the crucial topic of cybersecurity awareness and training. She discusses the importance of aligning training with an organization’s brand and culture, distinguishing between cyber risk and awareness, and the challenges in effectively engaging employees in training. The conversation covers a wide range of issues, such as the need for comprehensive, personalized training, the impact of poorly executed online modules, and the critical role of engaging and effective delivery in cybersecurity training. Tune in to gain valuable insights into cybersecurity training strategies and the importance of driving behavioral change across organizations.</p>
<p>For her entire cyber security career Christina has been translating cyber security concepts and providing high quality awareness and training to all roles – from the company graduates right up to the board.</p>
<p>With a wide range of experiences across financial services and technology industries, working with startups, SMB’s and large multinational organisations, Christina has built a career on the intersection of cyber threats, risk and business objectives. In 2016 she co-founded cyber security SaaS startup <em>BreachAware</em>, leading its operations right through to acquisition in 2020. Recently she dived back into the world of entrepreneurship to reimagine security awareness offerings and provide her expertise through her new company, Inspire Cyber.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1756796/c1e-d5v7a6or0qcpd4g2-60kmvv5qsnww-4xxzsu.mp3" length="44561599"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Christina Arcane, Director from Inspire Cyber, sits down with us to discuss the crucial topic of cybersecurity awareness and training. She discusses the importance of aligning training with an organization’s brand and culture, distinguishing between cyber risk and awareness, and the challenges in effectively engaging employees in training. The conversation covers a wide range of issues, such as the need for comprehensive, personalized training, the impact of poorly executed online modules, and the critical role of engaging and effective delivery in cybersecurity training. Tune in to gain valuable insights into cybersecurity training strategies and the importance of driving behavioral change across organizations.
For her entire cyber security career Christina has been translating cyber security concepts and providing high quality awareness and training to all roles – from the company graduates right up to the board.
With a wide range of experiences across financial services and technology industries, working with startups, SMB’s and large multinational organisations, Christina has built a career on the intersection of cyber threats, risk and business objectives. In 2016 she co-founded cyber security SaaS startup BreachAware, leading its operations right through to acquisition in 2020. Recently she dived back into the world of entrepreneurship to reimagine security awareness offerings and provide her expertise through her new company, Inspire Cyber.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1756796/c1a-5k0v-33zr181qh3dz-ouat2j.jpg"></itunes:image>
                                                                            <itunes:duration>00:46:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 259 Deep Dive: Dima Postnikov | Why Digital ID is Changing How We Think About Fraud Prevention and Defence]]>
                </title>
                <pubDate>Fri, 31 May 2024 16:00:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1752282</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-259-deep-dive-dima-postnikov-why-digital-id-is-changing-how-we-think-about-fraud-prevention-and-defence</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sat down with Dima Postnikov (Head of Identity Strategy and Architecture – ConnectID) as we explore the challenges and potential of digital identity technologies in Australia. From fraud prevention to data privacy, Dima discusses the complexities and opportunities in the evolving landscape of digital identities, shedding light on the importance of trust, security, and consumer education.</p>
<p>Dima is an identity industry leader 20+ years of experience who is influential in the advancement of digital identity ecosystems globally.</p>
<p>Dima has a passion for digital identity, open banking and trust ecosystem design, having spent the last 10+ years focused on architecture, design and implementation of the technology platforms that underpin online systems of Commonwealth Bank of Australia (CBA), Westpac and Australian Securities Exchange (ASX).</p>
<p>Dima has significant technical experience in developing customer identity solutions in the areas of identity proofing, authentication, authorisation, application and API security, Digital identity, Open Banking.</p>
<p>As an active member of standard and industry organisations globally, Dima has been heavily involved with OpenID Foundation, IDPro, Trust Over IP, FIDO, Kantara and Open Wallet Foundation and ISO.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sat down with Dima Postnikov (Head of Identity Strategy and Architecture – ConnectID) as we explore the challenges and potential of digital identity technologies in Australia. From fraud prevention to data privacy, Dima discusses the complexities and opportunities in the evolving landscape of digital identities, shedding light on the importance of trust, security, and consumer education.
Dima is an identity industry leader 20+ years of experience who is influential in the advancement of digital identity ecosystems globally.
Dima has a passion for digital identity, open banking and trust ecosystem design, having spent the last 10+ years focused on architecture, design and implementation of the technology platforms that underpin online systems of Commonwealth Bank of Australia (CBA), Westpac and Australian Securities Exchange (ASX).
Dima has significant technical experience in developing customer identity solutions in the areas of identity proofing, authentication, authorisation, application and API security, Digital identity, Open Banking.
As an active member of standard and industry organisations globally, Dima has been heavily involved with OpenID Foundation, IDPro, Trust Over IP, FIDO, Kantara and Open Wallet Foundation and ISO.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 259 Deep Dive: Dima Postnikov | Why Digital ID is Changing How We Think About Fraud Prevention and Defence]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sat down with Dima Postnikov (Head of Identity Strategy and Architecture – ConnectID) as we explore the challenges and potential of digital identity technologies in Australia. From fraud prevention to data privacy, Dima discusses the complexities and opportunities in the evolving landscape of digital identities, shedding light on the importance of trust, security, and consumer education.</p>
<p>Dima is an identity industry leader 20+ years of experience who is influential in the advancement of digital identity ecosystems globally.</p>
<p>Dima has a passion for digital identity, open banking and trust ecosystem design, having spent the last 10+ years focused on architecture, design and implementation of the technology platforms that underpin online systems of Commonwealth Bank of Australia (CBA), Westpac and Australian Securities Exchange (ASX).</p>
<p>Dima has significant technical experience in developing customer identity solutions in the areas of identity proofing, authentication, authorisation, application and API security, Digital identity, Open Banking.</p>
<p>As an active member of standard and industry organisations globally, Dima has been heavily involved with OpenID Foundation, IDPro, Trust Over IP, FIDO, Kantara and Open Wallet Foundation and ISO.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1752282/c1e-x8jpim9z8zsn7wz4-924xg1pjad8n-p0rgvy.mp3" length="34198719"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sat down with Dima Postnikov (Head of Identity Strategy and Architecture – ConnectID) as we explore the challenges and potential of digital identity technologies in Australia. From fraud prevention to data privacy, Dima discusses the complexities and opportunities in the evolving landscape of digital identities, shedding light on the importance of trust, security, and consumer education.
Dima is an identity industry leader 20+ years of experience who is influential in the advancement of digital identity ecosystems globally.
Dima has a passion for digital identity, open banking and trust ecosystem design, having spent the last 10+ years focused on architecture, design and implementation of the technology platforms that underpin online systems of Commonwealth Bank of Australia (CBA), Westpac and Australian Securities Exchange (ASX).
Dima has significant technical experience in developing customer identity solutions in the areas of identity proofing, authentication, authorisation, application and API security, Digital identity, Open Banking.
As an active member of standard and industry organisations globally, Dima has been heavily involved with OpenID Foundation, IDPro, Trust Over IP, FIDO, Kantara and Open Wallet Foundation and ISO.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1752282/c1a-5k0v-33zj591xu5v2-blmovn.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 258 Deep Dive: Aaron Bugal | Addressing Cybersecurity Burnout]]>
                </title>
                <pubDate>Fri, 24 May 2024 16:00:01 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1748597</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-258-deep-dive-aaron-bugal-addressing-cybersecurity-burnout</link>
                                <description>
                                            <![CDATA[<p>In this episode, we’re joined by Aaron Bugal (Field Chief Technology Officer – APJ for Sophos) as he delves into the crucial yet often overlooked topic of burnout in the cybersecurity industry. We  explore how burnout and apathy can contribute to major breaches, stressing the need for organizations to support their cybersecurity professionals effectively. From the impact of the pandemic to the prevalence of lip service in the industry, Aaron shares insights on improving mental health support, fostering a positive cybersecurity culture, and the significance of addressing burnout for a more resilient defense against cyber threats.</p>
<p>With close to 18 years experience at Sophos, and over 20 years in the cybersecurity industry, Aaron Bugal has spent his time helping organisations throughout Asia Pacific and Japan effectively understand and deploy strong cybersecurity measures to keep their business safe.</p>
<p>As Field Chief Technology Officer for APJ, he is able to flawlessly articulate to business leaders, partners, and companies the ever evolving cybersecurity landscape and emerging cyber threats.</p>
<p>His humorous demeanour and witty analogies has shined in discussions with a range of media, conferences, and events, where he provides practical insights for both business and consumers audiences to take on board.</p>
<p>Read the report <a href="https://www.sophos.com/en-us/whitepaper/the-future-of-cybersecurity-in-apj-edition">here</a>.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we’re joined by Aaron Bugal (Field Chief Technology Officer – APJ for Sophos) as he delves into the crucial yet often overlooked topic of burnout in the cybersecurity industry. We  explore how burnout and apathy can contribute to major breaches, stressing the need for organizations to support their cybersecurity professionals effectively. From the impact of the pandemic to the prevalence of lip service in the industry, Aaron shares insights on improving mental health support, fostering a positive cybersecurity culture, and the significance of addressing burnout for a more resilient defense against cyber threats.
With close to 18 years experience at Sophos, and over 20 years in the cybersecurity industry, Aaron Bugal has spent his time helping organisations throughout Asia Pacific and Japan effectively understand and deploy strong cybersecurity measures to keep their business safe.
As Field Chief Technology Officer for APJ, he is able to flawlessly articulate to business leaders, partners, and companies the ever evolving cybersecurity landscape and emerging cyber threats.
His humorous demeanour and witty analogies has shined in discussions with a range of media, conferences, and events, where he provides practical insights for both business and consumers audiences to take on board.
Read the report here.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 258 Deep Dive: Aaron Bugal | Addressing Cybersecurity Burnout]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we’re joined by Aaron Bugal (Field Chief Technology Officer – APJ for Sophos) as he delves into the crucial yet often overlooked topic of burnout in the cybersecurity industry. We  explore how burnout and apathy can contribute to major breaches, stressing the need for organizations to support their cybersecurity professionals effectively. From the impact of the pandemic to the prevalence of lip service in the industry, Aaron shares insights on improving mental health support, fostering a positive cybersecurity culture, and the significance of addressing burnout for a more resilient defense against cyber threats.</p>
<p>With close to 18 years experience at Sophos, and over 20 years in the cybersecurity industry, Aaron Bugal has spent his time helping organisations throughout Asia Pacific and Japan effectively understand and deploy strong cybersecurity measures to keep their business safe.</p>
<p>As Field Chief Technology Officer for APJ, he is able to flawlessly articulate to business leaders, partners, and companies the ever evolving cybersecurity landscape and emerging cyber threats.</p>
<p>His humorous demeanour and witty analogies has shined in discussions with a range of media, conferences, and events, where he provides practical insights for both business and consumers audiences to take on board.</p>
<p>Read the report <a href="https://www.sophos.com/en-us/whitepaper/the-future-of-cybersecurity-in-apj-edition">here</a>.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1748597/c1e-rdnmsjwk3ju2kwq0-zo5mgkoocgmj-muc9tq.mp3" length="38869831"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we’re joined by Aaron Bugal (Field Chief Technology Officer – APJ for Sophos) as he delves into the crucial yet often overlooked topic of burnout in the cybersecurity industry. We  explore how burnout and apathy can contribute to major breaches, stressing the need for organizations to support their cybersecurity professionals effectively. From the impact of the pandemic to the prevalence of lip service in the industry, Aaron shares insights on improving mental health support, fostering a positive cybersecurity culture, and the significance of addressing burnout for a more resilient defense against cyber threats.
With close to 18 years experience at Sophos, and over 20 years in the cybersecurity industry, Aaron Bugal has spent his time helping organisations throughout Asia Pacific and Japan effectively understand and deploy strong cybersecurity measures to keep their business safe.
As Field Chief Technology Officer for APJ, he is able to flawlessly articulate to business leaders, partners, and companies the ever evolving cybersecurity landscape and emerging cyber threats.
His humorous demeanour and witty analogies has shined in discussions with a range of media, conferences, and events, where he provides practical insights for both business and consumers audiences to take on board.
Read the report here.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1748597/c1a-5k0v-o8725j62t1vo-tdlntd.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 257 Deep Dive: Min Livanidis | Shaping Responsible AI Policy]]>
                </title>
                <pubDate>Wed, 22 May 2024 16:00:42 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1745607</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-257-deep-dive-min-livanidis-shaping-responsible-ai-policy</link>
                                <description>
                                            <![CDATA[<p>In this episode, we sat down with Min Livanidis – Head of Digital Trust, Cyber, and Data Policy, AWS ANZ, as she provides insights into the intersection of AI, cybersecurity, and public policy, emphasizing their impact on society. From Australia’s cybersecurity strategy to responsible AI policies, we explore the collaborative nature of policy development, the role of diverse perspectives, and the potential for individuals to influence change.</p>
<p style="font-weight:400;">Min Livanidis leads AWS public policy across some of Australia’s most pressing technology areas, including cybersecurity, artificial intelligence, and critical infrastructure. Min lead AWS’s collaboration with the government during the development of the 2023-2030 Cybersecurity Strategy. She is currently leading AWS’s engagement around safe and responsible AI in Australia, working closely with Minister Ed Husic and industry to develop best practice regulation frameworks. In 2023 she appeared at the Senate Inquiry for the use of Generative AI in the Australia Education Sector. Min regularly engages with the most senior level of government on key policy areas including AI, cybersecurity, privacy, data and digitization strategy, electronic surveillance, critical and emerging technology, and critical infrastructure.</p>
<p style="font-weight:400;">Outside AWS, she is Non-Executive Director of the Oceania Cyber Security Centre, a registered charity developed in partnership with the eight Victorian universities, the Victorian Government, and Oxford University to deliver cyber maturity assessments for Pacific Island nations; Non-Executive Director of the Australian Cyber Collaboration Centre, established by the South Australian Government with a focus on domestic cyber capacity building and home to key partnerships with the MITRE Corporation and NATO; and an Industry Professor with the School of Information Technology at Deakin University, affiliated with the Centre for Cyber Resilience and Trust (CREST).</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we sat down with Min Livanidis – Head of Digital Trust, Cyber, and Data Policy, AWS ANZ, as she provides insights into the intersection of AI, cybersecurity, and public policy, emphasizing their impact on society. From Australia’s cybersecurity strategy to responsible AI policies, we explore the collaborative nature of policy development, the role of diverse perspectives, and the potential for individuals to influence change.
Min Livanidis leads AWS public policy across some of Australia’s most pressing technology areas, including cybersecurity, artificial intelligence, and critical infrastructure. Min lead AWS’s collaboration with the government during the development of the 2023-2030 Cybersecurity Strategy. She is currently leading AWS’s engagement around safe and responsible AI in Australia, working closely with Minister Ed Husic and industry to develop best practice regulation frameworks. In 2023 she appeared at the Senate Inquiry for the use of Generative AI in the Australia Education Sector. Min regularly engages with the most senior level of government on key policy areas including AI, cybersecurity, privacy, data and digitization strategy, electronic surveillance, critical and emerging technology, and critical infrastructure.
Outside AWS, she is Non-Executive Director of the Oceania Cyber Security Centre, a registered charity developed in partnership with the eight Victorian universities, the Victorian Government, and Oxford University to deliver cyber maturity assessments for Pacific Island nations; Non-Executive Director of the Australian Cyber Collaboration Centre, established by the South Australian Government with a focus on domestic cyber capacity building and home to key partnerships with the MITRE Corporation and NATO; and an Industry Professor with the School of Information Technology at Deakin University, affiliated with the Centre for Cyber Resilience and Trust (CREST).
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 257 Deep Dive: Min Livanidis | Shaping Responsible AI Policy]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we sat down with Min Livanidis – Head of Digital Trust, Cyber, and Data Policy, AWS ANZ, as she provides insights into the intersection of AI, cybersecurity, and public policy, emphasizing their impact on society. From Australia’s cybersecurity strategy to responsible AI policies, we explore the collaborative nature of policy development, the role of diverse perspectives, and the potential for individuals to influence change.</p>
<p style="font-weight:400;">Min Livanidis leads AWS public policy across some of Australia’s most pressing technology areas, including cybersecurity, artificial intelligence, and critical infrastructure. Min lead AWS’s collaboration with the government during the development of the 2023-2030 Cybersecurity Strategy. She is currently leading AWS’s engagement around safe and responsible AI in Australia, working closely with Minister Ed Husic and industry to develop best practice regulation frameworks. In 2023 she appeared at the Senate Inquiry for the use of Generative AI in the Australia Education Sector. Min regularly engages with the most senior level of government on key policy areas including AI, cybersecurity, privacy, data and digitization strategy, electronic surveillance, critical and emerging technology, and critical infrastructure.</p>
<p style="font-weight:400;">Outside AWS, she is Non-Executive Director of the Oceania Cyber Security Centre, a registered charity developed in partnership with the eight Victorian universities, the Victorian Government, and Oxford University to deliver cyber maturity assessments for Pacific Island nations; Non-Executive Director of the Australian Cyber Collaboration Centre, established by the South Australian Government with a focus on domestic cyber capacity building and home to key partnerships with the MITRE Corporation and NATO; and an Industry Professor with the School of Information Technology at Deakin University, affiliated with the Centre for Cyber Resilience and Trust (CREST).</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1745607/c1e-7km5b499x6ad6vxn-1xnq9dqws8qz-wlv4je.mp3" length="42604296"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we sat down with Min Livanidis – Head of Digital Trust, Cyber, and Data Policy, AWS ANZ, as she provides insights into the intersection of AI, cybersecurity, and public policy, emphasizing their impact on society. From Australia’s cybersecurity strategy to responsible AI policies, we explore the collaborative nature of policy development, the role of diverse perspectives, and the potential for individuals to influence change.
Min Livanidis leads AWS public policy across some of Australia’s most pressing technology areas, including cybersecurity, artificial intelligence, and critical infrastructure. Min lead AWS’s collaboration with the government during the development of the 2023-2030 Cybersecurity Strategy. She is currently leading AWS’s engagement around safe and responsible AI in Australia, working closely with Minister Ed Husic and industry to develop best practice regulation frameworks. In 2023 she appeared at the Senate Inquiry for the use of Generative AI in the Australia Education Sector. Min regularly engages with the most senior level of government on key policy areas including AI, cybersecurity, privacy, data and digitization strategy, electronic surveillance, critical and emerging technology, and critical infrastructure.
Outside AWS, she is Non-Executive Director of the Oceania Cyber Security Centre, a registered charity developed in partnership with the eight Victorian universities, the Victorian Government, and Oxford University to deliver cyber maturity assessments for Pacific Island nations; Non-Executive Director of the Australian Cyber Collaboration Centre, established by the South Australian Government with a focus on domestic cyber capacity building and home to key partnerships with the MITRE Corporation and NATO; and an Industry Professor with the School of Information Technology at Deakin University, affiliated with the Centre for Cyber Resilience and Trust (CREST).
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1745607/c1a-5k0v-mq82zp32h67w-jjwbfh.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 256 Deep Dive: Andre Durand | Verify More, Trust Less]]>
                </title>
                <pubDate>Wed, 15 May 2024 16:00:03 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1741949</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-256-deep-dive-andre-durand-verify-more-trust-less</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Andre Durand, CEO and founder of Ping Identity, as we explore the need to shift from “trust” to “verify” in today’s interconnected digital world. Andre dives into the complexities and challenges of this shift, discussing the implications for security, user experience, and the ongoing battle against fraud. From balancing security with user convenience to the importance of quantifying security investments, this episode provides valuable insights into the evolving landscape of digital verification.</p>
<p>Founded in 2002, Ping Identity has become a leading provider of enterprise identity security, serving more than half of the Fortune 100 and protecting more than 3 billion identities worldwide. In 2016, Ping Identity was acquired by Vista Equity Partners and in 2019, became the first Vista company to IPO on the New York Stock Exchange, trading under the symbol PING. In 2022, Thoma Bravo acquired PING and took the company private for US$2.8B. Prior to Ping Identity, Durand founded Jabber to commercialise the Jabber open source instant messaging platform which was acquired by Cisco in 2008.</p>
<p>Durand serves on the board of Jamf (NASDAQ: JAMF) and in his spare time focuses on causes related to children in the foster care system, building great culture and creating opportunities for entrepreneurs. Durand holds a BA in Biology and Economics from the University of California at Santa Barbara and lives in Denver, Colorado, with his wife Kim and two daughters.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Andre Durand, CEO and founder of Ping Identity, as we explore the need to shift from “trust” to “verify” in today’s interconnected digital world. Andre dives into the complexities and challenges of this shift, discussing the implications for security, user experience, and the ongoing battle against fraud. From balancing security with user convenience to the importance of quantifying security investments, this episode provides valuable insights into the evolving landscape of digital verification.
Founded in 2002, Ping Identity has become a leading provider of enterprise identity security, serving more than half of the Fortune 100 and protecting more than 3 billion identities worldwide. In 2016, Ping Identity was acquired by Vista Equity Partners and in 2019, became the first Vista company to IPO on the New York Stock Exchange, trading under the symbol PING. In 2022, Thoma Bravo acquired PING and took the company private for US$2.8B. Prior to Ping Identity, Durand founded Jabber to commercialise the Jabber open source instant messaging platform which was acquired by Cisco in 2008.
Durand serves on the board of Jamf (NASDAQ: JAMF) and in his spare time focuses on causes related to children in the foster care system, building great culture and creating opportunities for entrepreneurs. Durand holds a BA in Biology and Economics from the University of California at Santa Barbara and lives in Denver, Colorado, with his wife Kim and two daughters.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 256 Deep Dive: Andre Durand | Verify More, Trust Less]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Andre Durand, CEO and founder of Ping Identity, as we explore the need to shift from “trust” to “verify” in today’s interconnected digital world. Andre dives into the complexities and challenges of this shift, discussing the implications for security, user experience, and the ongoing battle against fraud. From balancing security with user convenience to the importance of quantifying security investments, this episode provides valuable insights into the evolving landscape of digital verification.</p>
<p>Founded in 2002, Ping Identity has become a leading provider of enterprise identity security, serving more than half of the Fortune 100 and protecting more than 3 billion identities worldwide. In 2016, Ping Identity was acquired by Vista Equity Partners and in 2019, became the first Vista company to IPO on the New York Stock Exchange, trading under the symbol PING. In 2022, Thoma Bravo acquired PING and took the company private for US$2.8B. Prior to Ping Identity, Durand founded Jabber to commercialise the Jabber open source instant messaging platform which was acquired by Cisco in 2008.</p>
<p>Durand serves on the board of Jamf (NASDAQ: JAMF) and in his spare time focuses on causes related to children in the foster care system, building great culture and creating opportunities for entrepreneurs. Durand holds a BA in Biology and Economics from the University of California at Santa Barbara and lives in Denver, Colorado, with his wife Kim and two daughters.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1741949/c1e-d5v7a6mw66bpd4g2-k5m39oonu701-vhve7c.mp3" length="39701987"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Andre Durand, CEO and founder of Ping Identity, as we explore the need to shift from “trust” to “verify” in today’s interconnected digital world. Andre dives into the complexities and challenges of this shift, discussing the implications for security, user experience, and the ongoing battle against fraud. From balancing security with user convenience to the importance of quantifying security investments, this episode provides valuable insights into the evolving landscape of digital verification.
Founded in 2002, Ping Identity has become a leading provider of enterprise identity security, serving more than half of the Fortune 100 and protecting more than 3 billion identities worldwide. In 2016, Ping Identity was acquired by Vista Equity Partners and in 2019, became the first Vista company to IPO on the New York Stock Exchange, trading under the symbol PING. In 2022, Thoma Bravo acquired PING and took the company private for US$2.8B. Prior to Ping Identity, Durand founded Jabber to commercialise the Jabber open source instant messaging platform which was acquired by Cisco in 2008.
Durand serves on the board of Jamf (NASDAQ: JAMF) and in his spare time focuses on causes related to children in the foster care system, building great culture and creating opportunities for entrepreneurs. Durand holds a BA in Biology and Economics from the University of California at Santa Barbara and lives in Denver, Colorado, with his wife Kim and two daughters.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1741949/c1a-5k0v-33zv75j5t5wg-ayedgf.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 255 Deep Dive: Jason Baden | Simplifying API Security: The Impact and Evolution of Secure Application Development]]>
                </title>
                <pubDate>Wed, 08 May 2024 16:00:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1736351</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-255-deep-dive-jason-baden-simplifying-api-security-the-impact-and-evolution-of-secure-application-development</link>
                                <description>
                                            <![CDATA[<p>In this episode, we’re joined by Jason Baden (Regional Vice President – F5) as he shares his insights on the evolving landscape of cybersecurity,  simplifying API security, and the critical need for education around security spending. Jason also discusses the challenges and opportunities in API security, the impact of security spending on businesses, and the growing collaboration between developers and security professionals.</p>
<p>Jason has almost 20 years’ experience as a senior executive in the IT and telecommunications industry. Prior to joining F5, he was Country Manager at Ruckus Networks and was responsible for leading the ANZ team strategy, as well as the smooth integration of ARRIS following its acquisition of Ruckus Networks. He has also previously held roles at Juniper Networks, AXS-One, Airwide Solutions, and Optus.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we’re joined by Jason Baden (Regional Vice President – F5) as he shares his insights on the evolving landscape of cybersecurity,  simplifying API security, and the critical need for education around security spending. Jason also discusses the challenges and opportunities in API security, the impact of security spending on businesses, and the growing collaboration between developers and security professionals.
Jason has almost 20 years’ experience as a senior executive in the IT and telecommunications industry. Prior to joining F5, he was Country Manager at Ruckus Networks and was responsible for leading the ANZ team strategy, as well as the smooth integration of ARRIS following its acquisition of Ruckus Networks. He has also previously held roles at Juniper Networks, AXS-One, Airwide Solutions, and Optus.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 255 Deep Dive: Jason Baden | Simplifying API Security: The Impact and Evolution of Secure Application Development]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we’re joined by Jason Baden (Regional Vice President – F5) as he shares his insights on the evolving landscape of cybersecurity,  simplifying API security, and the critical need for education around security spending. Jason also discusses the challenges and opportunities in API security, the impact of security spending on businesses, and the growing collaboration between developers and security professionals.</p>
<p>Jason has almost 20 years’ experience as a senior executive in the IT and telecommunications industry. Prior to joining F5, he was Country Manager at Ruckus Networks and was responsible for leading the ANZ team strategy, as well as the smooth integration of ARRIS following its acquisition of Ruckus Networks. He has also previously held roles at Juniper Networks, AXS-One, Airwide Solutions, and Optus.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1736351/c1e-901kfnnrpkbdv65n-p8dkkkg2c5k5-ff6vjs.mp3" length="34433194"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we’re joined by Jason Baden (Regional Vice President – F5) as he shares his insights on the evolving landscape of cybersecurity,  simplifying API security, and the critical need for education around security spending. Jason also discusses the challenges and opportunities in API security, the impact of security spending on businesses, and the growing collaboration between developers and security professionals.
Jason has almost 20 years’ experience as a senior executive in the IT and telecommunications industry. Prior to joining F5, he was Country Manager at Ruckus Networks and was responsible for leading the ANZ team strategy, as well as the smooth integration of ARRIS following its acquisition of Ruckus Networks. He has also previously held roles at Juniper Networks, AXS-One, Airwide Solutions, and Optus.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1736351/c1a-5k0v-49v77q9gh652-njnxxp.png"></itunes:image>
                                                                            <itunes:duration>00:35:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: Insights from the AWS Summit Sydney]]>
                </title>
                <pubDate>Mon, 06 May 2024 16:00:00 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1735351</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-insights-from-the-aws-summit-sydney</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is on the go at the 2024 AWS Summit Sydney where she sits down for a quickfire interview with AWS experts Min Livanidis (Head of Digital Trust, Cyber, and Data Policy) and Phil Rodrigues (Global Head of Customer Security Outcomes, Global Services Security) to get their insights on hot topics in the media and cyber space.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is on the go at the 2024 AWS Summit Sydney where she sits down for a quickfire interview with AWS experts Min Livanidis (Head of Digital Trust, Cyber, and Data Policy) and Phil Rodrigues (Global Head of Customer Security Outcomes, Global Services Security) to get their insights on hot topics in the media and cyber space.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: Insights from the AWS Summit Sydney]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is on the go at the 2024 AWS Summit Sydney where she sits down for a quickfire interview with AWS experts Min Livanidis (Head of Digital Trust, Cyber, and Data Policy) and Phil Rodrigues (Global Head of Customer Security Outcomes, Global Services Security) to get their insights on hot topics in the media and cyber space.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1735351/c1e-pjr0h55qgwamo9x2-7nqzk9v3izr6-wni8ht.mp3" length="26444322"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is on the go at the 2024 AWS Summit Sydney where she sits down for a quickfire interview with AWS experts Min Livanidis (Head of Digital Trust, Cyber, and Data Policy) and Phil Rodrigues (Global Head of Customer Security Outcomes, Global Services Security) to get their insights on hot topics in the media and cyber space.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1735351/c1a-5k0v-5r5zkq5rbv2n-fgqr5s.jpg"></itunes:image>
                                                                            <itunes:duration>00:27:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 254 Deep Dive: Bob Huber | Deep Fakes and Election Interference: Tackling the Threat of Manipulated Content]]>
                </title>
                <pubDate>Fri, 03 May 2024 16:00:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1732814</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-254-deep-dive-bob-huber-deep-fakes-and-election-interference-tackling-the-threat-of-manipulated-content</link>
                                <description>
                                            <![CDATA[<p>In this episode, we’re joined by Bob Huber (Chief Security Officer and Head of Research – Tenable) as he delves into the pressing issue of misinformation on social media. From the impact on critical situations like elections and natural disasters to the proliferation of deepfake technology, we explored the difficulty of discerning authentic content. Bob shared insights on the challenges of identifying and combating misinformation, emphasizing the need for international norms and proactive measures.</p>
<p>Robert Huber, Tenable’s chief security officer, head of research and president of Tenable Public Sector, LLC, oversees the company’s global security and research teams, working cross-functionally to reduce risk to the organization, its customers and the broader industry. He has more than 25 years of cyber security experience across the financial, defense, critical infrastructure and technology sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the U.S. Air Force and Air National Guard for more than 22 years. Before retiring in 2021, he provided offensive and defensive cyber capabilities supporting the National Security Agency (NSA), United States Cyber Command and state missions.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we’re joined by Bob Huber (Chief Security Officer and Head of Research – Tenable) as he delves into the pressing issue of misinformation on social media. From the impact on critical situations like elections and natural disasters to the proliferation of deepfake technology, we explored the difficulty of discerning authentic content. Bob shared insights on the challenges of identifying and combating misinformation, emphasizing the need for international norms and proactive measures.
Robert Huber, Tenable’s chief security officer, head of research and president of Tenable Public Sector, LLC, oversees the company’s global security and research teams, working cross-functionally to reduce risk to the organization, its customers and the broader industry. He has more than 25 years of cyber security experience across the financial, defense, critical infrastructure and technology sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the U.S. Air Force and Air National Guard for more than 22 years. Before retiring in 2021, he provided offensive and defensive cyber capabilities supporting the National Security Agency (NSA), United States Cyber Command and state missions.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 254 Deep Dive: Bob Huber | Deep Fakes and Election Interference: Tackling the Threat of Manipulated Content]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we’re joined by Bob Huber (Chief Security Officer and Head of Research – Tenable) as he delves into the pressing issue of misinformation on social media. From the impact on critical situations like elections and natural disasters to the proliferation of deepfake technology, we explored the difficulty of discerning authentic content. Bob shared insights on the challenges of identifying and combating misinformation, emphasizing the need for international norms and proactive measures.</p>
<p>Robert Huber, Tenable’s chief security officer, head of research and president of Tenable Public Sector, LLC, oversees the company’s global security and research teams, working cross-functionally to reduce risk to the organization, its customers and the broader industry. He has more than 25 years of cyber security experience across the financial, defense, critical infrastructure and technology sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the U.S. Air Force and Air National Guard for more than 22 years. Before retiring in 2021, he provided offensive and defensive cyber capabilities supporting the National Security Agency (NSA), United States Cyber Command and state missions.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1732814/c1e-o39rfvvnnot8n0xg-33z3x5kxipd-mo7esc.mp3" length="40412100"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we’re joined by Bob Huber (Chief Security Officer and Head of Research – Tenable) as he delves into the pressing issue of misinformation on social media. From the impact on critical situations like elections and natural disasters to the proliferation of deepfake technology, we explored the difficulty of discerning authentic content. Bob shared insights on the challenges of identifying and combating misinformation, emphasizing the need for international norms and proactive measures.
Robert Huber, Tenable’s chief security officer, head of research and president of Tenable Public Sector, LLC, oversees the company’s global security and research teams, working cross-functionally to reduce risk to the organization, its customers and the broader industry. He has more than 25 years of cyber security experience across the financial, defense, critical infrastructure and technology sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the U.S. Air Force and Air National Guard for more than 22 years. Before retiring in 2021, he provided offensive and defensive cyber capabilities supporting the National Security Agency (NSA), United States Cyber Command and state missions.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1732814/c1a-5k0v-7nqnrnrpcn6o-cjginh.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:06</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 253 Deep Dive: Mike Hanley | The Role of AI in Addressing Software Security Challenges]]>
                </title>
                <pubDate>Fri, 05 Apr 2024 16:37:21 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1712733</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-253-deep-dive-mike-hanley-the-role-of-ai-in-addressing-software-security-challenges</link>
                                <description>
                                            <![CDATA[<div>
<p class="f4-mktg col-6-max">Mike Hanley is the Chief Security Officer and SVP of Engineering at GitHub. Prior to GitHub, Mike was the Vice President of Security at Duo Security, where he built and led the security research, development, and operations functions. After Duo’s acquisition by Cisco for $2.35 billion in 2018, Mike led the transformation of Cisco’s cloud security framework and later served as CISO for the company. Mike also spent several years at CERT/CC as a Senior Member of the Technical Staff and security researcher focused on applied R&amp;D programs for the US Department of Defense and the Intelligence Community. When he’s not talking about security at GitHub, Mike can be found enjoying Ann Arbor, MI with his wife and eight kids.</p>
</div>
<div></div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Mike Hanley is the Chief Security Officer and SVP of Engineering at GitHub. Prior to GitHub, Mike was the Vice President of Security at Duo Security, where he built and led the security research, development, and operations functions. After Duo’s acquisition by Cisco for $2.35 billion in 2018, Mike led the transformation of Cisco’s cloud security framework and later served as CISO for the company. Mike also spent several years at CERT/CC as a Senior Member of the Technical Staff and security researcher focused on applied R&D programs for the US Department of Defense and the Intelligence Community. When he’s not talking about security at GitHub, Mike can be found enjoying Ann Arbor, MI with his wife and eight kids.


]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 253 Deep Dive: Mike Hanley | The Role of AI in Addressing Software Security Challenges]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div>
<p class="f4-mktg col-6-max">Mike Hanley is the Chief Security Officer and SVP of Engineering at GitHub. Prior to GitHub, Mike was the Vice President of Security at Duo Security, where he built and led the security research, development, and operations functions. After Duo’s acquisition by Cisco for $2.35 billion in 2018, Mike led the transformation of Cisco’s cloud security framework and later served as CISO for the company. Mike also spent several years at CERT/CC as a Senior Member of the Technical Staff and security researcher focused on applied R&amp;D programs for the US Department of Defense and the Intelligence Community. When he’s not talking about security at GitHub, Mike can be found enjoying Ann Arbor, MI with his wife and eight kids.</p>
</div>
<div></div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1712733/c1e-jjvwhq1djdun1k2x-1xn2qxdpi96v-og2bqx.mp3" length="38810480"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Mike Hanley is the Chief Security Officer and SVP of Engineering at GitHub. Prior to GitHub, Mike was the Vice President of Security at Duo Security, where he built and led the security research, development, and operations functions. After Duo’s acquisition by Cisco for $2.35 billion in 2018, Mike led the transformation of Cisco’s cloud security framework and later served as CISO for the company. Mike also spent several years at CERT/CC as a Senior Member of the Technical Staff and security researcher focused on applied R&D programs for the US Department of Defense and the Intelligence Community. When he’s not talking about security at GitHub, Mike can be found enjoying Ann Arbor, MI with his wife and eight kids.


]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1712733/c1a-5k0v-5r5q2rk5cx30-4jvsdg.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 252 Deep Dive: Mario Duarte | Navigating Cloud Complexity: The Evolution of Infrastructure]]>
                </title>
                <pubDate>Fri, 29 Mar 2024 16:00:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1705688</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-252-deep-dive-mario-duarte-navigating-cloud-complexity-the-evolution-of-infrastructure</link>
                                <description>
                                            <![CDATA[<p>Mario has 20 years of experience as a security professional working across the retail, healthcare, and financial sectors. He has built and managed security teams, developed and implemented security programs, and managed PCI and HIPAA compliance initiatives for medium and large organizations. He also currently serves as both an advisor and investor at Silicon Valley CISO Investments (SVCI) and SYN Ventures.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mario has 20 years of experience as a security professional working across the retail, healthcare, and financial sectors. He has built and managed security teams, developed and implemented security programs, and managed PCI and HIPAA compliance initiatives for medium and large organizations. He also currently serves as both an advisor and investor at Silicon Valley CISO Investments (SVCI) and SYN Ventures.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 252 Deep Dive: Mario Duarte | Navigating Cloud Complexity: The Evolution of Infrastructure]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mario has 20 years of experience as a security professional working across the retail, healthcare, and financial sectors. He has built and managed security teams, developed and implemented security programs, and managed PCI and HIPAA compliance initiatives for medium and large organizations. He also currently serves as both an advisor and investor at Silicon Valley CISO Investments (SVCI) and SYN Ventures.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1705688/c1e-7km5b42m9rhd6vxn-nj997gw2bdwk-bj5ofh.mp3" length="38293883"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mario has 20 years of experience as a security professional working across the retail, healthcare, and financial sectors. He has built and managed security teams, developed and implemented security programs, and managed PCI and HIPAA compliance initiatives for medium and large organizations. He also currently serves as both an advisor and investor at Silicon Valley CISO Investments (SVCI) and SYN Ventures.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1705688/c1a-5k0v-row13n7vsqz9-133611.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 251 Deep Dive: Mandy Andress | Charting the Path of AI Innovation and Security]]>
                </title>
                <pubDate>Wed, 27 Mar 2024 20:33:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1705650</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-251-deep-dive-mandy-andress-charting-the-path-of-ai-innovation-and-security</link>
                                <description>
                                            <![CDATA[<p>Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security. Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst &amp; Young and Deloitte &amp; Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune 100 companies to start up organizations.</p>
<p>She is a published author, with her book Surviving Security having two editions and used at multiple universities around the world as the textbook for foundation information security courses. Mandy also tested and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought-after expert in the field, speaking at signature security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level Information Risk Management course for UMass Amherst in the College of Information and Computer Sciences.</p>
<p>Mandy has a JD from Western New England University, a Master’s in Management Information Systems from Texas A&amp;M University, and a B.B.A in Accounting from Texas A&amp;M University. Mandy is a CISSP, CPA, and member of the Texas Bar.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security. Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst & Young and Deloitte & Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune 100 companies to start up organizations.
She is a published author, with her book Surviving Security having two editions and used at multiple universities around the world as the textbook for foundation information security courses. Mandy also tested and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought-after expert in the field, speaking at signature security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level Information Risk Management course for UMass Amherst in the College of Information and Computer Sciences.
Mandy has a JD from Western New England University, a Master’s in Management Information Systems from Texas A&M University, and a B.B.A in Accounting from Texas A&M University. Mandy is a CISSP, CPA, and member of the Texas Bar.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 251 Deep Dive: Mandy Andress | Charting the Path of AI Innovation and Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security. Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst &amp; Young and Deloitte &amp; Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune 100 companies to start up organizations.</p>
<p>She is a published author, with her book Surviving Security having two editions and used at multiple universities around the world as the textbook for foundation information security courses. Mandy also tested and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought-after expert in the field, speaking at signature security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level Information Risk Management course for UMass Amherst in the College of Information and Computer Sciences.</p>
<p>Mandy has a JD from Western New England University, a Master’s in Management Information Systems from Texas A&amp;M University, and a B.B.A in Accounting from Texas A&amp;M University. Mandy is a CISSP, CPA, and member of the Texas Bar.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1705650/c1e-n439h5123wh9z48n-v088mroqsjkd-4xhwvz.mp3" length="37120671"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security. Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst & Young and Deloitte & Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune 100 companies to start up organizations.
She is a published author, with her book Surviving Security having two editions and used at multiple universities around the world as the textbook for foundation information security courses. Mandy also tested and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought-after expert in the field, speaking at signature security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level Information Risk Management course for UMass Amherst in the College of Information and Computer Sciences.
Mandy has a JD from Western New England University, a Master’s in Management Information Systems from Texas A&M University, and a B.B.A in Accounting from Texas A&M University. Mandy is a CISSP, CPA, and member of the Texas Bar.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1705650/c1a-5k0v-o87nz9r3hwq7-wymwmq.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 250 Deep Dive: Mark Anderson | Unveiling The Microsoft Digital Defence Report: Cybercrime Trends and Critical Cybersecurity Challenges]]>
                </title>
                <pubDate>Fri, 22 Mar 2024 16:00:12 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1694304</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-250-deep-dive-mark-anderson-unveiling-the-microsoft-digital-defence-report-cybercrime-trends-and-critical-cybersecurity-challenges</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Mark Anderson (National Security Officer – Microsoft ANZ) as we discuss insights from the Microsoft Digital Defense Report, shedding light on the rise of cybercrime, the surge in sophisticated attacks, and the pressing need for enhanced cybersecurity capabilities across all business sizes.</p>
<p>From open source vulnerabilities to the significance of software bill of materials (SBOMs), this episode offers practical examples and advice on building robust cyber defenses. Join us as we navigate through the complexities of cybersecurity, uncovering how technology intersects with societal and business issues, and exploring the compelling data shaping the future of cybersecurity.</p>
<p>Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure,<br />
Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University</p>
<p>Take a look at the MDDR Report <a href="https://kbi.media/wp-content/uploads/2024/03/MDDR_FINAL_2023_1004.pdf">here</a>.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Mark Anderson (National Security Officer – Microsoft ANZ) as we discuss insights from the Microsoft Digital Defense Report, shedding light on the rise of cybercrime, the surge in sophisticated attacks, and the pressing need for enhanced cybersecurity capabilities across all business sizes.
From open source vulnerabilities to the significance of software bill of materials (SBOMs), this episode offers practical examples and advice on building robust cyber defenses. Join us as we navigate through the complexities of cybersecurity, uncovering how technology intersects with societal and business issues, and exploring the compelling data shaping the future of cybersecurity.
Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia & New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure,
Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University
Take a look at the MDDR Report here.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 250 Deep Dive: Mark Anderson | Unveiling The Microsoft Digital Defence Report: Cybercrime Trends and Critical Cybersecurity Challenges]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Mark Anderson (National Security Officer – Microsoft ANZ) as we discuss insights from the Microsoft Digital Defense Report, shedding light on the rise of cybercrime, the surge in sophisticated attacks, and the pressing need for enhanced cybersecurity capabilities across all business sizes.</p>
<p>From open source vulnerabilities to the significance of software bill of materials (SBOMs), this episode offers practical examples and advice on building robust cyber defenses. Join us as we navigate through the complexities of cybersecurity, uncovering how technology intersects with societal and business issues, and exploring the compelling data shaping the future of cybersecurity.</p>
<p>Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure,<br />
Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University</p>
<p>Take a look at the MDDR Report <a href="https://kbi.media/wp-content/uploads/2024/03/MDDR_FINAL_2023_1004.pdf">here</a>.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1694304/c1e-6wnpc2z3pghndopx-04mg0zw4ir5-yipac2.mp3" length="45369096"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Mark Anderson (National Security Officer – Microsoft ANZ) as we discuss insights from the Microsoft Digital Defense Report, shedding light on the rise of cybercrime, the surge in sophisticated attacks, and the pressing need for enhanced cybersecurity capabilities across all business sizes.
From open source vulnerabilities to the significance of software bill of materials (SBOMs), this episode offers practical examples and advice on building robust cyber defenses. Join us as we navigate through the complexities of cybersecurity, uncovering how technology intersects with societal and business issues, and exploring the compelling data shaping the future of cybersecurity.
Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia & New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure,
Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University
Take a look at the MDDR Report here.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1694304/c1a-5k0v-33zv7vd9aw3r-3hoqx6.png"></itunes:image>
                                                                            <itunes:duration>00:47:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 249 Deep Dive: Chris Cochran | Resonating Stories: The Power of Creativity and Authenticity in Cybersecurity]]>
                </title>
                <pubDate>Wed, 20 Mar 2024 16:00:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1692581</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-249-deep-dive-chris-cochran-resonating-stories-the-power-of-creativity-and-authenticity-in-cybersecurity</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Chris Cochran (Co-Founder and Chief Creative Officer – Hacker Valley Media), as we delve into the world of content creation in cybersecurity. We explore the power of authentic storytelling and creativity in content, and its potential to shape the cybersecurity industry.</p>
<p>Chris shares personal anecdotes, underlining the importance of diversity and inclusivity in this field, and advocates for a shift towards a more positive mindset.</p>
<p><span style="font-weight:400;">Chris Cochran is Hacker Valley Media’s co-founder/ Chief Creative Officer and the Advisory Chief Information Security Officer/ Chief Evangelist for Huntress Labs. Chris also serves on the Board of Governors for the Podcast Academy. He is a cybersecurity leader turned award-winning content creator and speaker, earning two Anthem Awards and one Webby nomination. Chris started his career in technology during his active duty service in the US Marine Corps as an intelligence analyst at the National Security Agency.</span></p>
<p><span style="font-weight:400;"><br />
</span><span style="font-weight:400;">Chris spent over a decade leading advanced cybersecurity and intelligence missions at organizations such as the US House of Representatives, US Cyber Command, Mandiant, Booz Allen Hamilton, United Technologies, and Netflix. His passion is finding and amplifying human stories in cybersecurity and technology to inspire and empower our community.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Chris Cochran (Co-Founder and Chief Creative Officer – Hacker Valley Media), as we delve into the world of content creation in cybersecurity. We explore the power of authentic storytelling and creativity in content, and its potential to shape the cybersecurity industry.
Chris shares personal anecdotes, underlining the importance of diversity and inclusivity in this field, and advocates for a shift towards a more positive mindset.
Chris Cochran is Hacker Valley Media’s co-founder/ Chief Creative Officer and the Advisory Chief Information Security Officer/ Chief Evangelist for Huntress Labs. Chris also serves on the Board of Governors for the Podcast Academy. He is a cybersecurity leader turned award-winning content creator and speaker, earning two Anthem Awards and one Webby nomination. Chris started his career in technology during his active duty service in the US Marine Corps as an intelligence analyst at the National Security Agency.

Chris spent over a decade leading advanced cybersecurity and intelligence missions at organizations such as the US House of Representatives, US Cyber Command, Mandiant, Booz Allen Hamilton, United Technologies, and Netflix. His passion is finding and amplifying human stories in cybersecurity and technology to inspire and empower our community.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 249 Deep Dive: Chris Cochran | Resonating Stories: The Power of Creativity and Authenticity in Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Chris Cochran (Co-Founder and Chief Creative Officer – Hacker Valley Media), as we delve into the world of content creation in cybersecurity. We explore the power of authentic storytelling and creativity in content, and its potential to shape the cybersecurity industry.</p>
<p>Chris shares personal anecdotes, underlining the importance of diversity and inclusivity in this field, and advocates for a shift towards a more positive mindset.</p>
<p><span style="font-weight:400;">Chris Cochran is Hacker Valley Media’s co-founder/ Chief Creative Officer and the Advisory Chief Information Security Officer/ Chief Evangelist for Huntress Labs. Chris also serves on the Board of Governors for the Podcast Academy. He is a cybersecurity leader turned award-winning content creator and speaker, earning two Anthem Awards and one Webby nomination. Chris started his career in technology during his active duty service in the US Marine Corps as an intelligence analyst at the National Security Agency.</span></p>
<p><span style="font-weight:400;"><br />
</span><span style="font-weight:400;">Chris spent over a decade leading advanced cybersecurity and intelligence missions at organizations such as the US House of Representatives, US Cyber Command, Mandiant, Booz Allen Hamilton, United Technologies, and Netflix. His passion is finding and amplifying human stories in cybersecurity and technology to inspire and empower our community.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1692581/c1e-5k0vbmzd5ms0xmv3-dd7wo3zzim0z-nwwogp.mp3" length="42767718"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Chris Cochran (Co-Founder and Chief Creative Officer – Hacker Valley Media), as we delve into the world of content creation in cybersecurity. We explore the power of authentic storytelling and creativity in content, and its potential to shape the cybersecurity industry.
Chris shares personal anecdotes, underlining the importance of diversity and inclusivity in this field, and advocates for a shift towards a more positive mindset.
Chris Cochran is Hacker Valley Media’s co-founder/ Chief Creative Officer and the Advisory Chief Information Security Officer/ Chief Evangelist for Huntress Labs. Chris also serves on the Board of Governors for the Podcast Academy. He is a cybersecurity leader turned award-winning content creator and speaker, earning two Anthem Awards and one Webby nomination. Chris started his career in technology during his active duty service in the US Marine Corps as an intelligence analyst at the National Security Agency.

Chris spent over a decade leading advanced cybersecurity and intelligence missions at organizations such as the US House of Representatives, US Cyber Command, Mandiant, Booz Allen Hamilton, United Technologies, and Netflix. His passion is finding and amplifying human stories in cybersecurity and technology to inspire and empower our community.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1692581/c1a-5k0v-8m6vqv8ocv4w-umlaog.png"></itunes:image>
                                                                            <itunes:duration>00:44:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go | Cybersecurity Challenges and Innovations: Expert Conversations from Cisco]]>
                </title>
                <pubDate>Fri, 15 Mar 2024 16:00:50 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1688921</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-cybersecurity-challenges-and-innovations-expert-conversations-from-cisco</link>
                                <description>
                                            <![CDATA[]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go | Cybersecurity Challenges and Innovations: Expert Conversations from Cisco]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1688921/c1e-901kfnwoqvs0kp47-5rv6462wcnr9-djaiti.mp3" length="63430577"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1688921/c1a-5k0v-pk956vpoc3dq-hsdlcy.png"></itunes:image>
                                                                            <itunes:duration>00:44:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 248 Deep Dive: Corien Vermaak | The Future of Cybersecurity: Expert Insights on Challenges and Opportunities Presented by A.I.]]>
                </title>
                <pubDate>Wed, 13 Mar 2024 16:00:51 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1682619</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-248-deep-dive-corien-vermaak-the-future-of-cybersecurity-expert-insights-on-challenges-and-opportunities-presented-by-a-i</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Corien Vermaak  (Head of Cybersecurity – Cisco ANZ) shares insights on the evolving role of AI in cybersecurity. From early threat detection to ethical considerations, we explore the potential and challenges of AI in safeguarding digital environments. Corien discusses how AI can proactively identify anomalies and augment human skills, enhancing security measures and response times. Join us as we delve into the integration of AI in cybersecurity and the impact on job roles, and a thought-provoking discussion on the ethical implications of AI decision-making.</p>
<p>Corien Vermaak started her career as a technology law specialist within the telecommunication space and soon fell in love with data privacy and the legal structures governing cybercrime. In her career,  Corien specialised in cybercrime legislation and data privacy while representing large multinationals on these matters.</p>
<p>She holds a master’s degree in law specialising in cybercrime and data privacy. She has been involved in the writing of legislation in this regard as well as consulting to Africa Union and Interpol on issues relating to cybercrimes and privacy.</p>
<p>Corien is a Qualified Digital Forensic Auditor, Lead ISO 27001 auditor and C|CISO. Corien has been a CISO Advisor for the Cisco Security Centre of Excellence in the Asia Pacific, Japan and China region where she has led market.</p>
<p>KB has previously interviewed Corien, but asked for a more in-depth interview. This is likely to be followed with an in-depth interview with Jeetu Patel, Global Exec for Cybersecurity at Cisco.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Corien Vermaak  (Head of Cybersecurity – Cisco ANZ) shares insights on the evolving role of AI in cybersecurity. From early threat detection to ethical considerations, we explore the potential and challenges of AI in safeguarding digital environments. Corien discusses how AI can proactively identify anomalies and augment human skills, enhancing security measures and response times. Join us as we delve into the integration of AI in cybersecurity and the impact on job roles, and a thought-provoking discussion on the ethical implications of AI decision-making.
Corien Vermaak started her career as a technology law specialist within the telecommunication space and soon fell in love with data privacy and the legal structures governing cybercrime. In her career,  Corien specialised in cybercrime legislation and data privacy while representing large multinationals on these matters.
She holds a master’s degree in law specialising in cybercrime and data privacy. She has been involved in the writing of legislation in this regard as well as consulting to Africa Union and Interpol on issues relating to cybercrimes and privacy.
Corien is a Qualified Digital Forensic Auditor, Lead ISO 27001 auditor and C|CISO. Corien has been a CISO Advisor for the Cisco Security Centre of Excellence in the Asia Pacific, Japan and China region where she has led market.
KB has previously interviewed Corien, but asked for a more in-depth interview. This is likely to be followed with an in-depth interview with Jeetu Patel, Global Exec for Cybersecurity at Cisco.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 248 Deep Dive: Corien Vermaak | The Future of Cybersecurity: Expert Insights on Challenges and Opportunities Presented by A.I.]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Corien Vermaak  (Head of Cybersecurity – Cisco ANZ) shares insights on the evolving role of AI in cybersecurity. From early threat detection to ethical considerations, we explore the potential and challenges of AI in safeguarding digital environments. Corien discusses how AI can proactively identify anomalies and augment human skills, enhancing security measures and response times. Join us as we delve into the integration of AI in cybersecurity and the impact on job roles, and a thought-provoking discussion on the ethical implications of AI decision-making.</p>
<p>Corien Vermaak started her career as a technology law specialist within the telecommunication space and soon fell in love with data privacy and the legal structures governing cybercrime. In her career,  Corien specialised in cybercrime legislation and data privacy while representing large multinationals on these matters.</p>
<p>She holds a master’s degree in law specialising in cybercrime and data privacy. She has been involved in the writing of legislation in this regard as well as consulting to Africa Union and Interpol on issues relating to cybercrimes and privacy.</p>
<p>Corien is a Qualified Digital Forensic Auditor, Lead ISO 27001 auditor and C|CISO. Corien has been a CISO Advisor for the Cisco Security Centre of Excellence in the Asia Pacific, Japan and China region where she has led market.</p>
<p>KB has previously interviewed Corien, but asked for a more in-depth interview. This is likely to be followed with an in-depth interview with Jeetu Patel, Global Exec for Cybersecurity at Cisco.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1682619/c1e-901kfn3vnqidv65n-7n51o7q9a2q7-qssmcf.mp3" length="48133896"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Corien Vermaak  (Head of Cybersecurity – Cisco ANZ) shares insights on the evolving role of AI in cybersecurity. From early threat detection to ethical considerations, we explore the potential and challenges of AI in safeguarding digital environments. Corien discusses how AI can proactively identify anomalies and augment human skills, enhancing security measures and response times. Join us as we delve into the integration of AI in cybersecurity and the impact on job roles, and a thought-provoking discussion on the ethical implications of AI decision-making.
Corien Vermaak started her career as a technology law specialist within the telecommunication space and soon fell in love with data privacy and the legal structures governing cybercrime. In her career,  Corien specialised in cybercrime legislation and data privacy while representing large multinationals on these matters.
She holds a master’s degree in law specialising in cybercrime and data privacy. She has been involved in the writing of legislation in this regard as well as consulting to Africa Union and Interpol on issues relating to cybercrimes and privacy.
Corien is a Qualified Digital Forensic Auditor, Lead ISO 27001 auditor and C|CISO. Corien has been a CISO Advisor for the Cisco Security Centre of Excellence in the Asia Pacific, Japan and China region where she has led market.
KB has previously interviewed Corien, but asked for a more in-depth interview. This is likely to be followed with an in-depth interview with Jeetu Patel, Global Exec for Cybersecurity at Cisco.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1682619/c1a-5k0v-5rvmjrowckvx-vo0jn5.png"></itunes:image>
                                                                            <itunes:duration>00:50:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 247 Deep Dive: Alex Trafton | Strategic Partnerships and Cybersecurity Compliance for Global Defense and Trade Relations]]>
                </title>
                <pubDate>Wed, 06 Mar 2024 16:00:57 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1681049</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-247-deep-dive-alex-trafton-strategic-partnerships-and-cybersecurity-compliance-for-global-defense-and-trade-relations</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by with Alex Trafton (Managing Director of National Security, Trade, &amp; Technology – Ankura) to unravel the complex dynamics of cybersecurity, government regulations, and the landscape of defense and technology at a global scale. We explore the challenges and opportunities for small companies, the impact of strategic cooperation between democratic nations, and the crucial role of integrity and innovation in the industry. Join us for a candid conversation that sheds light on the future of cybersecurity and the call for collaboration between nations.</p>
<p class="IntroductionTest">Alex Trafton is a Managing Director in the National Security, Trade, &amp; Technology practice at Ankura Consulting Group, based in Los Angeles, CA, USA. He has over 15 years of experience in finance, risk management, and cybersecurity. Alex leads the NSTT cybersecurity function and serves as a subject matter expert in cybersecurity program design, implementation, and assessment with a focus in foreign investment control and oversight (CFIUS), Defense Industrial Base (DIB) cybersecurity requirements, and international trade control compliance program support (ITAR/EAR). Alex is focused on working with multi-national defense contractors to help them meet cybersecurity and export control requirements before, during, and after mergers and acquisitions.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by with Alex Trafton (Managing Director of National Security, Trade, & Technology – Ankura) to unravel the complex dynamics of cybersecurity, government regulations, and the landscape of defense and technology at a global scale. We explore the challenges and opportunities for small companies, the impact of strategic cooperation between democratic nations, and the crucial role of integrity and innovation in the industry. Join us for a candid conversation that sheds light on the future of cybersecurity and the call for collaboration between nations.
Alex Trafton is a Managing Director in the National Security, Trade, & Technology practice at Ankura Consulting Group, based in Los Angeles, CA, USA. He has over 15 years of experience in finance, risk management, and cybersecurity. Alex leads the NSTT cybersecurity function and serves as a subject matter expert in cybersecurity program design, implementation, and assessment with a focus in foreign investment control and oversight (CFIUS), Defense Industrial Base (DIB) cybersecurity requirements, and international trade control compliance program support (ITAR/EAR). Alex is focused on working with multi-national defense contractors to help them meet cybersecurity and export control requirements before, during, and after mergers and acquisitions.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 247 Deep Dive: Alex Trafton | Strategic Partnerships and Cybersecurity Compliance for Global Defense and Trade Relations]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by with Alex Trafton (Managing Director of National Security, Trade, &amp; Technology – Ankura) to unravel the complex dynamics of cybersecurity, government regulations, and the landscape of defense and technology at a global scale. We explore the challenges and opportunities for small companies, the impact of strategic cooperation between democratic nations, and the crucial role of integrity and innovation in the industry. Join us for a candid conversation that sheds light on the future of cybersecurity and the call for collaboration between nations.</p>
<p class="IntroductionTest">Alex Trafton is a Managing Director in the National Security, Trade, &amp; Technology practice at Ankura Consulting Group, based in Los Angeles, CA, USA. He has over 15 years of experience in finance, risk management, and cybersecurity. Alex leads the NSTT cybersecurity function and serves as a subject matter expert in cybersecurity program design, implementation, and assessment with a focus in foreign investment control and oversight (CFIUS), Defense Industrial Base (DIB) cybersecurity requirements, and international trade control compliance program support (ITAR/EAR). Alex is focused on working with multi-national defense contractors to help them meet cybersecurity and export control requirements before, during, and after mergers and acquisitions.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1681049/c1e-6wnpc25dj0sndopx-k5xzw93du03x-ggqnfl.mp3" length="45973883"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by with Alex Trafton (Managing Director of National Security, Trade, & Technology – Ankura) to unravel the complex dynamics of cybersecurity, government regulations, and the landscape of defense and technology at a global scale. We explore the challenges and opportunities for small companies, the impact of strategic cooperation between democratic nations, and the crucial role of integrity and innovation in the industry. Join us for a candid conversation that sheds light on the future of cybersecurity and the call for collaboration between nations.
Alex Trafton is a Managing Director in the National Security, Trade, & Technology practice at Ankura Consulting Group, based in Los Angeles, CA, USA. He has over 15 years of experience in finance, risk management, and cybersecurity. Alex leads the NSTT cybersecurity function and serves as a subject matter expert in cybersecurity program design, implementation, and assessment with a focus in foreign investment control and oversight (CFIUS), Defense Industrial Base (DIB) cybersecurity requirements, and international trade control compliance program support (ITAR/EAR). Alex is focused on working with multi-national defense contractors to help them meet cybersecurity and export control requirements before, during, and after mergers and acquisitions.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1681049/c1a-5k0v-o87nznv2io4j-tjceck.png"></itunes:image>
                                                                            <itunes:duration>00:47:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 246 Deep Dive: David Batch | Demystifying Privacy by Design, Understanding Its Challenges, and Identifying Solutions]]>
                </title>
                <pubDate>Fri, 01 Mar 2024 16:00:31 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1677537</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-246-deep-dive-david-batch-demystifying-privacy-by-design-understanding-its-challenges-and-identifying-solutions</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by David Batch (Executive Director, Privacy Advisory – CyberCX) as we delve into the principles of Privacy by Design and the need for organizations to prioritise privacy as a pillar of trust. From data retention challenges to the impact of data erasure on regulated industries, we navigate through the complexities of privacy management. Join us as we explore the potential catalysts for change, the role of regulatory frameworks, and the innovative solutions for empowering individuals to take control of their privacy.</p>
<p>David leads the Privacy Advisory Practice at CyberCX and brings to the role over 25 years of government and industry experience.  Prior to entering the consulting sector, David was responsible for privacy risk management at State Street Corporation across APAC, built and led the CBA’s first dedicated privacy team, led the privacy function at NEHTA (now the ADHA) and was the online safety, security and privacy lead for <a title="smartCard-inline" href="https://myspace.com/" target="_blank" rel="noreferrer noopener">https://MySpace.com</a> in Australia/NZ. Prior to his privacy focused roles, David was a Federal Agent with the Australian Federal Police and held a number of investigative, legal policy and training roles during his 9 year tenure with the agency.​</p>
<p>In addition to these roles, David was the creator of the annual consumer and organisation privacy research, the Deloitte Australian Privacy Index and its principal author for four editions. David also launched the annual <a href="https://cybercx.com.au/privacybydesignawards/">Australian Privacy by Design Research and Awards</a> in 2022, for which he and the team were awarded by the Australian Information Security Association as ‘Cybersecurity Researcher of the Year’ in 2022.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by David Batch (Executive Director, Privacy Advisory – CyberCX) as we delve into the principles of Privacy by Design and the need for organizations to prioritise privacy as a pillar of trust. From data retention challenges to the impact of data erasure on regulated industries, we navigate through the complexities of privacy management. Join us as we explore the potential catalysts for change, the role of regulatory frameworks, and the innovative solutions for empowering individuals to take control of their privacy.
David leads the Privacy Advisory Practice at CyberCX and brings to the role over 25 years of government and industry experience.  Prior to entering the consulting sector, David was responsible for privacy risk management at State Street Corporation across APAC, built and led the CBA’s first dedicated privacy team, led the privacy function at NEHTA (now the ADHA) and was the online safety, security and privacy lead for https://MySpace.com in Australia/NZ. Prior to his privacy focused roles, David was a Federal Agent with the Australian Federal Police and held a number of investigative, legal policy and training roles during his 9 year tenure with the agency.​
In addition to these roles, David was the creator of the annual consumer and organisation privacy research, the Deloitte Australian Privacy Index and its principal author for four editions. David also launched the annual Australian Privacy by Design Research and Awards in 2022, for which he and the team were awarded by the Australian Information Security Association as ‘Cybersecurity Researcher of the Year’ in 2022.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 246 Deep Dive: David Batch | Demystifying Privacy by Design, Understanding Its Challenges, and Identifying Solutions]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by David Batch (Executive Director, Privacy Advisory – CyberCX) as we delve into the principles of Privacy by Design and the need for organizations to prioritise privacy as a pillar of trust. From data retention challenges to the impact of data erasure on regulated industries, we navigate through the complexities of privacy management. Join us as we explore the potential catalysts for change, the role of regulatory frameworks, and the innovative solutions for empowering individuals to take control of their privacy.</p>
<p>David leads the Privacy Advisory Practice at CyberCX and brings to the role over 25 years of government and industry experience.  Prior to entering the consulting sector, David was responsible for privacy risk management at State Street Corporation across APAC, built and led the CBA’s first dedicated privacy team, led the privacy function at NEHTA (now the ADHA) and was the online safety, security and privacy lead for <a title="smartCard-inline" href="https://myspace.com/" target="_blank" rel="noreferrer noopener">https://MySpace.com</a> in Australia/NZ. Prior to his privacy focused roles, David was a Federal Agent with the Australian Federal Police and held a number of investigative, legal policy and training roles during his 9 year tenure with the agency.​</p>
<p>In addition to these roles, David was the creator of the annual consumer and organisation privacy research, the Deloitte Australian Privacy Index and its principal author for four editions. David also launched the annual <a href="https://cybercx.com.au/privacybydesignawards/">Australian Privacy by Design Research and Awards</a> in 2022, for which he and the team were awarded by the Australian Information Security Association as ‘Cybersecurity Researcher of the Year’ in 2022.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1677537/c1e-jjvwhqm877in1k2x-60pj6gpqc57r-hxkik4.mp3" length="44525236"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by David Batch (Executive Director, Privacy Advisory – CyberCX) as we delve into the principles of Privacy by Design and the need for organizations to prioritise privacy as a pillar of trust. From data retention challenges to the impact of data erasure on regulated industries, we navigate through the complexities of privacy management. Join us as we explore the potential catalysts for change, the role of regulatory frameworks, and the innovative solutions for empowering individuals to take control of their privacy.
David leads the Privacy Advisory Practice at CyberCX and brings to the role over 25 years of government and industry experience.  Prior to entering the consulting sector, David was responsible for privacy risk management at State Street Corporation across APAC, built and led the CBA’s first dedicated privacy team, led the privacy function at NEHTA (now the ADHA) and was the online safety, security and privacy lead for https://MySpace.com in Australia/NZ. Prior to his privacy focused roles, David was a Federal Agent with the Australian Federal Police and held a number of investigative, legal policy and training roles during his 9 year tenure with the agency.​
In addition to these roles, David was the creator of the annual consumer and organisation privacy research, the Deloitte Australian Privacy Index and its principal author for four editions. David also launched the annual Australian Privacy by Design Research and Awards in 2022, for which he and the team were awarded by the Australian Information Security Association as ‘Cybersecurity Researcher of the Year’ in 2022.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1677537/c1a-5k0v-rom6v5gjtjr6-jpfwav.png"></itunes:image>
                                                                            <itunes:duration>00:46:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 245 Deep Dive: Dali Kaafar | Distracting Scammers: Leveraging AI to Protect Against Unwanted and Malicious Calls]]>
                </title>
                <pubDate>Wed, 28 Feb 2024 16:00:52 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1673265</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-245-deep-dive-dali-kaafar-distracting-scammers-leveraging-ai-to-protect-against-unwanted-and-malicious-calls</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Prof. Dali Kaafar (Executive Director –  Macquarie University Cyber Security Hub, CEO and Founder of <a href="https://apate.ai/" target="_blank" rel="noreferrer noopener">APATE.AI</a>) as he discusses the innovative use of conversational AI in combating phone scams. From the manipulation and trust-building tactics employed by scammers to the pressing need for proactive defense measures, Dali sheds light on disrupting scammers’ profits and protecting potential victims. This captivating conversation explores the intersection of technology, psychology, and security, offering valuable perspectives on safeguarding against phone scams in today’s digital landscape.</p>
<p>Dali Kaafar is a Professor at the Faculty of Science and Engineering and serves as the Executive Director of [The Macquarie University Cyber Security Hub]. In addition to his role as the director of the Data Security and Privacy R&amp;D Program, he oversees the Cyber Range Training Centre (CRTC) and Cyber Security Curriculum at the Institute of Applied Technology-Digital.</p>
<p>Leading a team of collaborators, Professor Kaafar is actively engaged in extensive Research and Development activities within the field of Cyber Security in Emerging Technologies, with a vision to enable Explicit Trust in the Digital Economy. His primary research interests revolve around Data Security and Privacy, specifically focusing on Privacy-Preserving (or Enhancing) technologies, Information Security for Web and Mobile applications, (Provably) private data sharing, and Trustworthy Secure and Private Machine learning techniques.</p>
<p>Before joining Macquarie University, Professor Kaafar served as the group leader and founder of the Information Security and Privacy group at CSIRO Data61. He was previously a principal researcher at National ICT Australia (NICTA) and held a permanent researcher position at the Privatics team at INRIA in France.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Prof. Dali Kaafar (Executive Director –  Macquarie University Cyber Security Hub, CEO and Founder of APATE.AI) as he discusses the innovative use of conversational AI in combating phone scams. From the manipulation and trust-building tactics employed by scammers to the pressing need for proactive defense measures, Dali sheds light on disrupting scammers’ profits and protecting potential victims. This captivating conversation explores the intersection of technology, psychology, and security, offering valuable perspectives on safeguarding against phone scams in today’s digital landscape.
Dali Kaafar is a Professor at the Faculty of Science and Engineering and serves as the Executive Director of [The Macquarie University Cyber Security Hub]. In addition to his role as the director of the Data Security and Privacy R&D Program, he oversees the Cyber Range Training Centre (CRTC) and Cyber Security Curriculum at the Institute of Applied Technology-Digital.
Leading a team of collaborators, Professor Kaafar is actively engaged in extensive Research and Development activities within the field of Cyber Security in Emerging Technologies, with a vision to enable Explicit Trust in the Digital Economy. His primary research interests revolve around Data Security and Privacy, specifically focusing on Privacy-Preserving (or Enhancing) technologies, Information Security for Web and Mobile applications, (Provably) private data sharing, and Trustworthy Secure and Private Machine learning techniques.
Before joining Macquarie University, Professor Kaafar served as the group leader and founder of the Information Security and Privacy group at CSIRO Data61. He was previously a principal researcher at National ICT Australia (NICTA) and held a permanent researcher position at the Privatics team at INRIA in France.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 245 Deep Dive: Dali Kaafar | Distracting Scammers: Leveraging AI to Protect Against Unwanted and Malicious Calls]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Prof. Dali Kaafar (Executive Director –  Macquarie University Cyber Security Hub, CEO and Founder of <a href="https://apate.ai/" target="_blank" rel="noreferrer noopener">APATE.AI</a>) as he discusses the innovative use of conversational AI in combating phone scams. From the manipulation and trust-building tactics employed by scammers to the pressing need for proactive defense measures, Dali sheds light on disrupting scammers’ profits and protecting potential victims. This captivating conversation explores the intersection of technology, psychology, and security, offering valuable perspectives on safeguarding against phone scams in today’s digital landscape.</p>
<p>Dali Kaafar is a Professor at the Faculty of Science and Engineering and serves as the Executive Director of [The Macquarie University Cyber Security Hub]. In addition to his role as the director of the Data Security and Privacy R&amp;D Program, he oversees the Cyber Range Training Centre (CRTC) and Cyber Security Curriculum at the Institute of Applied Technology-Digital.</p>
<p>Leading a team of collaborators, Professor Kaafar is actively engaged in extensive Research and Development activities within the field of Cyber Security in Emerging Technologies, with a vision to enable Explicit Trust in the Digital Economy. His primary research interests revolve around Data Security and Privacy, specifically focusing on Privacy-Preserving (or Enhancing) technologies, Information Security for Web and Mobile applications, (Provably) private data sharing, and Trustworthy Secure and Private Machine learning techniques.</p>
<p>Before joining Macquarie University, Professor Kaafar served as the group leader and founder of the Information Security and Privacy group at CSIRO Data61. He was previously a principal researcher at National ICT Australia (NICTA) and held a permanent researcher position at the Privatics team at INRIA in France.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1673265/c1e-q40nh2no5kh0v2x1-mq36zj85inmo-qydkvf.mp3" length="39312449"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Prof. Dali Kaafar (Executive Director –  Macquarie University Cyber Security Hub, CEO and Founder of APATE.AI) as he discusses the innovative use of conversational AI in combating phone scams. From the manipulation and trust-building tactics employed by scammers to the pressing need for proactive defense measures, Dali sheds light on disrupting scammers’ profits and protecting potential victims. This captivating conversation explores the intersection of technology, psychology, and security, offering valuable perspectives on safeguarding against phone scams in today’s digital landscape.
Dali Kaafar is a Professor at the Faculty of Science and Engineering and serves as the Executive Director of [The Macquarie University Cyber Security Hub]. In addition to his role as the director of the Data Security and Privacy R&D Program, he oversees the Cyber Range Training Centre (CRTC) and Cyber Security Curriculum at the Institute of Applied Technology-Digital.
Leading a team of collaborators, Professor Kaafar is actively engaged in extensive Research and Development activities within the field of Cyber Security in Emerging Technologies, with a vision to enable Explicit Trust in the Digital Economy. His primary research interests revolve around Data Security and Privacy, specifically focusing on Privacy-Preserving (or Enhancing) technologies, Information Security for Web and Mobile applications, (Provably) private data sharing, and Trustworthy Secure and Private Machine learning techniques.
Before joining Macquarie University, Professor Kaafar served as the group leader and founder of the Information Security and Privacy group at CSIRO Data61. He was previously a principal researcher at National ICT Australia (NICTA) and held a permanent researcher position at the Privatics team at INRIA in France.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1673265/c1a-5k0v-1xgjo5r2fj2n-i2gx8w.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 244 Deep Dive: Mark McClain | Enhancing Security Resilience: Identity as the Key Accelerant for Business Success]]>
                </title>
                <pubDate>Wed, 21 Feb 2024 16:00:01 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1666460</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-244-deep-dive-mark-mcclain-enhancing-security-resilience-identity-as-the-key-accelerant-for-business-success</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Mark McClain (CEO and Founder of SailPoint), as we dive deep into the pivotal role of identity as a fundamental control point and lens for understanding security in organizations. Mark emphasises that while traditional security measures such as firewalls and network security remain vital, identity security is equally critical for protecting data and driving business momentum. Moreover, the conversation delves into the challenges of balancing convenience and security, particularly with the rise of AI and machine learning in security measures. Mark highlights the limitations of current security tools in being “identity blind,” stressing the need for better tooling and processes to identify and respond to security threats more efficiently.</p>
<p>In his role as CEO and Founder of SailPoint, Mark brings almost 35 years of experience in technology, with over 20 years as a founder and leader of innovative identity management companies. Under Mark’s direction, the company has grown into a publicly recognized leader in its market. Mark directs and drives the overall vision and strategy for SailPoint, which is underpinned by his commitment and passion for building top-performing teams, creating a collaborative and innovative work environment, and focusing continuously on the needs of customers.</p>
<p>Teaming is a concept that Mark promotes throughout the company: teaming with forward-thinking customers to understand their needs, with partners to ensure customer success, and ultimately within SailPoint to develop innovative, market-leading solutions. Mark is passionate about maintaining the spirit of teamwork, even as SailPoint grows its employee base and its global presence to offices around the world.</p>
<p>Prior to SailPoint, he co-founded Waveset Technologies, which was ultimately acquired by Sun Microsystems. Mark’s career also includes diverse experience in international sales and marketing with Hewlett-Packard and IBM/Tivoli Systems.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Mark McClain (CEO and Founder of SailPoint), as we dive deep into the pivotal role of identity as a fundamental control point and lens for understanding security in organizations. Mark emphasises that while traditional security measures such as firewalls and network security remain vital, identity security is equally critical for protecting data and driving business momentum. Moreover, the conversation delves into the challenges of balancing convenience and security, particularly with the rise of AI and machine learning in security measures. Mark highlights the limitations of current security tools in being “identity blind,” stressing the need for better tooling and processes to identify and respond to security threats more efficiently.
In his role as CEO and Founder of SailPoint, Mark brings almost 35 years of experience in technology, with over 20 years as a founder and leader of innovative identity management companies. Under Mark’s direction, the company has grown into a publicly recognized leader in its market. Mark directs and drives the overall vision and strategy for SailPoint, which is underpinned by his commitment and passion for building top-performing teams, creating a collaborative and innovative work environment, and focusing continuously on the needs of customers.
Teaming is a concept that Mark promotes throughout the company: teaming with forward-thinking customers to understand their needs, with partners to ensure customer success, and ultimately within SailPoint to develop innovative, market-leading solutions. Mark is passionate about maintaining the spirit of teamwork, even as SailPoint grows its employee base and its global presence to offices around the world.
Prior to SailPoint, he co-founded Waveset Technologies, which was ultimately acquired by Sun Microsystems. Mark’s career also includes diverse experience in international sales and marketing with Hewlett-Packard and IBM/Tivoli Systems.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 244 Deep Dive: Mark McClain | Enhancing Security Resilience: Identity as the Key Accelerant for Business Success]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Mark McClain (CEO and Founder of SailPoint), as we dive deep into the pivotal role of identity as a fundamental control point and lens for understanding security in organizations. Mark emphasises that while traditional security measures such as firewalls and network security remain vital, identity security is equally critical for protecting data and driving business momentum. Moreover, the conversation delves into the challenges of balancing convenience and security, particularly with the rise of AI and machine learning in security measures. Mark highlights the limitations of current security tools in being “identity blind,” stressing the need for better tooling and processes to identify and respond to security threats more efficiently.</p>
<p>In his role as CEO and Founder of SailPoint, Mark brings almost 35 years of experience in technology, with over 20 years as a founder and leader of innovative identity management companies. Under Mark’s direction, the company has grown into a publicly recognized leader in its market. Mark directs and drives the overall vision and strategy for SailPoint, which is underpinned by his commitment and passion for building top-performing teams, creating a collaborative and innovative work environment, and focusing continuously on the needs of customers.</p>
<p>Teaming is a concept that Mark promotes throughout the company: teaming with forward-thinking customers to understand their needs, with partners to ensure customer success, and ultimately within SailPoint to develop innovative, market-leading solutions. Mark is passionate about maintaining the spirit of teamwork, even as SailPoint grows its employee base and its global presence to offices around the world.</p>
<p>Prior to SailPoint, he co-founded Waveset Technologies, which was ultimately acquired by Sun Microsystems. Mark’s career also includes diverse experience in international sales and marketing with Hewlett-Packard and IBM/Tivoli Systems.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1666460/c1e-rdnmsjp7m5h2kwq0-qxn7gjgkbvn1-z8slxi.mp3" length="38928763"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Mark McClain (CEO and Founder of SailPoint), as we dive deep into the pivotal role of identity as a fundamental control point and lens for understanding security in organizations. Mark emphasises that while traditional security measures such as firewalls and network security remain vital, identity security is equally critical for protecting data and driving business momentum. Moreover, the conversation delves into the challenges of balancing convenience and security, particularly with the rise of AI and machine learning in security measures. Mark highlights the limitations of current security tools in being “identity blind,” stressing the need for better tooling and processes to identify and respond to security threats more efficiently.
In his role as CEO and Founder of SailPoint, Mark brings almost 35 years of experience in technology, with over 20 years as a founder and leader of innovative identity management companies. Under Mark’s direction, the company has grown into a publicly recognized leader in its market. Mark directs and drives the overall vision and strategy for SailPoint, which is underpinned by his commitment and passion for building top-performing teams, creating a collaborative and innovative work environment, and focusing continuously on the needs of customers.
Teaming is a concept that Mark promotes throughout the company: teaming with forward-thinking customers to understand their needs, with partners to ensure customer success, and ultimately within SailPoint to develop innovative, market-leading solutions. Mark is passionate about maintaining the spirit of teamwork, even as SailPoint grows its employee base and its global presence to offices around the world.
Prior to SailPoint, he co-founded Waveset Technologies, which was ultimately acquired by Sun Microsystems. Mark’s career also includes diverse experience in international sales and marketing with Hewlett-Packard and IBM/Tivoli Systems.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1666460/c1a-5k0v-92kmp0zpa2x-icktfy.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 243 Deep Dive: Dean Houari | Addressing Vulnerabilities and Data Exposure: Expert Insights on the Evolution of the API Attack Surface]]>
                </title>
                <pubDate>Fri, 16 Feb 2024 16:00:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1662870</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-243-deep-dive-dean-houari-addressing-vulnerabilities-and-data-exposure-expert-insights-on-the-evolution-of-the-api-attack-surface</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Dean Houari from Akamai, as we dive deep into the continuously evolving landscape of API security. The discussion delves into the growing concern of API attacks and the increasing recognition of the need for “security by design” at the board level. Dean shares insights on the shifting nature of application architecture, the vulnerabilities of APIs, and the impact of cloud-native and modern applications on security measures. The conversation emphasizes the need for a comprehensive approach to securing API attack surfaces and preparing for potential breaches. Tune in as Dean provides practical advice and expert perspectives on navigating the complexities of API security.</p>
<p><span style="font-weight:400;">Dean Houari is the Director of Security Technology and Strategy for Akamai’s Asia-Pacific and Japan region. He is a patent awarded technologist with over two decades of experiences in various engineering and architecture leadership roles.</span></p>
<p><span style="font-weight:400;"> </span><span style="font-weight:400;">At Akamai, Dean is responsible for product and go-to-market strategy for Akamai’s security portfolio, which includes both established and emerging areas in security. His work focuses on encouraging customers to a strategic view of their security programs, and articulating key security design principles that position customers for long-term success in their security strategy.</span></p>
<p><span style="font-weight:400;">Prior to Akamai, Dean led the architecture and development of DevSecOps, cloud and cyber security initiatives and innovations. He holds an inventor patent with Cisco Systems, as well as certifications from CCIE, Terraform, and AWS. He is also an avid powerlifter who has lifted a personal best of 650kg.</span></p>
<p><span style="font-weight:400;">Dean attended Carnegie Mellon University and is currently based in Tokyo, Japan. </span></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Dean Houari from Akamai, as we dive deep into the continuously evolving landscape of API security. The discussion delves into the growing concern of API attacks and the increasing recognition of the need for “security by design” at the board level. Dean shares insights on the shifting nature of application architecture, the vulnerabilities of APIs, and the impact of cloud-native and modern applications on security measures. The conversation emphasizes the need for a comprehensive approach to securing API attack surfaces and preparing for potential breaches. Tune in as Dean provides practical advice and expert perspectives on navigating the complexities of API security.
Dean Houari is the Director of Security Technology and Strategy for Akamai’s Asia-Pacific and Japan region. He is a patent awarded technologist with over two decades of experiences in various engineering and architecture leadership roles.
 At Akamai, Dean is responsible for product and go-to-market strategy for Akamai’s security portfolio, which includes both established and emerging areas in security. His work focuses on encouraging customers to a strategic view of their security programs, and articulating key security design principles that position customers for long-term success in their security strategy.
Prior to Akamai, Dean led the architecture and development of DevSecOps, cloud and cyber security initiatives and innovations. He holds an inventor patent with Cisco Systems, as well as certifications from CCIE, Terraform, and AWS. He is also an avid powerlifter who has lifted a personal best of 650kg.
Dean attended Carnegie Mellon University and is currently based in Tokyo, Japan. 
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 243 Deep Dive: Dean Houari | Addressing Vulnerabilities and Data Exposure: Expert Insights on the Evolution of the API Attack Surface]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Dean Houari from Akamai, as we dive deep into the continuously evolving landscape of API security. The discussion delves into the growing concern of API attacks and the increasing recognition of the need for “security by design” at the board level. Dean shares insights on the shifting nature of application architecture, the vulnerabilities of APIs, and the impact of cloud-native and modern applications on security measures. The conversation emphasizes the need for a comprehensive approach to securing API attack surfaces and preparing for potential breaches. Tune in as Dean provides practical advice and expert perspectives on navigating the complexities of API security.</p>
<p><span style="font-weight:400;">Dean Houari is the Director of Security Technology and Strategy for Akamai’s Asia-Pacific and Japan region. He is a patent awarded technologist with over two decades of experiences in various engineering and architecture leadership roles.</span></p>
<p><span style="font-weight:400;"> </span><span style="font-weight:400;">At Akamai, Dean is responsible for product and go-to-market strategy for Akamai’s security portfolio, which includes both established and emerging areas in security. His work focuses on encouraging customers to a strategic view of their security programs, and articulating key security design principles that position customers for long-term success in their security strategy.</span></p>
<p><span style="font-weight:400;">Prior to Akamai, Dean led the architecture and development of DevSecOps, cloud and cyber security initiatives and innovations. He holds an inventor patent with Cisco Systems, as well as certifications from CCIE, Terraform, and AWS. He is also an avid powerlifter who has lifted a personal best of 650kg.</span></p>
<p><span style="font-weight:400;">Dean attended Carnegie Mellon University and is currently based in Tokyo, Japan. </span></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1662870/c1e-wmjvurj353f0gmpv-498pxz4ns4od-uglzoo.mp3" length="35835029"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Dean Houari from Akamai, as we dive deep into the continuously evolving landscape of API security. The discussion delves into the growing concern of API attacks and the increasing recognition of the need for “security by design” at the board level. Dean shares insights on the shifting nature of application architecture, the vulnerabilities of APIs, and the impact of cloud-native and modern applications on security measures. The conversation emphasizes the need for a comprehensive approach to securing API attack surfaces and preparing for potential breaches. Tune in as Dean provides practical advice and expert perspectives on navigating the complexities of API security.
Dean Houari is the Director of Security Technology and Strategy for Akamai’s Asia-Pacific and Japan region. He is a patent awarded technologist with over two decades of experiences in various engineering and architecture leadership roles.
 At Akamai, Dean is responsible for product and go-to-market strategy for Akamai’s security portfolio, which includes both established and emerging areas in security. His work focuses on encouraging customers to a strategic view of their security programs, and articulating key security design principles that position customers for long-term success in their security strategy.
Prior to Akamai, Dean led the architecture and development of DevSecOps, cloud and cyber security initiatives and innovations. He holds an inventor patent with Cisco Systems, as well as certifications from CCIE, Terraform, and AWS. He is also an avid powerlifter who has lifted a personal best of 650kg.
Dean attended Carnegie Mellon University and is currently based in Tokyo, Japan. 
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1662870/c1a-5k0v-25dpjm6ru7ox-e5o57l.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 242 Deep Dive: Nick Schneider | Unpacking Challenges: A Discussion on Legacy Approaches, Talent Shortage, Alert Fatigue, and Over-layered Security Systems]]>
                </title>
                <pubDate>Wed, 14 Feb 2024 16:00:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1661186</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-242-deep-dive-nick-schneider-unpacking-challenges-a-discussion-on-legacy-approaches-talent-shortage-alert-fatigue-and-over-layered-security-systems</link>
                                <description>
                                            <![CDATA[<div class="elementor-element elementor-element-b1f3841 elementor-widget elementor-widget-text-editor">
<div class="elementor-widget-container">
<p>In this episode, we are joined by Nick Schneider, as we explore the challenges organizations face in managing cybersecurity with multiple point solutions. Nick discusses the complexity of handling 30-50 different tools, and the necessity of integrating and aggregating telemetry and alerts onto a centralized platform. The episode delves into the evolution of cybersecurity, the use of AI, addressing talent shortages, and combating alert fatigue. Join us as we unravel the complexities of cybersecurity and the strategic approach needed to mitigate risks in a rapidly changing landscape.</p>
<p>As President and CEO of Arctic Wolf, Nick Schneider brings more than 15 years of experience in building global, high-growth technology companies spanning both emerging and established markets. As a veteran in the security industry, Nick has developed expertise in creating best-of-breed technology platforms and world-class sales organizations, which have been the driving force behind Arctic Wolf’s explosive growth and leadership position in the security operations market.</p>
</div>
</div>
<div class="elementor-element elementor-element-2acd1b8 elementor-widget elementor-widget-text-editor">
<div class="elementor-widget-container">
<p>Before being named CEO, Nick served as Arctic Wolf’s President and Chief Revenue Officer, where he helped lead the company to eight consecutive years of 100% sales growth, spearheaded the company’s international expansion, and oversaw Arctic Wolf’s transition to a 100% channel go-to-market model.</p>
</div>
</div>
<div class="elementor-element elementor-element-f5e26ed elementor-widget elementor-widget-text-editor">
<div class="elementor-widget-container">
<p>Prior to Arctic Wolf, Nick served as the Vice President of North American Sales for Code42, an industry-leading endpoint data protection company. Before Code42, Nick led high-performing sales teams at Compellent Technologies, where he helped the company grow to a successful IPO and eventual acquisition by Dell. Nick holds a Bachelor of Arts and Sciences degree from Duke University in public policy and economics.</p>
</div>
</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[

In this episode, we are joined by Nick Schneider, as we explore the challenges organizations face in managing cybersecurity with multiple point solutions. Nick discusses the complexity of handling 30-50 different tools, and the necessity of integrating and aggregating telemetry and alerts onto a centralized platform. The episode delves into the evolution of cybersecurity, the use of AI, addressing talent shortages, and combating alert fatigue. Join us as we unravel the complexities of cybersecurity and the strategic approach needed to mitigate risks in a rapidly changing landscape.
As President and CEO of Arctic Wolf, Nick Schneider brings more than 15 years of experience in building global, high-growth technology companies spanning both emerging and established markets. As a veteran in the security industry, Nick has developed expertise in creating best-of-breed technology platforms and world-class sales organizations, which have been the driving force behind Arctic Wolf’s explosive growth and leadership position in the security operations market.




Before being named CEO, Nick served as Arctic Wolf’s President and Chief Revenue Officer, where he helped lead the company to eight consecutive years of 100% sales growth, spearheaded the company’s international expansion, and oversaw Arctic Wolf’s transition to a 100% channel go-to-market model.




Prior to Arctic Wolf, Nick served as the Vice President of North American Sales for Code42, an industry-leading endpoint data protection company. Before Code42, Nick led high-performing sales teams at Compellent Technologies, where he helped the company grow to a successful IPO and eventual acquisition by Dell. Nick holds a Bachelor of Arts and Sciences degree from Duke University in public policy and economics.


]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 242 Deep Dive: Nick Schneider | Unpacking Challenges: A Discussion on Legacy Approaches, Talent Shortage, Alert Fatigue, and Over-layered Security Systems]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div class="elementor-element elementor-element-b1f3841 elementor-widget elementor-widget-text-editor">
<div class="elementor-widget-container">
<p>In this episode, we are joined by Nick Schneider, as we explore the challenges organizations face in managing cybersecurity with multiple point solutions. Nick discusses the complexity of handling 30-50 different tools, and the necessity of integrating and aggregating telemetry and alerts onto a centralized platform. The episode delves into the evolution of cybersecurity, the use of AI, addressing talent shortages, and combating alert fatigue. Join us as we unravel the complexities of cybersecurity and the strategic approach needed to mitigate risks in a rapidly changing landscape.</p>
<p>As President and CEO of Arctic Wolf, Nick Schneider brings more than 15 years of experience in building global, high-growth technology companies spanning both emerging and established markets. As a veteran in the security industry, Nick has developed expertise in creating best-of-breed technology platforms and world-class sales organizations, which have been the driving force behind Arctic Wolf’s explosive growth and leadership position in the security operations market.</p>
</div>
</div>
<div class="elementor-element elementor-element-2acd1b8 elementor-widget elementor-widget-text-editor">
<div class="elementor-widget-container">
<p>Before being named CEO, Nick served as Arctic Wolf’s President and Chief Revenue Officer, where he helped lead the company to eight consecutive years of 100% sales growth, spearheaded the company’s international expansion, and oversaw Arctic Wolf’s transition to a 100% channel go-to-market model.</p>
</div>
</div>
<div class="elementor-element elementor-element-f5e26ed elementor-widget elementor-widget-text-editor">
<div class="elementor-widget-container">
<p>Prior to Arctic Wolf, Nick served as the Vice President of North American Sales for Code42, an industry-leading endpoint data protection company. Before Code42, Nick led high-performing sales teams at Compellent Technologies, where he helped the company grow to a successful IPO and eventual acquisition by Dell. Nick holds a Bachelor of Arts and Sciences degree from Duke University in public policy and economics.</p>
</div>
</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1661186/c1e-n439h5m3m4s9z48n-mq3r5d2pf5m-ffaulu.mp3" length="35596374"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[

In this episode, we are joined by Nick Schneider, as we explore the challenges organizations face in managing cybersecurity with multiple point solutions. Nick discusses the complexity of handling 30-50 different tools, and the necessity of integrating and aggregating telemetry and alerts onto a centralized platform. The episode delves into the evolution of cybersecurity, the use of AI, addressing talent shortages, and combating alert fatigue. Join us as we unravel the complexities of cybersecurity and the strategic approach needed to mitigate risks in a rapidly changing landscape.
As President and CEO of Arctic Wolf, Nick Schneider brings more than 15 years of experience in building global, high-growth technology companies spanning both emerging and established markets. As a veteran in the security industry, Nick has developed expertise in creating best-of-breed technology platforms and world-class sales organizations, which have been the driving force behind Arctic Wolf’s explosive growth and leadership position in the security operations market.




Before being named CEO, Nick served as Arctic Wolf’s President and Chief Revenue Officer, where he helped lead the company to eight consecutive years of 100% sales growth, spearheaded the company’s international expansion, and oversaw Arctic Wolf’s transition to a 100% channel go-to-market model.




Prior to Arctic Wolf, Nick served as the Vice President of North American Sales for Code42, an industry-leading endpoint data protection company. Before Code42, Nick led high-performing sales teams at Compellent Technologies, where he helped the company grow to a successful IPO and eventual acquisition by Dell. Nick holds a Bachelor of Arts and Sciences degree from Duke University in public policy and economics.


]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1661186/c1a-5k0v-wwz53po0hz6g-zufcdt.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 241 Deep Dive: Mary Carmichael | Workplace Evolution: Addressing AI Skepticism, Embracing Advancements, and Navigating New Realities]]>
                </title>
                <pubDate>Fri, 09 Feb 2024 16:00:36 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1658071</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-241-deep-dive-mary-carmichael-workplace-evolution-addressing-ai-skepticism-embracing-advancements-and-navigating-new-realities</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Mary Carmichael (Vice President – ISACA Vancouver) as we dive deep into the Generative AI 2023: An ISACA Pulse Poll. Mary discusses addressing vulnerabilities and biases in AI, the societal impact on jobs and the need for upskilling, and the importance of responsible AI deployment and ethical considerations.</p>
<p>Mary Carmichael, CISA, CFE, CPA, is Director, Risk Advisory, at Momentum Technology (Vancouver Canada), and member of ISACA’s Emerging Trends Working Group and Risk Advisory Committee.</p>
<p>Read more about it:<br />
<a href="https://www.isaca.org/resources/artificial-intelligence">Gain a Clearer Understanding of AI</a><br />
<a href="https://www.isaca.org/resources/infographics/generative-ai-2023-an-isaca-pulse-poll-infographic">Generative AI 2023: An ISACA Pulse Poll infographic</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Mary Carmichael (Vice President – ISACA Vancouver) as we dive deep into the Generative AI 2023: An ISACA Pulse Poll. Mary discusses addressing vulnerabilities and biases in AI, the societal impact on jobs and the need for upskilling, and the importance of responsible AI deployment and ethical considerations.
Mary Carmichael, CISA, CFE, CPA, is Director, Risk Advisory, at Momentum Technology (Vancouver Canada), and member of ISACA’s Emerging Trends Working Group and Risk Advisory Committee.
Read more about it:
Gain a Clearer Understanding of AI
Generative AI 2023: An ISACA Pulse Poll infographic
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 241 Deep Dive: Mary Carmichael | Workplace Evolution: Addressing AI Skepticism, Embracing Advancements, and Navigating New Realities]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Mary Carmichael (Vice President – ISACA Vancouver) as we dive deep into the Generative AI 2023: An ISACA Pulse Poll. Mary discusses addressing vulnerabilities and biases in AI, the societal impact on jobs and the need for upskilling, and the importance of responsible AI deployment and ethical considerations.</p>
<p>Mary Carmichael, CISA, CFE, CPA, is Director, Risk Advisory, at Momentum Technology (Vancouver Canada), and member of ISACA’s Emerging Trends Working Group and Risk Advisory Committee.</p>
<p>Read more about it:<br />
<a href="https://www.isaca.org/resources/artificial-intelligence">Gain a Clearer Understanding of AI</a><br />
<a href="https://www.isaca.org/resources/infographics/generative-ai-2023-an-isaca-pulse-poll-infographic">Generative AI 2023: An ISACA Pulse Poll infographic</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1658071/c1e-41r8cgpq28fopgxj-5rv0z2m1smkm-47ane1.mp3" length="35833357"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Mary Carmichael (Vice President – ISACA Vancouver) as we dive deep into the Generative AI 2023: An ISACA Pulse Poll. Mary discusses addressing vulnerabilities and biases in AI, the societal impact on jobs and the need for upskilling, and the importance of responsible AI deployment and ethical considerations.
Mary Carmichael, CISA, CFE, CPA, is Director, Risk Advisory, at Momentum Technology (Vancouver Canada), and member of ISACA’s Emerging Trends Working Group and Risk Advisory Committee.
Read more about it:
Gain a Clearer Understanding of AI
Generative AI 2023: An ISACA Pulse Poll infographic
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1658071/c1a-5k0v-25dpjm6vfzv6-b2qlj1.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 240 Deep Dive: Cricket Liu | The Past, Present, and Future of DNS: Security Evolution, Collaboration, and Maximizing Infrastructure Efficiency]]>
                </title>
                <pubDate>Wed, 07 Feb 2024 16:00:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1656284</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-240-deep-dive-cricket-liu-the-past-present-and-future-of-dns-security-evolution-collaboration-and-maximizing-infrastructure-efficiency</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Cricket Liu (EVP Engineering, Chief DNS Architect – Infoblox) as we dive deep into the critical role of Domain Name System (DNS) security in closing the gap in today’s interconnected world. Cricket sheds light on the importance of protecting critical infrastructure and the significant role DNS plays in enhancing visibility and blocking threats. Brought about by his unexpected entry into the field of DNS, his extensive experience in the evolution of the internet from its nascent stages brings historical context to the dialogue, uncovering parallels between the apprehension surrounding generative AI technology and early sentiments toward the internet’s unknown prospects.</p>
<p>Cricket Liu is one of the world’s leading experts on the Domain Name System (DNS), and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an Internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including “DNS and BIND,” one of the most widely used references in the field, now in its fifth edition.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Cricket Liu (EVP Engineering, Chief DNS Architect – Infoblox) as we dive deep into the critical role of Domain Name System (DNS) security in closing the gap in today’s interconnected world. Cricket sheds light on the importance of protecting critical infrastructure and the significant role DNS plays in enhancing visibility and blocking threats. Brought about by his unexpected entry into the field of DNS, his extensive experience in the evolution of the internet from its nascent stages brings historical context to the dialogue, uncovering parallels between the apprehension surrounding generative AI technology and early sentiments toward the internet’s unknown prospects.
Cricket Liu is one of the world’s leading experts on the Domain Name System (DNS), and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an Internet consulting and training company, Acme Byte & Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including “DNS and BIND,” one of the most widely used references in the field, now in its fifth edition.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 240 Deep Dive: Cricket Liu | The Past, Present, and Future of DNS: Security Evolution, Collaboration, and Maximizing Infrastructure Efficiency]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Cricket Liu (EVP Engineering, Chief DNS Architect – Infoblox) as we dive deep into the critical role of Domain Name System (DNS) security in closing the gap in today’s interconnected world. Cricket sheds light on the importance of protecting critical infrastructure and the significant role DNS plays in enhancing visibility and blocking threats. Brought about by his unexpected entry into the field of DNS, his extensive experience in the evolution of the internet from its nascent stages brings historical context to the dialogue, uncovering parallels between the apprehension surrounding generative AI technology and early sentiments toward the internet’s unknown prospects.</p>
<p>Cricket Liu is one of the world’s leading experts on the Domain Name System (DNS), and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an Internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including “DNS and BIND,” one of the most widely used references in the field, now in its fifth edition.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1656284/c1e-02xms8pnv9bgm3kp-p80k19j1i0j-bnam5x.mp3" length="34316583"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Cricket Liu (EVP Engineering, Chief DNS Architect – Infoblox) as we dive deep into the critical role of Domain Name System (DNS) security in closing the gap in today’s interconnected world. Cricket sheds light on the importance of protecting critical infrastructure and the significant role DNS plays in enhancing visibility and blocking threats. Brought about by his unexpected entry into the field of DNS, his extensive experience in the evolution of the internet from its nascent stages brings historical context to the dialogue, uncovering parallels between the apprehension surrounding generative AI technology and early sentiments toward the internet’s unknown prospects.
Cricket Liu is one of the world’s leading experts on the Domain Name System (DNS), and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an Internet consulting and training company, Acme Byte & Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including “DNS and BIND,” one of the most widely used references in the field, now in its fifth edition.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1656284/c1a-5k0v-ndw56v8xt59-9tmupk.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 239 Deep Dive: James Campbell | Cloud Security Complexity and the Role of Automation in Digital Forensics]]>
                </title>
                <pubDate>Wed, 31 Jan 2024 16:00:27 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1648896</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-239-deep-dive-james-campbell-cloud-security-complexity-and-the-role-of-automation-in-digital-forensics</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by James Campbell (CEO and Co-Founder of Cado Security) as we explore modern digital forensics and the complexity of the cloud. They discuss the transition from on-premise to cloud operations, the unique risks associated with ephemeral cloud infrastructure, and the growing need for automation in digital forensics to streamline routine tasks and enable security professionals to focus on advanced problem-solving. Join us as we unravel the intricacies of cloud security, automation in digital forensics, and the continuous learning and adaptation necessary to stay ahead in the rapidly evolving industry.</p>
<p>With over 15 years experience helping global organisations tackle sophisticated cyber espionage and criminal campaigns, James has a deep passion for cyber incident response, forensics and cyber crisis. Prior to founding Cado Security, Campbell served as a Director at PwC building the Cyber Incident Response service. Campbell’s background also includes a career in intelligence previously leading Australia’s National Incident Response capability as the Assistant Director of Operations at the Australian Signals Directorate. James is an active thought leader having spoken at various conferences including Blackhat, Cloudsec, Crestcon, and the Forensics Europe Expo.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by James Campbell (CEO and Co-Founder of Cado Security) as we explore modern digital forensics and the complexity of the cloud. They discuss the transition from on-premise to cloud operations, the unique risks associated with ephemeral cloud infrastructure, and the growing need for automation in digital forensics to streamline routine tasks and enable security professionals to focus on advanced problem-solving. Join us as we unravel the intricacies of cloud security, automation in digital forensics, and the continuous learning and adaptation necessary to stay ahead in the rapidly evolving industry.
With over 15 years experience helping global organisations tackle sophisticated cyber espionage and criminal campaigns, James has a deep passion for cyber incident response, forensics and cyber crisis. Prior to founding Cado Security, Campbell served as a Director at PwC building the Cyber Incident Response service. Campbell’s background also includes a career in intelligence previously leading Australia’s National Incident Response capability as the Assistant Director of Operations at the Australian Signals Directorate. James is an active thought leader having spoken at various conferences including Blackhat, Cloudsec, Crestcon, and the Forensics Europe Expo.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 239 Deep Dive: James Campbell | Cloud Security Complexity and the Role of Automation in Digital Forensics]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by James Campbell (CEO and Co-Founder of Cado Security) as we explore modern digital forensics and the complexity of the cloud. They discuss the transition from on-premise to cloud operations, the unique risks associated with ephemeral cloud infrastructure, and the growing need for automation in digital forensics to streamline routine tasks and enable security professionals to focus on advanced problem-solving. Join us as we unravel the intricacies of cloud security, automation in digital forensics, and the continuous learning and adaptation necessary to stay ahead in the rapidly evolving industry.</p>
<p>With over 15 years experience helping global organisations tackle sophisticated cyber espionage and criminal campaigns, James has a deep passion for cyber incident response, forensics and cyber crisis. Prior to founding Cado Security, Campbell served as a Director at PwC building the Cyber Incident Response service. Campbell’s background also includes a career in intelligence previously leading Australia’s National Incident Response capability as the Assistant Director of Operations at the Australian Signals Directorate. James is an active thought leader having spoken at various conferences including Blackhat, Cloudsec, Crestcon, and the Forensics Europe Expo.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1648896/c1e-5k0vbkw13rh0xmv3-dd7d6965t15v-p8muba.mp3" length="34905070"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by James Campbell (CEO and Co-Founder of Cado Security) as we explore modern digital forensics and the complexity of the cloud. They discuss the transition from on-premise to cloud operations, the unique risks associated with ephemeral cloud infrastructure, and the growing need for automation in digital forensics to streamline routine tasks and enable security professionals to focus on advanced problem-solving. Join us as we unravel the intricacies of cloud security, automation in digital forensics, and the continuous learning and adaptation necessary to stay ahead in the rapidly evolving industry.
With over 15 years experience helping global organisations tackle sophisticated cyber espionage and criminal campaigns, James has a deep passion for cyber incident response, forensics and cyber crisis. Prior to founding Cado Security, Campbell served as a Director at PwC building the Cyber Incident Response service. Campbell’s background also includes a career in intelligence previously leading Australia’s National Incident Response capability as the Assistant Director of Operations at the Australian Signals Directorate. James is an active thought leader having spoken at various conferences including Blackhat, Cloudsec, Crestcon, and the Forensics Europe Expo.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1648896/c1a-5k0v-3323kz84udj9-ld7aae.png"></itunes:image>
                                                                            <itunes:duration>00:36:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 238 Deep Dive: Alex Tilley | Building a Stronger Cyber Culture: Expert Advice on Collaboration and Ownership in Security]]>
                </title>
                <pubDate>Wed, 24 Jan 2024 16:00:12 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1640598</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-238-deep-dive-alex-tilley-building-a-stronger-cyber-culture-expert-advice-on-collaboration-and-ownership-in-security</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Alex Tilley (Head of Threat Intelligence, Asia Pacific and Japan – Secureworks) as we dive deep into the challenges that come with fostering a strong security culture within organizations. We explore the importance of cross-departmental collaboration, the need for clear and engaging cybersecurity training, and the emotional hurdles of dealing with security incidents.</p>
<p>Alex shares valuable insights in handling crises, addressing ego-driven conflicts, and the crucial role of the board in cyber. Join us as we unravel the intricate layers of today’s security culture and learn from his experiences and expertise.</p>
<p>With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia’s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia’s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police’s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover “who” the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals.  During this time Alex become a key member of the operations team responsible for many high profile cases.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Alex Tilley (Head of Threat Intelligence, Asia Pacific and Japan – Secureworks) as we dive deep into the challenges that come with fostering a strong security culture within organizations. We explore the importance of cross-departmental collaboration, the need for clear and engaging cybersecurity training, and the emotional hurdles of dealing with security incidents.
Alex shares valuable insights in handling crises, addressing ego-driven conflicts, and the crucial role of the board in cyber. Join us as we unravel the intricate layers of today’s security culture and learn from his experiences and expertise.
With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia’s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia’s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police’s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover “who” the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals.  During this time Alex become a key member of the operations team responsible for many high profile cases.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 238 Deep Dive: Alex Tilley | Building a Stronger Cyber Culture: Expert Advice on Collaboration and Ownership in Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Alex Tilley (Head of Threat Intelligence, Asia Pacific and Japan – Secureworks) as we dive deep into the challenges that come with fostering a strong security culture within organizations. We explore the importance of cross-departmental collaboration, the need for clear and engaging cybersecurity training, and the emotional hurdles of dealing with security incidents.</p>
<p>Alex shares valuable insights in handling crises, addressing ego-driven conflicts, and the crucial role of the board in cyber. Join us as we unravel the intricate layers of today’s security culture and learn from his experiences and expertise.</p>
<p>With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia’s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia’s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police’s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover “who” the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals.  During this time Alex become a key member of the operations team responsible for many high profile cases.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1640598/c1e-q40nh41wddi0v2wv-jkwq3m0mb7gp-4mbi6i.mp3" length="43475373"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Alex Tilley (Head of Threat Intelligence, Asia Pacific and Japan – Secureworks) as we dive deep into the challenges that come with fostering a strong security culture within organizations. We explore the importance of cross-departmental collaboration, the need for clear and engaging cybersecurity training, and the emotional hurdles of dealing with security incidents.
Alex shares valuable insights in handling crises, addressing ego-driven conflicts, and the crucial role of the board in cyber. Join us as we unravel the intricate layers of today’s security culture and learn from his experiences and expertise.
With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia’s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia’s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police’s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover “who” the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals.  During this time Alex become a key member of the operations team responsible for many high profile cases.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1640598/c1a-5k0v-o8rpjmjxu0q2-g9dbfo.png"></itunes:image>
                                                                            <itunes:duration>00:45:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 237 Deep Dive: Rachael Greaves | From Compliance to Consequences: Safeguarding Records in Today’s Virtual Environment]]>
                </title>
                <pubDate>Fri, 19 Jan 2024 16:00:56 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1637569</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-237-deep-dive-rachael-greaves-from-compliance-to-consequences-safeguarding-records-in-todays-virtual-environment</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Rachael Greaves (CEO and Co-Founder at Castlepoint Systems) as she sheds light on the far-reaching consequences of records mismanagement and the integration of artificial intelligence (AI) in decision-making processes. The discussion delves into the ramifications of mishandling information, the advent of new privacy regulations, and the imperative need for efficient records governance in the age of evolving technology.</p>
<p>Rachael highlights the need for a new approach to managing information, acknowledging the challenges of audits and their impact on users and systems. She emphasised the potential of AI technology in managing information and its effects on regulators and businesses, particularly as noncompliance in audits and increased pressure from regulators due to cybersecurity and privacy concerns become prevalent.</p>
<p>Rachael Greaves is CEO and Co-Founder at Castlepoint Systems, and has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments. Rachael’s credentials include: Certified Information Systems Auditor (CISA), PRINCE2 (Practitioner), Certified Data Privacy Systems Engineer (CDPSE) ITIL v3 (Foundation), AIIM Certified Information Professional (CIP), and AIIM SharePoint Information Management Specialist. She is also an IIBA member.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Rachael Greaves (CEO and Co-Founder at Castlepoint Systems) as she sheds light on the far-reaching consequences of records mismanagement and the integration of artificial intelligence (AI) in decision-making processes. The discussion delves into the ramifications of mishandling information, the advent of new privacy regulations, and the imperative need for efficient records governance in the age of evolving technology.
Rachael highlights the need for a new approach to managing information, acknowledging the challenges of audits and their impact on users and systems. She emphasised the potential of AI technology in managing information and its effects on regulators and businesses, particularly as noncompliance in audits and increased pressure from regulators due to cybersecurity and privacy concerns become prevalent.
Rachael Greaves is CEO and Co-Founder at Castlepoint Systems, and has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments. Rachael’s credentials include: Certified Information Systems Auditor (CISA), PRINCE2 (Practitioner), Certified Data Privacy Systems Engineer (CDPSE) ITIL v3 (Foundation), AIIM Certified Information Professional (CIP), and AIIM SharePoint Information Management Specialist. She is also an IIBA member.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 237 Deep Dive: Rachael Greaves | From Compliance to Consequences: Safeguarding Records in Today’s Virtual Environment]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Rachael Greaves (CEO and Co-Founder at Castlepoint Systems) as she sheds light on the far-reaching consequences of records mismanagement and the integration of artificial intelligence (AI) in decision-making processes. The discussion delves into the ramifications of mishandling information, the advent of new privacy regulations, and the imperative need for efficient records governance in the age of evolving technology.</p>
<p>Rachael highlights the need for a new approach to managing information, acknowledging the challenges of audits and their impact on users and systems. She emphasised the potential of AI technology in managing information and its effects on regulators and businesses, particularly as noncompliance in audits and increased pressure from regulators due to cybersecurity and privacy concerns become prevalent.</p>
<p>Rachael Greaves is CEO and Co-Founder at Castlepoint Systems, and has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments. Rachael’s credentials include: Certified Information Systems Auditor (CISA), PRINCE2 (Practitioner), Certified Data Privacy Systems Engineer (CDPSE) ITIL v3 (Foundation), AIIM Certified Information Professional (CIP), and AIIM SharePoint Information Management Specialist. She is also an IIBA member.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1637569/c1e-jjvwh29jwmtn1k71-92kqkwx0b3qx-km3xjz.mp3" length="39484077"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Rachael Greaves (CEO and Co-Founder at Castlepoint Systems) as she sheds light on the far-reaching consequences of records mismanagement and the integration of artificial intelligence (AI) in decision-making processes. The discussion delves into the ramifications of mishandling information, the advent of new privacy regulations, and the imperative need for efficient records governance in the age of evolving technology.
Rachael highlights the need for a new approach to managing information, acknowledging the challenges of audits and their impact on users and systems. She emphasised the potential of AI technology in managing information and its effects on regulators and businesses, particularly as noncompliance in audits and increased pressure from regulators due to cybersecurity and privacy concerns become prevalent.
Rachael Greaves is CEO and Co-Founder at Castlepoint Systems, and has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments. Rachael’s credentials include: Certified Information Systems Auditor (CISA), PRINCE2 (Practitioner), Certified Data Privacy Systems Engineer (CDPSE) ITIL v3 (Foundation), AIIM Certified Information Professional (CIP), and AIIM SharePoint Information Management Specialist. She is also an IIBA member.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1637569/c1a-5k0v-z3z60prvin9d-zng3ot.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 236 Deep Dive: Jenai Marinkovic | AI Governance Unveiled: Managing Risks, Setting Policies, and Upholding Ethical Standards]]>
                </title>
                <pubDate>Wed, 10 Jan 2024 16:00:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1630023</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-236-deep-dive-jenai-marinkovic-ai-governance-unveiled-managing-risks-setting-policies-and-upholding-ethical-standards</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Jenai Marinkovic (Executive Director &amp; Chairman of the Board – GRC for Intelligent ecosystems or GRCIE) as we discuss <a href="https://www.isaca.org/resources/white-papers/2023/the-promise-and-peril-of-the-ai-revolution">ISACA’s White Paper – The Promise and Peril of the AI Revolution: Managing Risk</a>. We discuss the risks, challenges, and societal impact of generative AI, while also touching on the urgent need for policies, frameworks, and control structures to address these evolving concerns. Jenai also talks about the crucial role of ethical standards in the deployment of AI, the implications of job displacement and skills adaptation, and the future of AI through the lens of governance, cybersecurity, and training.</p>
<p>Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.</p>
<p>Jenai’s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.</p>
<p>Now she serves as the Executive Director &amp; Chairman of the Board at GRC for Intelligent ecosystems or GRCIE (Pronounced Gracie).</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Jenai Marinkovic (Executive Director & Chairman of the Board – GRC for Intelligent ecosystems or GRCIE) as we discuss ISACA’s White Paper – The Promise and Peril of the AI Revolution: Managing Risk. We discuss the risks, challenges, and societal impact of generative AI, while also touching on the urgent need for policies, frameworks, and control structures to address these evolving concerns. Jenai also talks about the crucial role of ethical standards in the deployment of AI, the implications of job displacement and skills adaptation, and the future of AI through the lens of governance, cybersecurity, and training.
Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.
Jenai’s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.
Now she serves as the Executive Director & Chairman of the Board at GRC for Intelligent ecosystems or GRCIE (Pronounced Gracie).
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 236 Deep Dive: Jenai Marinkovic | AI Governance Unveiled: Managing Risks, Setting Policies, and Upholding Ethical Standards]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Jenai Marinkovic (Executive Director &amp; Chairman of the Board – GRC for Intelligent ecosystems or GRCIE) as we discuss <a href="https://www.isaca.org/resources/white-papers/2023/the-promise-and-peril-of-the-ai-revolution">ISACA’s White Paper – The Promise and Peril of the AI Revolution: Managing Risk</a>. We discuss the risks, challenges, and societal impact of generative AI, while also touching on the urgent need for policies, frameworks, and control structures to address these evolving concerns. Jenai also talks about the crucial role of ethical standards in the deployment of AI, the implications of job displacement and skills adaptation, and the future of AI through the lens of governance, cybersecurity, and training.</p>
<p>Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.</p>
<p>Jenai’s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.</p>
<p>Now she serves as the Executive Director &amp; Chairman of the Board at GRC for Intelligent ecosystems or GRCIE (Pronounced Gracie).</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1630023/c1e-x8jpipnnnoun7w97-1xg4w4p2ajdk-velktd.mp3" length="38990253"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Jenai Marinkovic (Executive Director & Chairman of the Board – GRC for Intelligent ecosystems or GRCIE) as we discuss ISACA’s White Paper – The Promise and Peril of the AI Revolution: Managing Risk. We discuss the risks, challenges, and societal impact of generative AI, while also touching on the urgent need for policies, frameworks, and control structures to address these evolving concerns. Jenai also talks about the crucial role of ethical standards in the deployment of AI, the implications of job displacement and skills adaptation, and the future of AI through the lens of governance, cybersecurity, and training.
Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.
Jenai’s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.
Now she serves as the Executive Director & Chairman of the Board at GRC for Intelligent ecosystems or GRCIE (Pronounced Gracie).
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1630023/c1a-5k0v-dd74rxd9f92-kcmoif.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:37</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 235 Deep Dive: Dan Elliott | Understanding Cyber Risk Management: Strategies for Effective Communication]]>
                </title>
                <pubDate>Wed, 20 Dec 2023 16:00:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1618554</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-235-deep-dive-dan-elliott-understanding-cyber-risk-management-strategies-for-effective-communication</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Dan Elliott (Principal for Cyber Security Risk Consulting – Zurich Resilience Solutions) as we delve into the critical topic of aligning cyber leaders with business objectives. We explore the challenges of communicating cyber risks effectively, dissect the need for a common language in cybersecurity, and discuss the evolving role of CISOs as business enablers. Join us as we tackle the intricacies of cyber risk management, the importance of understanding business goals, and the quest for a universal language in the cyber world.</p>
<p style="font-weight:400;">Dan Elliott is the Principal for Cyber Security Risk Consulting at Zurich Resilience Solutions (ZRS) Canada and is responsible for supporting ZRS’s clients in making risk-based cybersecurity decisions to improve their overall organizational resilience. Dan has over 15 years of experience in national security and risk management and brings a unique perspective to cyber risk, having spent six years as an Intelligence Officer with the Canadian Security Intelligence Service (CSIS). Prior to that, he spent nearly a decade in law enforcement and intelligence, investigating multinational criminal organisations both online and in person. He evaluates cyber risk with the knowledge of international threat actors and the potential impact they pose to businesses and critical infrastructure, helping organizations improve their overall risk posture.</p>
<p style="font-weight:400;">Dan is also trained in multiple cyber risk management frameworks and holds specialized expertise in stakeholder management and strategic program design. He speaks internationally about the communication challenges that exist between traditional technical professionals and business leaders. He is a regional board member of the Risk and Insurance Management Society (RIMS), a Risk Fellow (RF) and is a Certified Risk Management Professional (CRMP and CRM). Dan is a contributing member of the Cybersecurity Advisors Network (CyAN), a volunteer member with ISACA and is accredited as Certified in Risk and Information Systems Controls (CRISC).</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Dan Elliott (Principal for Cyber Security Risk Consulting – Zurich Resilience Solutions) as we delve into the critical topic of aligning cyber leaders with business objectives. We explore the challenges of communicating cyber risks effectively, dissect the need for a common language in cybersecurity, and discuss the evolving role of CISOs as business enablers. Join us as we tackle the intricacies of cyber risk management, the importance of understanding business goals, and the quest for a universal language in the cyber world.
Dan Elliott is the Principal for Cyber Security Risk Consulting at Zurich Resilience Solutions (ZRS) Canada and is responsible for supporting ZRS’s clients in making risk-based cybersecurity decisions to improve their overall organizational resilience. Dan has over 15 years of experience in national security and risk management and brings a unique perspective to cyber risk, having spent six years as an Intelligence Officer with the Canadian Security Intelligence Service (CSIS). Prior to that, he spent nearly a decade in law enforcement and intelligence, investigating multinational criminal organisations both online and in person. He evaluates cyber risk with the knowledge of international threat actors and the potential impact they pose to businesses and critical infrastructure, helping organizations improve their overall risk posture.
Dan is also trained in multiple cyber risk management frameworks and holds specialized expertise in stakeholder management and strategic program design. He speaks internationally about the communication challenges that exist between traditional technical professionals and business leaders. He is a regional board member of the Risk and Insurance Management Society (RIMS), a Risk Fellow (RF) and is a Certified Risk Management Professional (CRMP and CRM). Dan is a contributing member of the Cybersecurity Advisors Network (CyAN), a volunteer member with ISACA and is accredited as Certified in Risk and Information Systems Controls (CRISC).
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 235 Deep Dive: Dan Elliott | Understanding Cyber Risk Management: Strategies for Effective Communication]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Dan Elliott (Principal for Cyber Security Risk Consulting – Zurich Resilience Solutions) as we delve into the critical topic of aligning cyber leaders with business objectives. We explore the challenges of communicating cyber risks effectively, dissect the need for a common language in cybersecurity, and discuss the evolving role of CISOs as business enablers. Join us as we tackle the intricacies of cyber risk management, the importance of understanding business goals, and the quest for a universal language in the cyber world.</p>
<p style="font-weight:400;">Dan Elliott is the Principal for Cyber Security Risk Consulting at Zurich Resilience Solutions (ZRS) Canada and is responsible for supporting ZRS’s clients in making risk-based cybersecurity decisions to improve their overall organizational resilience. Dan has over 15 years of experience in national security and risk management and brings a unique perspective to cyber risk, having spent six years as an Intelligence Officer with the Canadian Security Intelligence Service (CSIS). Prior to that, he spent nearly a decade in law enforcement and intelligence, investigating multinational criminal organisations both online and in person. He evaluates cyber risk with the knowledge of international threat actors and the potential impact they pose to businesses and critical infrastructure, helping organizations improve their overall risk posture.</p>
<p style="font-weight:400;">Dan is also trained in multiple cyber risk management frameworks and holds specialized expertise in stakeholder management and strategic program design. He speaks internationally about the communication challenges that exist between traditional technical professionals and business leaders. He is a regional board member of the Risk and Insurance Management Society (RIMS), a Risk Fellow (RF) and is a Certified Risk Management Professional (CRMP and CRM). Dan is a contributing member of the Cybersecurity Advisors Network (CyAN), a volunteer member with ISACA and is accredited as Certified in Risk and Information Systems Controls (CRISC).</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1618554/c1e-kdkxs49zo6f941v4-ddqq4qxzu1x9-nkrwdk.mp3" length="39428013"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Dan Elliott (Principal for Cyber Security Risk Consulting – Zurich Resilience Solutions) as we delve into the critical topic of aligning cyber leaders with business objectives. We explore the challenges of communicating cyber risks effectively, dissect the need for a common language in cybersecurity, and discuss the evolving role of CISOs as business enablers. Join us as we tackle the intricacies of cyber risk management, the importance of understanding business goals, and the quest for a universal language in the cyber world.
Dan Elliott is the Principal for Cyber Security Risk Consulting at Zurich Resilience Solutions (ZRS) Canada and is responsible for supporting ZRS’s clients in making risk-based cybersecurity decisions to improve their overall organizational resilience. Dan has over 15 years of experience in national security and risk management and brings a unique perspective to cyber risk, having spent six years as an Intelligence Officer with the Canadian Security Intelligence Service (CSIS). Prior to that, he spent nearly a decade in law enforcement and intelligence, investigating multinational criminal organisations both online and in person. He evaluates cyber risk with the knowledge of international threat actors and the potential impact they pose to businesses and critical infrastructure, helping organizations improve their overall risk posture.
Dan is also trained in multiple cyber risk management frameworks and holds specialized expertise in stakeholder management and strategic program design. He speaks internationally about the communication challenges that exist between traditional technical professionals and business leaders. He is a regional board member of the Risk and Insurance Management Society (RIMS), a Risk Fellow (RF) and is a Certified Risk Management Professional (CRMP and CRM). Dan is a contributing member of the Cybersecurity Advisors Network (CyAN), a volunteer member with ISACA and is accredited as Certified in Risk and Information Systems Controls (CRISC).
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1618554/c1a-5k0v-7n772781f4k1-a4szhq.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 234 Deep Dive: Tulin Sevgin | Tackling Third-Party Risk Management: Crucial Insights for Effective Due Diligence]]>
                </title>
                <pubDate>Fri, 15 Dec 2023 16:00:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1615709</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-234-deep-dive-tulin-sevgin-tackling-third-party-risk-management-crucial-insights-for-effective-due-diligence</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Tulin Sevgin (Director – National Cyber Security Practice, MinterEllison) as we unravel the complexities and potential oversights in working with vendors. Tulin sheds light on the critical need for due diligence in the procurement process to mitigate future risks, emphasising the impact of vendor changes on data access and infrastructure. Tulin navigates the labyrinth of vendor risk governance and emphasizes the significance of ongoing monitoring. Join us as we delve into the intricacies of vendor assessments, the challenges involved, and the supply chain landscape.</p>
<p>Tulin Sevgin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.</p>
<p>Amongst Tulin’s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.</p>
<p>Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,<br />
control and assurance. Tulin’s past working experience spans enterprise risk management, business<br />
continuity, risk culture analysis, project management, issues management, IT audit, data analytics,<br />
internal audit and external audit.<br />
Tulin has worked across multiple projects from:</p>
<ul>
<li>Developing and implementing successful Third-Party Risk Management Frameworks</li>
<li>APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness</li>
<li>Information Security Officer positions</li>
<li>Cyber Security Incident response exercises</li>
<li>Creating and exercising data breach response plans</li>
<li>Developing, managing and testing IT disaster recovery plans</li>
<li>Enhancing cyber risk frameworks for various clients</li>
<li>Facilitating cyber security awareness training</li>
<li>Post cyber incident reviews</li>
<li>Social engineering projects</li>
</ul>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Tulin Sevgin (Director – National Cyber Security Practice, MinterEllison) as we unravel the complexities and potential oversights in working with vendors. Tulin sheds light on the critical need for due diligence in the procurement process to mitigate future risks, emphasising the impact of vendor changes on data access and infrastructure. Tulin navigates the labyrinth of vendor risk governance and emphasizes the significance of ongoing monitoring. Join us as we delve into the intricacies of vendor assessments, the challenges involved, and the supply chain landscape.
Tulin Sevgin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.
Amongst Tulin’s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.
Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,
control and assurance. Tulin’s past working experience spans enterprise risk management, business
continuity, risk culture analysis, project management, issues management, IT audit, data analytics,
internal audit and external audit.
Tulin has worked across multiple projects from:

Developing and implementing successful Third-Party Risk Management Frameworks
APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness
Information Security Officer positions
Cyber Security Incident response exercises
Creating and exercising data breach response plans
Developing, managing and testing IT disaster recovery plans
Enhancing cyber risk frameworks for various clients
Facilitating cyber security awareness training
Post cyber incident reviews
Social engineering projects

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 234 Deep Dive: Tulin Sevgin | Tackling Third-Party Risk Management: Crucial Insights for Effective Due Diligence]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Tulin Sevgin (Director – National Cyber Security Practice, MinterEllison) as we unravel the complexities and potential oversights in working with vendors. Tulin sheds light on the critical need for due diligence in the procurement process to mitigate future risks, emphasising the impact of vendor changes on data access and infrastructure. Tulin navigates the labyrinth of vendor risk governance and emphasizes the significance of ongoing monitoring. Join us as we delve into the intricacies of vendor assessments, the challenges involved, and the supply chain landscape.</p>
<p>Tulin Sevgin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.</p>
<p>Amongst Tulin’s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.</p>
<p>Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,<br />
control and assurance. Tulin’s past working experience spans enterprise risk management, business<br />
continuity, risk culture analysis, project management, issues management, IT audit, data analytics,<br />
internal audit and external audit.<br />
Tulin has worked across multiple projects from:</p>
<ul>
<li>Developing and implementing successful Third-Party Risk Management Frameworks</li>
<li>APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness</li>
<li>Information Security Officer positions</li>
<li>Cyber Security Incident response exercises</li>
<li>Creating and exercising data breach response plans</li>
<li>Developing, managing and testing IT disaster recovery plans</li>
<li>Enhancing cyber risk frameworks for various clients</li>
<li>Facilitating cyber security awareness training</li>
<li>Post cyber incident reviews</li>
<li>Social engineering projects</li>
</ul>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/cb3ef1c1-8d08-4fa5-902e-8f9140601895-KBKAST-EP-Tulin-Sevgin.mp3" length="38942138"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Tulin Sevgin (Director – National Cyber Security Practice, MinterEllison) as we unravel the complexities and potential oversights in working with vendors. Tulin sheds light on the critical need for due diligence in the procurement process to mitigate future risks, emphasising the impact of vendor changes on data access and infrastructure. Tulin navigates the labyrinth of vendor risk governance and emphasizes the significance of ongoing monitoring. Join us as we delve into the intricacies of vendor assessments, the challenges involved, and the supply chain landscape.
Tulin Sevgin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.
Amongst Tulin’s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.
Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,
control and assurance. Tulin’s past working experience spans enterprise risk management, business
continuity, risk culture analysis, project management, issues management, IT audit, data analytics,
internal audit and external audit.
Tulin has worked across multiple projects from:

Developing and implementing successful Third-Party Risk Management Frameworks
APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness
Information Security Officer positions
Cyber Security Incident response exercises
Creating and exercising data breach response plans
Developing, managing and testing IT disaster recovery plans
Enhancing cyber risk frameworks for various clients
Facilitating cyber security awareness training
Post cyber incident reviews
Social engineering projects

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1615709/1702611904-Tulin-Sevgin.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 233 Deep Dive: Geoff Schomburgk | Securing Digital Identity: A Discussion on The Use of Passwords and Their Future]]>
                </title>
                <pubDate>Wed, 13 Dec 2023 16:00:01 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1614402</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-233-deep-dive-geoff-schomburgk-securing-digital-identity-a-discussion-on-the-use-of-passwords-and-their-future</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Geoff Schomburgk (Regional Vice President, Asia Pacific &amp; Japan – Yubico) as we explore the transition from traditional username and password systems to passwordless experiences. Together, we discuss the frustrations with current security methods, the need for consumer awareness, and the importance of businesses and government setting the standard for security measures. From practicality and usability to the business value of security technologies, Geoff delves into the evolving conversation around cybersecurity and the potential for multifaceted benefits. Tune in for a deep dive into the future of digital identity protection and the impact of modern authentication methods.</p>
<p>At Yubico, Geoff is responsible for driving the Yubico business across Australia and New Zealand, working with partners and enterprise customers to implement secure modern authentication, helping make the internet safer for all.</p>
<p>Geoff brings a strong customer focus and a proven ability to implement complex technology solutions across a range of industries, including telecommunications, utility and transport sectors across Australia, Asia and Europe.  Critical to the success of these projects is the definition and realisation of tangible business value, where the combination of Geoff’s business consulting approach and project delivery experience consistently deliver business value.</p>
<p>Geoff is an experienced senior executive with a background in engineering and strategy consulting and over 30 years’ experience in the global information and communications technology (ICT) industry.  Geoff has a Bachelor of Engineering and MBA and is also a Non-Executive Director and business mentor to several Not For Profit (NFP) organisations. He is a Fellow of the Australian Institute of Company Directors (GAICD), with B.E. (Hons) and M.B.A.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Geoff Schomburgk (Regional Vice President, Asia Pacific & Japan – Yubico) as we explore the transition from traditional username and password systems to passwordless experiences. Together, we discuss the frustrations with current security methods, the need for consumer awareness, and the importance of businesses and government setting the standard for security measures. From practicality and usability to the business value of security technologies, Geoff delves into the evolving conversation around cybersecurity and the potential for multifaceted benefits. Tune in for a deep dive into the future of digital identity protection and the impact of modern authentication methods.
At Yubico, Geoff is responsible for driving the Yubico business across Australia and New Zealand, working with partners and enterprise customers to implement secure modern authentication, helping make the internet safer for all.
Geoff brings a strong customer focus and a proven ability to implement complex technology solutions across a range of industries, including telecommunications, utility and transport sectors across Australia, Asia and Europe.  Critical to the success of these projects is the definition and realisation of tangible business value, where the combination of Geoff’s business consulting approach and project delivery experience consistently deliver business value.
Geoff is an experienced senior executive with a background in engineering and strategy consulting and over 30 years’ experience in the global information and communications technology (ICT) industry.  Geoff has a Bachelor of Engineering and MBA and is also a Non-Executive Director and business mentor to several Not For Profit (NFP) organisations. He is a Fellow of the Australian Institute of Company Directors (GAICD), with B.E. (Hons) and M.B.A.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 233 Deep Dive: Geoff Schomburgk | Securing Digital Identity: A Discussion on The Use of Passwords and Their Future]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Geoff Schomburgk (Regional Vice President, Asia Pacific &amp; Japan – Yubico) as we explore the transition from traditional username and password systems to passwordless experiences. Together, we discuss the frustrations with current security methods, the need for consumer awareness, and the importance of businesses and government setting the standard for security measures. From practicality and usability to the business value of security technologies, Geoff delves into the evolving conversation around cybersecurity and the potential for multifaceted benefits. Tune in for a deep dive into the future of digital identity protection and the impact of modern authentication methods.</p>
<p>At Yubico, Geoff is responsible for driving the Yubico business across Australia and New Zealand, working with partners and enterprise customers to implement secure modern authentication, helping make the internet safer for all.</p>
<p>Geoff brings a strong customer focus and a proven ability to implement complex technology solutions across a range of industries, including telecommunications, utility and transport sectors across Australia, Asia and Europe.  Critical to the success of these projects is the definition and realisation of tangible business value, where the combination of Geoff’s business consulting approach and project delivery experience consistently deliver business value.</p>
<p>Geoff is an experienced senior executive with a background in engineering and strategy consulting and over 30 years’ experience in the global information and communications technology (ICT) industry.  Geoff has a Bachelor of Engineering and MBA and is also a Non-Executive Director and business mentor to several Not For Profit (NFP) organisations. He is a Fellow of the Australian Institute of Company Directors (GAICD), with B.E. (Hons) and M.B.A.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/9b506dcc-b1e8-425a-bf57-fffe73af5cbf-KBKAST-EP-Geoff-Schomburgk.mp3" length="36766893"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Geoff Schomburgk (Regional Vice President, Asia Pacific & Japan – Yubico) as we explore the transition from traditional username and password systems to passwordless experiences. Together, we discuss the frustrations with current security methods, the need for consumer awareness, and the importance of businesses and government setting the standard for security measures. From practicality and usability to the business value of security technologies, Geoff delves into the evolving conversation around cybersecurity and the potential for multifaceted benefits. Tune in for a deep dive into the future of digital identity protection and the impact of modern authentication methods.
At Yubico, Geoff is responsible for driving the Yubico business across Australia and New Zealand, working with partners and enterprise customers to implement secure modern authentication, helping make the internet safer for all.
Geoff brings a strong customer focus and a proven ability to implement complex technology solutions across a range of industries, including telecommunications, utility and transport sectors across Australia, Asia and Europe.  Critical to the success of these projects is the definition and realisation of tangible business value, where the combination of Geoff’s business consulting approach and project delivery experience consistently deliver business value.
Geoff is an experienced senior executive with a background in engineering and strategy consulting and over 30 years’ experience in the global information and communications technology (ICT) industry.  Geoff has a Bachelor of Engineering and MBA and is also a Non-Executive Director and business mentor to several Not For Profit (NFP) organisations. He is a Fellow of the Australian Institute of Company Directors (GAICD), with B.E. (Hons) and M.B.A.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1614402/c1a-5k0v-kp216ng0i4om-7hvqpj.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 232 Deep Dive: Pierre Liddle | Future-Proofing Security: Unpacking Cloud Native Application Protection Platforms (CNAPP)]]>
                </title>
                <pubDate>Fri, 08 Dec 2023 16:00:24 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1612231</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-232-deep-dive-pierre-liddle-future-proofing-security-unpacking-cloud-native-application-protection-platforms-cnapp</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Pierre Liddle (Co-Founder, Plerion) dive deep into the ever-evolving landscape of cloud security, tackling misconceptions, and examining the potential of cloud native application protection platforms (CNAPP) as a line of defense against attacks. We shed light on the dynamic nature of security threats, the benefits of cloud technology, and the strategic importance of finding the right partners.</p>
<p><span style="font-weight:400;">Pierre Liddle is a distinguished expert with over 20 years of dedicated experience in the dynamic field of security. As the Co-founder and CTO of Plerion, he serves as the guiding force behind the company’s strategic vision. Pierre’s extensive career includes an impressive seven-year tenure at AWS, where he played a crucial role in driving global internal security programs and collaborating with customers to design, build, and manage secure cloud workloads. This direct and hands-on engagement has equipped him with an unparalleled understanding of the precise challenges and pain points that organisations encounter in the realm of cloud security.</span></p>
<p><span style="font-weight:400;">With a profound commitment to enhancing cloud security practices, and a vision to make the world a safer place by empowering customers to conquer the future, Pierre brings his wealth of knowledge to the forefront at Plerion. His leadership and domain expertise empower the company to provide cutting-edge solutions that address the evolving needs of businesses in an increasingly digital world. Pierre’s invaluable insights and dedication to innovation underscore his role as a driving force behind Plerion’s mission to revolutionise cloud security.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Pierre Liddle (Co-Founder, Plerion) dive deep into the ever-evolving landscape of cloud security, tackling misconceptions, and examining the potential of cloud native application protection platforms (CNAPP) as a line of defense against attacks. We shed light on the dynamic nature of security threats, the benefits of cloud technology, and the strategic importance of finding the right partners.
Pierre Liddle is a distinguished expert with over 20 years of dedicated experience in the dynamic field of security. As the Co-founder and CTO of Plerion, he serves as the guiding force behind the company’s strategic vision. Pierre’s extensive career includes an impressive seven-year tenure at AWS, where he played a crucial role in driving global internal security programs and collaborating with customers to design, build, and manage secure cloud workloads. This direct and hands-on engagement has equipped him with an unparalleled understanding of the precise challenges and pain points that organisations encounter in the realm of cloud security.
With a profound commitment to enhancing cloud security practices, and a vision to make the world a safer place by empowering customers to conquer the future, Pierre brings his wealth of knowledge to the forefront at Plerion. His leadership and domain expertise empower the company to provide cutting-edge solutions that address the evolving needs of businesses in an increasingly digital world. Pierre’s invaluable insights and dedication to innovation underscore his role as a driving force behind Plerion’s mission to revolutionise cloud security.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 232 Deep Dive: Pierre Liddle | Future-Proofing Security: Unpacking Cloud Native Application Protection Platforms (CNAPP)]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Pierre Liddle (Co-Founder, Plerion) dive deep into the ever-evolving landscape of cloud security, tackling misconceptions, and examining the potential of cloud native application protection platforms (CNAPP) as a line of defense against attacks. We shed light on the dynamic nature of security threats, the benefits of cloud technology, and the strategic importance of finding the right partners.</p>
<p><span style="font-weight:400;">Pierre Liddle is a distinguished expert with over 20 years of dedicated experience in the dynamic field of security. As the Co-founder and CTO of Plerion, he serves as the guiding force behind the company’s strategic vision. Pierre’s extensive career includes an impressive seven-year tenure at AWS, where he played a crucial role in driving global internal security programs and collaborating with customers to design, build, and manage secure cloud workloads. This direct and hands-on engagement has equipped him with an unparalleled understanding of the precise challenges and pain points that organisations encounter in the realm of cloud security.</span></p>
<p><span style="font-weight:400;">With a profound commitment to enhancing cloud security practices, and a vision to make the world a safer place by empowering customers to conquer the future, Pierre brings his wealth of knowledge to the forefront at Plerion. His leadership and domain expertise empower the company to provide cutting-edge solutions that address the evolving needs of businesses in an increasingly digital world. Pierre’s invaluable insights and dedication to innovation underscore his role as a driving force behind Plerion’s mission to revolutionise cloud security.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/730291c5-eb61-4159-8dbe-491bb3dfaf48-KBKAST-EP-Pierre-Liddle.mp3" length="39437997"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Pierre Liddle (Co-Founder, Plerion) dive deep into the ever-evolving landscape of cloud security, tackling misconceptions, and examining the potential of cloud native application protection platforms (CNAPP) as a line of defense against attacks. We shed light on the dynamic nature of security threats, the benefits of cloud technology, and the strategic importance of finding the right partners.
Pierre Liddle is a distinguished expert with over 20 years of dedicated experience in the dynamic field of security. As the Co-founder and CTO of Plerion, he serves as the guiding force behind the company’s strategic vision. Pierre’s extensive career includes an impressive seven-year tenure at AWS, where he played a crucial role in driving global internal security programs and collaborating with customers to design, build, and manage secure cloud workloads. This direct and hands-on engagement has equipped him with an unparalleled understanding of the precise challenges and pain points that organisations encounter in the realm of cloud security.
With a profound commitment to enhancing cloud security practices, and a vision to make the world a safer place by empowering customers to conquer the future, Pierre brings his wealth of knowledge to the forefront at Plerion. His leadership and domain expertise empower the company to provide cutting-edge solutions that address the evolving needs of businesses in an increasingly digital world. Pierre’s invaluable insights and dedication to innovation underscore his role as a driving force behind Plerion’s mission to revolutionise cloud security.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1612231/c1a-5k0v-9j5px367c6np-qbdqmh.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 231 Deep Dive: Ashwin Ram | Overcoming Evolving Threats: Expert Advice for Executive Cyber Awareness]]>
                </title>
                <pubDate>Wed, 06 Dec 2023 16:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1610545</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-231-deep-dive-ashwin-ram-overcoming-evolving-threats-expert-advice-for-executive-cyber-awareness</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Ashwin Ram (Office of the Chief Technology Officer – Check Point) as he dives deep into the need for clear communication of cyber risks, addresses the challenges faced by security practitioners, and highlights the importance of credibility in cybersecurity strategies. From leveraging diverse threat intelligence sources to staying updated on emerging threats and attack strategies, this episode provides valuable guidance for executives and board members. Stay ahead of cyber threats, understand the evolving landscape, and ensure comprehensive cybersecurity strategies for your organization’s success. Tune in now to gain valuable, actionable insights.</p>
<p>Ashwin Ram is a seasoned cyber security expert and thought leader with a unique blend of CISO consulting experience and technical know-how. He is widely regarded as a trusted advisor by industry titans, startups, and industry collectives due to his ability to translate technical threats into business contexts to evaluate overall risk to organisations.</p>
<p>With his deep security knowledge, Ashwin can switch effortlessly between “tech talk” and “business talk,” making him a go-to person for organisations looking to bolster their cyber resilience. In his current role at Check Point Software Technologies, Ashwin assists cyber executives understand, prioritise, communicate, and address cyber risks.</p>
<div></div>
<div></div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Ashwin Ram (Office of the Chief Technology Officer – Check Point) as he dives deep into the need for clear communication of cyber risks, addresses the challenges faced by security practitioners, and highlights the importance of credibility in cybersecurity strategies. From leveraging diverse threat intelligence sources to staying updated on emerging threats and attack strategies, this episode provides valuable guidance for executives and board members. Stay ahead of cyber threats, understand the evolving landscape, and ensure comprehensive cybersecurity strategies for your organization’s success. Tune in now to gain valuable, actionable insights.
Ashwin Ram is a seasoned cyber security expert and thought leader with a unique blend of CISO consulting experience and technical know-how. He is widely regarded as a trusted advisor by industry titans, startups, and industry collectives due to his ability to translate technical threats into business contexts to evaluate overall risk to organisations.
With his deep security knowledge, Ashwin can switch effortlessly between “tech talk” and “business talk,” making him a go-to person for organisations looking to bolster their cyber resilience. In his current role at Check Point Software Technologies, Ashwin assists cyber executives understand, prioritise, communicate, and address cyber risks.


]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 231 Deep Dive: Ashwin Ram | Overcoming Evolving Threats: Expert Advice for Executive Cyber Awareness]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Ashwin Ram (Office of the Chief Technology Officer – Check Point) as he dives deep into the need for clear communication of cyber risks, addresses the challenges faced by security practitioners, and highlights the importance of credibility in cybersecurity strategies. From leveraging diverse threat intelligence sources to staying updated on emerging threats and attack strategies, this episode provides valuable guidance for executives and board members. Stay ahead of cyber threats, understand the evolving landscape, and ensure comprehensive cybersecurity strategies for your organization’s success. Tune in now to gain valuable, actionable insights.</p>
<p>Ashwin Ram is a seasoned cyber security expert and thought leader with a unique blend of CISO consulting experience and technical know-how. He is widely regarded as a trusted advisor by industry titans, startups, and industry collectives due to his ability to translate technical threats into business contexts to evaluate overall risk to organisations.</p>
<p>With his deep security knowledge, Ashwin can switch effortlessly between “tech talk” and “business talk,” making him a go-to person for organisations looking to bolster their cyber resilience. In his current role at Check Point Software Technologies, Ashwin assists cyber executives understand, prioritise, communicate, and address cyber risks.</p>
<div></div>
<div></div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/dda12036-6a01-4af6-92ba-0b86350920f2-KBKAST-EP-Ashwin-Ram.mp3" length="38721873"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Ashwin Ram (Office of the Chief Technology Officer – Check Point) as he dives deep into the need for clear communication of cyber risks, addresses the challenges faced by security practitioners, and highlights the importance of credibility in cybersecurity strategies. From leveraging diverse threat intelligence sources to staying updated on emerging threats and attack strategies, this episode provides valuable guidance for executives and board members. Stay ahead of cyber threats, understand the evolving landscape, and ensure comprehensive cybersecurity strategies for your organization’s success. Tune in now to gain valuable, actionable insights.
Ashwin Ram is a seasoned cyber security expert and thought leader with a unique blend of CISO consulting experience and technical know-how. He is widely regarded as a trusted advisor by industry titans, startups, and industry collectives due to his ability to translate technical threats into business contexts to evaluate overall risk to organisations.
With his deep security knowledge, Ashwin can switch effortlessly between “tech talk” and “business talk,” making him a go-to person for organisations looking to bolster their cyber resilience. In his current role at Check Point Software Technologies, Ashwin assists cyber executives understand, prioritise, communicate, and address cyber risks.


]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1610545/c1a-5k0v-8d4pjo25uoxo-pon8ri.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 230 Deep Dive: Alen Zenicanin | Perspectives on Vendor and Third-Party Risk Management]]>
                </title>
                <pubDate>Fri, 01 Dec 2023 16:00:49 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1606459</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-230-deep-dive-alen-zenicanin-perspectives-on-vendor-and-third-party-risk-management</link>
                                <description>
                                            <![CDATA[<p>In this episode, we dive deep and explore the intricate cat-and-mouse game between third-party vendors and clients in the cybersecurity realm. They discuss the challenges of ensuring that vendors fulfill cybersecurity contracts and the importance of clearly stipulating cybersecurity requirements to reduce the risk of breaches. Alen stresses the significance of vetting and continuously assessing vendors to ensure a robust security posture.</p>
<p>The conversation delves into the complexities of data classification, due diligence on third-party vendors, and the importance of transparency and accountability in handling breaches. Join us as we unravel the nuances of third-party risk management, cybersecurity marketing, and the potential risks and benefits of AI in the cybersecurity landscape.</p>
<p>Hailing from Eastern Europe, Alen arrives in Australia in 1996 and has been a daily contributor to Australia’s Cybersecurity scene for a over 15 years now. Having helped hundreds of organisations improve their threat landscape and avoid costly breaches, Alen is a leader in the spaces of cyber security, information security, risk management and governance/compliance. Being a regular guest speaker at webinars, summits and industry events – Alen is considered a valuable asset in helping non-technical people understand the value of technology risk management. Experienced across various industries including aerospace, renewable energies, legal, and our government; Alen is highly sought after as an industry subject-matter expert.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we dive deep and explore the intricate cat-and-mouse game between third-party vendors and clients in the cybersecurity realm. They discuss the challenges of ensuring that vendors fulfill cybersecurity contracts and the importance of clearly stipulating cybersecurity requirements to reduce the risk of breaches. Alen stresses the significance of vetting and continuously assessing vendors to ensure a robust security posture.
The conversation delves into the complexities of data classification, due diligence on third-party vendors, and the importance of transparency and accountability in handling breaches. Join us as we unravel the nuances of third-party risk management, cybersecurity marketing, and the potential risks and benefits of AI in the cybersecurity landscape.
Hailing from Eastern Europe, Alen arrives in Australia in 1996 and has been a daily contributor to Australia’s Cybersecurity scene for a over 15 years now. Having helped hundreds of organisations improve their threat landscape and avoid costly breaches, Alen is a leader in the spaces of cyber security, information security, risk management and governance/compliance. Being a regular guest speaker at webinars, summits and industry events – Alen is considered a valuable asset in helping non-technical people understand the value of technology risk management. Experienced across various industries including aerospace, renewable energies, legal, and our government; Alen is highly sought after as an industry subject-matter expert.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 230 Deep Dive: Alen Zenicanin | Perspectives on Vendor and Third-Party Risk Management]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we dive deep and explore the intricate cat-and-mouse game between third-party vendors and clients in the cybersecurity realm. They discuss the challenges of ensuring that vendors fulfill cybersecurity contracts and the importance of clearly stipulating cybersecurity requirements to reduce the risk of breaches. Alen stresses the significance of vetting and continuously assessing vendors to ensure a robust security posture.</p>
<p>The conversation delves into the complexities of data classification, due diligence on third-party vendors, and the importance of transparency and accountability in handling breaches. Join us as we unravel the nuances of third-party risk management, cybersecurity marketing, and the potential risks and benefits of AI in the cybersecurity landscape.</p>
<p>Hailing from Eastern Europe, Alen arrives in Australia in 1996 and has been a daily contributor to Australia’s Cybersecurity scene for a over 15 years now. Having helped hundreds of organisations improve their threat landscape and avoid costly breaches, Alen is a leader in the spaces of cyber security, information security, risk management and governance/compliance. Being a regular guest speaker at webinars, summits and industry events – Alen is considered a valuable asset in helping non-technical people understand the value of technology risk management. Experienced across various industries including aerospace, renewable energies, legal, and our government; Alen is highly sought after as an industry subject-matter expert.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/fd890f21-806e-4daa-8d04-754ebbfc6f25-KBKAST-EP-Alen-Zenicanin.mp3" length="42438189"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we dive deep and explore the intricate cat-and-mouse game between third-party vendors and clients in the cybersecurity realm. They discuss the challenges of ensuring that vendors fulfill cybersecurity contracts and the importance of clearly stipulating cybersecurity requirements to reduce the risk of breaches. Alen stresses the significance of vetting and continuously assessing vendors to ensure a robust security posture.
The conversation delves into the complexities of data classification, due diligence on third-party vendors, and the importance of transparency and accountability in handling breaches. Join us as we unravel the nuances of third-party risk management, cybersecurity marketing, and the potential risks and benefits of AI in the cybersecurity landscape.
Hailing from Eastern Europe, Alen arrives in Australia in 1996 and has been a daily contributor to Australia’s Cybersecurity scene for a over 15 years now. Having helped hundreds of organisations improve their threat landscape and avoid costly breaches, Alen is a leader in the spaces of cyber security, information security, risk management and governance/compliance. Being a regular guest speaker at webinars, summits and industry events – Alen is considered a valuable asset in helping non-technical people understand the value of technology risk management. Experienced across various industries including aerospace, renewable energies, legal, and our government; Alen is highly sought after as an industry subject-matter expert.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1606459/1701404828-Alen-Zenicanin.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:13</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 229 Deep Dive: Rad Kanapathipillai | Enhancing Security Posture: Prioritising Data Protection in Organisations]]>
                </title>
                <pubDate>Wed, 29 Nov 2023 16:30:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1604947</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-229-deep-dive-rad-kanapathipillai-enhancing-security-posture-prioritising-data-protection-in-organisations</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Rad Kanapathipillai (Head of Engineering at DevOps1) as he sheds light on the critical importance of safeguarding sensitive data right from the development phase through to production. The discussion delves into the challenges organisations encounter in protecting sensitive information and the pressing need for encryption, compliance, and code and password protection to prevent data breaches. Rad also emphasizes the urgency of prioritising data protection and implementing strategies that elevate its significance. Moreover, the conversation touches on the evolving focus on security in agile environments and the empowerment of developers to code securely. Throughout the episode, Rad presents insightful solutions, including the use of automation and AI to address security issues.</p>
<p>Rad, Head of Engineering at DevOps1, is a seasoned tech expert with 15+ years in the industry.</p>
<p>Specialising in Platforms and Security, Rad has led platform and devsecops transformations at organisations like Spark New Zealand, ANZ Government, and top financial institutions.</p>
<p>With a strong track record in project management and ethics, Rad has also contributed significantly at Ampion/Wipro’s cybersecurity division, Shelde where he was a Cloud Consulting partner.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Rad Kanapathipillai (Head of Engineering at DevOps1) as he sheds light on the critical importance of safeguarding sensitive data right from the development phase through to production. The discussion delves into the challenges organisations encounter in protecting sensitive information and the pressing need for encryption, compliance, and code and password protection to prevent data breaches. Rad also emphasizes the urgency of prioritising data protection and implementing strategies that elevate its significance. Moreover, the conversation touches on the evolving focus on security in agile environments and the empowerment of developers to code securely. Throughout the episode, Rad presents insightful solutions, including the use of automation and AI to address security issues.
Rad, Head of Engineering at DevOps1, is a seasoned tech expert with 15+ years in the industry.
Specialising in Platforms and Security, Rad has led platform and devsecops transformations at organisations like Spark New Zealand, ANZ Government, and top financial institutions.
With a strong track record in project management and ethics, Rad has also contributed significantly at Ampion/Wipro’s cybersecurity division, Shelde where he was a Cloud Consulting partner.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 229 Deep Dive: Rad Kanapathipillai | Enhancing Security Posture: Prioritising Data Protection in Organisations]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Rad Kanapathipillai (Head of Engineering at DevOps1) as he sheds light on the critical importance of safeguarding sensitive data right from the development phase through to production. The discussion delves into the challenges organisations encounter in protecting sensitive information and the pressing need for encryption, compliance, and code and password protection to prevent data breaches. Rad also emphasizes the urgency of prioritising data protection and implementing strategies that elevate its significance. Moreover, the conversation touches on the evolving focus on security in agile environments and the empowerment of developers to code securely. Throughout the episode, Rad presents insightful solutions, including the use of automation and AI to address security issues.</p>
<p>Rad, Head of Engineering at DevOps1, is a seasoned tech expert with 15+ years in the industry.</p>
<p>Specialising in Platforms and Security, Rad has led platform and devsecops transformations at organisations like Spark New Zealand, ANZ Government, and top financial institutions.</p>
<p>With a strong track record in project management and ethics, Rad has also contributed significantly at Ampion/Wipro’s cybersecurity division, Shelde where he was a Cloud Consulting partner.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/4ea00ebc-1d16-46b8-b5ed-026ba07205f4-KBKAST-EP-229-Rad-Kanapathipillai.mp3" length="36311085"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Rad Kanapathipillai (Head of Engineering at DevOps1) as he sheds light on the critical importance of safeguarding sensitive data right from the development phase through to production. The discussion delves into the challenges organisations encounter in protecting sensitive information and the pressing need for encryption, compliance, and code and password protection to prevent data breaches. Rad also emphasizes the urgency of prioritising data protection and implementing strategies that elevate its significance. Moreover, the conversation touches on the evolving focus on security in agile environments and the empowerment of developers to code securely. Throughout the episode, Rad presents insightful solutions, including the use of automation and AI to address security issues.
Rad, Head of Engineering at DevOps1, is a seasoned tech expert with 15+ years in the industry.
Specialising in Platforms and Security, Rad has led platform and devsecops transformations at organisations like Spark New Zealand, ANZ Government, and top financial institutions.
With a strong track record in project management and ethics, Rad has also contributed significantly at Ampion/Wipro’s cybersecurity division, Shelde where he was a Cloud Consulting partner.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1604947/c1a-5k0v-34kqjm61i36q-n9gmv6.png"></itunes:image>
                                                                            <itunes:duration>00:37:50</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 228 Deep Dive: Rob Rashotte | Diversifying the Cybersecurity Talent Pool: A Discussion on Making Cybersecurity Roles Inclusive and Accessible to All]]>
                </title>
                <pubDate>Fri, 24 Nov 2023 16:00:45 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1602362</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-228-deep-dive-rob-rashotte-diversifying-the-cybersecurity-talent-pool-a-discussion-on-making-cybersecurity-roles-inclusive-and-accessible-to-all</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Rob Rashotte as we dive deep into workforce culture and the skills gap. Rob talks about the need for organisations to prioritize upskilling programs and foster a new workforce culture to address skills gaps in cybersecurity. Rob highlights the importance of considering underrepresented groups and economically disadvantaged individuals, as viable candidates for cybersecurity roles.</p>
<p>One crucial theme that we also talk about is the misconception that a university degree is necessary for all cybersecurity jobs. Rob challenges this notion, emphasising that there are many skilled individuals without degrees who can effectively contribute to the field. However, the lack of standardised job roles and descriptions in cybersecurity makes recruiting difficult, leading to the use of a degree as a filtering criteria. To tackle this issue, Rob also emphasises the need for a structured framework for cybersecurity roles. By developing such a framework, the recruiting process can be made easier, and educational pathways can be established that may or may not require a degree. Throughout the episode, we touch upon the role of HR, the use of AI in creating inclusive job descriptions, and the importance of promoting cybersecurity careers to younger candidates.</p>
<p>Rob Rashotte is the Vice President of the Fortinet Training Institute and the Fortinet Technical Field Enablement Program. Rob has more than 20 years of experience developing training and education strategies for startups as well as complex global organisations. He also has more than 15 years of experience working with some of the most innovative, fast-paced companies in the cybersecurity field. Rob has an Executive MBA from the University of Ottawa and is a regular speaker at a number of business schools on the topic of cyber risk and corporate impact.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Rob Rashotte as we dive deep into workforce culture and the skills gap. Rob talks about the need for organisations to prioritize upskilling programs and foster a new workforce culture to address skills gaps in cybersecurity. Rob highlights the importance of considering underrepresented groups and economically disadvantaged individuals, as viable candidates for cybersecurity roles.
One crucial theme that we also talk about is the misconception that a university degree is necessary for all cybersecurity jobs. Rob challenges this notion, emphasising that there are many skilled individuals without degrees who can effectively contribute to the field. However, the lack of standardised job roles and descriptions in cybersecurity makes recruiting difficult, leading to the use of a degree as a filtering criteria. To tackle this issue, Rob also emphasises the need for a structured framework for cybersecurity roles. By developing such a framework, the recruiting process can be made easier, and educational pathways can be established that may or may not require a degree. Throughout the episode, we touch upon the role of HR, the use of AI in creating inclusive job descriptions, and the importance of promoting cybersecurity careers to younger candidates.
Rob Rashotte is the Vice President of the Fortinet Training Institute and the Fortinet Technical Field Enablement Program. Rob has more than 20 years of experience developing training and education strategies for startups as well as complex global organisations. He also has more than 15 years of experience working with some of the most innovative, fast-paced companies in the cybersecurity field. Rob has an Executive MBA from the University of Ottawa and is a regular speaker at a number of business schools on the topic of cyber risk and corporate impact.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 228 Deep Dive: Rob Rashotte | Diversifying the Cybersecurity Talent Pool: A Discussion on Making Cybersecurity Roles Inclusive and Accessible to All]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Rob Rashotte as we dive deep into workforce culture and the skills gap. Rob talks about the need for organisations to prioritize upskilling programs and foster a new workforce culture to address skills gaps in cybersecurity. Rob highlights the importance of considering underrepresented groups and economically disadvantaged individuals, as viable candidates for cybersecurity roles.</p>
<p>One crucial theme that we also talk about is the misconception that a university degree is necessary for all cybersecurity jobs. Rob challenges this notion, emphasising that there are many skilled individuals without degrees who can effectively contribute to the field. However, the lack of standardised job roles and descriptions in cybersecurity makes recruiting difficult, leading to the use of a degree as a filtering criteria. To tackle this issue, Rob also emphasises the need for a structured framework for cybersecurity roles. By developing such a framework, the recruiting process can be made easier, and educational pathways can be established that may or may not require a degree. Throughout the episode, we touch upon the role of HR, the use of AI in creating inclusive job descriptions, and the importance of promoting cybersecurity careers to younger candidates.</p>
<p>Rob Rashotte is the Vice President of the Fortinet Training Institute and the Fortinet Technical Field Enablement Program. Rob has more than 20 years of experience developing training and education strategies for startups as well as complex global organisations. He also has more than 15 years of experience working with some of the most innovative, fast-paced companies in the cybersecurity field. Rob has an Executive MBA from the University of Ottawa and is a regular speaker at a number of business schools on the topic of cyber risk and corporate impact.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/114e44d9-1cac-4c07-8645-2eb1ec6313f5-KBKAST-EP-ROB-RASHOTTE.mp3" length="32694902"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Rob Rashotte as we dive deep into workforce culture and the skills gap. Rob talks about the need for organisations to prioritize upskilling programs and foster a new workforce culture to address skills gaps in cybersecurity. Rob highlights the importance of considering underrepresented groups and economically disadvantaged individuals, as viable candidates for cybersecurity roles.
One crucial theme that we also talk about is the misconception that a university degree is necessary for all cybersecurity jobs. Rob challenges this notion, emphasising that there are many skilled individuals without degrees who can effectively contribute to the field. However, the lack of standardised job roles and descriptions in cybersecurity makes recruiting difficult, leading to the use of a degree as a filtering criteria. To tackle this issue, Rob also emphasises the need for a structured framework for cybersecurity roles. By developing such a framework, the recruiting process can be made easier, and educational pathways can be established that may or may not require a degree. Throughout the episode, we touch upon the role of HR, the use of AI in creating inclusive job descriptions, and the importance of promoting cybersecurity careers to younger candidates.
Rob Rashotte is the Vice President of the Fortinet Training Institute and the Fortinet Technical Field Enablement Program. Rob has more than 20 years of experience developing training and education strategies for startups as well as complex global organisations. He also has more than 15 years of experience working with some of the most innovative, fast-paced companies in the cybersecurity field. Rob has an Executive MBA from the University of Ottawa and is a regular speaker at a number of business schools on the topic of cyber risk and corporate impact.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1602362/c1a-5k0v-v615opx7inm5-mis9rf.jpg"></itunes:image>
                                                                            <itunes:duration>00:34:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 227 Deep Dive: Jaya Baloo | Discussing New Cyber Disclosure Rules, Understanding the Cost of Breaches, and Building a Long-term Security Strategy for Organisations]]>
                </title>
                <pubDate>Wed, 22 Nov 2023 16:00:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1601336</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-227-deep-dive-jaya-baloo-discussing-new-cyber-disclosure-rules-understanding-the-cost-of-breaches-and-building-a-long-term-security-strategy-for-organisations</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Jaya Baloo, Chief Security Officer of Rapid7, as we dive deep into the crucial topic of cybersecurity and its impact on revenue retention and the overall success of organisations. Jaya emphasises the importance of the security team making their contributions visible to the rest of the enterprise, rather than expecting others to figure it out on their own. They discuss the purpose of the security function, the cost of breaches, and the challenges faced by CISOs in communicating the value of cybersecurity to CFOs. Jaya also shares her predictions for the future of cybersecurity, the need for industry standards, and the importance of bringing the cybersecurity industry together to make a significant difference.</p>
<p>Jaya Baloo is the CSO of Rapid7 and has been working in the field of Info Security with a focus on secure network architecture for more than 20 years. She is the former CISO of Avast, and prior to that was CISO at KPN, the largest telco carrier in The Netherlands. Jaya serves on the boards of the NL’s National Cyber Security Centre, TIIN Capital, the NOS, and was former Vice Chair of the EU Quantum flagship. Shie is also on the faculty of the Singularity University. Jaya is recognised as a top 100 security influencer worldwide. In 2019, she was selected as one of the 50 most inspiring Fifty. In 2022 she received an honorary doctorate from the Uni of Twente for her contributions to the field of Cybersecurity.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Jaya Baloo, Chief Security Officer of Rapid7, as we dive deep into the crucial topic of cybersecurity and its impact on revenue retention and the overall success of organisations. Jaya emphasises the importance of the security team making their contributions visible to the rest of the enterprise, rather than expecting others to figure it out on their own. They discuss the purpose of the security function, the cost of breaches, and the challenges faced by CISOs in communicating the value of cybersecurity to CFOs. Jaya also shares her predictions for the future of cybersecurity, the need for industry standards, and the importance of bringing the cybersecurity industry together to make a significant difference.
Jaya Baloo is the CSO of Rapid7 and has been working in the field of Info Security with a focus on secure network architecture for more than 20 years. She is the former CISO of Avast, and prior to that was CISO at KPN, the largest telco carrier in The Netherlands. Jaya serves on the boards of the NL’s National Cyber Security Centre, TIIN Capital, the NOS, and was former Vice Chair of the EU Quantum flagship. Shie is also on the faculty of the Singularity University. Jaya is recognised as a top 100 security influencer worldwide. In 2019, she was selected as one of the 50 most inspiring Fifty. In 2022 she received an honorary doctorate from the Uni of Twente for her contributions to the field of Cybersecurity.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 227 Deep Dive: Jaya Baloo | Discussing New Cyber Disclosure Rules, Understanding the Cost of Breaches, and Building a Long-term Security Strategy for Organisations]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Jaya Baloo, Chief Security Officer of Rapid7, as we dive deep into the crucial topic of cybersecurity and its impact on revenue retention and the overall success of organisations. Jaya emphasises the importance of the security team making their contributions visible to the rest of the enterprise, rather than expecting others to figure it out on their own. They discuss the purpose of the security function, the cost of breaches, and the challenges faced by CISOs in communicating the value of cybersecurity to CFOs. Jaya also shares her predictions for the future of cybersecurity, the need for industry standards, and the importance of bringing the cybersecurity industry together to make a significant difference.</p>
<p>Jaya Baloo is the CSO of Rapid7 and has been working in the field of Info Security with a focus on secure network architecture for more than 20 years. She is the former CISO of Avast, and prior to that was CISO at KPN, the largest telco carrier in The Netherlands. Jaya serves on the boards of the NL’s National Cyber Security Centre, TIIN Capital, the NOS, and was former Vice Chair of the EU Quantum flagship. Shie is also on the faculty of the Singularity University. Jaya is recognised as a top 100 security influencer worldwide. In 2019, she was selected as one of the 50 most inspiring Fifty. In 2022 she received an honorary doctorate from the Uni of Twente for her contributions to the field of Cybersecurity.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/eb99c55d-786d-41e9-88f4-05e04250360d-KBKAST-EP-Jaya-Baloo.mp3" length="39918381"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Jaya Baloo, Chief Security Officer of Rapid7, as we dive deep into the crucial topic of cybersecurity and its impact on revenue retention and the overall success of organisations. Jaya emphasises the importance of the security team making their contributions visible to the rest of the enterprise, rather than expecting others to figure it out on their own. They discuss the purpose of the security function, the cost of breaches, and the challenges faced by CISOs in communicating the value of cybersecurity to CFOs. Jaya also shares her predictions for the future of cybersecurity, the need for industry standards, and the importance of bringing the cybersecurity industry together to make a significant difference.
Jaya Baloo is the CSO of Rapid7 and has been working in the field of Info Security with a focus on secure network architecture for more than 20 years. She is the former CISO of Avast, and prior to that was CISO at KPN, the largest telco carrier in The Netherlands. Jaya serves on the boards of the NL’s National Cyber Security Centre, TIIN Capital, the NOS, and was former Vice Chair of the EU Quantum flagship. Shie is also on the faculty of the Singularity University. Jaya is recognised as a top 100 security influencer worldwide. In 2019, she was selected as one of the 50 most inspiring Fifty. In 2022 she received an honorary doctorate from the Uni of Twente for her contributions to the field of Cybersecurity.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1601336/c1a-5k0v-pk956vpzi691-mloqjg.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 226 Deep Dive: Raj Sharma | Rethinking the Reseller Role: Adapting to the Shifting Dynamics of the Technology Market]]>
                </title>
                <pubDate>Thu, 16 Nov 2023 16:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598780</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-226-deep-dive-raj-sharma-rethinking-the-reseller-role-adapting-to-the-shifting-dynamics-of-the-technology-market</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Raj Sharma, District Sales Manager of Palo Alto, as we delve into the importance of strategic partners versus transactional partners, the shift in customer preferences, and the role of resellers in delivering exceptional value to customers. We explore how transparency, empathy, and understanding drive successful partnerships, and the challenges faced by resellers in managing multiple vendors and services. Join us as we uncover the keys to relevance, trust, and success in the ever-changing world of technology partnerships.</p>
<p>Raj Sharma, a seasoned professional in the realm of cybersecurity and enterprise sales, boasts nearly two decades of invaluable experience in these domains. Throughout his illustrious career, Raj has consistently demonstrated his prowess by not only navigating the complex landscape of cybersecurity but also by excelling in the dynamic field of enterprise sales.</p>
<p>At present, Raj holds a pivotal role as the leader of a high-performance sales team, where his strategic vision and leadership skills have contributed significantly to the team’s success. His commitment to fostering a collaborative and results-driven environment has positioned the team as a force to be reckoned with in the industry.</p>
<p>Raj is driven by a deep-seated passion for helping clients, partners, and his own team achieve their respective goals. His client-centric approach and keen understanding of the ever-evolving cybersecurity landscape have earned him a reputation as a trusted advisor in the industry.</p>
<p>What sets Raj apart is not only his professional acumen but also his unwavering commitment to continuous self-development and a growth mindset. He believes in the power of ongoing learning and embraces challenges as opportunities for personal and professional growth. Raj’s enthusiasm for learning and adapting to new technologies ensures that he remains at the forefront of industry trends.</p>
<p>Beyond his individual success, Raj finds fulfillment in witnessing the flourishing of others around him. His leadership style is characterized by mentorship and empowerment, reflecting his genuine desire to see his team members reach their full potential. In every endeavor, Raj Sharma exemplifies the qualities of a dynamic and visionary leader who not only excels in his own journey but also inspires others to thrive in their pursuits.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Raj Sharma, District Sales Manager of Palo Alto, as we delve into the importance of strategic partners versus transactional partners, the shift in customer preferences, and the role of resellers in delivering exceptional value to customers. We explore how transparency, empathy, and understanding drive successful partnerships, and the challenges faced by resellers in managing multiple vendors and services. Join us as we uncover the keys to relevance, trust, and success in the ever-changing world of technology partnerships.
Raj Sharma, a seasoned professional in the realm of cybersecurity and enterprise sales, boasts nearly two decades of invaluable experience in these domains. Throughout his illustrious career, Raj has consistently demonstrated his prowess by not only navigating the complex landscape of cybersecurity but also by excelling in the dynamic field of enterprise sales.
At present, Raj holds a pivotal role as the leader of a high-performance sales team, where his strategic vision and leadership skills have contributed significantly to the team’s success. His commitment to fostering a collaborative and results-driven environment has positioned the team as a force to be reckoned with in the industry.
Raj is driven by a deep-seated passion for helping clients, partners, and his own team achieve their respective goals. His client-centric approach and keen understanding of the ever-evolving cybersecurity landscape have earned him a reputation as a trusted advisor in the industry.
What sets Raj apart is not only his professional acumen but also his unwavering commitment to continuous self-development and a growth mindset. He believes in the power of ongoing learning and embraces challenges as opportunities for personal and professional growth. Raj’s enthusiasm for learning and adapting to new technologies ensures that he remains at the forefront of industry trends.
Beyond his individual success, Raj finds fulfillment in witnessing the flourishing of others around him. His leadership style is characterized by mentorship and empowerment, reflecting his genuine desire to see his team members reach their full potential. In every endeavor, Raj Sharma exemplifies the qualities of a dynamic and visionary leader who not only excels in his own journey but also inspires others to thrive in their pursuits.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 226 Deep Dive: Raj Sharma | Rethinking the Reseller Role: Adapting to the Shifting Dynamics of the Technology Market]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Raj Sharma, District Sales Manager of Palo Alto, as we delve into the importance of strategic partners versus transactional partners, the shift in customer preferences, and the role of resellers in delivering exceptional value to customers. We explore how transparency, empathy, and understanding drive successful partnerships, and the challenges faced by resellers in managing multiple vendors and services. Join us as we uncover the keys to relevance, trust, and success in the ever-changing world of technology partnerships.</p>
<p>Raj Sharma, a seasoned professional in the realm of cybersecurity and enterprise sales, boasts nearly two decades of invaluable experience in these domains. Throughout his illustrious career, Raj has consistently demonstrated his prowess by not only navigating the complex landscape of cybersecurity but also by excelling in the dynamic field of enterprise sales.</p>
<p>At present, Raj holds a pivotal role as the leader of a high-performance sales team, where his strategic vision and leadership skills have contributed significantly to the team’s success. His commitment to fostering a collaborative and results-driven environment has positioned the team as a force to be reckoned with in the industry.</p>
<p>Raj is driven by a deep-seated passion for helping clients, partners, and his own team achieve their respective goals. His client-centric approach and keen understanding of the ever-evolving cybersecurity landscape have earned him a reputation as a trusted advisor in the industry.</p>
<p>What sets Raj apart is not only his professional acumen but also his unwavering commitment to continuous self-development and a growth mindset. He believes in the power of ongoing learning and embraces challenges as opportunities for personal and professional growth. Raj’s enthusiasm for learning and adapting to new technologies ensures that he remains at the forefront of industry trends.</p>
<p>Beyond his individual success, Raj finds fulfillment in witnessing the flourishing of others around him. His leadership style is characterized by mentorship and empowerment, reflecting his genuine desire to see his team members reach their full potential. In every endeavor, Raj Sharma exemplifies the qualities of a dynamic and visionary leader who not only excels in his own journey but also inspires others to thrive in their pursuits.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598780/KBKAST-EP-Raj-Sharma.mp3" length="41497005"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Raj Sharma, District Sales Manager of Palo Alto, as we delve into the importance of strategic partners versus transactional partners, the shift in customer preferences, and the role of resellers in delivering exceptional value to customers. We explore how transparency, empathy, and understanding drive successful partnerships, and the challenges faced by resellers in managing multiple vendors and services. Join us as we uncover the keys to relevance, trust, and success in the ever-changing world of technology partnerships.
Raj Sharma, a seasoned professional in the realm of cybersecurity and enterprise sales, boasts nearly two decades of invaluable experience in these domains. Throughout his illustrious career, Raj has consistently demonstrated his prowess by not only navigating the complex landscape of cybersecurity but also by excelling in the dynamic field of enterprise sales.
At present, Raj holds a pivotal role as the leader of a high-performance sales team, where his strategic vision and leadership skills have contributed significantly to the team’s success. His commitment to fostering a collaborative and results-driven environment has positioned the team as a force to be reckoned with in the industry.
Raj is driven by a deep-seated passion for helping clients, partners, and his own team achieve their respective goals. His client-centric approach and keen understanding of the ever-evolving cybersecurity landscape have earned him a reputation as a trusted advisor in the industry.
What sets Raj apart is not only his professional acumen but also his unwavering commitment to continuous self-development and a growth mindset. He believes in the power of ongoing learning and embraces challenges as opportunities for personal and professional growth. Raj’s enthusiasm for learning and adapting to new technologies ensures that he remains at the forefront of industry trends.
Beyond his individual success, Raj finds fulfillment in witnessing the flourishing of others around him. His leadership style is characterized by mentorship and empowerment, reflecting his genuine desire to see his team members reach their full potential. In every endeavor, Raj Sharma exemplifies the qualities of a dynamic and visionary leader who not only excels in his own journey but also inspires others to thrive in their pursuits.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598780/1700198764-Raj-Sharma.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 225 Deep Dive: Toby Jones | Discussing a Game-Changing Approach to Private and Public Sector Collaboration]]>
                </title>
                <pubDate>Wed, 15 Nov 2023 16:00:51 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598676</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-225-deep-dive-toby-jones-discussing-a-game-changing-approach-to-private-and-public-sector-collaboration</link>
                                <description>
                                            <![CDATA[<div dir="ltr">
<div>
<div>
<div>
<div>
<div>
<div dir="ltr">
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>In this episode, we dive deep into the ACE initiative, and how it acts as a facilitator for the public sector, encouraging diversity and collaboration among businesses to deliver the required outcomes. Toby shares how the platform has changed the dynamic with larger companies, leading to adaptations and a shift towards acquiring smaller companies for innovation. We also explore the impact of ACE on smaller businesses, the importance of protecting intellectual property, and the role of collaborations between businesses, academia, and mission customers in addressing shared problems and creating commercial opportunities. Toby also takes us on a journey from the UK to Australia, discussing the opportunities for collaboration and knowledge exchange between countries and the plans to expand ACE’s platform overseas.</div>
<div></div>
<div>Toby Jones, a former UK senior civil servant, leads the UK Home Office’s transformation of mission-led innovation for public safety and security with science, digital technology and data. He co-founded ACE, the UK’s Accelerated Capability Environment, a Home Office-sponsored partnership between industry, academia and government, to push smart technologies and skills to front-line public services with operational tempo. He brings experience from the national security and resilience sector, combined with public policy development including legislation for investigatory powers and telecommunications regulation and compliance. His professional background is in systems engineering and computer science.</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[













































In this episode, we dive deep into the ACE initiative, and how it acts as a facilitator for the public sector, encouraging diversity and collaboration among businesses to deliver the required outcomes. Toby shares how the platform has changed the dynamic with larger companies, leading to adaptations and a shift towards acquiring smaller companies for innovation. We also explore the impact of ACE on smaller businesses, the importance of protecting intellectual property, and the role of collaborations between businesses, academia, and mission customers in addressing shared problems and creating commercial opportunities. Toby also takes us on a journey from the UK to Australia, discussing the opportunities for collaboration and knowledge exchange between countries and the plans to expand ACE’s platform overseas.

Toby Jones, a former UK senior civil servant, leads the UK Home Office’s transformation of mission-led innovation for public safety and security with science, digital technology and data. He co-founded ACE, the UK’s Accelerated Capability Environment, a Home Office-sponsored partnership between industry, academia and government, to push smart technologies and skills to front-line public services with operational tempo. He brings experience from the national security and resilience sector, combined with public policy development including legislation for investigatory powers and telecommunications regulation and compliance. His professional background is in systems engineering and computer science.














































]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 225 Deep Dive: Toby Jones | Discussing a Game-Changing Approach to Private and Public Sector Collaboration]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div dir="ltr">
<div>
<div>
<div>
<div>
<div>
<div dir="ltr">
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>In this episode, we dive deep into the ACE initiative, and how it acts as a facilitator for the public sector, encouraging diversity and collaboration among businesses to deliver the required outcomes. Toby shares how the platform has changed the dynamic with larger companies, leading to adaptations and a shift towards acquiring smaller companies for innovation. We also explore the impact of ACE on smaller businesses, the importance of protecting intellectual property, and the role of collaborations between businesses, academia, and mission customers in addressing shared problems and creating commercial opportunities. Toby also takes us on a journey from the UK to Australia, discussing the opportunities for collaboration and knowledge exchange between countries and the plans to expand ACE’s platform overseas.</div>
<div></div>
<div>Toby Jones, a former UK senior civil servant, leads the UK Home Office’s transformation of mission-led innovation for public safety and security with science, digital technology and data. He co-founded ACE, the UK’s Accelerated Capability Environment, a Home Office-sponsored partnership between industry, academia and government, to push smart technologies and skills to front-line public services with operational tempo. He brings experience from the national security and resilience sector, combined with public policy development including legislation for investigatory powers and telecommunications regulation and compliance. His professional background is in systems engineering and computer science.</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598676/KBKAST-EP-Toby-Jones.mp3" length="35185965"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[













































In this episode, we dive deep into the ACE initiative, and how it acts as a facilitator for the public sector, encouraging diversity and collaboration among businesses to deliver the required outcomes. Toby shares how the platform has changed the dynamic with larger companies, leading to adaptations and a shift towards acquiring smaller companies for innovation. We also explore the impact of ACE on smaller businesses, the importance of protecting intellectual property, and the role of collaborations between businesses, academia, and mission customers in addressing shared problems and creating commercial opportunities. Toby also takes us on a journey from the UK to Australia, discussing the opportunities for collaboration and knowledge exchange between countries and the plans to expand ACE’s platform overseas.

Toby Jones, a former UK senior civil servant, leads the UK Home Office’s transformation of mission-led innovation for public safety and security with science, digital technology and data. He co-founded ACE, the UK’s Accelerated Capability Environment, a Home Office-sponsored partnership between industry, academia and government, to push smart technologies and skills to front-line public services with operational tempo. He brings experience from the national security and resilience sector, combined with public policy development including legislation for investigatory powers and telecommunications regulation and compliance. His professional background is in systems engineering and computer science.














































]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598676/1700181070-Toby-Jones.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 224 Deep Dive: Ben Gestier | Understanding Converging Threats: A Discussion on Cyber and Physical Security Awareness]]>
                </title>
                <pubDate>Fri, 10 Nov 2023 16:00:37 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598677</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-224-deep-dive-ben-gestier-understanding-converging-threats-a-discussion-on-cyber-and-physical-security-awareness</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Ben Gestier (Senior Intelligence Analyst and Team Lead APAC/EMEA – Flashpoint) as we dive deep into the complex and often underappreciated intersection of cyber and physical security. We explore the challenges of understanding and addressing cyber threats in the Australian context and the need to educate and empower individuals and organizations to navigate these evolving dangers. From the use of open source forums by threat actors to the convergence of online communication on real-world actions, Ben sheds light on the vital importance of collaboration and awareness in combating cyber and physical security threats. Tune in as Ben Gestier shares insights and experiences that highlight the critical nexus between the digital and physical realms, and learn from his call to action to enhance our understanding and preparedness in the face of converging security risks.</p>
<p>Ben is Senior Intelligence Analyst and Team Lead APAC/EMEA with risk intelligence firm Flashpoint. He’s former intelligence with Australian Federal Police and Australian Defence Force.</p>
<p>In his current role, Ben seeks to synchronise efforts across time zones and threat types to assist in protecting businesses and government elements from threats. This can include identification of risks, vulnerabilities, advanced persistent threats, and how these can manifest in the real world.</p>
<p>The nexus between the online threat and the physical world is where Flashpoint strives to provide assistance to its clients to help in protecting people, assets, information, and infrastructure.</p>
<p>Prior to joining Flashpoint, Ben was a Criminal Intelligence Analyst with the Australian Federal Police. As part of his work with AFP, Ben established the Aviation Protection Assessment Team (APAT), which was responsible for undertaking physical vulnerability assessments at airports across Australia. An integral part of this role included understanding the online communication methodology of criminal and threat elements. During his time with the ADF, Ben worked as part of the intelligence capability, in operations both domestically and internationally.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Ben Gestier (Senior Intelligence Analyst and Team Lead APAC/EMEA – Flashpoint) as we dive deep into the complex and often underappreciated intersection of cyber and physical security. We explore the challenges of understanding and addressing cyber threats in the Australian context and the need to educate and empower individuals and organizations to navigate these evolving dangers. From the use of open source forums by threat actors to the convergence of online communication on real-world actions, Ben sheds light on the vital importance of collaboration and awareness in combating cyber and physical security threats. Tune in as Ben Gestier shares insights and experiences that highlight the critical nexus between the digital and physical realms, and learn from his call to action to enhance our understanding and preparedness in the face of converging security risks.
Ben is Senior Intelligence Analyst and Team Lead APAC/EMEA with risk intelligence firm Flashpoint. He’s former intelligence with Australian Federal Police and Australian Defence Force.
In his current role, Ben seeks to synchronise efforts across time zones and threat types to assist in protecting businesses and government elements from threats. This can include identification of risks, vulnerabilities, advanced persistent threats, and how these can manifest in the real world.
The nexus between the online threat and the physical world is where Flashpoint strives to provide assistance to its clients to help in protecting people, assets, information, and infrastructure.
Prior to joining Flashpoint, Ben was a Criminal Intelligence Analyst with the Australian Federal Police. As part of his work with AFP, Ben established the Aviation Protection Assessment Team (APAT), which was responsible for undertaking physical vulnerability assessments at airports across Australia. An integral part of this role included understanding the online communication methodology of criminal and threat elements. During his time with the ADF, Ben worked as part of the intelligence capability, in operations both domestically and internationally.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 224 Deep Dive: Ben Gestier | Understanding Converging Threats: A Discussion on Cyber and Physical Security Awareness]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Ben Gestier (Senior Intelligence Analyst and Team Lead APAC/EMEA – Flashpoint) as we dive deep into the complex and often underappreciated intersection of cyber and physical security. We explore the challenges of understanding and addressing cyber threats in the Australian context and the need to educate and empower individuals and organizations to navigate these evolving dangers. From the use of open source forums by threat actors to the convergence of online communication on real-world actions, Ben sheds light on the vital importance of collaboration and awareness in combating cyber and physical security threats. Tune in as Ben Gestier shares insights and experiences that highlight the critical nexus between the digital and physical realms, and learn from his call to action to enhance our understanding and preparedness in the face of converging security risks.</p>
<p>Ben is Senior Intelligence Analyst and Team Lead APAC/EMEA with risk intelligence firm Flashpoint. He’s former intelligence with Australian Federal Police and Australian Defence Force.</p>
<p>In his current role, Ben seeks to synchronise efforts across time zones and threat types to assist in protecting businesses and government elements from threats. This can include identification of risks, vulnerabilities, advanced persistent threats, and how these can manifest in the real world.</p>
<p>The nexus between the online threat and the physical world is where Flashpoint strives to provide assistance to its clients to help in protecting people, assets, information, and infrastructure.</p>
<p>Prior to joining Flashpoint, Ben was a Criminal Intelligence Analyst with the Australian Federal Police. As part of his work with AFP, Ben established the Aviation Protection Assessment Team (APAT), which was responsible for undertaking physical vulnerability assessments at airports across Australia. An integral part of this role included understanding the online communication methodology of criminal and threat elements. During his time with the ADF, Ben worked as part of the intelligence capability, in operations both domestically and internationally.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598677/KBKAST-EP-Ben-Gestier.mp3" length="34914861"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Ben Gestier (Senior Intelligence Analyst and Team Lead APAC/EMEA – Flashpoint) as we dive deep into the complex and often underappreciated intersection of cyber and physical security. We explore the challenges of understanding and addressing cyber threats in the Australian context and the need to educate and empower individuals and organizations to navigate these evolving dangers. From the use of open source forums by threat actors to the convergence of online communication on real-world actions, Ben sheds light on the vital importance of collaboration and awareness in combating cyber and physical security threats. Tune in as Ben Gestier shares insights and experiences that highlight the critical nexus between the digital and physical realms, and learn from his call to action to enhance our understanding and preparedness in the face of converging security risks.
Ben is Senior Intelligence Analyst and Team Lead APAC/EMEA with risk intelligence firm Flashpoint. He’s former intelligence with Australian Federal Police and Australian Defence Force.
In his current role, Ben seeks to synchronise efforts across time zones and threat types to assist in protecting businesses and government elements from threats. This can include identification of risks, vulnerabilities, advanced persistent threats, and how these can manifest in the real world.
The nexus between the online threat and the physical world is where Flashpoint strives to provide assistance to its clients to help in protecting people, assets, information, and infrastructure.
Prior to joining Flashpoint, Ben was a Criminal Intelligence Analyst with the Australian Federal Police. As part of his work with AFP, Ben established the Aviation Protection Assessment Team (APAT), which was responsible for undertaking physical vulnerability assessments at airports across Australia. An integral part of this role included understanding the online communication methodology of criminal and threat elements. During his time with the ADF, Ben worked as part of the intelligence capability, in operations both domestically and internationally.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598677/1700181070-Ben-Gestier.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 223 Deep Dive: Puneeta Chellaramani | The Road to Smart Cities: Challenges, Sustainability, and Citizen Impact]]>
                </title>
                <pubDate>Wed, 08 Nov 2023 05:00:40 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598678</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-223-deep-dive-puneeta-chellaramani-the-road-to-smart-cities-challenges-sustainability-and-citizen-impact</link>
                                <description>
                                            <![CDATA[<p>In this episode, we delve into the dynamic landscape of smart cities with a captivating discussion featuring Puneeta Chellaramani. Puneeta enlightens us on the potential benefits, ethical implications, and the evolving challenges associated with the implementation of smart city initiatives. We explore every angle from the increasing threat landscape to the potential impact on sustainability and citizens. Tune in now and learn more about digital twins, spatial services, and the implications of smart cities to everyday life.</p>
<p>Puneeta offers management consulting and cyber security experience with a pragmatic approach in implementing sustainable change. She is both a coach and advisor to clients across diverse industries advocating a 2-speed approach when navigating through their cyber, digital and innovation journey.</p>
<p>Connecting vision and reality – she helps organisations move with confidence to overcome the challenges of an ever changing threat landscape, and work with them all the way from business intent to value realisation &amp; combat business risks.</p>
<p>Puneeta has been a cyber security Practitioner helping CISOs &amp; CROs adopt pragmatic solutions that Reduce business &amp; Compliance Risks; harnessing her exuberant skills &amp; experience across consultative selling, building security business solutions, customer management, security advisory &amp; roadmaps across large transformation programs.</p>
<p>She has provided leadership and managed large and distributed teams, managing a multi-vendor and rightshore delivery model, be seen as a cyber/technology enablement advisor in a diverse and geographically dispersed working environment partnering seamlessly across business and IT.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we delve into the dynamic landscape of smart cities with a captivating discussion featuring Puneeta Chellaramani. Puneeta enlightens us on the potential benefits, ethical implications, and the evolving challenges associated with the implementation of smart city initiatives. We explore every angle from the increasing threat landscape to the potential impact on sustainability and citizens. Tune in now and learn more about digital twins, spatial services, and the implications of smart cities to everyday life.
Puneeta offers management consulting and cyber security experience with a pragmatic approach in implementing sustainable change. She is both a coach and advisor to clients across diverse industries advocating a 2-speed approach when navigating through their cyber, digital and innovation journey.
Connecting vision and reality – she helps organisations move with confidence to overcome the challenges of an ever changing threat landscape, and work with them all the way from business intent to value realisation & combat business risks.
Puneeta has been a cyber security Practitioner helping CISOs & CROs adopt pragmatic solutions that Reduce business & Compliance Risks; harnessing her exuberant skills & experience across consultative selling, building security business solutions, customer management, security advisory & roadmaps across large transformation programs.
She has provided leadership and managed large and distributed teams, managing a multi-vendor and rightshore delivery model, be seen as a cyber/technology enablement advisor in a diverse and geographically dispersed working environment partnering seamlessly across business and IT.]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 223 Deep Dive: Puneeta Chellaramani | The Road to Smart Cities: Challenges, Sustainability, and Citizen Impact]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we delve into the dynamic landscape of smart cities with a captivating discussion featuring Puneeta Chellaramani. Puneeta enlightens us on the potential benefits, ethical implications, and the evolving challenges associated with the implementation of smart city initiatives. We explore every angle from the increasing threat landscape to the potential impact on sustainability and citizens. Tune in now and learn more about digital twins, spatial services, and the implications of smart cities to everyday life.</p>
<p>Puneeta offers management consulting and cyber security experience with a pragmatic approach in implementing sustainable change. She is both a coach and advisor to clients across diverse industries advocating a 2-speed approach when navigating through their cyber, digital and innovation journey.</p>
<p>Connecting vision and reality – she helps organisations move with confidence to overcome the challenges of an ever changing threat landscape, and work with them all the way from business intent to value realisation &amp; combat business risks.</p>
<p>Puneeta has been a cyber security Practitioner helping CISOs &amp; CROs adopt pragmatic solutions that Reduce business &amp; Compliance Risks; harnessing her exuberant skills &amp; experience across consultative selling, building security business solutions, customer management, security advisory &amp; roadmaps across large transformation programs.</p>
<p>She has provided leadership and managed large and distributed teams, managing a multi-vendor and rightshore delivery model, be seen as a cyber/technology enablement advisor in a diverse and geographically dispersed working environment partnering seamlessly across business and IT.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598678/KBKAST-EP-Puneeta-Ramani.mp3" length="39536685"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we delve into the dynamic landscape of smart cities with a captivating discussion featuring Puneeta Chellaramani. Puneeta enlightens us on the potential benefits, ethical implications, and the evolving challenges associated with the implementation of smart city initiatives. We explore every angle from the increasing threat landscape to the potential impact on sustainability and citizens. Tune in now and learn more about digital twins, spatial services, and the implications of smart cities to everyday life.
Puneeta offers management consulting and cyber security experience with a pragmatic approach in implementing sustainable change. She is both a coach and advisor to clients across diverse industries advocating a 2-speed approach when navigating through their cyber, digital and innovation journey.
Connecting vision and reality – she helps organisations move with confidence to overcome the challenges of an ever changing threat landscape, and work with them all the way from business intent to value realisation & combat business risks.
Puneeta has been a cyber security Practitioner helping CISOs & CROs adopt pragmatic solutions that Reduce business & Compliance Risks; harnessing her exuberant skills & experience across consultative selling, building security business solutions, customer management, security advisory & roadmaps across large transformation programs.
She has provided leadership and managed large and distributed teams, managing a multi-vendor and rightshore delivery model, be seen as a cyber/technology enablement advisor in a diverse and geographically dispersed working environment partnering seamlessly across business and IT.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598678/c1a-5k0v-jp3kkqo7h7kk-dejp9k.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 222 Deep Dive: David Chow | A Conversation on the Impact of Geopolitics on Cybersecurity]]>
                </title>
                <pubDate>Fri, 03 Nov 2023 16:21:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598679</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-222-deep-dive-david-chow-a-conversation-on-the-impact-of-geopolitics-on-cybersecurity</link>
                                <description>
                                            <![CDATA[<p>In this episode, we dive deep into the intersection of global events and issues and cybersecurity. David discusses the impact of geopolitical risks on cybersecurity, the urgent need for collaboration, comprehensive risk management, and the adoption of security strategies such as zero-trust.</p>
<p>From international trade tension to the Ukraine-Russia conflict, David and KB delve into the complex interdependencies and challenges in safeguarding organizations worldwide.</p>
<p><b>David Chow</b> brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency’s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we dive deep into the intersection of global events and issues and cybersecurity. David discusses the impact of geopolitical risks on cybersecurity, the urgent need for collaboration, comprehensive risk management, and the adoption of security strategies such as zero-trust.
From international trade tension to the Ukraine-Russia conflict, David and KB delve into the complex interdependencies and challenges in safeguarding organizations worldwide.
David Chow brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency’s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 222 Deep Dive: David Chow | A Conversation on the Impact of Geopolitics on Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we dive deep into the intersection of global events and issues and cybersecurity. David discusses the impact of geopolitical risks on cybersecurity, the urgent need for collaboration, comprehensive risk management, and the adoption of security strategies such as zero-trust.</p>
<p>From international trade tension to the Ukraine-Russia conflict, David and KB delve into the complex interdependencies and challenges in safeguarding organizations worldwide.</p>
<p><b>David Chow</b> brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency’s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598679/KBKAST-EP-David-Chow-1.mp3" length="41948973"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we dive deep into the intersection of global events and issues and cybersecurity. David discusses the impact of geopolitical risks on cybersecurity, the urgent need for collaboration, comprehensive risk management, and the adoption of security strategies such as zero-trust.
From international trade tension to the Ukraine-Russia conflict, David and KB delve into the complex interdependencies and challenges in safeguarding organizations worldwide.
David Chow brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency’s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598679/1700181071-FOR-KBI-DO-NOT-TOUCH-79.png"></itunes:image>
                                                                            <itunes:duration>00:43:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 221 Deep Dive: Mike Zachman | Rethinking Metrics: From Activity to Outcomes, Leveraging Automation in Security Reporting]]>
                </title>
                <pubDate>Wed, 01 Nov 2023 16:00:24 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598680</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-221-deep-dive-mike-zachman-rethinking-metrics-from-activity-to-outcomes-leveraging-automation-in-security-reporting</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Mike Zachman (VP &amp; CISO – Zebra Technologies), as we delve into the untapped potential of automation in security processes. Mike discusses how automation enhances data protection by reducing human error and facilitating faster threat detection and response. He emphasizes the importance of consistency in processes and the need to free up resources for more strategic tasks. The conversation explores challenges in implementing automation, the value of accurate and timely reporting, and the relevance of high fidelity signals in automation. Tune in to discover the key takeaways and insights on driving change and leveraging automation for improved security measures.</p>
<p>Mike Zachman is currently the Chief Security Officer (CSO) at Zebra Technologies, where he has global responsibility for its enterprise-wide product security, information security, corporate security and business continuity programs. Zachman is an experienced global leader with over 30 years of information security, risk management and information technology expertise.</p>
<p>Previously, Zachman was Chief information Security Officer (CISO) at Caterpillar, Ecolab, and Forsythe Technologies. Zachman holds an undergraduate degree in management information systems from Millikin University, and a master’s degree in business administration from Bradley University. He is a Certified Information Security Manager, Certified Internal Auditor and is Certified in the Governance of Enterprise IT. He is an active volunteer with Junior Achievement and Easter Seals.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Mike Zachman (VP & CISO – Zebra Technologies), as we delve into the untapped potential of automation in security processes. Mike discusses how automation enhances data protection by reducing human error and facilitating faster threat detection and response. He emphasizes the importance of consistency in processes and the need to free up resources for more strategic tasks. The conversation explores challenges in implementing automation, the value of accurate and timely reporting, and the relevance of high fidelity signals in automation. Tune in to discover the key takeaways and insights on driving change and leveraging automation for improved security measures.
Mike Zachman is currently the Chief Security Officer (CSO) at Zebra Technologies, where he has global responsibility for its enterprise-wide product security, information security, corporate security and business continuity programs. Zachman is an experienced global leader with over 30 years of information security, risk management and information technology expertise.
Previously, Zachman was Chief information Security Officer (CISO) at Caterpillar, Ecolab, and Forsythe Technologies. Zachman holds an undergraduate degree in management information systems from Millikin University, and a master’s degree in business administration from Bradley University. He is a Certified Information Security Manager, Certified Internal Auditor and is Certified in the Governance of Enterprise IT. He is an active volunteer with Junior Achievement and Easter Seals.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 221 Deep Dive: Mike Zachman | Rethinking Metrics: From Activity to Outcomes, Leveraging Automation in Security Reporting]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Mike Zachman (VP &amp; CISO – Zebra Technologies), as we delve into the untapped potential of automation in security processes. Mike discusses how automation enhances data protection by reducing human error and facilitating faster threat detection and response. He emphasizes the importance of consistency in processes and the need to free up resources for more strategic tasks. The conversation explores challenges in implementing automation, the value of accurate and timely reporting, and the relevance of high fidelity signals in automation. Tune in to discover the key takeaways and insights on driving change and leveraging automation for improved security measures.</p>
<p>Mike Zachman is currently the Chief Security Officer (CSO) at Zebra Technologies, where he has global responsibility for its enterprise-wide product security, information security, corporate security and business continuity programs. Zachman is an experienced global leader with over 30 years of information security, risk management and information technology expertise.</p>
<p>Previously, Zachman was Chief information Security Officer (CISO) at Caterpillar, Ecolab, and Forsythe Technologies. Zachman holds an undergraduate degree in management information systems from Millikin University, and a master’s degree in business administration from Bradley University. He is a Certified Information Security Manager, Certified Internal Auditor and is Certified in the Governance of Enterprise IT. He is an active volunteer with Junior Achievement and Easter Seals.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598680/KBKAST-EP-Mike-Zachman.mp3" length="36582189"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Mike Zachman (VP & CISO – Zebra Technologies), as we delve into the untapped potential of automation in security processes. Mike discusses how automation enhances data protection by reducing human error and facilitating faster threat detection and response. He emphasizes the importance of consistency in processes and the need to free up resources for more strategic tasks. The conversation explores challenges in implementing automation, the value of accurate and timely reporting, and the relevance of high fidelity signals in automation. Tune in to discover the key takeaways and insights on driving change and leveraging automation for improved security measures.
Mike Zachman is currently the Chief Security Officer (CSO) at Zebra Technologies, where he has global responsibility for its enterprise-wide product security, information security, corporate security and business continuity programs. Zachman is an experienced global leader with over 30 years of information security, risk management and information technology expertise.
Previously, Zachman was Chief information Security Officer (CISO) at Caterpillar, Ecolab, and Forsythe Technologies. Zachman holds an undergraduate degree in management information systems from Millikin University, and a master’s degree in business administration from Bradley University. He is a Certified Information Security Manager, Certified Internal Auditor and is Certified in the Governance of Enterprise IT. He is an active volunteer with Junior Achievement and Easter Seals.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598680/1700181071-Mike-Zachman.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 220 Deep Dive: Jamil Farshchi | Going Back to Basics, Breaking Barriers, and Nurturing Partnerships: A Discussion on Effective Leadership with Cyber in Focus]]>
                </title>
                <pubDate>Wed, 25 Oct 2023 16:00:50 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598681</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-220-deep-dive-jamil-farshchi-going-back-to-basics-breaking-barriers-and-nurturing-partnerships-a-discussion-on-effective-leadership-with-cyber-in-focus</link>
                                <description>
                                            <![CDATA[<p><span class="block mb-4">In this episode, we are joined by Jamil Farshchi (EVP &amp; CISO – Equifax), as we dive deep into the world of leadership and the importance of driving the right behaviors in your team. We also explored the strategic partnerships between the government and corporate community, focusing on improving public-private collaboration to tackle cybersecurity threats. </span><span class="block mb-4">We discuss the challenges and progress made in information sharing, especially for small to medium-sized businesses. Jamil also shares their groundbreaking initiatives, including their open and honest approach to security reporting and real-time visibility for customers. Jamil emphasises</span><span class="block mb-4"> the need for dialogue, diverse perspectives, and breaking down barriers in the security field, and highlights how cybersecurity has become a top priority for organizations worldwide, stressing the importance of investing proactively to avoid breaches.</span></p>
<p>Jamil Farshchi is EVP and Chief Information Security Officer of Equifax (NYSE: EFX). Farshchi joined Equifax in the aftermath of one of the most consequential data breaches in history. During his tenure, he led an unprecedented $1.5 billion transformation and has built what is regarded as one of the most advanced, effective, and transparent cybersecurity and privacy programs in business today.</p>
<p>Prior to Equifax, Farshchi was Chief Information Security Officer of The Home Depot, Chief Information Security Officer of Time Warner, Vice President of Global Information Security for Visa, Chief Information Security Officer of the Los Alamos National Laboratory, and Deputy Chief Information Assurance Officer of NASA.</p>
<p>Farshchi serves on the Board of Directors for UKG, is a Strategic Advisor for the FBI and serves on the Board of Directors for the National Technology Security Coalition. He was named a Top Voice in Technology and Innovation by LinkedIn.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Jamil Farshchi (EVP & CISO – Equifax), as we dive deep into the world of leadership and the importance of driving the right behaviors in your team. We also explored the strategic partnerships between the government and corporate community, focusing on improving public-private collaboration to tackle cybersecurity threats. We discuss the challenges and progress made in information sharing, especially for small to medium-sized businesses. Jamil also shares their groundbreaking initiatives, including their open and honest approach to security reporting and real-time visibility for customers. Jamil emphasises the need for dialogue, diverse perspectives, and breaking down barriers in the security field, and highlights how cybersecurity has become a top priority for organizations worldwide, stressing the importance of investing proactively to avoid breaches.
Jamil Farshchi is EVP and Chief Information Security Officer of Equifax (NYSE: EFX). Farshchi joined Equifax in the aftermath of one of the most consequential data breaches in history. During his tenure, he led an unprecedented $1.5 billion transformation and has built what is regarded as one of the most advanced, effective, and transparent cybersecurity and privacy programs in business today.
Prior to Equifax, Farshchi was Chief Information Security Officer of The Home Depot, Chief Information Security Officer of Time Warner, Vice President of Global Information Security for Visa, Chief Information Security Officer of the Los Alamos National Laboratory, and Deputy Chief Information Assurance Officer of NASA.
Farshchi serves on the Board of Directors for UKG, is a Strategic Advisor for the FBI and serves on the Board of Directors for the National Technology Security Coalition. He was named a Top Voice in Technology and Innovation by LinkedIn.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 220 Deep Dive: Jamil Farshchi | Going Back to Basics, Breaking Barriers, and Nurturing Partnerships: A Discussion on Effective Leadership with Cyber in Focus]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span class="block mb-4">In this episode, we are joined by Jamil Farshchi (EVP &amp; CISO – Equifax), as we dive deep into the world of leadership and the importance of driving the right behaviors in your team. We also explored the strategic partnerships between the government and corporate community, focusing on improving public-private collaboration to tackle cybersecurity threats. </span><span class="block mb-4">We discuss the challenges and progress made in information sharing, especially for small to medium-sized businesses. Jamil also shares their groundbreaking initiatives, including their open and honest approach to security reporting and real-time visibility for customers. Jamil emphasises</span><span class="block mb-4"> the need for dialogue, diverse perspectives, and breaking down barriers in the security field, and highlights how cybersecurity has become a top priority for organizations worldwide, stressing the importance of investing proactively to avoid breaches.</span></p>
<p>Jamil Farshchi is EVP and Chief Information Security Officer of Equifax (NYSE: EFX). Farshchi joined Equifax in the aftermath of one of the most consequential data breaches in history. During his tenure, he led an unprecedented $1.5 billion transformation and has built what is regarded as one of the most advanced, effective, and transparent cybersecurity and privacy programs in business today.</p>
<p>Prior to Equifax, Farshchi was Chief Information Security Officer of The Home Depot, Chief Information Security Officer of Time Warner, Vice President of Global Information Security for Visa, Chief Information Security Officer of the Los Alamos National Laboratory, and Deputy Chief Information Assurance Officer of NASA.</p>
<p>Farshchi serves on the Board of Directors for UKG, is a Strategic Advisor for the FBI and serves on the Board of Directors for the National Technology Security Coalition. He was named a Top Voice in Technology and Innovation by LinkedIn.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598681/0fb0b1c4-686c-4566-908f-ec8c0738c510-KBKAST-EP-Jamil-Farschi.mp3" length="34667181"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Jamil Farshchi (EVP & CISO – Equifax), as we dive deep into the world of leadership and the importance of driving the right behaviors in your team. We also explored the strategic partnerships between the government and corporate community, focusing on improving public-private collaboration to tackle cybersecurity threats. We discuss the challenges and progress made in information sharing, especially for small to medium-sized businesses. Jamil also shares their groundbreaking initiatives, including their open and honest approach to security reporting and real-time visibility for customers. Jamil emphasises the need for dialogue, diverse perspectives, and breaking down barriers in the security field, and highlights how cybersecurity has become a top priority for organizations worldwide, stressing the importance of investing proactively to avoid breaches.
Jamil Farshchi is EVP and Chief Information Security Officer of Equifax (NYSE: EFX). Farshchi joined Equifax in the aftermath of one of the most consequential data breaches in history. During his tenure, he led an unprecedented $1.5 billion transformation and has built what is regarded as one of the most advanced, effective, and transparent cybersecurity and privacy programs in business today.
Prior to Equifax, Farshchi was Chief Information Security Officer of The Home Depot, Chief Information Security Officer of Time Warner, Vice President of Global Information Security for Visa, Chief Information Security Officer of the Los Alamos National Laboratory, and Deputy Chief Information Assurance Officer of NASA.
Farshchi serves on the Board of Directors for UKG, is a Strategic Advisor for the FBI and serves on the Board of Directors for the National Technology Security Coalition. He was named a Top Voice in Technology and Innovation by LinkedIn.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598681/1700181072-Jamil-Farschi.png"></itunes:image>
                                                                            <itunes:duration>00:36:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 219 Deep Dive: Amy Meyer | Assessing Value and Overcoming Challenges: A Journey from Sydney to San Francisco]]>
                </title>
                <pubDate>Fri, 20 Oct 2023 16:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598698</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-219-deep-dive-amy-meyer-assessing-value-and-overcoming-challenges-a-journey-from-sydney-to-san-francisco</link>
                                <description>
                                            <![CDATA[<p>In this episode, we take a deep dive into the fascinating world of international careers and the challenges and triumphs that come with them. KB sits down with Amy Meyer (Founder – Aussie Recruit), who shares her experiences and insights, reflecting on how Australians can navigate the US job market, capitalize on their unique value proposition, and build successful careers across various industries. From cultural nuances to visa processes and the power of networking, this episode is a goldmine of advice for anyone considering making the move from Down Under to the land of opportunity. If you’ve been thinking about taking the leap necessary for your own international career breakthrough, tune in.</p>
<p>Amy is the founder of Aussie Recruit and has supported thousands of Australians with their US job search. She specializes in connecting Australians with jobs in the US at companies hiring Aussies on E-3 visas. Amy has 7+ years of experience recruiting in the US market.</p>
<p>Amy is a dual Australian-American. She relocated from Sydney to San Francisco 10 years ago. She has first-hand experienced and overcome the challenges Australians face getting jobs in the US.</p>
<p>Prior to starting Aussie Recruit, she was Head of People at an early-stage tech company and hired many Australians on E-3 visas. She also started and runs the <a href="https://www.facebook.com/groups/AustraliansInSanFrancisco/" target="_blank" rel="noreferrer noopener">Australians In San Francisco Bay Area</a>.</p>
<p>You can find Amy sharing tips &amp; stories on <a href="https://www.instagram.com/aussierecruitsf/" target="_blank" rel="noreferrer noopener">Instagram</a> almost every day.</p>
<p>Amy is also a full-time mum of 3 and started Aussie Recruit when her 1st child was just a few months old.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we take a deep dive into the fascinating world of international careers and the challenges and triumphs that come with them. KB sits down with Amy Meyer (Founder – Aussie Recruit), who shares her experiences and insights, reflecting on how Australians can navigate the US job market, capitalize on their unique value proposition, and build successful careers across various industries. From cultural nuances to visa processes and the power of networking, this episode is a goldmine of advice for anyone considering making the move from Down Under to the land of opportunity. If you’ve been thinking about taking the leap necessary for your own international career breakthrough, tune in.
Amy is the founder of Aussie Recruit and has supported thousands of Australians with their US job search. She specializes in connecting Australians with jobs in the US at companies hiring Aussies on E-3 visas. Amy has 7+ years of experience recruiting in the US market.
Amy is a dual Australian-American. She relocated from Sydney to San Francisco 10 years ago. She has first-hand experienced and overcome the challenges Australians face getting jobs in the US.
Prior to starting Aussie Recruit, she was Head of People at an early-stage tech company and hired many Australians on E-3 visas. She also started and runs the Australians In San Francisco Bay Area.
You can find Amy sharing tips & stories on Instagram almost every day.
Amy is also a full-time mum of 3 and started Aussie Recruit when her 1st child was just a few months old.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 219 Deep Dive: Amy Meyer | Assessing Value and Overcoming Challenges: A Journey from Sydney to San Francisco]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we take a deep dive into the fascinating world of international careers and the challenges and triumphs that come with them. KB sits down with Amy Meyer (Founder – Aussie Recruit), who shares her experiences and insights, reflecting on how Australians can navigate the US job market, capitalize on their unique value proposition, and build successful careers across various industries. From cultural nuances to visa processes and the power of networking, this episode is a goldmine of advice for anyone considering making the move from Down Under to the land of opportunity. If you’ve been thinking about taking the leap necessary for your own international career breakthrough, tune in.</p>
<p>Amy is the founder of Aussie Recruit and has supported thousands of Australians with their US job search. She specializes in connecting Australians with jobs in the US at companies hiring Aussies on E-3 visas. Amy has 7+ years of experience recruiting in the US market.</p>
<p>Amy is a dual Australian-American. She relocated from Sydney to San Francisco 10 years ago. She has first-hand experienced and overcome the challenges Australians face getting jobs in the US.</p>
<p>Prior to starting Aussie Recruit, she was Head of People at an early-stage tech company and hired many Australians on E-3 visas. She also started and runs the <a href="https://www.facebook.com/groups/AustraliansInSanFrancisco/" target="_blank" rel="noreferrer noopener">Australians In San Francisco Bay Area</a>.</p>
<p>You can find Amy sharing tips &amp; stories on <a href="https://www.instagram.com/aussierecruitsf/" target="_blank" rel="noreferrer noopener">Instagram</a> almost every day.</p>
<p>Amy is also a full-time mum of 3 and started Aussie Recruit when her 1st child was just a few months old.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598698/4ae95733-ec20-42aa-a243-da31932d53db-KBKAST-EP-Amy-Meyer.mp3" length="49527597"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we take a deep dive into the fascinating world of international careers and the challenges and triumphs that come with them. KB sits down with Amy Meyer (Founder – Aussie Recruit), who shares her experiences and insights, reflecting on how Australians can navigate the US job market, capitalize on their unique value proposition, and build successful careers across various industries. From cultural nuances to visa processes and the power of networking, this episode is a goldmine of advice for anyone considering making the move from Down Under to the land of opportunity. If you’ve been thinking about taking the leap necessary for your own international career breakthrough, tune in.
Amy is the founder of Aussie Recruit and has supported thousands of Australians with their US job search. She specializes in connecting Australians with jobs in the US at companies hiring Aussies on E-3 visas. Amy has 7+ years of experience recruiting in the US market.
Amy is a dual Australian-American. She relocated from Sydney to San Francisco 10 years ago. She has first-hand experienced and overcome the challenges Australians face getting jobs in the US.
Prior to starting Aussie Recruit, she was Head of People at an early-stage tech company and hired many Australians on E-3 visas. She also started and runs the Australians In San Francisco Bay Area.
You can find Amy sharing tips & stories on Instagram almost every day.
Amy is also a full-time mum of 3 and started Aussie Recruit when her 1st child was just a few months old.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598698/c1a-5k0v-1p0qj76nuvkj-b2hdse.png"></itunes:image>
                                                                            <itunes:duration>00:51:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 218 Deep Dive: Annie Haggar | Putting Together A Complex and Evolving Jigsaw Puzzle: A Discussion on the Intersection of Cyber and the Law]]>
                </title>
                <pubDate>Wed, 18 Oct 2023 16:00:42 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598684</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-218-deep-dive-annie-haggar-putting-together-a-complex-and-evolving-jigsaw-puzzle-a-discussion-on-the-intersection-of-cyber-and-the-law</link>
                                <description>
                                            <![CDATA[<p>In this episode, we dive deep into the intersection of cybersecurity and the legal world, as Annie Haggar of Cyber GC takes us through the pros and cons of additional barriers to entry in the industry, the impact of regulations on quality assurance, diversity, and the existing skills gap. Annie also discusses how businesses can navigate and strategise in terms of compliance with industry-specific legislations, and how governments can strike a balance between effective regulation and reasonable costs for compliance.</p>
<p>Annie is the founder and principal of Cyber GC – a legal and consulting practice dedicated to helping Australian businesses prepare for and fight cyberattacks. Annie is a multi-award-winning cybersecurity lawyer and was recently awarded General Counsel of the Year (Australian Law Awards – Lawyers Weekly – 2021).</p>
<p>She brings to Cyber GC the experience gained in 20 years as a technology lawyer, 12 years working for one of the largest technology companies in the world and 6 years as global legal counsel for Accenture Security, one of the largest security companies in the world. She specialises in advising on enterprise security risk, cyber regulation, procurement risk management, and the impact on the whole organisation of cybersecurity issues.</p>
<p>Based in Canberra, Australia, she lives with her two little girls (3 and 5), husband Tony and fur baby, Scout the Jack Russell-Foxy cross. Outside of work and volunteering, you will find her tending to her bees, cooking Ottolenghi, tending her veggie patch and sewing, quilting, knitting and crafting.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we dive deep into the intersection of cybersecurity and the legal world, as Annie Haggar of Cyber GC takes us through the pros and cons of additional barriers to entry in the industry, the impact of regulations on quality assurance, diversity, and the existing skills gap. Annie also discusses how businesses can navigate and strategise in terms of compliance with industry-specific legislations, and how governments can strike a balance between effective regulation and reasonable costs for compliance.
Annie is the founder and principal of Cyber GC – a legal and consulting practice dedicated to helping Australian businesses prepare for and fight cyberattacks. Annie is a multi-award-winning cybersecurity lawyer and was recently awarded General Counsel of the Year (Australian Law Awards – Lawyers Weekly – 2021).
She brings to Cyber GC the experience gained in 20 years as a technology lawyer, 12 years working for one of the largest technology companies in the world and 6 years as global legal counsel for Accenture Security, one of the largest security companies in the world. She specialises in advising on enterprise security risk, cyber regulation, procurement risk management, and the impact on the whole organisation of cybersecurity issues.
Based in Canberra, Australia, she lives with her two little girls (3 and 5), husband Tony and fur baby, Scout the Jack Russell-Foxy cross. Outside of work and volunteering, you will find her tending to her bees, cooking Ottolenghi, tending her veggie patch and sewing, quilting, knitting and crafting.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 218 Deep Dive: Annie Haggar | Putting Together A Complex and Evolving Jigsaw Puzzle: A Discussion on the Intersection of Cyber and the Law]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we dive deep into the intersection of cybersecurity and the legal world, as Annie Haggar of Cyber GC takes us through the pros and cons of additional barriers to entry in the industry, the impact of regulations on quality assurance, diversity, and the existing skills gap. Annie also discusses how businesses can navigate and strategise in terms of compliance with industry-specific legislations, and how governments can strike a balance between effective regulation and reasonable costs for compliance.</p>
<p>Annie is the founder and principal of Cyber GC – a legal and consulting practice dedicated to helping Australian businesses prepare for and fight cyberattacks. Annie is a multi-award-winning cybersecurity lawyer and was recently awarded General Counsel of the Year (Australian Law Awards – Lawyers Weekly – 2021).</p>
<p>She brings to Cyber GC the experience gained in 20 years as a technology lawyer, 12 years working for one of the largest technology companies in the world and 6 years as global legal counsel for Accenture Security, one of the largest security companies in the world. She specialises in advising on enterprise security risk, cyber regulation, procurement risk management, and the impact on the whole organisation of cybersecurity issues.</p>
<p>Based in Canberra, Australia, she lives with her two little girls (3 and 5), husband Tony and fur baby, Scout the Jack Russell-Foxy cross. Outside of work and volunteering, you will find her tending to her bees, cooking Ottolenghi, tending her veggie patch and sewing, quilting, knitting and crafting.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598684/44fa9676-aaed-426f-8eec-de0ce55ed90b-KBKAST-EP-Annie-Haggar.mp3" length="42887853"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we dive deep into the intersection of cybersecurity and the legal world, as Annie Haggar of Cyber GC takes us through the pros and cons of additional barriers to entry in the industry, the impact of regulations on quality assurance, diversity, and the existing skills gap. Annie also discusses how businesses can navigate and strategise in terms of compliance with industry-specific legislations, and how governments can strike a balance between effective regulation and reasonable costs for compliance.
Annie is the founder and principal of Cyber GC – a legal and consulting practice dedicated to helping Australian businesses prepare for and fight cyberattacks. Annie is a multi-award-winning cybersecurity lawyer and was recently awarded General Counsel of the Year (Australian Law Awards – Lawyers Weekly – 2021).
She brings to Cyber GC the experience gained in 20 years as a technology lawyer, 12 years working for one of the largest technology companies in the world and 6 years as global legal counsel for Accenture Security, one of the largest security companies in the world. She specialises in advising on enterprise security risk, cyber regulation, procurement risk management, and the impact on the whole organisation of cybersecurity issues.
Based in Canberra, Australia, she lives with her two little girls (3 and 5), husband Tony and fur baby, Scout the Jack Russell-Foxy cross. Outside of work and volunteering, you will find her tending to her bees, cooking Ottolenghi, tending her veggie patch and sewing, quilting, knitting and crafting.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598684/1700181072-GUESTS-DO-NOT-TOUCH-11.png"></itunes:image>
                                                                            <itunes:duration>00:44:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 217 Deep Dive: EJ Wise | Beyond Policies: Creating a Culture of Cybersecurity Awareness and Engagement]]>
                </title>
                <pubDate>Fri, 13 Oct 2023 16:00:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598685</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-217-deep-dive-ej-wise-beyond-policies-creating-a-culture-of-cybersecurity-awareness-and-engagement</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by <a class="ql-mention" href="https://www.linkedin.com/company/81901216/admin/feed/posts/#">EJ WISE</a> (Principal and Founder – <a class="ql-mention" href="https://www.linkedin.com/company/81901216/admin/feed/posts/#">Wise Law</a>). From tailoring preparedness measures for different audiences to the importance of customizing business continuity plans, EJ Wise highlights the pitfalls of generic templates and the need for proper training. She also explores the parallel between physical safety measures and cyber security preparedness, challenging organizations to identify their cyber wardens. Plus, we’ll discuss the potential HR and morale problems associated with neglecting policy updates and the importance of keeping policies relevant and engaging. Don’t miss out on the valuable advice EJ has to offer as she addresses the legal aspect of cyber preparedness, the role of communication teams during incidents, and the necessity of regular practice in handling cyber incidents effectively.</p>
<p><span>Professor EJ Wise (she/her) is Principal and Founder of Wise Law in </span><span>Melbourne</span><span> and:</span><span> </span></p>
<ul>
<li><span>Adjunct Professor, Faculty of Science, Engineering &amp; Built Environment, Deakin University</span><span> </span></li>
<li><span>Lecturer, School of Law, Society and Criminology, Faculty of Law and Justice, UNSW</span><span> </span></li>
<li><span>Lecturer, Melbourne Business School (Public Policy)</span><span> </span></li>
</ul>
<ul>
<li><span>Sessional Academic, Thomas More Law School, ACU</span><span> </span></li>
<li><a href="https://cybercentre.org.au/profile/ej-wise-2/"><span>Member</span></a><span>, Executive Advisory Board for Cyber, Deakin University</span><span> </span></li>
<li><span>Member, Industry Advisory Board for Cyber, RMIT</span><span> </span></li>
<li><span>Member, Advisory Committee of the UNSW Institute of Cyber Security, UNSW</span><span> </span></li>
<li><span>Founding Chair, Australasian Cyber Security Institute</span><span> </span></li>
<li><span>Founding Director &amp; Treasurer, National Institute of Strategic Resilience</span><span> </span></li>
<li><span>Member Law Council of Australia International Law Section</span><span> </span></li>
<li><span>Member Belgium Avenue Neighbourhood House Executive Committee</span><span> </span></li>
</ul>
<p><span>EJ has 29 years legal experience in Australian Federal and State Governments as well as in private practice and academia, specialising in cyber law, policy, strategy, governance, international law &amp; international humanitarian law and is an internationally recognized cyber law expert.</span><span> </span></p>
<p><span>EJ’s 21 years of service in uniform as a Legal Officer with the Royal Australian Air Force includes postings in the RAAF’s cyber and information operations squadron and on exchange with the United States Air Force’s JAG Corps in the Pentagon for three years.  EJ is a decorated veteran who served twice in the Middle East during Australia’s engagement in international armed conflict.  EJ’s volunteer roles have ranged from working in a Community Legal Centre to providing CPD to the Federation of Community Legal Centres in Victoria, being on the International Humanitarian Law Committee of the International Committee of the Red Cross to membership of Cyber Security Advisory Boards and Committees.</span><span> </span></p>
<p><span>EJ has assisted in drafting laws, relevant texts and manuals in Australian, International and US jurisdictions. She has assisted in law enforcement as well as cyber operations. EJ has strong community values and gives her time to community and not for profit organisations as her contribution to a fairer, more inclusive and equitable society for everyone.</span><span> </span></p>
<table>
<tbody>
<tr>
<td><span>Areas of Expertise</span><span> </span></td>
<td><span>Qualifications</span><span> </span></td>
</tr>
<tr>
<td><span>Cyber Law</span></td></tr></tbody></table>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by EJ WISE (Principal and Founder – Wise Law). From tailoring preparedness measures for different audiences to the importance of customizing business continuity plans, EJ Wise highlights the pitfalls of generic templates and the need for proper training. She also explores the parallel between physical safety measures and cyber security preparedness, challenging organizations to identify their cyber wardens. Plus, we’ll discuss the potential HR and morale problems associated with neglecting policy updates and the importance of keeping policies relevant and engaging. Don’t miss out on the valuable advice EJ has to offer as she addresses the legal aspect of cyber preparedness, the role of communication teams during incidents, and the necessity of regular practice in handling cyber incidents effectively.
Professor EJ Wise (she/her) is Principal and Founder of Wise Law in Melbourne and: 

Adjunct Professor, Faculty of Science, Engineering & Built Environment, Deakin University 
Lecturer, School of Law, Society and Criminology, Faculty of Law and Justice, UNSW 
Lecturer, Melbourne Business School (Public Policy) 


Sessional Academic, Thomas More Law School, ACU 
Member, Executive Advisory Board for Cyber, Deakin University 
Member, Industry Advisory Board for Cyber, RMIT 
Member, Advisory Committee of the UNSW Institute of Cyber Security, UNSW 
Founding Chair, Australasian Cyber Security Institute 
Founding Director & Treasurer, National Institute of Strategic Resilience 
Member Law Council of Australia International Law Section 
Member Belgium Avenue Neighbourhood House Executive Committee 

EJ has 29 years legal experience in Australian Federal and State Governments as well as in private practice and academia, specialising in cyber law, policy, strategy, governance, international law & international humanitarian law and is an internationally recognized cyber law expert. 
EJ’s 21 years of service in uniform as a Legal Officer with the Royal Australian Air Force includes postings in the RAAF’s cyber and information operations squadron and on exchange with the United States Air Force’s JAG Corps in the Pentagon for three years.  EJ is a decorated veteran who served twice in the Middle East during Australia’s engagement in international armed conflict.  EJ’s volunteer roles have ranged from working in a Community Legal Centre to providing CPD to the Federation of Community Legal Centres in Victoria, being on the International Humanitarian Law Committee of the International Committee of the Red Cross to membership of Cyber Security Advisory Boards and Committees. 
EJ has assisted in drafting laws, relevant texts and manuals in Australian, International and US jurisdictions. She has assisted in law enforcement as well as cyber operations. EJ has strong community values and gives her time to community and not for profit organisations as her contribution to a fairer, more inclusive and equitable society for everyone. 



Areas of Expertise 
Qualifications 


Cyber Law]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 217 Deep Dive: EJ Wise | Beyond Policies: Creating a Culture of Cybersecurity Awareness and Engagement]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by <a class="ql-mention" href="https://www.linkedin.com/company/81901216/admin/feed/posts/#">EJ WISE</a> (Principal and Founder – <a class="ql-mention" href="https://www.linkedin.com/company/81901216/admin/feed/posts/#">Wise Law</a>). From tailoring preparedness measures for different audiences to the importance of customizing business continuity plans, EJ Wise highlights the pitfalls of generic templates and the need for proper training. She also explores the parallel between physical safety measures and cyber security preparedness, challenging organizations to identify their cyber wardens. Plus, we’ll discuss the potential HR and morale problems associated with neglecting policy updates and the importance of keeping policies relevant and engaging. Don’t miss out on the valuable advice EJ has to offer as she addresses the legal aspect of cyber preparedness, the role of communication teams during incidents, and the necessity of regular practice in handling cyber incidents effectively.</p>
<p><span>Professor EJ Wise (she/her) is Principal and Founder of Wise Law in </span><span>Melbourne</span><span> and:</span><span> </span></p>
<ul>
<li><span>Adjunct Professor, Faculty of Science, Engineering &amp; Built Environment, Deakin University</span><span> </span></li>
<li><span>Lecturer, School of Law, Society and Criminology, Faculty of Law and Justice, UNSW</span><span> </span></li>
<li><span>Lecturer, Melbourne Business School (Public Policy)</span><span> </span></li>
</ul>
<ul>
<li><span>Sessional Academic, Thomas More Law School, ACU</span><span> </span></li>
<li><a href="https://cybercentre.org.au/profile/ej-wise-2/"><span>Member</span></a><span>, Executive Advisory Board for Cyber, Deakin University</span><span> </span></li>
<li><span>Member, Industry Advisory Board for Cyber, RMIT</span><span> </span></li>
<li><span>Member, Advisory Committee of the UNSW Institute of Cyber Security, UNSW</span><span> </span></li>
<li><span>Founding Chair, Australasian Cyber Security Institute</span><span> </span></li>
<li><span>Founding Director &amp; Treasurer, National Institute of Strategic Resilience</span><span> </span></li>
<li><span>Member Law Council of Australia International Law Section</span><span> </span></li>
<li><span>Member Belgium Avenue Neighbourhood House Executive Committee</span><span> </span></li>
</ul>
<p><span>EJ has 29 years legal experience in Australian Federal and State Governments as well as in private practice and academia, specialising in cyber law, policy, strategy, governance, international law &amp; international humanitarian law and is an internationally recognized cyber law expert.</span><span> </span></p>
<p><span>EJ’s 21 years of service in uniform as a Legal Officer with the Royal Australian Air Force includes postings in the RAAF’s cyber and information operations squadron and on exchange with the United States Air Force’s JAG Corps in the Pentagon for three years.  EJ is a decorated veteran who served twice in the Middle East during Australia’s engagement in international armed conflict.  EJ’s volunteer roles have ranged from working in a Community Legal Centre to providing CPD to the Federation of Community Legal Centres in Victoria, being on the International Humanitarian Law Committee of the International Committee of the Red Cross to membership of Cyber Security Advisory Boards and Committees.</span><span> </span></p>
<p><span>EJ has assisted in drafting laws, relevant texts and manuals in Australian, International and US jurisdictions. She has assisted in law enforcement as well as cyber operations. EJ has strong community values and gives her time to community and not for profit organisations as her contribution to a fairer, more inclusive and equitable society for everyone.</span><span> </span></p>
<table>
<tbody>
<tr>
<td><span>Areas of Expertise</span><span> </span></td>
<td><span>Qualifications</span><span> </span></td>
</tr>
<tr>
<td><span>Cyber Law</span><span> </span>
<p><span>Cyber Security Law</span><span> </span></p>
<p><span>Cyber Operations</span><span> </span></p>
<p><span>Cyber Warfare</span><span> </span></p>
<p><span>Information Operations</span><span> </span></p>
<p><span>International Humanitarian Law</span><span> </span></p>
<p><span>Cyber Policy, Risk, Strategy &amp; Governance</span><span> </span></p>
<p><span>Military Law</span><span> </span></p></td>
<td><span>B.App.Sc (Ecology &amp; Natural Resources)</span><span> </span>
<p><span>LLB</span><span> </span></p>
<p><span>LLM</span><span> </span></p>
<p><span>MA (Policy &amp; Strategy)</span><span> </span></p>
<p><span>Grad Dip (Legal Practice)</span><span> </span></p>
<p><span>Grad Dip (Strategic planning &amp; management)</span><span> </span></p>
<p><span>Grad Dip (Defence studies) </span><span> </span></p>
<p><span> </span></p></td>
</tr>
</tbody>
</table>
<p><span> </span></p>
<p><i><span>Using tech without cybersecurity is like driving a car without a seatbelt and with no idea of its service history</span></i><span> </span></p>
<p><i><span>– EJ Wise, founder of Wise Law</span></i></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598685/2b89744f-50b6-4281-9921-c8d37f35500b-KBKAST-EP-EJ-Wise.mp3" length="42883629"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by EJ WISE (Principal and Founder – Wise Law). From tailoring preparedness measures for different audiences to the importance of customizing business continuity plans, EJ Wise highlights the pitfalls of generic templates and the need for proper training. She also explores the parallel between physical safety measures and cyber security preparedness, challenging organizations to identify their cyber wardens. Plus, we’ll discuss the potential HR and morale problems associated with neglecting policy updates and the importance of keeping policies relevant and engaging. Don’t miss out on the valuable advice EJ has to offer as she addresses the legal aspect of cyber preparedness, the role of communication teams during incidents, and the necessity of regular practice in handling cyber incidents effectively.
Professor EJ Wise (she/her) is Principal and Founder of Wise Law in Melbourne and: 

Adjunct Professor, Faculty of Science, Engineering & Built Environment, Deakin University 
Lecturer, School of Law, Society and Criminology, Faculty of Law and Justice, UNSW 
Lecturer, Melbourne Business School (Public Policy) 


Sessional Academic, Thomas More Law School, ACU 
Member, Executive Advisory Board for Cyber, Deakin University 
Member, Industry Advisory Board for Cyber, RMIT 
Member, Advisory Committee of the UNSW Institute of Cyber Security, UNSW 
Founding Chair, Australasian Cyber Security Institute 
Founding Director & Treasurer, National Institute of Strategic Resilience 
Member Law Council of Australia International Law Section 
Member Belgium Avenue Neighbourhood House Executive Committee 

EJ has 29 years legal experience in Australian Federal and State Governments as well as in private practice and academia, specialising in cyber law, policy, strategy, governance, international law & international humanitarian law and is an internationally recognized cyber law expert. 
EJ’s 21 years of service in uniform as a Legal Officer with the Royal Australian Air Force includes postings in the RAAF’s cyber and information operations squadron and on exchange with the United States Air Force’s JAG Corps in the Pentagon for three years.  EJ is a decorated veteran who served twice in the Middle East during Australia’s engagement in international armed conflict.  EJ’s volunteer roles have ranged from working in a Community Legal Centre to providing CPD to the Federation of Community Legal Centres in Victoria, being on the International Humanitarian Law Committee of the International Committee of the Red Cross to membership of Cyber Security Advisory Boards and Committees. 
EJ has assisted in drafting laws, relevant texts and manuals in Australian, International and US jurisdictions. She has assisted in law enforcement as well as cyber operations. EJ has strong community values and gives her time to community and not for profit organisations as her contribution to a fairer, more inclusive and equitable society for everyone. 



Areas of Expertise 
Qualifications 


Cyber Law]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598685/1700181072-GUESTS-DO-NOT-TOUCH-1.png"></itunes:image>
                                                                            <itunes:duration>00:44:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 216 Deep Dive: Adam O’Donnell | Balancing Usability and Complexity: The Eternal Dilemma in Cybersecurity]]>
                </title>
                <pubDate>Wed, 11 Oct 2023 16:00:27 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598686</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-216-adam-o-donnell-balancing-usability-and-complexity-the-eternal-dilemma-in-cybersecurity</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Special Forces team commander, Adam O’Donnell (CEO, Convergence Systems), as we explore the challenges and opportunities faced by SMBs in understanding their cybersecurity needs and finding affordable solutions. Together, we explore the complex ecosystem of cyber and the intricacies in finding the right balance between usability and security, which is no easy feat!</p>
<p style="font-weight:400;">As a Special Forces team commander, Adam O’Donnell successfully led high-performing teams in some of the most hostile and volatile places on earth.</p>
<p style="font-weight:400;">Looking back, he’d be the first to agree that his transition into the world of cybersecurity was something of an accident but he soon found that the decision-making, planning and leadership skills that served him so well leading combat operations and peacekeeping missions around the world also paved the way to a very successful corporate career leading cyber resilience uplift programs across government and large enterprise.</p>
<p style="font-weight:400;">The challenge, he realised, was that his work was actually creating another problem – small and medium enterprises were being left behind in the cyber arms race and becoming increasingly vulnerable to attackers who only ever seem to grow in their sophistication and numbers.  As CEO of Convergence Systems, a Melbourne-based startup, he’s leading the creation of an eXtended Detection &amp; Response system designed specifically for the cloud-based SME market and delivered at a price they can afford.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Special Forces team commander, Adam O’Donnell (CEO, Convergence Systems), as we explore the challenges and opportunities faced by SMBs in understanding their cybersecurity needs and finding affordable solutions. Together, we explore the complex ecosystem of cyber and the intricacies in finding the right balance between usability and security, which is no easy feat!
As a Special Forces team commander, Adam O’Donnell successfully led high-performing teams in some of the most hostile and volatile places on earth.
Looking back, he’d be the first to agree that his transition into the world of cybersecurity was something of an accident but he soon found that the decision-making, planning and leadership skills that served him so well leading combat operations and peacekeeping missions around the world also paved the way to a very successful corporate career leading cyber resilience uplift programs across government and large enterprise.
The challenge, he realised, was that his work was actually creating another problem – small and medium enterprises were being left behind in the cyber arms race and becoming increasingly vulnerable to attackers who only ever seem to grow in their sophistication and numbers.  As CEO of Convergence Systems, a Melbourne-based startup, he’s leading the creation of an eXtended Detection & Response system designed specifically for the cloud-based SME market and delivered at a price they can afford.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 216 Deep Dive: Adam O’Donnell | Balancing Usability and Complexity: The Eternal Dilemma in Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Special Forces team commander, Adam O’Donnell (CEO, Convergence Systems), as we explore the challenges and opportunities faced by SMBs in understanding their cybersecurity needs and finding affordable solutions. Together, we explore the complex ecosystem of cyber and the intricacies in finding the right balance between usability and security, which is no easy feat!</p>
<p style="font-weight:400;">As a Special Forces team commander, Adam O’Donnell successfully led high-performing teams in some of the most hostile and volatile places on earth.</p>
<p style="font-weight:400;">Looking back, he’d be the first to agree that his transition into the world of cybersecurity was something of an accident but he soon found that the decision-making, planning and leadership skills that served him so well leading combat operations and peacekeeping missions around the world also paved the way to a very successful corporate career leading cyber resilience uplift programs across government and large enterprise.</p>
<p style="font-weight:400;">The challenge, he realised, was that his work was actually creating another problem – small and medium enterprises were being left behind in the cyber arms race and becoming increasingly vulnerable to attackers who only ever seem to grow in their sophistication and numbers.  As CEO of Convergence Systems, a Melbourne-based startup, he’s leading the creation of an eXtended Detection &amp; Response system designed specifically for the cloud-based SME market and delivered at a price they can afford.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598686/5478329e-0c0a-483c-9c2c-1ba2eae314ac-KBKAST-EP-Adam-O-Donnell-Final2.mp3" length="40440621"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Special Forces team commander, Adam O’Donnell (CEO, Convergence Systems), as we explore the challenges and opportunities faced by SMBs in understanding their cybersecurity needs and finding affordable solutions. Together, we explore the complex ecosystem of cyber and the intricacies in finding the right balance between usability and security, which is no easy feat!
As a Special Forces team commander, Adam O’Donnell successfully led high-performing teams in some of the most hostile and volatile places on earth.
Looking back, he’d be the first to agree that his transition into the world of cybersecurity was something of an accident but he soon found that the decision-making, planning and leadership skills that served him so well leading combat operations and peacekeeping missions around the world also paved the way to a very successful corporate career leading cyber resilience uplift programs across government and large enterprise.
The challenge, he realised, was that his work was actually creating another problem – small and medium enterprises were being left behind in the cyber arms race and becoming increasingly vulnerable to attackers who only ever seem to grow in their sophistication and numbers.  As CEO of Convergence Systems, a Melbourne-based startup, he’s leading the creation of an eXtended Detection & Response system designed specifically for the cloud-based SME market and delivered at a price they can afford.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598686/1700181073-Adam-ODonnell.png"></itunes:image>
                                                                            <itunes:duration>00:42:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 215 Deep Dive: Edwin Kwan | Navigating the Wild West: Tools and Techniques to Assess the Security and Integrity of Open Source Software]]>
                </title>
                <pubDate>Fri, 06 Oct 2023 16:00:53 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598687</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-215-deep-dive-edwin-kwan-navigating-the-wild-west-tools-and-techniques-to-assess-the-security-and-integrity-of-open-source-software</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Edwin Kwan (Head of Application Security and Advisory – Tyro Payments), as he sheds light on the meticulous risk acceptance process and shares his insights on using open source software to build applications swiftly with freely available parts. We explore the challenges of ensuring the security of open source software and the need for due diligence when downloading such software. Edwin raises thought-provoking questions about software verification, maintenance, and security, highlighting the tricky balance between maintaining security protocols and accommodating a wide range of individuals in the workplace.</p>
<p>Stay tuned as we examine the potential risks of using open source software and the complexities of explaining security issues to individuals who may not fully grasp their implications. Edwin shares captivating stories and real-life examples, including incidents where businesses chose to accept high-severity risks rather than investing in their mitigation.</p>
<p><span>Edwin a cybersecurity specialist whose approach towards security is to raise awareness, provide light touch controls to the software development life cycle to increase visibility of security issues, and work closely with engineering teams to quickly develop secure applications. </span></p>
<p>He started out as a software engineer and transitioned into application and information security to lead a range of security initiatives when the company was working towards obtaining an unrestricted banking licence.</p>
<p>He has presented at several events, including RSA, AISA, All Day Dev Ops, AppSec Day, OWASP and DevSecOps Leadership Forums.</p>
<p>Edwin is also a contributing journalist to the It’s 5:05 Podcast, a daily podcast on open source and cybersecurity news.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Edwin Kwan (Head of Application Security and Advisory – Tyro Payments), as he sheds light on the meticulous risk acceptance process and shares his insights on using open source software to build applications swiftly with freely available parts. We explore the challenges of ensuring the security of open source software and the need for due diligence when downloading such software. Edwin raises thought-provoking questions about software verification, maintenance, and security, highlighting the tricky balance between maintaining security protocols and accommodating a wide range of individuals in the workplace.
Stay tuned as we examine the potential risks of using open source software and the complexities of explaining security issues to individuals who may not fully grasp their implications. Edwin shares captivating stories and real-life examples, including incidents where businesses chose to accept high-severity risks rather than investing in their mitigation.
Edwin a cybersecurity specialist whose approach towards security is to raise awareness, provide light touch controls to the software development life cycle to increase visibility of security issues, and work closely with engineering teams to quickly develop secure applications. 
He started out as a software engineer and transitioned into application and information security to lead a range of security initiatives when the company was working towards obtaining an unrestricted banking licence.
He has presented at several events, including RSA, AISA, All Day Dev Ops, AppSec Day, OWASP and DevSecOps Leadership Forums.
Edwin is also a contributing journalist to the It’s 5:05 Podcast, a daily podcast on open source and cybersecurity news.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 215 Deep Dive: Edwin Kwan | Navigating the Wild West: Tools and Techniques to Assess the Security and Integrity of Open Source Software]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Edwin Kwan (Head of Application Security and Advisory – Tyro Payments), as he sheds light on the meticulous risk acceptance process and shares his insights on using open source software to build applications swiftly with freely available parts. We explore the challenges of ensuring the security of open source software and the need for due diligence when downloading such software. Edwin raises thought-provoking questions about software verification, maintenance, and security, highlighting the tricky balance between maintaining security protocols and accommodating a wide range of individuals in the workplace.</p>
<p>Stay tuned as we examine the potential risks of using open source software and the complexities of explaining security issues to individuals who may not fully grasp their implications. Edwin shares captivating stories and real-life examples, including incidents where businesses chose to accept high-severity risks rather than investing in their mitigation.</p>
<p><span>Edwin a cybersecurity specialist whose approach towards security is to raise awareness, provide light touch controls to the software development life cycle to increase visibility of security issues, and work closely with engineering teams to quickly develop secure applications. </span></p>
<p>He started out as a software engineer and transitioned into application and information security to lead a range of security initiatives when the company was working towards obtaining an unrestricted banking licence.</p>
<p>He has presented at several events, including RSA, AISA, All Day Dev Ops, AppSec Day, OWASP and DevSecOps Leadership Forums.</p>
<p>Edwin is also a contributing journalist to the It’s 5:05 Podcast, a daily podcast on open source and cybersecurity news.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598687/4db7e6db-2480-4ee0-91c6-3eb8ac9e742a-KBKAST-EP-215-Edwin-Kwan.mp3" length="40397997"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Edwin Kwan (Head of Application Security and Advisory – Tyro Payments), as he sheds light on the meticulous risk acceptance process and shares his insights on using open source software to build applications swiftly with freely available parts. We explore the challenges of ensuring the security of open source software and the need for due diligence when downloading such software. Edwin raises thought-provoking questions about software verification, maintenance, and security, highlighting the tricky balance between maintaining security protocols and accommodating a wide range of individuals in the workplace.
Stay tuned as we examine the potential risks of using open source software and the complexities of explaining security issues to individuals who may not fully grasp their implications. Edwin shares captivating stories and real-life examples, including incidents where businesses chose to accept high-severity risks rather than investing in their mitigation.
Edwin a cybersecurity specialist whose approach towards security is to raise awareness, provide light touch controls to the software development life cycle to increase visibility of security issues, and work closely with engineering teams to quickly develop secure applications. 
He started out as a software engineer and transitioned into application and information security to lead a range of security initiatives when the company was working towards obtaining an unrestricted banking licence.
He has presented at several events, including RSA, AISA, All Day Dev Ops, AppSec Day, OWASP and DevSecOps Leadership Forums.
Edwin is also a contributing journalist to the It’s 5:05 Podcast, a daily podcast on open source and cybersecurity news.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598687/1700181073-Edwin-Kwan.png"></itunes:image>
                                                                            <itunes:duration>00:42:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 214 Deep Dive: Syed Ubaid Ali Jafri | Understanding the Banking Industry: Regulations, PCI DSS Compliance, and Additional Controls Against Breaches]]>
                </title>
                <pubDate>Wed, 04 Oct 2023 16:00:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598688</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-214-deep-dive-syed-ubaid-ali-jafri-understanding-the-banking-industry-regulations-pci-dss-compliance-and-additional-controls-against-breaches</link>
                                <description>
                                            <![CDATA[<p>Protecting customer data has become a critical priority for banking and financial institutions worldwide. With the ever-increasing threat landscape and the potential devastating consequences of data breaches, organizations are taking significant steps to enhance their data security measures. In this episode, we dive deep into the world of banking compliance and cybersecurity regulations as Syed Ubaid Ali Jafri brings us his expertise as the (Head of Cyber Defense &amp; Offensive Security – HBL), one of the leading banks in Pakistan. Ubaid shares insights on achieving Payment Card Industry Data Security Standard (PCI DSS) compliance, the challenges faced by banks in meeting these strict requirements, and the importance of trust and verification in the zero-trust model. We also explore the banking regulations in Pakistan, the measures taken to reduce the threat landscape and potential attacks, and the additional controls that have significantly reduced breaches.</p>
<p>Ubaid Jafri is a dynamic and talented motivational speaker renowned for his distinctive ability to seamlessly weave real-life experiences into captivating presentations. With over 12 years of invaluable experience in the commercial banking and risk management consultancy sectors, he has carved a niche as an expert in Information Security. His speaking engagements are not only entertaining but also deeply enriching, offering audiences practical insights into real-world work scenarios across diverse industries.</p>
<p>Ubaid Jafri’s professional journey encompasses leadership roles that define his expertise. Currently serving as the Head of Cyber Defense and Offensive Security at Habib Bank Limited, he previously held the position of Senior Manager Cyber Security &amp; Forensic Technology at KPMG. His proficiency extends to Cyber Defense, Offensive Security, Red Teaming, Cyber Analytics, IoT, Digital Forensics, Incident Handling &amp; Response, and various other crucial areas.</p>
<p>Ubaid Jafri’s impact on the cybersecurity landscape is marked by a series of achievements that demonstrate his tenacity and expertise. He has conducted numerous communication and cybersecurity intrusions, as well as penetration red-team attacks, for a diverse array of organizations, including utilities, power companies, Banking &amp; Financial Institutions, and more. These proactive initiatives have consistently unearthed critical vulnerabilities, thwarting unauthorized access, system compromises, sensitive information disclosures, and control hijackings. His vigilant approach has significantly contributed to safeguarding organizations from the looming threat of massive cyber breaches.</p>
<p>Ubaid Jafri’s speaking engagements, fueled by engaging narratives, practical insights, and heroic anecdotes, position him as an exceptional motivational speaker. His mission is to empower audiences with the tools to navigate the digital era confidently, equipped with the knowledge to safeguard against evolving cybersecurity challenges.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Protecting customer data has become a critical priority for banking and financial institutions worldwide. With the ever-increasing threat landscape and the potential devastating consequences of data breaches, organizations are taking significant steps to enhance their data security measures. In this episode, we dive deep into the world of banking compliance and cybersecurity regulations as Syed Ubaid Ali Jafri brings us his expertise as the (Head of Cyber Defense & Offensive Security – HBL), one of the leading banks in Pakistan. Ubaid shares insights on achieving Payment Card Industry Data Security Standard (PCI DSS) compliance, the challenges faced by banks in meeting these strict requirements, and the importance of trust and verification in the zero-trust model. We also explore the banking regulations in Pakistan, the measures taken to reduce the threat landscape and potential attacks, and the additional controls that have significantly reduced breaches.
Ubaid Jafri is a dynamic and talented motivational speaker renowned for his distinctive ability to seamlessly weave real-life experiences into captivating presentations. With over 12 years of invaluable experience in the commercial banking and risk management consultancy sectors, he has carved a niche as an expert in Information Security. His speaking engagements are not only entertaining but also deeply enriching, offering audiences practical insights into real-world work scenarios across diverse industries.
Ubaid Jafri’s professional journey encompasses leadership roles that define his expertise. Currently serving as the Head of Cyber Defense and Offensive Security at Habib Bank Limited, he previously held the position of Senior Manager Cyber Security & Forensic Technology at KPMG. His proficiency extends to Cyber Defense, Offensive Security, Red Teaming, Cyber Analytics, IoT, Digital Forensics, Incident Handling & Response, and various other crucial areas.
Ubaid Jafri’s impact on the cybersecurity landscape is marked by a series of achievements that demonstrate his tenacity and expertise. He has conducted numerous communication and cybersecurity intrusions, as well as penetration red-team attacks, for a diverse array of organizations, including utilities, power companies, Banking & Financial Institutions, and more. These proactive initiatives have consistently unearthed critical vulnerabilities, thwarting unauthorized access, system compromises, sensitive information disclosures, and control hijackings. His vigilant approach has significantly contributed to safeguarding organizations from the looming threat of massive cyber breaches.
Ubaid Jafri’s speaking engagements, fueled by engaging narratives, practical insights, and heroic anecdotes, position him as an exceptional motivational speaker. His mission is to empower audiences with the tools to navigate the digital era confidently, equipped with the knowledge to safeguard against evolving cybersecurity challenges.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 214 Deep Dive: Syed Ubaid Ali Jafri | Understanding the Banking Industry: Regulations, PCI DSS Compliance, and Additional Controls Against Breaches]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Protecting customer data has become a critical priority for banking and financial institutions worldwide. With the ever-increasing threat landscape and the potential devastating consequences of data breaches, organizations are taking significant steps to enhance their data security measures. In this episode, we dive deep into the world of banking compliance and cybersecurity regulations as Syed Ubaid Ali Jafri brings us his expertise as the (Head of Cyber Defense &amp; Offensive Security – HBL), one of the leading banks in Pakistan. Ubaid shares insights on achieving Payment Card Industry Data Security Standard (PCI DSS) compliance, the challenges faced by banks in meeting these strict requirements, and the importance of trust and verification in the zero-trust model. We also explore the banking regulations in Pakistan, the measures taken to reduce the threat landscape and potential attacks, and the additional controls that have significantly reduced breaches.</p>
<p>Ubaid Jafri is a dynamic and talented motivational speaker renowned for his distinctive ability to seamlessly weave real-life experiences into captivating presentations. With over 12 years of invaluable experience in the commercial banking and risk management consultancy sectors, he has carved a niche as an expert in Information Security. His speaking engagements are not only entertaining but also deeply enriching, offering audiences practical insights into real-world work scenarios across diverse industries.</p>
<p>Ubaid Jafri’s professional journey encompasses leadership roles that define his expertise. Currently serving as the Head of Cyber Defense and Offensive Security at Habib Bank Limited, he previously held the position of Senior Manager Cyber Security &amp; Forensic Technology at KPMG. His proficiency extends to Cyber Defense, Offensive Security, Red Teaming, Cyber Analytics, IoT, Digital Forensics, Incident Handling &amp; Response, and various other crucial areas.</p>
<p>Ubaid Jafri’s impact on the cybersecurity landscape is marked by a series of achievements that demonstrate his tenacity and expertise. He has conducted numerous communication and cybersecurity intrusions, as well as penetration red-team attacks, for a diverse array of organizations, including utilities, power companies, Banking &amp; Financial Institutions, and more. These proactive initiatives have consistently unearthed critical vulnerabilities, thwarting unauthorized access, system compromises, sensitive information disclosures, and control hijackings. His vigilant approach has significantly contributed to safeguarding organizations from the looming threat of massive cyber breaches.</p>
<p>Ubaid Jafri’s speaking engagements, fueled by engaging narratives, practical insights, and heroic anecdotes, position him as an exceptional motivational speaker. His mission is to empower audiences with the tools to navigate the digital era confidently, equipped with the knowledge to safeguard against evolving cybersecurity challenges.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598688/8cc0c659-ec8d-4b8a-98e1-62eb3af3d853-KBKAST-EP-Syed-Ubaid-Ali-Jafri.mp3" length="39893421"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Protecting customer data has become a critical priority for banking and financial institutions worldwide. With the ever-increasing threat landscape and the potential devastating consequences of data breaches, organizations are taking significant steps to enhance their data security measures. In this episode, we dive deep into the world of banking compliance and cybersecurity regulations as Syed Ubaid Ali Jafri brings us his expertise as the (Head of Cyber Defense & Offensive Security – HBL), one of the leading banks in Pakistan. Ubaid shares insights on achieving Payment Card Industry Data Security Standard (PCI DSS) compliance, the challenges faced by banks in meeting these strict requirements, and the importance of trust and verification in the zero-trust model. We also explore the banking regulations in Pakistan, the measures taken to reduce the threat landscape and potential attacks, and the additional controls that have significantly reduced breaches.
Ubaid Jafri is a dynamic and talented motivational speaker renowned for his distinctive ability to seamlessly weave real-life experiences into captivating presentations. With over 12 years of invaluable experience in the commercial banking and risk management consultancy sectors, he has carved a niche as an expert in Information Security. His speaking engagements are not only entertaining but also deeply enriching, offering audiences practical insights into real-world work scenarios across diverse industries.
Ubaid Jafri’s professional journey encompasses leadership roles that define his expertise. Currently serving as the Head of Cyber Defense and Offensive Security at Habib Bank Limited, he previously held the position of Senior Manager Cyber Security & Forensic Technology at KPMG. His proficiency extends to Cyber Defense, Offensive Security, Red Teaming, Cyber Analytics, IoT, Digital Forensics, Incident Handling & Response, and various other crucial areas.
Ubaid Jafri’s impact on the cybersecurity landscape is marked by a series of achievements that demonstrate his tenacity and expertise. He has conducted numerous communication and cybersecurity intrusions, as well as penetration red-team attacks, for a diverse array of organizations, including utilities, power companies, Banking & Financial Institutions, and more. These proactive initiatives have consistently unearthed critical vulnerabilities, thwarting unauthorized access, system compromises, sensitive information disclosures, and control hijackings. His vigilant approach has significantly contributed to safeguarding organizations from the looming threat of massive cyber breaches.
Ubaid Jafri’s speaking engagements, fueled by engaging narratives, practical insights, and heroic anecdotes, position him as an exceptional motivational speaker. His mission is to empower audiences with the tools to navigate the digital era confidently, equipped with the knowledge to safeguard against evolving cybersecurity challenges.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598688/1700181074-Syed-Ubaid-Jafri.png"></itunes:image>
                                                                            <itunes:duration>00:41:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 213 Deep Dive: Karissa Breen | Weathering the Storms: KB’s Secrets to Resilience Against All Odds, Reciprocity in Business, and Building a Legacy]]>
                </title>
                <pubDate>Fri, 29 Sep 2023 16:00:44 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1565259</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-213-deep-dive-karissa-breen-weathering-the-storms-kbs-secrets-to-resilience-against-all-odds-reciprocity-in-business-and-building-a-legacy</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, we turn the tables around and feature KB as the guest of her own show. Jay Hira (Founder and Executive Director of <a href="https://www.linkedin.com/company/makecybersimple/">MakeCyberSimple</a>), an industry expert and long-time peer, takes the host’s seat and asks KB about her rollercoaster journey into the industry. From a belief in the transformative power of challenges to the importance of consistency and evolution, KB has navigated the ups and downs of entrepreneurship with determination. With gratitude for the support she’s given and the invaluable life lessons learned along the way, KB reflects on the wild and crazy ride of building her business and her brand. Join us as we delve into the power of perseverance, the impact of recognizing and believing in one’s identity, and the unwavering commitment to continual (and sometimes gradual) improvement. Get ready for an inspiring and honest conversation about triumphs, setbacks, and the exhilarating unpredictability of the entrepreneurial path.</p>
<p>Karissa Breen, more commonly known as KB, is a serial entrepreneur that founded KBI.Media, the independent &amp; agnostic global cybersecurity media company. KB has been crowned LinkedIn Top Voice in Technology. KB is a Cybersecurity Investigative Journalist that hosts the flagship podcast, KBKast, interviewing cybersecurity practitioners from around the globe about security and the problems business executives face.</p>
<p>KB is known for asking hard-hitting questions and getting real answers from her guests, providing a unique yet neutral position on these topics. KB is also the Producer &amp; Host of the streaming show, 2Fa.tv, where she asks questions to demystify the world of cybersecurity, providing insight into the world of security to business executives, and focuses on the downstream impacts these cybersecurity events have on our markets.</p>
<p> </p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, we turn the tables around and feature KB as the guest of her own show. Jay Hira (Founder and Executive Director of MakeCyberSimple), an industry expert and long-time peer, takes the host’s seat and asks KB about her rollercoaster journey into the industry. From a belief in the transformative power of challenges to the importance of consistency and evolution, KB has navigated the ups and downs of entrepreneurship with determination. With gratitude for the support she’s given and the invaluable life lessons learned along the way, KB reflects on the wild and crazy ride of building her business and her brand. Join us as we delve into the power of perseverance, the impact of recognizing and believing in one’s identity, and the unwavering commitment to continual (and sometimes gradual) improvement. Get ready for an inspiring and honest conversation about triumphs, setbacks, and the exhilarating unpredictability of the entrepreneurial path.
Karissa Breen, more commonly known as KB, is a serial entrepreneur that founded KBI.Media, the independent & agnostic global cybersecurity media company. KB has been crowned LinkedIn Top Voice in Technology. KB is a Cybersecurity Investigative Journalist that hosts the flagship podcast, KBKast, interviewing cybersecurity practitioners from around the globe about security and the problems business executives face.
KB is known for asking hard-hitting questions and getting real answers from her guests, providing a unique yet neutral position on these topics. KB is also the Producer & Host of the streaming show, 2Fa.tv, where she asks questions to demystify the world of cybersecurity, providing insight into the world of security to business executives, and focuses on the downstream impacts these cybersecurity events have on our markets.
 
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 213 Deep Dive: Karissa Breen | Weathering the Storms: KB’s Secrets to Resilience Against All Odds, Reciprocity in Business, and Building a Legacy]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, we turn the tables around and feature KB as the guest of her own show. Jay Hira (Founder and Executive Director of <a href="https://www.linkedin.com/company/makecybersimple/">MakeCyberSimple</a>), an industry expert and long-time peer, takes the host’s seat and asks KB about her rollercoaster journey into the industry. From a belief in the transformative power of challenges to the importance of consistency and evolution, KB has navigated the ups and downs of entrepreneurship with determination. With gratitude for the support she’s given and the invaluable life lessons learned along the way, KB reflects on the wild and crazy ride of building her business and her brand. Join us as we delve into the power of perseverance, the impact of recognizing and believing in one’s identity, and the unwavering commitment to continual (and sometimes gradual) improvement. Get ready for an inspiring and honest conversation about triumphs, setbacks, and the exhilarating unpredictability of the entrepreneurial path.</p>
<p>Karissa Breen, more commonly known as KB, is a serial entrepreneur that founded KBI.Media, the independent &amp; agnostic global cybersecurity media company. KB has been crowned LinkedIn Top Voice in Technology. KB is a Cybersecurity Investigative Journalist that hosts the flagship podcast, KBKast, interviewing cybersecurity practitioners from around the globe about security and the problems business executives face.</p>
<p>KB is known for asking hard-hitting questions and getting real answers from her guests, providing a unique yet neutral position on these topics. KB is also the Producer &amp; Host of the streaming show, 2Fa.tv, where she asks questions to demystify the world of cybersecurity, providing insight into the world of security to business executives, and focuses on the downstream impacts these cybersecurity events have on our markets.</p>
<p> </p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/a254f72a-eb5d-4feb-8504-864699ddf14b-KBKAST-EP-Karissa-Breen.mp3" length="45279405"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, we turn the tables around and feature KB as the guest of her own show. Jay Hira (Founder and Executive Director of MakeCyberSimple), an industry expert and long-time peer, takes the host’s seat and asks KB about her rollercoaster journey into the industry. From a belief in the transformative power of challenges to the importance of consistency and evolution, KB has navigated the ups and downs of entrepreneurship with determination. With gratitude for the support she’s given and the invaluable life lessons learned along the way, KB reflects on the wild and crazy ride of building her business and her brand. Join us as we delve into the power of perseverance, the impact of recognizing and believing in one’s identity, and the unwavering commitment to continual (and sometimes gradual) improvement. Get ready for an inspiring and honest conversation about triumphs, setbacks, and the exhilarating unpredictability of the entrepreneurial path.
Karissa Breen, more commonly known as KB, is a serial entrepreneur that founded KBI.Media, the independent & agnostic global cybersecurity media company. KB has been crowned LinkedIn Top Voice in Technology. KB is a Cybersecurity Investigative Journalist that hosts the flagship podcast, KBKast, interviewing cybersecurity practitioners from around the globe about security and the problems business executives face.
KB is known for asking hard-hitting questions and getting real answers from her guests, providing a unique yet neutral position on these topics. KB is also the Producer & Host of the streaming show, 2Fa.tv, where she asks questions to demystify the world of cybersecurity, providing insight into the world of security to business executives, and focuses on the downstream impacts these cybersecurity events have on our markets.
 
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1565259/1695954017-KB.png"></itunes:image>
                                                                            <itunes:duration>00:47:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 212 Deep Dive: Nathan Wenzler | Cybersecurity’s Prominent Place in the ESG Conversation: Protecting the Planet and Society]]>
                </title>
                <pubDate>Thu, 28 Sep 2023 16:00:14 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598689</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-212-deep-dive-nathan-wenzler-cybersecuritys-prominent-place-in-the-esg-conversation-protecting-the-planet-and-society</link>
                                <description>
                                            <![CDATA[<p>As the world starts focusing on sustainability and ethical business practices intensifies, organizations are increasingly embracing ESG initiatives to demonstrate their commitment to the environment, social responsibility, and good governance. While ESG programs encompass a wide range of considerations, one aspect that should not be overlooked is cybersecurity. In today’s digital age, the integration of technology and cybersecurity is paramount to the success and integrity of ESG programs. In this episode, we discuss the intersection of technology and ESG, highlighting how cybersecurity protects against potential damage and disruption to green energy production and efficiency improvement. Additionally, we address the growing demand for ethical behavior from companies, the risks of focusing solely on media attention and neglecting proper security practices, and how breaches in trust can have long-lasting negative effects on reputation.</p>
<p>ESG initiatives were among the winners in this year’s Federal Budget, with $4 billion in new funding commitments aimed at accelerating Australia’s clean energy sector. However, it is important for businesses to not overlook cybersecurity as a crucial component of their ESG strategy moving forward. While companies often prioritise social and environmental initiatives, they tend to neglect cybersecurity in those areas, viewing it as only a part of the governance initiative. It’s often left to regulators or insurance providers to handle, despite the fact that cyberattacks can have a direct material impact on social and environmental matters whether through critical infrastructure compromise, data privacy violations, the loss of social trust and other impacts to partner organisations. The risk from cyberattacks can then result in potentially weakening every aspect of an ESG strategy, and not solely in technical matters or governance.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[As the world starts focusing on sustainability and ethical business practices intensifies, organizations are increasingly embracing ESG initiatives to demonstrate their commitment to the environment, social responsibility, and good governance. While ESG programs encompass a wide range of considerations, one aspect that should not be overlooked is cybersecurity. In today’s digital age, the integration of technology and cybersecurity is paramount to the success and integrity of ESG programs. In this episode, we discuss the intersection of technology and ESG, highlighting how cybersecurity protects against potential damage and disruption to green energy production and efficiency improvement. Additionally, we address the growing demand for ethical behavior from companies, the risks of focusing solely on media attention and neglecting proper security practices, and how breaches in trust can have long-lasting negative effects on reputation.
ESG initiatives were among the winners in this year’s Federal Budget, with $4 billion in new funding commitments aimed at accelerating Australia’s clean energy sector. However, it is important for businesses to not overlook cybersecurity as a crucial component of their ESG strategy moving forward. While companies often prioritise social and environmental initiatives, they tend to neglect cybersecurity in those areas, viewing it as only a part of the governance initiative. It’s often left to regulators or insurance providers to handle, despite the fact that cyberattacks can have a direct material impact on social and environmental matters whether through critical infrastructure compromise, data privacy violations, the loss of social trust and other impacts to partner organisations. The risk from cyberattacks can then result in potentially weakening every aspect of an ESG strategy, and not solely in technical matters or governance.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 212 Deep Dive: Nathan Wenzler | Cybersecurity’s Prominent Place in the ESG Conversation: Protecting the Planet and Society]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>As the world starts focusing on sustainability and ethical business practices intensifies, organizations are increasingly embracing ESG initiatives to demonstrate their commitment to the environment, social responsibility, and good governance. While ESG programs encompass a wide range of considerations, one aspect that should not be overlooked is cybersecurity. In today’s digital age, the integration of technology and cybersecurity is paramount to the success and integrity of ESG programs. In this episode, we discuss the intersection of technology and ESG, highlighting how cybersecurity protects against potential damage and disruption to green energy production and efficiency improvement. Additionally, we address the growing demand for ethical behavior from companies, the risks of focusing solely on media attention and neglecting proper security practices, and how breaches in trust can have long-lasting negative effects on reputation.</p>
<p>ESG initiatives were among the winners in this year’s Federal Budget, with $4 billion in new funding commitments aimed at accelerating Australia’s clean energy sector. However, it is important for businesses to not overlook cybersecurity as a crucial component of their ESG strategy moving forward. While companies often prioritise social and environmental initiatives, they tend to neglect cybersecurity in those areas, viewing it as only a part of the governance initiative. It’s often left to regulators or insurance providers to handle, despite the fact that cyberattacks can have a direct material impact on social and environmental matters whether through critical infrastructure compromise, data privacy violations, the loss of social trust and other impacts to partner organisations. The risk from cyberattacks can then result in potentially weakening every aspect of an ESG strategy, and not solely in technical matters or governance.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598689/3426cbdd-0445-480d-b92b-94bcb1d870bd-KBKAST-EP-Nathan-Wenzler.mp3" length="44106669"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[As the world starts focusing on sustainability and ethical business practices intensifies, organizations are increasingly embracing ESG initiatives to demonstrate their commitment to the environment, social responsibility, and good governance. While ESG programs encompass a wide range of considerations, one aspect that should not be overlooked is cybersecurity. In today’s digital age, the integration of technology and cybersecurity is paramount to the success and integrity of ESG programs. In this episode, we discuss the intersection of technology and ESG, highlighting how cybersecurity protects against potential damage and disruption to green energy production and efficiency improvement. Additionally, we address the growing demand for ethical behavior from companies, the risks of focusing solely on media attention and neglecting proper security practices, and how breaches in trust can have long-lasting negative effects on reputation.
ESG initiatives were among the winners in this year’s Federal Budget, with $4 billion in new funding commitments aimed at accelerating Australia’s clean energy sector. However, it is important for businesses to not overlook cybersecurity as a crucial component of their ESG strategy moving forward. While companies often prioritise social and environmental initiatives, they tend to neglect cybersecurity in those areas, viewing it as only a part of the governance initiative. It’s often left to regulators or insurance providers to handle, despite the fact that cyberattacks can have a direct material impact on social and environmental matters whether through critical infrastructure compromise, data privacy violations, the loss of social trust and other impacts to partner organisations. The risk from cyberattacks can then result in potentially weakening every aspect of an ESG strategy, and not solely in technical matters or governance.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598689/1700181074-Nathan-Wenzler.png"></itunes:image>
                                                                            <itunes:duration>00:45:57</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 211 Deep Dive: Fernando Serto | AI in the Hot Seat: Examining the Unknown Threats, Mitigating Risks, and Exploring Opportunities in Cybersecurity]]>
                </title>
                <pubDate>Fri, 22 Sep 2023 16:00:03 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598690</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-211-deep-dive-fernando-serto-ai-in-the-hot-seat-examining-the-unknown-threats-mitigating-risks-and-exploring-opportunities-in-cybersecurity</link>
                                <description>
                                            <![CDATA[<p>In this deep dive, we are joined by Fernando Serto, Chief Technologist and Evangelist of Cloudflare. With a deep understanding of the potential risks posed by accelerating climate change and fast-paced advancements in artificial intelligence (AI), he advocates for a careful and balanced approach to development. Fernando emphasizes the need to reflect on the consequences of our actions and the urgency to reduce our carbon footprint. He highlights the interconnectedness of today’s world, where people increasingly rely on AI-powered devices. While acknowledging the potential risks associated with AI, he believes that we are not yet at the point of no return. As an advisor, Fernando encourages individuals and organizations to exercise caution and approach AI development with a sense of responsibility. He highlights the positive aspects of AI when implemented correctly, emphasizing its ability to simplify and enhance our lives. Finally, we also uncover the importance of patching vulnerabilities quickly, the need for better cybersecurity practices, and the challenges faced by organizations in securing their networks.</p>
<p><span style="font-weight:400;">Fernando Serto – Field CTO for Asia Pacific, Japan and China at Cloudflare – is a highly qualified IT and Security expert with over 27 years of work experience. Fernando has held a variety of technical positions during his career, including Web Development, Unix, Networking, and Security. Fernando had the privilege of being involved with offensive security in the beginning of his career, and as a result, he has since gained a thorough understanding of both offensive and defensive security methods.</span></p>
<p><span style="font-weight:400;">Fernando has spent the last ten years working with top technology vendors, where he has established a reputation for his skill in explaining difficult technical security issues to both technical and non-technical audiences. He has a demonstrated history of assisting Product and Engineering teams in creating cutting-edge security solutions based on client input.</span></p>
<p><span style="font-weight:400;">Fernando is dedicated to remaining on the cutting edge of new security technology and has a thorough understanding of how businesses can use security to achieve their goals. He is passionate about assisting businesses in creating and putting into practise security plans that allow them to safeguard their assets and accomplish their objectives in the rapidly changing security environment of today.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this deep dive, we are joined by Fernando Serto, Chief Technologist and Evangelist of Cloudflare. With a deep understanding of the potential risks posed by accelerating climate change and fast-paced advancements in artificial intelligence (AI), he advocates for a careful and balanced approach to development. Fernando emphasizes the need to reflect on the consequences of our actions and the urgency to reduce our carbon footprint. He highlights the interconnectedness of today’s world, where people increasingly rely on AI-powered devices. While acknowledging the potential risks associated with AI, he believes that we are not yet at the point of no return. As an advisor, Fernando encourages individuals and organizations to exercise caution and approach AI development with a sense of responsibility. He highlights the positive aspects of AI when implemented correctly, emphasizing its ability to simplify and enhance our lives. Finally, we also uncover the importance of patching vulnerabilities quickly, the need for better cybersecurity practices, and the challenges faced by organizations in securing their networks.
Fernando Serto – Field CTO for Asia Pacific, Japan and China at Cloudflare – is a highly qualified IT and Security expert with over 27 years of work experience. Fernando has held a variety of technical positions during his career, including Web Development, Unix, Networking, and Security. Fernando had the privilege of being involved with offensive security in the beginning of his career, and as a result, he has since gained a thorough understanding of both offensive and defensive security methods.
Fernando has spent the last ten years working with top technology vendors, where he has established a reputation for his skill in explaining difficult technical security issues to both technical and non-technical audiences. He has a demonstrated history of assisting Product and Engineering teams in creating cutting-edge security solutions based on client input.
Fernando is dedicated to remaining on the cutting edge of new security technology and has a thorough understanding of how businesses can use security to achieve their goals. He is passionate about assisting businesses in creating and putting into practise security plans that allow them to safeguard their assets and accomplish their objectives in the rapidly changing security environment of today.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 211 Deep Dive: Fernando Serto | AI in the Hot Seat: Examining the Unknown Threats, Mitigating Risks, and Exploring Opportunities in Cybersecurity]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this deep dive, we are joined by Fernando Serto, Chief Technologist and Evangelist of Cloudflare. With a deep understanding of the potential risks posed by accelerating climate change and fast-paced advancements in artificial intelligence (AI), he advocates for a careful and balanced approach to development. Fernando emphasizes the need to reflect on the consequences of our actions and the urgency to reduce our carbon footprint. He highlights the interconnectedness of today’s world, where people increasingly rely on AI-powered devices. While acknowledging the potential risks associated with AI, he believes that we are not yet at the point of no return. As an advisor, Fernando encourages individuals and organizations to exercise caution and approach AI development with a sense of responsibility. He highlights the positive aspects of AI when implemented correctly, emphasizing its ability to simplify and enhance our lives. Finally, we also uncover the importance of patching vulnerabilities quickly, the need for better cybersecurity practices, and the challenges faced by organizations in securing their networks.</p>
<p><span style="font-weight:400;">Fernando Serto – Field CTO for Asia Pacific, Japan and China at Cloudflare – is a highly qualified IT and Security expert with over 27 years of work experience. Fernando has held a variety of technical positions during his career, including Web Development, Unix, Networking, and Security. Fernando had the privilege of being involved with offensive security in the beginning of his career, and as a result, he has since gained a thorough understanding of both offensive and defensive security methods.</span></p>
<p><span style="font-weight:400;">Fernando has spent the last ten years working with top technology vendors, where he has established a reputation for his skill in explaining difficult technical security issues to both technical and non-technical audiences. He has a demonstrated history of assisting Product and Engineering teams in creating cutting-edge security solutions based on client input.</span></p>
<p><span style="font-weight:400;">Fernando is dedicated to remaining on the cutting edge of new security technology and has a thorough understanding of how businesses can use security to achieve their goals. He is passionate about assisting businesses in creating and putting into practise security plans that allow them to safeguard their assets and accomplish their objectives in the rapidly changing security environment of today.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598690/2035bdc1-e566-4e3a-95ff-259e9316470e-KBKAST-EP-Fernando-Serto.mp3" length="38418861"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this deep dive, we are joined by Fernando Serto, Chief Technologist and Evangelist of Cloudflare. With a deep understanding of the potential risks posed by accelerating climate change and fast-paced advancements in artificial intelligence (AI), he advocates for a careful and balanced approach to development. Fernando emphasizes the need to reflect on the consequences of our actions and the urgency to reduce our carbon footprint. He highlights the interconnectedness of today’s world, where people increasingly rely on AI-powered devices. While acknowledging the potential risks associated with AI, he believes that we are not yet at the point of no return. As an advisor, Fernando encourages individuals and organizations to exercise caution and approach AI development with a sense of responsibility. He highlights the positive aspects of AI when implemented correctly, emphasizing its ability to simplify and enhance our lives. Finally, we also uncover the importance of patching vulnerabilities quickly, the need for better cybersecurity practices, and the challenges faced by organizations in securing their networks.
Fernando Serto – Field CTO for Asia Pacific, Japan and China at Cloudflare – is a highly qualified IT and Security expert with over 27 years of work experience. Fernando has held a variety of technical positions during his career, including Web Development, Unix, Networking, and Security. Fernando had the privilege of being involved with offensive security in the beginning of his career, and as a result, he has since gained a thorough understanding of both offensive and defensive security methods.
Fernando has spent the last ten years working with top technology vendors, where he has established a reputation for his skill in explaining difficult technical security issues to both technical and non-technical audiences. He has a demonstrated history of assisting Product and Engineering teams in creating cutting-edge security solutions based on client input.
Fernando is dedicated to remaining on the cutting edge of new security technology and has a thorough understanding of how businesses can use security to achieve their goals. He is passionate about assisting businesses in creating and putting into practise security plans that allow them to safeguard their assets and accomplish their objectives in the rapidly changing security environment of today.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598690/1700181074-GUESTS-DO-NOT-TOUCH-1.png"></itunes:image>
                                                                            <itunes:duration>00:40:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 210 Deep Dive: Mike Mengell | Strategic Secure Coding: Matching Skilled Problem Solvers to the Right Challenges]]>
                </title>
                <pubDate>Wed, 20 Sep 2023 16:00:20 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1559429</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-210-deep-dive-mike-mengell-strategic-secure-coding-matching-skilled-problem-solvers-to-the-right-challenges</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Mike Mengell (CTO &amp; Co-Founder – CTO Labs) as we dive deep into the challenges and solutions in the security specialist field, with a spotlight on the APAC region.</p>
<p>Mike is a passionate technologist.</p>
<p>He has over 20 years experience within IT and has worked in both corporate and start-up environments, often adapting technical engineering practices to varying clients, cultures and product requirements.</p>
<p>Mike has a keen understanding that successful teams are a culmination of culture, behaviours, technology, architecture and development techniques. One particular area of interest is the challenge for tech leaders – and pragmatic strategies available to them across people, platforms and processes – in pursuing a deeply secure, fast and productive core engineering capability, critical for enterprise cyber resilience today.</p>
<p>Mike is highly proficient in a range of software engineering practices and has held the role of CTO in a number of companies. He believes in removing waste through repeatable processes and automation.</p>
<p>Mike believes in contributing positively to those around him.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Mike Mengell (CTO & Co-Founder – CTO Labs) as we dive deep into the challenges and solutions in the security specialist field, with a spotlight on the APAC region.
Mike is a passionate technologist.
He has over 20 years experience within IT and has worked in both corporate and start-up environments, often adapting technical engineering practices to varying clients, cultures and product requirements.
Mike has a keen understanding that successful teams are a culmination of culture, behaviours, technology, architecture and development techniques. One particular area of interest is the challenge for tech leaders – and pragmatic strategies available to them across people, platforms and processes – in pursuing a deeply secure, fast and productive core engineering capability, critical for enterprise cyber resilience today.
Mike is highly proficient in a range of software engineering practices and has held the role of CTO in a number of companies. He believes in removing waste through repeatable processes and automation.
Mike believes in contributing positively to those around him.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 210 Deep Dive: Mike Mengell | Strategic Secure Coding: Matching Skilled Problem Solvers to the Right Challenges]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Mike Mengell (CTO &amp; Co-Founder – CTO Labs) as we dive deep into the challenges and solutions in the security specialist field, with a spotlight on the APAC region.</p>
<p>Mike is a passionate technologist.</p>
<p>He has over 20 years experience within IT and has worked in both corporate and start-up environments, often adapting technical engineering practices to varying clients, cultures and product requirements.</p>
<p>Mike has a keen understanding that successful teams are a culmination of culture, behaviours, technology, architecture and development techniques. One particular area of interest is the challenge for tech leaders – and pragmatic strategies available to them across people, platforms and processes – in pursuing a deeply secure, fast and productive core engineering capability, critical for enterprise cyber resilience today.</p>
<p>Mike is highly proficient in a range of software engineering practices and has held the role of CTO in a number of companies. He believes in removing waste through repeatable processes and automation.</p>
<p>Mike believes in contributing positively to those around him.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/920d0df5-15ac-49f1-86a9-9a9f9e7e471d-KBKAST-EP-210-Mike-Mengell-1.mp3" length="45425102"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Mike Mengell (CTO & Co-Founder – CTO Labs) as we dive deep into the challenges and solutions in the security specialist field, with a spotlight on the APAC region.
Mike is a passionate technologist.
He has over 20 years experience within IT and has worked in both corporate and start-up environments, often adapting technical engineering practices to varying clients, cultures and product requirements.
Mike has a keen understanding that successful teams are a culmination of culture, behaviours, technology, architecture and development techniques. One particular area of interest is the challenge for tech leaders – and pragmatic strategies available to them across people, platforms and processes – in pursuing a deeply secure, fast and productive core engineering capability, critical for enterprise cyber resilience today.
Mike is highly proficient in a range of software engineering practices and has held the role of CTO in a number of companies. He believes in removing waste through repeatable processes and automation.
Mike believes in contributing positively to those around him.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1559429/1700181074-GUESTS-DO-NOT-TOUCH-14.png"></itunes:image>
                                                                            <itunes:duration>00:47:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 209 Deep Dive: Rock Lambros | Business Fundamentals, Communication Strategies, and CFO Engagement: Exploring the Evolving Role of CISOs]]>
                </title>
                <pubDate>Fri, 15 Sep 2023 16:00:30 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598691</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-209-deep-dive-rock-lambros-business-fundamentals-communication-strategies-and-cfo-engagement-exploring-the-evolving-role-of-cisos</link>
                                <description>
                                            <![CDATA[<p>Kyriakos “Rock” Lambros is the CEO and Founder of RockCyber. He is a seasoned Cybersecurity and Information Technology executive with expertise in aligning Cybersecurity and technology strategy with enterprise business goals to reduce the risk of revenue to the organization. This experience includes building multi-framework security programs, policy and standards development, architecture, operations, threat intelligence, governance, risk management, compliance, and incident response for (multi-billion dollar) global organizations with exceptional security and requirements. The frameworks Rock has supported include the NIST Cybersecurity Framework, CMMC, NERC/CIP, NIST 800-53, NIST 800-171, NIST 800-207 (Zero Trust), ISO 27001, SOC2, PCI, and others. Rock’s enterprise experience has spanned industries with vastly differing security and privacy requirements, including energy, eCommerce, government, banking, and manufacturing.</p>
<p>Rock has served in several senior Cybersecurity and technology roles for global, multi-billion-dollar companies such as MPLX (a subsidiary of Marathon Petroleum Corporation), eBay, Honeywell, General Dynamics Information Technology, Wells Fargo, and Agilent Technologies. He built security programs from the ground up on multiple occasions. Rock was a pivotal contributor to M&amp;A activities at numerous companies, including eBay’s acquisition of Shopping.com and Skype and Marathon Petroleum Corporation’s acquisition of MarkWest Energy Partners. Rock oversaw multi-million dollar budgets, led successful defenses against highly-publicized denial-of-service attacks, and built and managed large Security and Network Operations Centers.</p>
<p>Rock serves on the board of several stealth-mode startups as a corporate strategy and Cybersecurity advisor. He is also a member of the Secure Smart Cities Advisory Board at the National Cybersecurity Center and co-chaired the Rocky Mountain Information Security Conference from 2015 to 2017,</p>
<p>A sought-after speaker, Rock has spoken at the annual RSA Security conference, which is the Cybersecurity industry’s seminal yearly event. He has also spoken at the CIO Energy Summit, the Future of Data Security conference, the American Council for Technology, the ISSA CISO Mentorship series, and several industry association chapter meetings.</p>
<p>Rock is a member of ISSA, ISC2, the Cloud Security Alliance, and OWASP. He graduated with an MBA in Finance and Entrepreneurship from Arizona State University and received his BS in Management Information Systems from the University of Nevada, Las Vegas.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kyriakos “Rock” Lambros is the CEO and Founder of RockCyber. He is a seasoned Cybersecurity and Information Technology executive with expertise in aligning Cybersecurity and technology strategy with enterprise business goals to reduce the risk of revenue to the organization. This experience includes building multi-framework security programs, policy and standards development, architecture, operations, threat intelligence, governance, risk management, compliance, and incident response for (multi-billion dollar) global organizations with exceptional security and requirements. The frameworks Rock has supported include the NIST Cybersecurity Framework, CMMC, NERC/CIP, NIST 800-53, NIST 800-171, NIST 800-207 (Zero Trust), ISO 27001, SOC2, PCI, and others. Rock’s enterprise experience has spanned industries with vastly differing security and privacy requirements, including energy, eCommerce, government, banking, and manufacturing.
Rock has served in several senior Cybersecurity and technology roles for global, multi-billion-dollar companies such as MPLX (a subsidiary of Marathon Petroleum Corporation), eBay, Honeywell, General Dynamics Information Technology, Wells Fargo, and Agilent Technologies. He built security programs from the ground up on multiple occasions. Rock was a pivotal contributor to M&A activities at numerous companies, including eBay’s acquisition of Shopping.com and Skype and Marathon Petroleum Corporation’s acquisition of MarkWest Energy Partners. Rock oversaw multi-million dollar budgets, led successful defenses against highly-publicized denial-of-service attacks, and built and managed large Security and Network Operations Centers.
Rock serves on the board of several stealth-mode startups as a corporate strategy and Cybersecurity advisor. He is also a member of the Secure Smart Cities Advisory Board at the National Cybersecurity Center and co-chaired the Rocky Mountain Information Security Conference from 2015 to 2017,
A sought-after speaker, Rock has spoken at the annual RSA Security conference, which is the Cybersecurity industry’s seminal yearly event. He has also spoken at the CIO Energy Summit, the Future of Data Security conference, the American Council for Technology, the ISSA CISO Mentorship series, and several industry association chapter meetings.
Rock is a member of ISSA, ISC2, the Cloud Security Alliance, and OWASP. He graduated with an MBA in Finance and Entrepreneurship from Arizona State University and received his BS in Management Information Systems from the University of Nevada, Las Vegas.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 209 Deep Dive: Rock Lambros | Business Fundamentals, Communication Strategies, and CFO Engagement: Exploring the Evolving Role of CISOs]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Kyriakos “Rock” Lambros is the CEO and Founder of RockCyber. He is a seasoned Cybersecurity and Information Technology executive with expertise in aligning Cybersecurity and technology strategy with enterprise business goals to reduce the risk of revenue to the organization. This experience includes building multi-framework security programs, policy and standards development, architecture, operations, threat intelligence, governance, risk management, compliance, and incident response for (multi-billion dollar) global organizations with exceptional security and requirements. The frameworks Rock has supported include the NIST Cybersecurity Framework, CMMC, NERC/CIP, NIST 800-53, NIST 800-171, NIST 800-207 (Zero Trust), ISO 27001, SOC2, PCI, and others. Rock’s enterprise experience has spanned industries with vastly differing security and privacy requirements, including energy, eCommerce, government, banking, and manufacturing.</p>
<p>Rock has served in several senior Cybersecurity and technology roles for global, multi-billion-dollar companies such as MPLX (a subsidiary of Marathon Petroleum Corporation), eBay, Honeywell, General Dynamics Information Technology, Wells Fargo, and Agilent Technologies. He built security programs from the ground up on multiple occasions. Rock was a pivotal contributor to M&amp;A activities at numerous companies, including eBay’s acquisition of Shopping.com and Skype and Marathon Petroleum Corporation’s acquisition of MarkWest Energy Partners. Rock oversaw multi-million dollar budgets, led successful defenses against highly-publicized denial-of-service attacks, and built and managed large Security and Network Operations Centers.</p>
<p>Rock serves on the board of several stealth-mode startups as a corporate strategy and Cybersecurity advisor. He is also a member of the Secure Smart Cities Advisory Board at the National Cybersecurity Center and co-chaired the Rocky Mountain Information Security Conference from 2015 to 2017,</p>
<p>A sought-after speaker, Rock has spoken at the annual RSA Security conference, which is the Cybersecurity industry’s seminal yearly event. He has also spoken at the CIO Energy Summit, the Future of Data Security conference, the American Council for Technology, the ISSA CISO Mentorship series, and several industry association chapter meetings.</p>
<p>Rock is a member of ISSA, ISC2, the Cloud Security Alliance, and OWASP. He graduated with an MBA in Finance and Entrepreneurship from Arizona State University and received his BS in Management Information Systems from the University of Nevada, Las Vegas.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598691/12cc6cf7-6293-41aa-a712-e30900aed1a4-KBKAST-EP-Rock-Lambros.mp3" length="55527012"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kyriakos “Rock” Lambros is the CEO and Founder of RockCyber. He is a seasoned Cybersecurity and Information Technology executive with expertise in aligning Cybersecurity and technology strategy with enterprise business goals to reduce the risk of revenue to the organization. This experience includes building multi-framework security programs, policy and standards development, architecture, operations, threat intelligence, governance, risk management, compliance, and incident response for (multi-billion dollar) global organizations with exceptional security and requirements. The frameworks Rock has supported include the NIST Cybersecurity Framework, CMMC, NERC/CIP, NIST 800-53, NIST 800-171, NIST 800-207 (Zero Trust), ISO 27001, SOC2, PCI, and others. Rock’s enterprise experience has spanned industries with vastly differing security and privacy requirements, including energy, eCommerce, government, banking, and manufacturing.
Rock has served in several senior Cybersecurity and technology roles for global, multi-billion-dollar companies such as MPLX (a subsidiary of Marathon Petroleum Corporation), eBay, Honeywell, General Dynamics Information Technology, Wells Fargo, and Agilent Technologies. He built security programs from the ground up on multiple occasions. Rock was a pivotal contributor to M&A activities at numerous companies, including eBay’s acquisition of Shopping.com and Skype and Marathon Petroleum Corporation’s acquisition of MarkWest Energy Partners. Rock oversaw multi-million dollar budgets, led successful defenses against highly-publicized denial-of-service attacks, and built and managed large Security and Network Operations Centers.
Rock serves on the board of several stealth-mode startups as a corporate strategy and Cybersecurity advisor. He is also a member of the Secure Smart Cities Advisory Board at the National Cybersecurity Center and co-chaired the Rocky Mountain Information Security Conference from 2015 to 2017,
A sought-after speaker, Rock has spoken at the annual RSA Security conference, which is the Cybersecurity industry’s seminal yearly event. He has also spoken at the CIO Energy Summit, the Future of Data Security conference, the American Council for Technology, the ISSA CISO Mentorship series, and several industry association chapter meetings.
Rock is a member of ISSA, ISC2, the Cloud Security Alliance, and OWASP. He graduated with an MBA in Finance and Entrepreneurship from Arizona State University and received his BS in Management Information Systems from the University of Nevada, Las Vegas.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598691/1700181075-GUESTS-DO-NOT-TOUCH-3.png"></itunes:image>
                                                                            <itunes:duration>00:38:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 208 Deep Dive: Ben Doyle | Purposeful Leadership: Essential Conversations Cyber Executives Should Focus On]]>
                </title>
                <pubDate>Wed, 13 Sep 2023 16:00:37 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598692</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-208-deep-dive-ben-doyle-purposeful-leadership-essential-conversations-cyber-executives-should-focus-on</link>
                                <description>
                                            <![CDATA[<p>Ben is an accomplished information security executive with over 20 years of international information security experience. Due to his many years of providing strategic C-level/board advice, he is able to apply technical threats into appropriate business contexts to determine overall risk to organisations. During this time Ben has been required to manage complex environments that requires balancing local and global organisational policies, domestic regulations, national security requirements, export control and international trade control restrictions, and applying the process, people and technology to ensure successful compliance.</p>
<p>Ben maintains his strong passion for the technical aspects of information security and recently has been focusing on creating new business opportunities by working across the breath of the global organisation’s capabilities while teaming and supporting small innovative start up technology companies.</p>
<p>Ben speaks regularly at international, interstate and local conferences, seminars and round tables</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ben is an accomplished information security executive with over 20 years of international information security experience. Due to his many years of providing strategic C-level/board advice, he is able to apply technical threats into appropriate business contexts to determine overall risk to organisations. During this time Ben has been required to manage complex environments that requires balancing local and global organisational policies, domestic regulations, national security requirements, export control and international trade control restrictions, and applying the process, people and technology to ensure successful compliance.
Ben maintains his strong passion for the technical aspects of information security and recently has been focusing on creating new business opportunities by working across the breath of the global organisation’s capabilities while teaming and supporting small innovative start up technology companies.
Ben speaks regularly at international, interstate and local conferences, seminars and round tables
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 208 Deep Dive: Ben Doyle | Purposeful Leadership: Essential Conversations Cyber Executives Should Focus On]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Ben is an accomplished information security executive with over 20 years of international information security experience. Due to his many years of providing strategic C-level/board advice, he is able to apply technical threats into appropriate business contexts to determine overall risk to organisations. During this time Ben has been required to manage complex environments that requires balancing local and global organisational policies, domestic regulations, national security requirements, export control and international trade control restrictions, and applying the process, people and technology to ensure successful compliance.</p>
<p>Ben maintains his strong passion for the technical aspects of information security and recently has been focusing on creating new business opportunities by working across the breath of the global organisation’s capabilities while teaming and supporting small innovative start up technology companies.</p>
<p>Ben speaks regularly at international, interstate and local conferences, seminars and round tables</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598692/e3c8cf70-a932-4dba-83ae-cc6f85d850fc-KBKAST-EP-Ben-Doyle.mp3" length="62026138"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ben is an accomplished information security executive with over 20 years of international information security experience. Due to his many years of providing strategic C-level/board advice, he is able to apply technical threats into appropriate business contexts to determine overall risk to organisations. During this time Ben has been required to manage complex environments that requires balancing local and global organisational policies, domestic regulations, national security requirements, export control and international trade control restrictions, and applying the process, people and technology to ensure successful compliance.
Ben maintains his strong passion for the technical aspects of information security and recently has been focusing on creating new business opportunities by working across the breath of the global organisation’s capabilities while teaming and supporting small innovative start up technology companies.
Ben speaks regularly at international, interstate and local conferences, seminars and round tables
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598692/c1a-5k0v-25dpjm2ksnk6-stda6v.png"></itunes:image>
                                                                            <itunes:duration>00:43:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 207 Deep Dive: Mark Anderson | Staying Ahead of the Game: Cyber Preparedness for Executives]]>
                </title>
                <pubDate>Fri, 08 Sep 2023 16:00:07 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598693</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-207-deep-dive-mark-anderson-staying-ahead-of-the-game-cyber-preparedness-for-executives</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Mark Anderson (National Security Officer – Microsoft ANZ), as we dive deep into the challenges that executives face in today’s ever-evolving landscape. We discuss the importance of picking the right sources for insights, the non-IT ramifications of incidents, and the need for transparency and communication in the face of cyber attacks. Mark also shares his expertise on the commercialization of cybercrime, human-operated ransomware, and business email compromise that affect both small businesses and large enterprises. We also touch on the true cost of cybercrime and the importance of resilience-building through drills and scenario practice.</p>
<p>Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Mark Anderson (National Security Officer – Microsoft ANZ), as we dive deep into the challenges that executives face in today’s ever-evolving landscape. We discuss the importance of picking the right sources for insights, the non-IT ramifications of incidents, and the need for transparency and communication in the face of cyber attacks. Mark also shares his expertise on the commercialization of cybercrime, human-operated ransomware, and business email compromise that affect both small businesses and large enterprises. We also touch on the true cost of cybercrime and the importance of resilience-building through drills and scenario practice.
Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia & New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 207 Deep Dive: Mark Anderson | Staying Ahead of the Game: Cyber Preparedness for Executives]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Mark Anderson (National Security Officer – Microsoft ANZ), as we dive deep into the challenges that executives face in today’s ever-evolving landscape. We discuss the importance of picking the right sources for insights, the non-IT ramifications of incidents, and the need for transparency and communication in the face of cyber attacks. Mark also shares his expertise on the commercialization of cybercrime, human-operated ransomware, and business email compromise that affect both small businesses and large enterprises. We also touch on the true cost of cybercrime and the importance of resilience-building through drills and scenario practice.</p>
<p>Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598693/8cd42831-872e-4f1c-aa9b-6e9f7b61c838-KBKAST-EP-Mark-Anderson.mp3" length="60876184"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Mark Anderson (National Security Officer – Microsoft ANZ), as we dive deep into the challenges that executives face in today’s ever-evolving landscape. We discuss the importance of picking the right sources for insights, the non-IT ramifications of incidents, and the need for transparency and communication in the face of cyber attacks. Mark also shares his expertise on the commercialization of cybercrime, human-operated ransomware, and business email compromise that affect both small businesses and large enterprises. We also touch on the true cost of cybercrime and the importance of resilience-building through drills and scenario practice.
Mark has over 28 years’ experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia & New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598693/1700181075-GUESTS-DO-NOT-TOUCH-12.png"></itunes:image>
                                                                            <itunes:duration>00:42:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[KB On The Go: Expert Insights from the Tech Leaders Media and Journalism Conference]]>
                </title>
                <pubDate>Thu, 07 Sep 2023 11:00:34 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1550360</guid>
                                    <link>https://kbkast.castos.com/episodes/kb-on-the-go-expert-insights-from-the-tech-leaders-media-and-journalism-conference</link>
                                <description>
                                            <![CDATA[<p>In this bonus episode, KB is on the go at the 2023 Tech Leaders Media and Journalism Conference, where she sits down for quickfire interviews with industry experts and gets their insights on hot topics in the media and cyber space. In this special segment, we are joined by the following experts:</p>
<ol>
<li>Phil Sim – CEO, Influencing</li>
<li>Anthony Woodward – CEO, Logicalis Australia</li>
<li>Zach Zeus – CEO, BizCubed</li>
<li>Matt Hurford – Managing Director – Australia &amp; New Zealand, NetApp</li>
<li>Kurt Hansen – CEO, Tesserent</li>
<li>Stela Solar – Director, National Artificial Intelligence Centre</li>
</ol>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this bonus episode, KB is on the go at the 2023 Tech Leaders Media and Journalism Conference, where she sits down for quickfire interviews with industry experts and gets their insights on hot topics in the media and cyber space. In this special segment, we are joined by the following experts:

Phil Sim – CEO, Influencing
Anthony Woodward – CEO, Logicalis Australia
Zach Zeus – CEO, BizCubed
Matt Hurford – Managing Director – Australia & New Zealand, NetApp
Kurt Hansen – CEO, Tesserent
Stela Solar – Director, National Artificial Intelligence Centre

 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[KB On The Go: Expert Insights from the Tech Leaders Media and Journalism Conference]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this bonus episode, KB is on the go at the 2023 Tech Leaders Media and Journalism Conference, where she sits down for quickfire interviews with industry experts and gets their insights on hot topics in the media and cyber space. In this special segment, we are joined by the following experts:</p>
<ol>
<li>Phil Sim – CEO, Influencing</li>
<li>Anthony Woodward – CEO, Logicalis Australia</li>
<li>Zach Zeus – CEO, BizCubed</li>
<li>Matt Hurford – Managing Director – Australia &amp; New Zealand, NetApp</li>
<li>Kurt Hansen – CEO, Tesserent</li>
<li>Stela Solar – Director, National Artificial Intelligence Centre</li>
</ol>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/93fd9203-6096-40b8-aba2-56855e798453-KB-On-The-Go-Tech-Leaders-Conference.mp3" length="36926399"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this bonus episode, KB is on the go at the 2023 Tech Leaders Media and Journalism Conference, where she sits down for quickfire interviews with industry experts and gets their insights on hot topics in the media and cyber space. In this special segment, we are joined by the following experts:

Phil Sim – CEO, Influencing
Anthony Woodward – CEO, Logicalis Australia
Zach Zeus – CEO, BizCubed
Matt Hurford – Managing Director – Australia & New Zealand, NetApp
Kurt Hansen – CEO, Tesserent
Stela Solar – Director, National Artificial Intelligence Centre

 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1550360/1700181076-Tech-Leaders-Social-Post.png"></itunes:image>
                                                                            <itunes:duration>00:38:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 206 Deep Dive: Gergana Winzer | From Fragmentation to Integration: Collaborative Solutions for a  Secure Cyber Future]]>
                </title>
                <pubDate>Wed, 06 Sep 2023 16:00:16 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1549833</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-206-deep-dive-gergana-winzer-from-fragmentation-to-integration-collaborative-solutions-for-a-secure-cyber-future</link>
                                <description>
                                            <![CDATA[<p>An IT and cybersecurity professional, Gergana works with clients to develop creative approaches to reduce their cyber and data security risks. She assists organisations to improve their cyber security posture and supports them to achieve cyber resilient outcomes. Gergana believes that cyber is a business enabler; an intrinsic part of developing the business that can help organisations become more competitive in today’s world.</p>
<p>Gergana is an experienced and respected member of the cybersecurity community in Australia and Asia and an engaging keynote and public speaker on cyber security and privacy matters, risks and issues to the business community. In her spare time, she mentors young professionals and is an advocate for diversity.</p>
<p>Prior to KPMG, Gergana worked for a global IT solutions company as Industry Director Cyber Security for the Asia Pacific region. She was a member of the Australian Information Security Association (AISA) national board and ISACA Sydney board.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[An IT and cybersecurity professional, Gergana works with clients to develop creative approaches to reduce their cyber and data security risks. She assists organisations to improve their cyber security posture and supports them to achieve cyber resilient outcomes. Gergana believes that cyber is a business enabler; an intrinsic part of developing the business that can help organisations become more competitive in today’s world.
Gergana is an experienced and respected member of the cybersecurity community in Australia and Asia and an engaging keynote and public speaker on cyber security and privacy matters, risks and issues to the business community. In her spare time, she mentors young professionals and is an advocate for diversity.
Prior to KPMG, Gergana worked for a global IT solutions company as Industry Director Cyber Security for the Asia Pacific region. She was a member of the Australian Information Security Association (AISA) national board and ISACA Sydney board.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 206 Deep Dive: Gergana Winzer | From Fragmentation to Integration: Collaborative Solutions for a  Secure Cyber Future]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>An IT and cybersecurity professional, Gergana works with clients to develop creative approaches to reduce their cyber and data security risks. She assists organisations to improve their cyber security posture and supports them to achieve cyber resilient outcomes. Gergana believes that cyber is a business enabler; an intrinsic part of developing the business that can help organisations become more competitive in today’s world.</p>
<p>Gergana is an experienced and respected member of the cybersecurity community in Australia and Asia and an engaging keynote and public speaker on cyber security and privacy matters, risks and issues to the business community. In her spare time, she mentors young professionals and is an advocate for diversity.</p>
<p>Prior to KPMG, Gergana worked for a global IT solutions company as Industry Director Cyber Security for the Asia Pacific region. She was a member of the Australian Information Security Association (AISA) national board and ISACA Sydney board.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/e2dd58e8-3fe7-4b81-8697-271fc49be459-KBKAST-EP-Gergana-Winzer.mp3" length="53686576"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[An IT and cybersecurity professional, Gergana works with clients to develop creative approaches to reduce their cyber and data security risks. She assists organisations to improve their cyber security posture and supports them to achieve cyber resilient outcomes. Gergana believes that cyber is a business enabler; an intrinsic part of developing the business that can help organisations become more competitive in today’s world.
Gergana is an experienced and respected member of the cybersecurity community in Australia and Asia and an engaging keynote and public speaker on cyber security and privacy matters, risks and issues to the business community. In her spare time, she mentors young professionals and is an advocate for diversity.
Prior to KPMG, Gergana worked for a global IT solutions company as Industry Director Cyber Security for the Asia Pacific region. She was a member of the Australian Information Security Association (AISA) national board and ISACA Sydney board.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1549833/1700181076-GUESTS-DO-NOT-TOUCH-1.png"></itunes:image>
                                                                            <itunes:duration>00:37:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 205 Deep Dive: Phillip Campbell | Unlocking Your Cyber Mind: Using Brain Science to Approach Security Training Differently]]>
                </title>
                <pubDate>Fri, 01 Sep 2023 16:00:25 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1547806</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-205-deep-dive-phillip-campbell-unlocking-your-cyber-mind-using-brain-science-to-approach-security-training-differently</link>
                                <description>
                                            <![CDATA[<p style="font-weight:400;">Phillip is the CEO of enigmaFIT, a global brain coaching and training company. He has a Master of Cognitive Science and is committed to developing cognitive excellence for clients. Over the past 25 years, he has provided his programs to Fortune 500 executives and entrepreneurs in the USA, Europe, and Asia-Pacific.</p>
<p style="font-weight:400;">The enigmaFIT program is based on over 50 years of research into the CHC Theory of Human Cognitive Abilities. It creates Brain Balance, where the conscious mind and subconscious brain work together to optimally increase an individual’s cognitive capability, a very important aspect in the cybersecurity space.</p>
<p style="font-weight:400;">Phillip is a USA Today and Wall Street Journalist best-selling Author for his contribution to ‘Habits of Success’ and has just completed his new work, ‘Brain Habits: The Science of Subconscious Success’ which has reached Amazon #1 Best Seller in Developmental Biology</p>
<p class="m_-7812065148990480490Default"><b>Purchasing book</b> – Brain Habits: The Science of Subconscious Success. Click on this Amazon link: <a href="https://www.amazon.com/Brain-Habits-Science-Subconscious-Success-ebook/dp/B0BNXRMMPJ/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=1689049309&amp;sr=8-1" target="_blank" rel="noreferrer noopener">Brain Habits Book</a><u></u><u></u></p>
<p class="m_-7812065148990480490Default"><b>To understand more about your Focused Thinking capability, try Phillip’s free assessment:</b>  <a href="https://www.enigmafit.com/focusedtest" target="_blank" rel="noreferrer noopener">Complimentary Focused Thinking Assessment</a><u></u><u></u><u></u><u></u></p>
<p class="m_-7812065148990480490Default"><b>To contact Phillip Campbell, email</b>: <a href="mailto:info@enigmafit.com" target="_blank" rel="noreferrer noopener">info@enigmafit.com</a> or visit website: <a href="https://www.enigmafit.com/" target="_blank" rel="noreferrer noopener">www.enigmaFIT.com</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Phillip is the CEO of enigmaFIT, a global brain coaching and training company. He has a Master of Cognitive Science and is committed to developing cognitive excellence for clients. Over the past 25 years, he has provided his programs to Fortune 500 executives and entrepreneurs in the USA, Europe, and Asia-Pacific.
The enigmaFIT program is based on over 50 years of research into the CHC Theory of Human Cognitive Abilities. It creates Brain Balance, where the conscious mind and subconscious brain work together to optimally increase an individual’s cognitive capability, a very important aspect in the cybersecurity space.
Phillip is a USA Today and Wall Street Journalist best-selling Author for his contribution to ‘Habits of Success’ and has just completed his new work, ‘Brain Habits: The Science of Subconscious Success’ which has reached Amazon #1 Best Seller in Developmental Biology
Purchasing book – Brain Habits: The Science of Subconscious Success. Click on this Amazon link: Brain Habits Book
To understand more about your Focused Thinking capability, try Phillip’s free assessment:  Complimentary Focused Thinking Assessment
To contact Phillip Campbell, email: info@enigmafit.com or visit website: www.enigmaFIT.com
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 205 Deep Dive: Phillip Campbell | Unlocking Your Cyber Mind: Using Brain Science to Approach Security Training Differently]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p style="font-weight:400;">Phillip is the CEO of enigmaFIT, a global brain coaching and training company. He has a Master of Cognitive Science and is committed to developing cognitive excellence for clients. Over the past 25 years, he has provided his programs to Fortune 500 executives and entrepreneurs in the USA, Europe, and Asia-Pacific.</p>
<p style="font-weight:400;">The enigmaFIT program is based on over 50 years of research into the CHC Theory of Human Cognitive Abilities. It creates Brain Balance, where the conscious mind and subconscious brain work together to optimally increase an individual’s cognitive capability, a very important aspect in the cybersecurity space.</p>
<p style="font-weight:400;">Phillip is a USA Today and Wall Street Journalist best-selling Author for his contribution to ‘Habits of Success’ and has just completed his new work, ‘Brain Habits: The Science of Subconscious Success’ which has reached Amazon #1 Best Seller in Developmental Biology</p>
<p class="m_-7812065148990480490Default"><b>Purchasing book</b> – Brain Habits: The Science of Subconscious Success. Click on this Amazon link: <a href="https://www.amazon.com/Brain-Habits-Science-Subconscious-Success-ebook/dp/B0BNXRMMPJ/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=1689049309&amp;sr=8-1" target="_blank" rel="noreferrer noopener">Brain Habits Book</a><u></u><u></u></p>
<p class="m_-7812065148990480490Default"><b>To understand more about your Focused Thinking capability, try Phillip’s free assessment:</b>  <a href="https://www.enigmafit.com/focusedtest" target="_blank" rel="noreferrer noopener">Complimentary Focused Thinking Assessment</a><u></u><u></u><u></u><u></u></p>
<p class="m_-7812065148990480490Default"><b>To contact Phillip Campbell, email</b>: <a href="mailto:info@enigmafit.com" target="_blank" rel="noreferrer noopener">info@enigmafit.com</a> or visit website: <a href="https://www.enigmafit.com/" target="_blank" rel="noreferrer noopener">www.enigmaFIT.com</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/0dd053dc-4733-4f79-8309-7dc66e7e8454-KBKAST-EP-Phillip-Campbell-edited.mp3" length="53837292"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Phillip is the CEO of enigmaFIT, a global brain coaching and training company. He has a Master of Cognitive Science and is committed to developing cognitive excellence for clients. Over the past 25 years, he has provided his programs to Fortune 500 executives and entrepreneurs in the USA, Europe, and Asia-Pacific.
The enigmaFIT program is based on over 50 years of research into the CHC Theory of Human Cognitive Abilities. It creates Brain Balance, where the conscious mind and subconscious brain work together to optimally increase an individual’s cognitive capability, a very important aspect in the cybersecurity space.
Phillip is a USA Today and Wall Street Journalist best-selling Author for his contribution to ‘Habits of Success’ and has just completed his new work, ‘Brain Habits: The Science of Subconscious Success’ which has reached Amazon #1 Best Seller in Developmental Biology
Purchasing book – Brain Habits: The Science of Subconscious Success. Click on this Amazon link: Brain Habits Book
To understand more about your Focused Thinking capability, try Phillip’s free assessment:  Complimentary Focused Thinking Assessment
To contact Phillip Campbell, email: info@enigmafit.com or visit website: www.enigmaFIT.com
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1547806/1700181076-GUESTS-DO-NOT-TOUCH-2-1.png"></itunes:image>
                                                                            <itunes:duration>00:37:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 204 Deep Dive: Kurt Hansen | Discussing the Three Major Pillars and Envisioning The World’s Most Cyber Secure Country by 2030]]>
                </title>
                <pubDate>Wed, 30 Aug 2023 16:00:13 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1545820</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-204-deep-dive-kurt-hansen-discussing-the-three-major-pillars-and-envisioning-the-worlds-most-cyber-secure-country-by-2030</link>
                                <description>
                                            <![CDATA[<p>In this episode, we are joined by Kurt Hansen (CEO – Tesserent) as we dive deep and envision Australia as the world’s most cyber secure country by 2030. Kurt addresses the three major pillars when formulating and implementing strategies, and highlights that there is no silver bullet here – we are doing the best we can but keeping the conversation going is also key.</p>
<p>Kurt is the CEO of Australi’a largest ASX listed cybersecurity company,  Tesserent Limited (ASX: TNT).</p>
<p>Kurt previously lead the Security Division at PS+C Group ASX:PSZ. Prior to that, Kurt was responsible at Tesserent ASX:TNT for defining the start up Sales Strategy GTM and building the initial team at Tesserent a newly listed ASX company.</p>
<p>Prior to Tesserent, Kurt was at Check Point Software responsible for $80MAUD Cyber Security Solution Sales and Services in Australia and New Zealand.</p>
<p>Prior to Check Point, Kurt was MD at F5 Networks for almost 5 years and grew the local subsidiary from $20m to $75m during 2009 to 2013, and the team from 17 to 70 people. In FY 2010/11 A/NZ was rated as the fastest growing subsidiary globally and has the highest attach rate of advanced application software and security solutions.</p>
<p>In 2011/12 he also led the Carrier and Service/Cloud provider virtual sales team across Asia Pacific and Japan.</p>
<p>Hansen’s career in the IT industry spans over 20 years. Before joining F5, Hansen was the CEO of AirData Pty Ltd, where he grew top line revenues by 250 percent in over 18 months.</p>
<p>Prior to AirData, he gained extensive sales and operational leadership experience while at Symbol Technologies, Telstra Wholesale, Cisco Systems, and Ericsson. In these positions he was responsible for increasing revenue and managing costs whilst building a senior high performing sales and delivery team.</p>
<p>Hansen commenced his career in IT as an Army Apprentice and later as an officer in the Royal Australian Signal Corps, finishing with the commissioned rank of Captain.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, we are joined by Kurt Hansen (CEO – Tesserent) as we dive deep and envision Australia as the world’s most cyber secure country by 2030. Kurt addresses the three major pillars when formulating and implementing strategies, and highlights that there is no silver bullet here – we are doing the best we can but keeping the conversation going is also key.
Kurt is the CEO of Australi’a largest ASX listed cybersecurity company,  Tesserent Limited (ASX: TNT).
Kurt previously lead the Security Division at PS+C Group ASX:PSZ. Prior to that, Kurt was responsible at Tesserent ASX:TNT for defining the start up Sales Strategy GTM and building the initial team at Tesserent a newly listed ASX company.
Prior to Tesserent, Kurt was at Check Point Software responsible for $80MAUD Cyber Security Solution Sales and Services in Australia and New Zealand.
Prior to Check Point, Kurt was MD at F5 Networks for almost 5 years and grew the local subsidiary from $20m to $75m during 2009 to 2013, and the team from 17 to 70 people. In FY 2010/11 A/NZ was rated as the fastest growing subsidiary globally and has the highest attach rate of advanced application software and security solutions.
In 2011/12 he also led the Carrier and Service/Cloud provider virtual sales team across Asia Pacific and Japan.
Hansen’s career in the IT industry spans over 20 years. Before joining F5, Hansen was the CEO of AirData Pty Ltd, where he grew top line revenues by 250 percent in over 18 months.
Prior to AirData, he gained extensive sales and operational leadership experience while at Symbol Technologies, Telstra Wholesale, Cisco Systems, and Ericsson. In these positions he was responsible for increasing revenue and managing costs whilst building a senior high performing sales and delivery team.
Hansen commenced his career in IT as an Army Apprentice and later as an officer in the Royal Australian Signal Corps, finishing with the commissioned rank of Captain.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 204 Deep Dive: Kurt Hansen | Discussing the Three Major Pillars and Envisioning The World’s Most Cyber Secure Country by 2030]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, we are joined by Kurt Hansen (CEO – Tesserent) as we dive deep and envision Australia as the world’s most cyber secure country by 2030. Kurt addresses the three major pillars when formulating and implementing strategies, and highlights that there is no silver bullet here – we are doing the best we can but keeping the conversation going is also key.</p>
<p>Kurt is the CEO of Australi’a largest ASX listed cybersecurity company,  Tesserent Limited (ASX: TNT).</p>
<p>Kurt previously lead the Security Division at PS+C Group ASX:PSZ. Prior to that, Kurt was responsible at Tesserent ASX:TNT for defining the start up Sales Strategy GTM and building the initial team at Tesserent a newly listed ASX company.</p>
<p>Prior to Tesserent, Kurt was at Check Point Software responsible for $80MAUD Cyber Security Solution Sales and Services in Australia and New Zealand.</p>
<p>Prior to Check Point, Kurt was MD at F5 Networks for almost 5 years and grew the local subsidiary from $20m to $75m during 2009 to 2013, and the team from 17 to 70 people. In FY 2010/11 A/NZ was rated as the fastest growing subsidiary globally and has the highest attach rate of advanced application software and security solutions.</p>
<p>In 2011/12 he also led the Carrier and Service/Cloud provider virtual sales team across Asia Pacific and Japan.</p>
<p>Hansen’s career in the IT industry spans over 20 years. Before joining F5, Hansen was the CEO of AirData Pty Ltd, where he grew top line revenues by 250 percent in over 18 months.</p>
<p>Prior to AirData, he gained extensive sales and operational leadership experience while at Symbol Technologies, Telstra Wholesale, Cisco Systems, and Ericsson. In these positions he was responsible for increasing revenue and managing costs whilst building a senior high performing sales and delivery team.</p>
<p>Hansen commenced his career in IT as an Army Apprentice and later as an officer in the Royal Australian Signal Corps, finishing with the commissioned rank of Captain.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2b9e0a61-e66c-49fb-99dd-5af8f214f2d6-KBKAST-EP-Kurt-Hansen-V2.mp3" length="60500440"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, we are joined by Kurt Hansen (CEO – Tesserent) as we dive deep and envision Australia as the world’s most cyber secure country by 2030. Kurt addresses the three major pillars when formulating and implementing strategies, and highlights that there is no silver bullet here – we are doing the best we can but keeping the conversation going is also key.
Kurt is the CEO of Australi’a largest ASX listed cybersecurity company,  Tesserent Limited (ASX: TNT).
Kurt previously lead the Security Division at PS+C Group ASX:PSZ. Prior to that, Kurt was responsible at Tesserent ASX:TNT for defining the start up Sales Strategy GTM and building the initial team at Tesserent a newly listed ASX company.
Prior to Tesserent, Kurt was at Check Point Software responsible for $80MAUD Cyber Security Solution Sales and Services in Australia and New Zealand.
Prior to Check Point, Kurt was MD at F5 Networks for almost 5 years and grew the local subsidiary from $20m to $75m during 2009 to 2013, and the team from 17 to 70 people. In FY 2010/11 A/NZ was rated as the fastest growing subsidiary globally and has the highest attach rate of advanced application software and security solutions.
In 2011/12 he also led the Carrier and Service/Cloud provider virtual sales team across Asia Pacific and Japan.
Hansen’s career in the IT industry spans over 20 years. Before joining F5, Hansen was the CEO of AirData Pty Ltd, where he grew top line revenues by 250 percent in over 18 months.
Prior to AirData, he gained extensive sales and operational leadership experience while at Symbol Technologies, Telstra Wholesale, Cisco Systems, and Ericsson. In these positions he was responsible for increasing revenue and managing costs whilst building a senior high performing sales and delivery team.
Hansen commenced his career in IT as an Army Apprentice and later as an officer in the Royal Australian Signal Corps, finishing with the commissioned rank of Captain.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1545820/c1a-5k0v-47gpjmzkf0w3-qptnmr.png"></itunes:image>
                                                                            <itunes:duration>00:41:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 203 Deep Dive: Chester Wisniewski | Understanding the Modern Ransomware Era: The Impact on Organisations and the Urgency for Awareness and Preparation]]>
                </title>
                <pubDate>Wed, 23 Aug 2023 16:00:03 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1541544</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-203-deep-dive-chester-wisniewski-understanding-the-modern-ransomware-era-the-impact-on-organisations-and-the-urgency-for-awareness-and-preparation</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we are joined by Chester Wisniewski as we dive deep into the modern era of ransomware and discuss the <a href="https://www.sophos.com/en-us/content/state-of-ransomware">2023 Ransomware Report</a> by Sophos. We delve into the ever-evolving challenges of negotiating with cybercriminals for encryption keys, the high cost of recovery, and the potential loss of data even if ransom is paid. Chester also imparts insights on the role of cyber insurance and its implications, and ultimately, highlights that preparation is key to prevention. It is high time for organisations to invest in infrastructure and to stay vigilant to limit any type of future damage and to protect sensitive information.</p>
<p class="paragraph"><span class="normaltextrun">Chester Wisniewski is a field chief technology officer in applied research at next-generation security leader Sophos. With more than 20 years of professional experience, </span><span class="eop"> </span><span class="normaltextrun">Chester analyses the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry’s understanding of evolving threats, attacker behaviours and effective security defences. He’s helped organisations design enterprise-scale defence strategies, served as the primary technical lead on architecting Sophos’ first email security appliance, and consulted on security planning with some of the largest global brands.</span><span class="eop"> </span></p>
<p class="paragraph"><span class="normaltextrun">Chester regularly speaks at industry events, including RSA Conference, Virus Bulletin, Security BSides (Vancouver, London, Wales, Perth, Austin, Detroit, Los Angeles, Boston, and Calgary) and others. He’s widely recognised as one of the industry’s top security researchers and is regularly consulted by press, appearing on BBC News, ABC, NBC, Bloomberg, CNBC, CBC, NPR, and more.</span><span class="eop">  </span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are joined by Chester Wisniewski as we dive deep into the modern era of ransomware and discuss the 2023 Ransomware Report by Sophos. We delve into the ever-evolving challenges of negotiating with cybercriminals for encryption keys, the high cost of recovery, and the potential loss of data even if ransom is paid. Chester also imparts insights on the role of cyber insurance and its implications, and ultimately, highlights that preparation is key to prevention. It is high time for organisations to invest in infrastructure and to stay vigilant to limit any type of future damage and to protect sensitive information.
Chester Wisniewski is a field chief technology officer in applied research at next-generation security leader Sophos. With more than 20 years of professional experience,  Chester analyses the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry’s understanding of evolving threats, attacker behaviours and effective security defences. He’s helped organisations design enterprise-scale defence strategies, served as the primary technical lead on architecting Sophos’ first email security appliance, and consulted on security planning with some of the largest global brands. 
Chester regularly speaks at industry events, including RSA Conference, Virus Bulletin, Security BSides (Vancouver, London, Wales, Perth, Austin, Detroit, Los Angeles, Boston, and Calgary) and others. He’s widely recognised as one of the industry’s top security researchers and is regularly consulted by press, appearing on BBC News, ABC, NBC, Bloomberg, CNBC, CBC, NPR, and more.  
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 203 Deep Dive: Chester Wisniewski | Understanding the Modern Ransomware Era: The Impact on Organisations and the Urgency for Awareness and Preparation]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we are joined by Chester Wisniewski as we dive deep into the modern era of ransomware and discuss the <a href="https://www.sophos.com/en-us/content/state-of-ransomware">2023 Ransomware Report</a> by Sophos. We delve into the ever-evolving challenges of negotiating with cybercriminals for encryption keys, the high cost of recovery, and the potential loss of data even if ransom is paid. Chester also imparts insights on the role of cyber insurance and its implications, and ultimately, highlights that preparation is key to prevention. It is high time for organisations to invest in infrastructure and to stay vigilant to limit any type of future damage and to protect sensitive information.</p>
<p class="paragraph"><span class="normaltextrun">Chester Wisniewski is a field chief technology officer in applied research at next-generation security leader Sophos. With more than 20 years of professional experience, </span><span class="eop"> </span><span class="normaltextrun">Chester analyses the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry’s understanding of evolving threats, attacker behaviours and effective security defences. He’s helped organisations design enterprise-scale defence strategies, served as the primary technical lead on architecting Sophos’ first email security appliance, and consulted on security planning with some of the largest global brands.</span><span class="eop"> </span></p>
<p class="paragraph"><span class="normaltextrun">Chester regularly speaks at industry events, including RSA Conference, Virus Bulletin, Security BSides (Vancouver, London, Wales, Perth, Austin, Detroit, Los Angeles, Boston, and Calgary) and others. He’s widely recognised as one of the industry’s top security researchers and is regularly consulted by press, appearing on BBC News, ABC, NBC, Bloomberg, CNBC, CBC, NPR, and more.</span><span class="eop">  </span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/87082fc3-ae5d-4247-94ad-79877e66be00-KBKAST-EP-Chester-Wisniewski.mp3" length="53702234"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are joined by Chester Wisniewski as we dive deep into the modern era of ransomware and discuss the 2023 Ransomware Report by Sophos. We delve into the ever-evolving challenges of negotiating with cybercriminals for encryption keys, the high cost of recovery, and the potential loss of data even if ransom is paid. Chester also imparts insights on the role of cyber insurance and its implications, and ultimately, highlights that preparation is key to prevention. It is high time for organisations to invest in infrastructure and to stay vigilant to limit any type of future damage and to protect sensitive information.
Chester Wisniewski is a field chief technology officer in applied research at next-generation security leader Sophos. With more than 20 years of professional experience,  Chester analyses the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry’s understanding of evolving threats, attacker behaviours and effective security defences. He’s helped organisations design enterprise-scale defence strategies, served as the primary technical lead on architecting Sophos’ first email security appliance, and consulted on security planning with some of the largest global brands. 
Chester regularly speaks at industry events, including RSA Conference, Virus Bulletin, Security BSides (Vancouver, London, Wales, Perth, Austin, Detroit, Los Angeles, Boston, and Calgary) and others. He’s widely recognised as one of the industry’s top security researchers and is regularly consulted by press, appearing on BBC News, ABC, NBC, Bloomberg, CNBC, CBC, NPR, and more.  
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1541544/c1a-5k0v-9j5px37rudg3-r82qry.png"></itunes:image>
                                                                            <itunes:duration>00:37:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 202 Deep Dive: Kavitha Mariappan | No Sector Is Safe: The Importance of Ransomware Awareness and Protection Across Industries]]>
                </title>
                <pubDate>Wed, 16 Aug 2023 16:00:06 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1537529</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-202-deep-dive-kavitha-mariappan-no-sector-is-safe-the-importance-of-ransomware-awareness-and-protection-across-industries</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we are joined by Kavitha Mariappan, as we dove deep into the ever-evolving sophistication of ransomware attacks and consequently, the growing importance of budget and resource allocation for cybersecurity, strategy reassessments, and intentional actions based on cybersecurity reports, such as Zscaler’s 2023 Ransomware Report. We discuss how no sector is exempt from attacks, and that while historically, industries like finance and healthcare are targeted, arts, entertainment, education, manufacturing, and even the maritime sector are not immune. Organizations across these industries must recognize the value of information they hold and take steps to protect it.</p>
<p>Kavitha Mariappan is Executive Vice President of Customer Experience and Transformation at Zscaler. With more than 20 years of technology and go-to-market experience, she is responsible for driving transformation and innovation across all facets of the company’s business, customers, strategy, products, and operations</p>
<p><a href="https://kbi.media/wp-content/uploads/2023/07/zscaler-threatlabz-ransomware-report-R5-27Jun23.pdf">Read the entire 2023 Ransomware Report by Zscaler here</a>.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are joined by Kavitha Mariappan, as we dove deep into the ever-evolving sophistication of ransomware attacks and consequently, the growing importance of budget and resource allocation for cybersecurity, strategy reassessments, and intentional actions based on cybersecurity reports, such as Zscaler’s 2023 Ransomware Report. We discuss how no sector is exempt from attacks, and that while historically, industries like finance and healthcare are targeted, arts, entertainment, education, manufacturing, and even the maritime sector are not immune. Organizations across these industries must recognize the value of information they hold and take steps to protect it.
Kavitha Mariappan is Executive Vice President of Customer Experience and Transformation at Zscaler. With more than 20 years of technology and go-to-market experience, she is responsible for driving transformation and innovation across all facets of the company’s business, customers, strategy, products, and operations
Read the entire 2023 Ransomware Report by Zscaler here.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 202 Deep Dive: Kavitha Mariappan | No Sector Is Safe: The Importance of Ransomware Awareness and Protection Across Industries]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we are joined by Kavitha Mariappan, as we dove deep into the ever-evolving sophistication of ransomware attacks and consequently, the growing importance of budget and resource allocation for cybersecurity, strategy reassessments, and intentional actions based on cybersecurity reports, such as Zscaler’s 2023 Ransomware Report. We discuss how no sector is exempt from attacks, and that while historically, industries like finance and healthcare are targeted, arts, entertainment, education, manufacturing, and even the maritime sector are not immune. Organizations across these industries must recognize the value of information they hold and take steps to protect it.</p>
<p>Kavitha Mariappan is Executive Vice President of Customer Experience and Transformation at Zscaler. With more than 20 years of technology and go-to-market experience, she is responsible for driving transformation and innovation across all facets of the company’s business, customers, strategy, products, and operations</p>
<p><a href="https://kbi.media/wp-content/uploads/2023/07/zscaler-threatlabz-ransomware-report-R5-27Jun23.pdf">Read the entire 2023 Ransomware Report by Zscaler here</a>.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/e68e684f-397e-4c44-81e1-e1798b17a902-KBKAST-EP-Kavitha-Mariappan.mp3" length="44335394"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are joined by Kavitha Mariappan, as we dove deep into the ever-evolving sophistication of ransomware attacks and consequently, the growing importance of budget and resource allocation for cybersecurity, strategy reassessments, and intentional actions based on cybersecurity reports, such as Zscaler’s 2023 Ransomware Report. We discuss how no sector is exempt from attacks, and that while historically, industries like finance and healthcare are targeted, arts, entertainment, education, manufacturing, and even the maritime sector are not immune. Organizations across these industries must recognize the value of information they hold and take steps to protect it.
Kavitha Mariappan is Executive Vice President of Customer Experience and Transformation at Zscaler. With more than 20 years of technology and go-to-market experience, she is responsible for driving transformation and innovation across all facets of the company’s business, customers, strategy, products, and operations
Read the entire 2023 Ransomware Report by Zscaler here.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1537529/1700181077-GUESTS-DO-NOT-TOUCH-10.png"></itunes:image>
                                                                            <itunes:duration>00:30:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 201 Deep Dive: Glenn Maiden | A Cyber Defense Mission: Uniting Stakeholders and Sharing Expertise]]>
                </title>
                <pubDate>Fri, 11 Aug 2023 16:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1534984</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-201-deep-dive-glenn-maiden-a-cyber-defense-mission-uniting-stakeholders-and-sharing-expertise</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we are joined by Glenn Maiden, as we dive deep into the gaps of cyber and shine the light on the importance of connections – between cybersecurity professionals, businesses, government agencies, law enforcement, and other stakeholders. We uncover challenges faced by the industry and how strategic investments, shared expertise, and tactical partnerships can be used to make the lives of cybercriminals a lot more difficult.</p>
<p>Glenn Maiden is the director of threat intelligence operations at Fortinet’s FortiGuard Labs Australia and New Zealand. Glenn has more than 20 years’ experience in different roles across the technology sector with a solid background in defence, federal cybersecurity, and Australian intelligence. Glenn’s role with FortiGuard Labs focuses on sharing threat intelligence to help organisations protect against current and emerging threats with advanced security technologies such as artificial intelligence, intrusion prevention, antivirus, and email security.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are joined by Glenn Maiden, as we dive deep into the gaps of cyber and shine the light on the importance of connections – between cybersecurity professionals, businesses, government agencies, law enforcement, and other stakeholders. We uncover challenges faced by the industry and how strategic investments, shared expertise, and tactical partnerships can be used to make the lives of cybercriminals a lot more difficult.
Glenn Maiden is the director of threat intelligence operations at Fortinet’s FortiGuard Labs Australia and New Zealand. Glenn has more than 20 years’ experience in different roles across the technology sector with a solid background in defence, federal cybersecurity, and Australian intelligence. Glenn’s role with FortiGuard Labs focuses on sharing threat intelligence to help organisations protect against current and emerging threats with advanced security technologies such as artificial intelligence, intrusion prevention, antivirus, and email security.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 201 Deep Dive: Glenn Maiden | A Cyber Defense Mission: Uniting Stakeholders and Sharing Expertise]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we are joined by Glenn Maiden, as we dive deep into the gaps of cyber and shine the light on the importance of connections – between cybersecurity professionals, businesses, government agencies, law enforcement, and other stakeholders. We uncover challenges faced by the industry and how strategic investments, shared expertise, and tactical partnerships can be used to make the lives of cybercriminals a lot more difficult.</p>
<p>Glenn Maiden is the director of threat intelligence operations at Fortinet’s FortiGuard Labs Australia and New Zealand. Glenn has more than 20 years’ experience in different roles across the technology sector with a solid background in defence, federal cybersecurity, and Australian intelligence. Glenn’s role with FortiGuard Labs focuses on sharing threat intelligence to help organisations protect against current and emerging threats with advanced security technologies such as artificial intelligence, intrusion prevention, antivirus, and email security.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/ced6d5dd-7df0-4b9c-9005-5d913cee212d-KBKAST-EP-Glenn-Maiden.mp3" length="49641360"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are joined by Glenn Maiden, as we dive deep into the gaps of cyber and shine the light on the importance of connections – between cybersecurity professionals, businesses, government agencies, law enforcement, and other stakeholders. We uncover challenges faced by the industry and how strategic investments, shared expertise, and tactical partnerships can be used to make the lives of cybercriminals a lot more difficult.
Glenn Maiden is the director of threat intelligence operations at Fortinet’s FortiGuard Labs Australia and New Zealand. Glenn has more than 20 years’ experience in different roles across the technology sector with a solid background in defence, federal cybersecurity, and Australian intelligence. Glenn’s role with FortiGuard Labs focuses on sharing threat intelligence to help organisations protect against current and emerging threats with advanced security technologies such as artificial intelligence, intrusion prevention, antivirus, and email security.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1534984/1691722487-GUESTS-DO-NOT-TOUCH-9.png"></itunes:image>
                                                                            <itunes:duration>00:34:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 200 Deep Dive: Phil Rodrigues | Safeguarding the Cloud: AWS’s Approach to Security, Best Practices, and Customer Responsibilities]]>
                </title>
                <pubDate>Fri, 04 Aug 2023 10:00:07 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1528282</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-200-deep-dive-phil-rodrigues-safeguarding-the-cloud-awss-approach-to-security-best-practices-and-customer-responsibilities</link>
                                <description>
                                            <![CDATA[<p>In the 200th episode of KBKAST, we are joined by Phil Rodrigues (Head of Security, AWS, APJ Commercial) as we highlight key facts about security in the cloud, including the importance of strong identity measures like MFA, the need for organizations to prioritize security culture, and the role of AWS in providing guidance, security tools, and partner services to help customers make informed security decisions. Phil also touches on the responsibilities of both AWS and customers in ensuring security, and we explore the larger context of cloud technology in the current climate of the technology landscape.</p>
<p>Phil works with AWS customers across Asia-Pacific to improve their security, risk, and compliance in the cloud. He is an information security professional with over 20 years of experience working in top tier research, military, finance and corporate environments in the US, Europe and Asia-Pacific. Before AWS, Phil worked as an Information Operations Specialist in the US Army, as a Penetration Tester on Wall Street and as the regional Vice-President for a global managed security provider.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In the 200th episode of KBKAST, we are joined by Phil Rodrigues (Head of Security, AWS, APJ Commercial) as we highlight key facts about security in the cloud, including the importance of strong identity measures like MFA, the need for organizations to prioritize security culture, and the role of AWS in providing guidance, security tools, and partner services to help customers make informed security decisions. Phil also touches on the responsibilities of both AWS and customers in ensuring security, and we explore the larger context of cloud technology in the current climate of the technology landscape.
Phil works with AWS customers across Asia-Pacific to improve their security, risk, and compliance in the cloud. He is an information security professional with over 20 years of experience working in top tier research, military, finance and corporate environments in the US, Europe and Asia-Pacific. Before AWS, Phil worked as an Information Operations Specialist in the US Army, as a Penetration Tester on Wall Street and as the regional Vice-President for a global managed security provider.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 200 Deep Dive: Phil Rodrigues | Safeguarding the Cloud: AWS’s Approach to Security, Best Practices, and Customer Responsibilities]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In the 200th episode of KBKAST, we are joined by Phil Rodrigues (Head of Security, AWS, APJ Commercial) as we highlight key facts about security in the cloud, including the importance of strong identity measures like MFA, the need for organizations to prioritize security culture, and the role of AWS in providing guidance, security tools, and partner services to help customers make informed security decisions. Phil also touches on the responsibilities of both AWS and customers in ensuring security, and we explore the larger context of cloud technology in the current climate of the technology landscape.</p>
<p>Phil works with AWS customers across Asia-Pacific to improve their security, risk, and compliance in the cloud. He is an information security professional with over 20 years of experience working in top tier research, military, finance and corporate environments in the US, Europe and Asia-Pacific. Before AWS, Phil worked as an Information Operations Specialist in the US Army, as a Penetration Tester on Wall Street and as the regional Vice-President for a global managed security provider.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5dbc5d9c-23f4-443e-b4a7-0762030cbb84-KBKAST-EP-Phil-Rodrigues.mp3" length="51345336"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In the 200th episode of KBKAST, we are joined by Phil Rodrigues (Head of Security, AWS, APJ Commercial) as we highlight key facts about security in the cloud, including the importance of strong identity measures like MFA, the need for organizations to prioritize security culture, and the role of AWS in providing guidance, security tools, and partner services to help customers make informed security decisions. Phil also touches on the responsibilities of both AWS and customers in ensuring security, and we explore the larger context of cloud technology in the current climate of the technology landscape.
Phil works with AWS customers across Asia-Pacific to improve their security, risk, and compliance in the cloud. He is an information security professional with over 20 years of experience working in top tier research, military, finance and corporate environments in the US, Europe and Asia-Pacific. Before AWS, Phil worked as an Information Operations Specialist in the US Army, as a Penetration Tester on Wall Street and as the regional Vice-President for a global managed security provider.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1528282/1691104724-GUESTS-DO-NOT-TOUCH-6-1.png"></itunes:image>
                                                                            <itunes:duration>00:35:37</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 199 Deep Dive: Wayne Williamson | Navigating Agile Environments, Executive Involvement, and Risk Prioritisation]]>
                </title>
                <pubDate>Wed, 26 Jul 2023 16:00:03 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1523420</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-199-deep-dive-wayne-williamson-navigating-agile-environments-executive-involvement-and-risk-prioritisation</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, Wayne Williamson shares his insights on agile security structures and the importance of prioritizing cybersecurity within organizations. Wayne also highlights the challenges of navigating traditional, centralized structures and emphasizes the need for organizations to pivot and make tweaks to their structures and approaches when undergoing transformation.</p>
<p>Wayne Williamson joined Equifax in August 2020. Wayne has over 20 years’ experience across Information Security and Cyber Resilience spanning large financial organisations within Australia, UK and Europe.</p>
<p>An experienced executive, Wayne is passionate about delivering the right level of oversight, being pragmatic in addressing threats – without compromising cost and user experience, as well as embedding a culture of information security protection ‘by design’ that delivers measured business value and buys-down risk in a cost-effective manner.</p>
<p>Prior to joining Equifax, Wayne held senior roles at Allianz Australia as the Chief Information Security Officer, the Commonwealth Bank of Australia as an Executive Security Officer and abroad at KPMG (UK) and Royal Dutch Shell (UK/Netherlands) as a Security Executive advisor focusing on information protection, business resilience and cyber strategy delivery.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, Wayne Williamson shares his insights on agile security structures and the importance of prioritizing cybersecurity within organizations. Wayne also highlights the challenges of navigating traditional, centralized structures and emphasizes the need for organizations to pivot and make tweaks to their structures and approaches when undergoing transformation.
Wayne Williamson joined Equifax in August 2020. Wayne has over 20 years’ experience across Information Security and Cyber Resilience spanning large financial organisations within Australia, UK and Europe.
An experienced executive, Wayne is passionate about delivering the right level of oversight, being pragmatic in addressing threats – without compromising cost and user experience, as well as embedding a culture of information security protection ‘by design’ that delivers measured business value and buys-down risk in a cost-effective manner.
Prior to joining Equifax, Wayne held senior roles at Allianz Australia as the Chief Information Security Officer, the Commonwealth Bank of Australia as an Executive Security Officer and abroad at KPMG (UK) and Royal Dutch Shell (UK/Netherlands) as a Security Executive advisor focusing on information protection, business resilience and cyber strategy delivery.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 199 Deep Dive: Wayne Williamson | Navigating Agile Environments, Executive Involvement, and Risk Prioritisation]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, Wayne Williamson shares his insights on agile security structures and the importance of prioritizing cybersecurity within organizations. Wayne also highlights the challenges of navigating traditional, centralized structures and emphasizes the need for organizations to pivot and make tweaks to their structures and approaches when undergoing transformation.</p>
<p>Wayne Williamson joined Equifax in August 2020. Wayne has over 20 years’ experience across Information Security and Cyber Resilience spanning large financial organisations within Australia, UK and Europe.</p>
<p>An experienced executive, Wayne is passionate about delivering the right level of oversight, being pragmatic in addressing threats – without compromising cost and user experience, as well as embedding a culture of information security protection ‘by design’ that delivers measured business value and buys-down risk in a cost-effective manner.</p>
<p>Prior to joining Equifax, Wayne held senior roles at Allianz Australia as the Chief Information Security Officer, the Commonwealth Bank of Australia as an Executive Security Officer and abroad at KPMG (UK) and Royal Dutch Shell (UK/Netherlands) as a Security Executive advisor focusing on information protection, business resilience and cyber strategy delivery.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/dffa991f-ac54-48aa-872f-c519f9f3700e-KBKAST-EP-Wayne-Williamson.mp3" length="57099532"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, Wayne Williamson shares his insights on agile security structures and the importance of prioritizing cybersecurity within organizations. Wayne also highlights the challenges of navigating traditional, centralized structures and emphasizes the need for organizations to pivot and make tweaks to their structures and approaches when undergoing transformation.
Wayne Williamson joined Equifax in August 2020. Wayne has over 20 years’ experience across Information Security and Cyber Resilience spanning large financial organisations within Australia, UK and Europe.
An experienced executive, Wayne is passionate about delivering the right level of oversight, being pragmatic in addressing threats – without compromising cost and user experience, as well as embedding a culture of information security protection ‘by design’ that delivers measured business value and buys-down risk in a cost-effective manner.
Prior to joining Equifax, Wayne held senior roles at Allianz Australia as the Chief Information Security Officer, the Commonwealth Bank of Australia as an Executive Security Officer and abroad at KPMG (UK) and Royal Dutch Shell (UK/Netherlands) as a Security Executive advisor focusing on information protection, business resilience and cyber strategy delivery.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1523420/1690350839-KBI-GUESTS-DO-NOT-TOUCH.png"></itunes:image>
                                                                            <itunes:duration>00:39:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 198 Deep Dive: Pancho Mehrotra | The Path to Improved Sales Performance]]>
                </title>
                <pubDate>Fri, 21 Jul 2023 16:00:52 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1520892</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-198-deep-dive-pancho-mehrotra-the-path-to-improved-sales-performance</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we are joined by Pancho Mehrotra as we delve into the key to sales success and why accepting rejection is crucial. Pancho discusses the importance of focusing on the process of having meaningful conversations and qualifying clients, rather than just aiming for immediate results. Drawing on the analogy of competitive sports, he highlights the significance of learning from losses and practicing to improve.</p>
<p>Pancho Mehrotra, sales and negotiator trainer, has been helping business leaders and sales teams take their businesses to new levels of sales success since 1991. Pancho is a sales and communications expert who brings a unique set of skills, training, and experience to the table. He is the most experienced and results oriented trainer and has developed his own proprietary sales method that uses psychology and negotiation with amazing results.</p>
<p><strong>Pancho has:</strong></p>
<ul>
<li>Over 30 years of hands-on sales and training experience</li>
<li>Trained over 5,000 salespeople</li>
<li>Set records for selling in past sales positions (in the insurance industry, he sold over 100 policies in one week!)</li>
<li>Personally, made over 220,000 cold calls in his career</li>
<li>Developed his own Emotional Intelligence profiling tool</li>
<li>His clients have sold over $146 billion in goods and services</li>
</ul>
<p>Additionally, he has a background in Cognitive Behavioural Therapy and went to Harvard Business School to undertake a specialised course in Negotiation.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are joined by Pancho Mehrotra as we delve into the key to sales success and why accepting rejection is crucial. Pancho discusses the importance of focusing on the process of having meaningful conversations and qualifying clients, rather than just aiming for immediate results. Drawing on the analogy of competitive sports, he highlights the significance of learning from losses and practicing to improve.
Pancho Mehrotra, sales and negotiator trainer, has been helping business leaders and sales teams take their businesses to new levels of sales success since 1991. Pancho is a sales and communications expert who brings a unique set of skills, training, and experience to the table. He is the most experienced and results oriented trainer and has developed his own proprietary sales method that uses psychology and negotiation with amazing results.
Pancho has:

Over 30 years of hands-on sales and training experience
Trained over 5,000 salespeople
Set records for selling in past sales positions (in the insurance industry, he sold over 100 policies in one week!)
Personally, made over 220,000 cold calls in his career
Developed his own Emotional Intelligence profiling tool
His clients have sold over $146 billion in goods and services

Additionally, he has a background in Cognitive Behavioural Therapy and went to Harvard Business School to undertake a specialised course in Negotiation.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 198 Deep Dive: Pancho Mehrotra | The Path to Improved Sales Performance]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we are joined by Pancho Mehrotra as we delve into the key to sales success and why accepting rejection is crucial. Pancho discusses the importance of focusing on the process of having meaningful conversations and qualifying clients, rather than just aiming for immediate results. Drawing on the analogy of competitive sports, he highlights the significance of learning from losses and practicing to improve.</p>
<p>Pancho Mehrotra, sales and negotiator trainer, has been helping business leaders and sales teams take their businesses to new levels of sales success since 1991. Pancho is a sales and communications expert who brings a unique set of skills, training, and experience to the table. He is the most experienced and results oriented trainer and has developed his own proprietary sales method that uses psychology and negotiation with amazing results.</p>
<p><strong>Pancho has:</strong></p>
<ul>
<li>Over 30 years of hands-on sales and training experience</li>
<li>Trained over 5,000 salespeople</li>
<li>Set records for selling in past sales positions (in the insurance industry, he sold over 100 policies in one week!)</li>
<li>Personally, made over 220,000 cold calls in his career</li>
<li>Developed his own Emotional Intelligence profiling tool</li>
<li>His clients have sold over $146 billion in goods and services</li>
</ul>
<p>Additionally, he has a background in Cognitive Behavioural Therapy and went to Harvard Business School to undertake a specialised course in Negotiation.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/8688bb14-fa63-4e9d-9656-310da3335c59-KBKAST-EP-Pancho-Mehrotra.mp3" length="65579952"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are joined by Pancho Mehrotra as we delve into the key to sales success and why accepting rejection is crucial. Pancho discusses the importance of focusing on the process of having meaningful conversations and qualifying clients, rather than just aiming for immediate results. Drawing on the analogy of competitive sports, he highlights the significance of learning from losses and practicing to improve.
Pancho Mehrotra, sales and negotiator trainer, has been helping business leaders and sales teams take their businesses to new levels of sales success since 1991. Pancho is a sales and communications expert who brings a unique set of skills, training, and experience to the table. He is the most experienced and results oriented trainer and has developed his own proprietary sales method that uses psychology and negotiation with amazing results.
Pancho has:

Over 30 years of hands-on sales and training experience
Trained over 5,000 salespeople
Set records for selling in past sales positions (in the insurance industry, he sold over 100 policies in one week!)
Personally, made over 220,000 cold calls in his career
Developed his own Emotional Intelligence profiling tool
His clients have sold over $146 billion in goods and services

Additionally, he has a background in Cognitive Behavioural Therapy and went to Harvard Business School to undertake a specialised course in Negotiation.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1520892/1700181078-KBI-GUESTS-DO-NOT-TOUCH.png"></itunes:image>
                                                                            <itunes:duration>00:45:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 197 Deep Dive: Vaile Mexted | The Immediate, Irrevocable, and Unstoppable Rise of Real-Time Payments]]>
                </title>
                <pubDate>Wed, 19 Jul 2023 16:00:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598694</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-197-deep-dive-vaile-mexted-the-immediate-irrevocable-and-unstoppable-rise-of-real-time-payments</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we are joined by Vaile Mexted as we delve into the world of real-time payments and the rapid growth of digital payment options. Vaile discusses the evolving customer expectations and the need for banks to invest heavily in digital tools to stay ahead of fraud and scam risks, and  the importance of building trust in the fraud, cyber, and scam space, and how banks can effectively manage the customer experience while ensuring security.</p>
<p style="font-weight:400;"><strong>Vaile Mexted is the New Zealand Country Manager for FICO </strong>and Senior Account Director for the Australian market. He has over 25 years’ experience across the technology and financial services sectors delivering enterprise data and analytic solutions, with a particular focus on credit risk management. He is an evangelist for the power of enterprise-wide analytics and decision management, and works to deliver true business value to leading organisations across New Zealand and Australia and their customers. Vaile joined FICO from the Bank of New Zealand, where he was Manager Decision Strategy and then Retail Models programme manager. Based in Wellington, New Zealand, Vaile holds both commerce and science degrees, with a focus on decision management, statistics and operations research.</p>
<p style="font-weight:400;">Founded in 1956, FICO is a pioneer in the use of predictive analytics, AI and data science to improve operational decisions. As a unified platform for fraud and compliance, Fraud Prevention on the FICO Platform helps financial institutions detect and prevent criminal activity before real-time transfer occurs.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are joined by Vaile Mexted as we delve into the world of real-time payments and the rapid growth of digital payment options. Vaile discusses the evolving customer expectations and the need for banks to invest heavily in digital tools to stay ahead of fraud and scam risks, and  the importance of building trust in the fraud, cyber, and scam space, and how banks can effectively manage the customer experience while ensuring security.
Vaile Mexted is the New Zealand Country Manager for FICO and Senior Account Director for the Australian market. He has over 25 years’ experience across the technology and financial services sectors delivering enterprise data and analytic solutions, with a particular focus on credit risk management. He is an evangelist for the power of enterprise-wide analytics and decision management, and works to deliver true business value to leading organisations across New Zealand and Australia and their customers. Vaile joined FICO from the Bank of New Zealand, where he was Manager Decision Strategy and then Retail Models programme manager. Based in Wellington, New Zealand, Vaile holds both commerce and science degrees, with a focus on decision management, statistics and operations research.
Founded in 1956, FICO is a pioneer in the use of predictive analytics, AI and data science to improve operational decisions. As a unified platform for fraud and compliance, Fraud Prevention on the FICO Platform helps financial institutions detect and prevent criminal activity before real-time transfer occurs.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 197 Deep Dive: Vaile Mexted | The Immediate, Irrevocable, and Unstoppable Rise of Real-Time Payments]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we are joined by Vaile Mexted as we delve into the world of real-time payments and the rapid growth of digital payment options. Vaile discusses the evolving customer expectations and the need for banks to invest heavily in digital tools to stay ahead of fraud and scam risks, and  the importance of building trust in the fraud, cyber, and scam space, and how banks can effectively manage the customer experience while ensuring security.</p>
<p style="font-weight:400;"><strong>Vaile Mexted is the New Zealand Country Manager for FICO </strong>and Senior Account Director for the Australian market. He has over 25 years’ experience across the technology and financial services sectors delivering enterprise data and analytic solutions, with a particular focus on credit risk management. He is an evangelist for the power of enterprise-wide analytics and decision management, and works to deliver true business value to leading organisations across New Zealand and Australia and their customers. Vaile joined FICO from the Bank of New Zealand, where he was Manager Decision Strategy and then Retail Models programme manager. Based in Wellington, New Zealand, Vaile holds both commerce and science degrees, with a focus on decision management, statistics and operations research.</p>
<p style="font-weight:400;">Founded in 1956, FICO is a pioneer in the use of predictive analytics, AI and data science to improve operational decisions. As a unified platform for fraud and compliance, Fraud Prevention on the FICO Platform helps financial institutions detect and prevent criminal activity before real-time transfer occurs.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598694/493da1ff-b589-4c15-9b6f-3330fcf09970-KBKAST-EP-Vaile-Mexted.mp3" length="52165392"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are joined by Vaile Mexted as we delve into the world of real-time payments and the rapid growth of digital payment options. Vaile discusses the evolving customer expectations and the need for banks to invest heavily in digital tools to stay ahead of fraud and scam risks, and  the importance of building trust in the fraud, cyber, and scam space, and how banks can effectively manage the customer experience while ensuring security.
Vaile Mexted is the New Zealand Country Manager for FICO and Senior Account Director for the Australian market. He has over 25 years’ experience across the technology and financial services sectors delivering enterprise data and analytic solutions, with a particular focus on credit risk management. He is an evangelist for the power of enterprise-wide analytics and decision management, and works to deliver true business value to leading organisations across New Zealand and Australia and their customers. Vaile joined FICO from the Bank of New Zealand, where he was Manager Decision Strategy and then Retail Models programme manager. Based in Wellington, New Zealand, Vaile holds both commerce and science degrees, with a focus on decision management, statistics and operations research.
Founded in 1956, FICO is a pioneer in the use of predictive analytics, AI and data science to improve operational decisions. As a unified platform for fraud and compliance, Fraud Prevention on the FICO Platform helps financial institutions detect and prevent criminal activity before real-time transfer occurs.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598694/1700181078-GUESTS-DO-NOT-TOUCH.png"></itunes:image>
                                                                            <itunes:duration>00:36:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 196 Deep Dive: James Maude | 2023 Microsoft Vulnerabilities Report: Mindsets, Innovations,  and Future Evolution]]>
                </title>
                <pubDate>Mon, 17 Jul 2023 16:00:34 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1518303</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-196-deep-dive-james-maude-2023-microsoft-vulnerabilities-report-mindsets-innovations-and-future-evolution</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we are joined by James Maude as we dive deep into the 2023 Microsoft Vulnerabilities report. James talks about the rapid increase of vulnerabilities, the impact of the COVID-19 pandemic, as well as a societal technological shift and concerns about foundational security measures and fundamental knowledge.</p>
<p>You can read the full 2023 Microsoft Vulnerabilities report <a href="https://www.beyondtrust.com/resources/whitepapers/microsoft-vulnerability-report"><strong>here.</strong></a></p>
<p style="font-weight:400;">James Maude is Lead Cyber Security Researcher at BeyondTrust, the worldwide leader in intelligent identity and access security.</p>
<p style="font-weight:400;">James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are joined by James Maude as we dive deep into the 2023 Microsoft Vulnerabilities report. James talks about the rapid increase of vulnerabilities, the impact of the COVID-19 pandemic, as well as a societal technological shift and concerns about foundational security measures and fundamental knowledge.
You can read the full 2023 Microsoft Vulnerabilities report here.
James Maude is Lead Cyber Security Researcher at BeyondTrust, the worldwide leader in intelligent identity and access security.
James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 196 Deep Dive: James Maude | 2023 Microsoft Vulnerabilities Report: Mindsets, Innovations,  and Future Evolution]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we are joined by James Maude as we dive deep into the 2023 Microsoft Vulnerabilities report. James talks about the rapid increase of vulnerabilities, the impact of the COVID-19 pandemic, as well as a societal technological shift and concerns about foundational security measures and fundamental knowledge.</p>
<p>You can read the full 2023 Microsoft Vulnerabilities report <a href="https://www.beyondtrust.com/resources/whitepapers/microsoft-vulnerability-report"><strong>here.</strong></a></p>
<p style="font-weight:400;">James Maude is Lead Cyber Security Researcher at BeyondTrust, the worldwide leader in intelligent identity and access security.</p>
<p style="font-weight:400;">James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/f7a056fe-3545-4b35-9bb9-4914a0e17e37-KBKAST-EP-James-Maude.mp3" length="54668138"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are joined by James Maude as we dive deep into the 2023 Microsoft Vulnerabilities report. James talks about the rapid increase of vulnerabilities, the impact of the COVID-19 pandemic, as well as a societal technological shift and concerns about foundational security measures and fundamental knowledge.
You can read the full 2023 Microsoft Vulnerabilities report here.
James Maude is Lead Cyber Security Researcher at BeyondTrust, the worldwide leader in intelligent identity and access security.
James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1518303/1700181079-James-Maude-1.png"></itunes:image>
                                                                            <itunes:duration>00:37:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 195 Deep Dive: Christopher Pogue | Breaking Stereotypes, Challenging the Status Quo, and Exploring the US Cybersecurity Market]]>
                </title>
                <pubDate>Fri, 14 Jul 2023 16:00:14 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1517348</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-195-deep-dive-christopher-pogue-breaking-stereotypes-challenging-the-status-quo-and-exploring-the-us-cybersecurity-market</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we are once again joined by Chris Pogue (CyberCX – US Director of Digital Forensics and Incident Response), as we dive deep into the world of cybersecurity, with a focus on the challenges faced by Australian companies and the potential benefits of breaking through the US market.</p>
<p>Chris Pogue is the Director of Digital Forensics and Incident Response (DFIR) for CyberCX in the Americas and is a member of the global DFIR leadership team.</p>
<p>Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.</p>
<p>His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.</p>
<p>Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.  He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.</p>
<p>Chris was also an active member of the United States Secret Service Electronic Crimes Task Force in multiple field offices as well as the Headquarters Division.  He has also been the recipient of multiple Secret Service Certificates of Appreciation.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are once again joined by Chris Pogue (CyberCX – US Director of Digital Forensics and Incident Response), as we dive deep into the world of cybersecurity, with a focus on the challenges faced by Australian companies and the potential benefits of breaking through the US market.
Chris Pogue is the Director of Digital Forensics and Incident Response (DFIR) for CyberCX in the Americas and is a member of the global DFIR leadership team.
Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.
His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.
Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.  He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.
Chris was also an active member of the United States Secret Service Electronic Crimes Task Force in multiple field offices as well as the Headquarters Division.  He has also been the recipient of multiple Secret Service Certificates of Appreciation.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 195 Deep Dive: Christopher Pogue | Breaking Stereotypes, Challenging the Status Quo, and Exploring the US Cybersecurity Market]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we are once again joined by Chris Pogue (CyberCX – US Director of Digital Forensics and Incident Response), as we dive deep into the world of cybersecurity, with a focus on the challenges faced by Australian companies and the potential benefits of breaking through the US market.</p>
<p>Chris Pogue is the Director of Digital Forensics and Incident Response (DFIR) for CyberCX in the Americas and is a member of the global DFIR leadership team.</p>
<p>Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.</p>
<p>His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.</p>
<p>Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.  He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.</p>
<p>Chris was also an active member of the United States Secret Service Electronic Crimes Task Force in multiple field offices as well as the Headquarters Division.  He has also been the recipient of multiple Secret Service Certificates of Appreciation.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3de83b49-d9e3-4552-91ac-f0c6619ef2c7-KBKAST-EP-Chris-Pogue.mp3" length="62620216"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are once again joined by Chris Pogue (CyberCX – US Director of Digital Forensics and Incident Response), as we dive deep into the world of cybersecurity, with a focus on the challenges faced by Australian companies and the potential benefits of breaking through the US market.
Chris Pogue is the Director of Digital Forensics and Incident Response (DFIR) for CyberCX in the Americas and is a member of the global DFIR leadership team.
Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.
His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.
Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.  He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.
Chris was also an active member of the United States Secret Service Electronic Crimes Task Force in multiple field offices as well as the Headquarters Division.  He has also been the recipient of multiple Secret Service Certificates of Appreciation.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1517348/1689306321-Chris-Pogue.png"></itunes:image>
                                                                            <itunes:duration>00:43:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 194 Deep Dive: Jo Stewart-Rattray | Bridging the Gender Digital Gap and a Holistic Approach for a Safer Online Environment]]>
                </title>
                <pubDate>Wed, 12 Jul 2023 16:00:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1515141</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-194-deep-dive-jo-stewart-rattray-bridging-the-gender-digital-gap-and-a-holistic-approach-for-a-safer-online-environment</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we are once again joined by expert Jo Stewart-Rattray as we delve into the importance of holding organizations accountable for their actions and addressing online gender-based violence. Jo also shares her key takeaways from her recent attendance to a conference held by the United Nations Commission on the Status of Women, and gives valuable insights on <a href="https://kbi.media/new-research-digital-trust-is-integral-to-innovation-and-resilience-but-major-gaps-threaten-business-operations-and-reputations/">ISACA’s 2023 State of Digital Trust Report</a> as compared to last year’s.</p>
<p>Jo has over 25 years’ experience in the security industry. She consults in risk and technology issues with a particular emphasis on governance and IT security in businesses as a Director with BRM Advisory. She regularly provides strategic advice and consulting to the banking and finance, utilities, healthcare, manufacturing, tertiary education, retail, and government sectors.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are once again joined by expert Jo Stewart-Rattray as we delve into the importance of holding organizations accountable for their actions and addressing online gender-based violence. Jo also shares her key takeaways from her recent attendance to a conference held by the United Nations Commission on the Status of Women, and gives valuable insights on ISACA’s 2023 State of Digital Trust Report as compared to last year’s.
Jo has over 25 years’ experience in the security industry. She consults in risk and technology issues with a particular emphasis on governance and IT security in businesses as a Director with BRM Advisory. She regularly provides strategic advice and consulting to the banking and finance, utilities, healthcare, manufacturing, tertiary education, retail, and government sectors.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 194 Deep Dive: Jo Stewart-Rattray | Bridging the Gender Digital Gap and a Holistic Approach for a Safer Online Environment]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we are once again joined by expert Jo Stewart-Rattray as we delve into the importance of holding organizations accountable for their actions and addressing online gender-based violence. Jo also shares her key takeaways from her recent attendance to a conference held by the United Nations Commission on the Status of Women, and gives valuable insights on <a href="https://kbi.media/new-research-digital-trust-is-integral-to-innovation-and-resilience-but-major-gaps-threaten-business-operations-and-reputations/">ISACA’s 2023 State of Digital Trust Report</a> as compared to last year’s.</p>
<p>Jo has over 25 years’ experience in the security industry. She consults in risk and technology issues with a particular emphasis on governance and IT security in businesses as a Director with BRM Advisory. She regularly provides strategic advice and consulting to the banking and finance, utilities, healthcare, manufacturing, tertiary education, retail, and government sectors.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/669f17b7-9fca-4e39-8fc5-def87b4c8990-KBKAST-EP-Jo-Stewart-Rattray.mp3" length="36459217"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are once again joined by expert Jo Stewart-Rattray as we delve into the importance of holding organizations accountable for their actions and addressing online gender-based violence. Jo also shares her key takeaways from her recent attendance to a conference held by the United Nations Commission on the Status of Women, and gives valuable insights on ISACA’s 2023 State of Digital Trust Report as compared to last year’s.
Jo has over 25 years’ experience in the security industry. She consults in risk and technology issues with a particular emphasis on governance and IT security in businesses as a Director with BRM Advisory. She regularly provides strategic advice and consulting to the banking and finance, utilities, healthcare, manufacturing, tertiary education, retail, and government sectors.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1515141/1689135306-KBKAST-62-Jo-Stewart-Rattray.jpg"></itunes:image>
                                                                            <itunes:duration>00:25:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 193 Deep Dive: Dr. Jordan Plotnek | The Intersecting Worlds of Critical Infrastructure and Space Security]]>
                </title>
                <pubDate>Mon, 10 Jul 2023 16:00:32 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1513183</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-193-deep-dive-dr-jordan-plotnek-the-intersecting-worlds-of-critical-infrastructure-and-space-security</link>
                                <description>
                                            <![CDATA[<p>Securing space technology is no longer a luxury but a necessity for the smooth functioning of our increasingly interconnected world. In this episode of KBKast, we delve into the fascinating world of space technology and its connection to critical infrastructure. Dr. Jordan Plotnek talks about his journey, the challenges of space security, and emphasizes the need for a tailored and collaborative global approach to managing space system security that has humanity at its core.</p>
<p class="Notesoncontributors"><span lang="en-gb" xml:lang="en-gb">Dr Jordan Plotnek received a PhD in space systems security and resilience from the University of South Australia and a Bachelor of Engineering in Telecommunications and Electronics from Swinburne University in Melbourne. Jordan is an Australian Air Force veteran and has held senior Operational Technology security positions for private and public sector organisations internationally. Jordan is currently a space security researcher at the University of South Australia and the Lead Partner for Critical Infrastructure at Anchoram Consulting. Jordan’s research and professional interests are centred around space systems security, critical infrastructure resilience, and cyber-physical conflict.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Securing space technology is no longer a luxury but a necessity for the smooth functioning of our increasingly interconnected world. In this episode of KBKast, we delve into the fascinating world of space technology and its connection to critical infrastructure. Dr. Jordan Plotnek talks about his journey, the challenges of space security, and emphasizes the need for a tailored and collaborative global approach to managing space system security that has humanity at its core.
Dr Jordan Plotnek received a PhD in space systems security and resilience from the University of South Australia and a Bachelor of Engineering in Telecommunications and Electronics from Swinburne University in Melbourne. Jordan is an Australian Air Force veteran and has held senior Operational Technology security positions for private and public sector organisations internationally. Jordan is currently a space security researcher at the University of South Australia and the Lead Partner for Critical Infrastructure at Anchoram Consulting. Jordan’s research and professional interests are centred around space systems security, critical infrastructure resilience, and cyber-physical conflict.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 193 Deep Dive: Dr. Jordan Plotnek | The Intersecting Worlds of Critical Infrastructure and Space Security]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Securing space technology is no longer a luxury but a necessity for the smooth functioning of our increasingly interconnected world. In this episode of KBKast, we delve into the fascinating world of space technology and its connection to critical infrastructure. Dr. Jordan Plotnek talks about his journey, the challenges of space security, and emphasizes the need for a tailored and collaborative global approach to managing space system security that has humanity at its core.</p>
<p class="Notesoncontributors"><span lang="en-gb" xml:lang="en-gb">Dr Jordan Plotnek received a PhD in space systems security and resilience from the University of South Australia and a Bachelor of Engineering in Telecommunications and Electronics from Swinburne University in Melbourne. Jordan is an Australian Air Force veteran and has held senior Operational Technology security positions for private and public sector organisations internationally. Jordan is currently a space security researcher at the University of South Australia and the Lead Partner for Critical Infrastructure at Anchoram Consulting. Jordan’s research and professional interests are centred around space systems security, critical infrastructure resilience, and cyber-physical conflict.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5b92c071-098c-4823-bcbc-1cc02a126887-KBKAST-EP-Jordan-Plotnek.mp3" length="56489804"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Securing space technology is no longer a luxury but a necessity for the smooth functioning of our increasingly interconnected world. In this episode of KBKast, we delve into the fascinating world of space technology and its connection to critical infrastructure. Dr. Jordan Plotnek talks about his journey, the challenges of space security, and emphasizes the need for a tailored and collaborative global approach to managing space system security that has humanity at its core.
Dr Jordan Plotnek received a PhD in space systems security and resilience from the University of South Australia and a Bachelor of Engineering in Telecommunications and Electronics from Swinburne University in Melbourne. Jordan is an Australian Air Force veteran and has held senior Operational Technology security positions for private and public sector organisations internationally. Jordan is currently a space security researcher at the University of South Australia and the Lead Partner for Critical Infrastructure at Anchoram Consulting. Jordan’s research and professional interests are centred around space systems security, critical infrastructure resilience, and cyber-physical conflict.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1513183/1689146007-GUESTS-DO-NOT-TOUCH.png"></itunes:image>
                                                                            <itunes:duration>00:39:11</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 192 Deep Dive: Pieter Danhieux | AI’s Role in Cyber: Challenges and Opportunities]]>
                </title>
                <pubDate>Fri, 07 Jul 2023 16:00:49 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1511930</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-192-deep-dive-pieter-danhieux-ais-role-in-cyber-challenges-and-opportunities</link>
                                <description>
                                            <![CDATA[<p>In this episode, Pieter Danhieux joins us in learning the balance between speed and security and the potential impact of AI in various industries, acknowledging that AI is not a magical solution but a tool for assisting with heavy work. Join Karissa Breen and Pieter Danhiuex as they delve into the world of AI and its implications for security analysts and developers alike.</p>
<p>Pieter Danhieux is the Chief Executive Officer, Chairman, and Co-Founder of Secure Code Warrior. He started SCW in 2015 and built this company out to a global cyber security company from Australia with 220+ staff, helping more than 500 Enterprises with building secure coders and software.</p>
<p>In 2020, Pieter was recognised as a finalist in the Diversity Champion category for the SC Awards Europe 2020. In 2016, he was No. 80 on the list of Coolest Tech people in Australia (Business Insider), awarded Cyber Security Professional of the Year (AISA – Australian Information Security Association) and is member of the Forbes Technology Council.</p>
<p>‍Pieter has been a Principal instructor for the SANS Institute since 20o7 teaching military, government and private organisations offensive techniques on how to target and assess organisations, systems and individuals for security weaknesses. Before starting his own company, Pieter co-founder NVISO in Belgium, worked at Ernst &amp; Young and BAE Systems. He is also one of the Co-Founders of BruCON, one of the most awesome hacking conferences on this planet.</p>
<p>‍He started his information security career early in life and obtained the Certified Information Systems Security Professional (CISSP) certification in 2004 as one of the youngest persons ever in Belgium. On his way, he collected a whole range of cyber security certificates (CISA, GCFA, GCIH, GPEN, GWAP) and is currently one of the select few people worldwide to hold the top certification GIAC Security Expert (GSE).</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Pieter Danhieux joins us in learning the balance between speed and security and the potential impact of AI in various industries, acknowledging that AI is not a magical solution but a tool for assisting with heavy work. Join Karissa Breen and Pieter Danhiuex as they delve into the world of AI and its implications for security analysts and developers alike.
Pieter Danhieux is the Chief Executive Officer, Chairman, and Co-Founder of Secure Code Warrior. He started SCW in 2015 and built this company out to a global cyber security company from Australia with 220+ staff, helping more than 500 Enterprises with building secure coders and software.
In 2020, Pieter was recognised as a finalist in the Diversity Champion category for the SC Awards Europe 2020. In 2016, he was No. 80 on the list of Coolest Tech people in Australia (Business Insider), awarded Cyber Security Professional of the Year (AISA – Australian Information Security Association) and is member of the Forbes Technology Council.
‍Pieter has been a Principal instructor for the SANS Institute since 20o7 teaching military, government and private organisations offensive techniques on how to target and assess organisations, systems and individuals for security weaknesses. Before starting his own company, Pieter co-founder NVISO in Belgium, worked at Ernst & Young and BAE Systems. He is also one of the Co-Founders of BruCON, one of the most awesome hacking conferences on this planet.
‍He started his information security career early in life and obtained the Certified Information Systems Security Professional (CISSP) certification in 2004 as one of the youngest persons ever in Belgium. On his way, he collected a whole range of cyber security certificates (CISA, GCFA, GCIH, GPEN, GWAP) and is currently one of the select few people worldwide to hold the top certification GIAC Security Expert (GSE).
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 192 Deep Dive: Pieter Danhieux | AI’s Role in Cyber: Challenges and Opportunities]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Pieter Danhieux joins us in learning the balance between speed and security and the potential impact of AI in various industries, acknowledging that AI is not a magical solution but a tool for assisting with heavy work. Join Karissa Breen and Pieter Danhiuex as they delve into the world of AI and its implications for security analysts and developers alike.</p>
<p>Pieter Danhieux is the Chief Executive Officer, Chairman, and Co-Founder of Secure Code Warrior. He started SCW in 2015 and built this company out to a global cyber security company from Australia with 220+ staff, helping more than 500 Enterprises with building secure coders and software.</p>
<p>In 2020, Pieter was recognised as a finalist in the Diversity Champion category for the SC Awards Europe 2020. In 2016, he was No. 80 on the list of Coolest Tech people in Australia (Business Insider), awarded Cyber Security Professional of the Year (AISA – Australian Information Security Association) and is member of the Forbes Technology Council.</p>
<p>‍Pieter has been a Principal instructor for the SANS Institute since 20o7 teaching military, government and private organisations offensive techniques on how to target and assess organisations, systems and individuals for security weaknesses. Before starting his own company, Pieter co-founder NVISO in Belgium, worked at Ernst &amp; Young and BAE Systems. He is also one of the Co-Founders of BruCON, one of the most awesome hacking conferences on this planet.</p>
<p>‍He started his information security career early in life and obtained the Certified Information Systems Security Professional (CISSP) certification in 2004 as one of the youngest persons ever in Belgium. On his way, he collected a whole range of cyber security certificates (CISA, GCFA, GCIH, GPEN, GWAP) and is currently one of the select few people worldwide to hold the top certification GIAC Security Expert (GSE).</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/6ca25622-0fef-486e-afee-08f2c666acab-KBKAST-EP-Pieter-Danhiuex.mp3" length="50363770"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Pieter Danhieux joins us in learning the balance between speed and security and the potential impact of AI in various industries, acknowledging that AI is not a magical solution but a tool for assisting with heavy work. Join Karissa Breen and Pieter Danhiuex as they delve into the world of AI and its implications for security analysts and developers alike.
Pieter Danhieux is the Chief Executive Officer, Chairman, and Co-Founder of Secure Code Warrior. He started SCW in 2015 and built this company out to a global cyber security company from Australia with 220+ staff, helping more than 500 Enterprises with building secure coders and software.
In 2020, Pieter was recognised as a finalist in the Diversity Champion category for the SC Awards Europe 2020. In 2016, he was No. 80 on the list of Coolest Tech people in Australia (Business Insider), awarded Cyber Security Professional of the Year (AISA – Australian Information Security Association) and is member of the Forbes Technology Council.
‍Pieter has been a Principal instructor for the SANS Institute since 20o7 teaching military, government and private organisations offensive techniques on how to target and assess organisations, systems and individuals for security weaknesses. Before starting his own company, Pieter co-founder NVISO in Belgium, worked at Ernst & Young and BAE Systems. He is also one of the Co-Founders of BruCON, one of the most awesome hacking conferences on this planet.
‍He started his information security career early in life and obtained the Certified Information Systems Security Professional (CISSP) certification in 2004 as one of the youngest persons ever in Belgium. On his way, he collected a whole range of cyber security certificates (CISA, GCFA, GCIH, GPEN, GWAP) and is currently one of the select few people worldwide to hold the top certification GIAC Security Expert (GSE).
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1511930/1700181079-Pieter-Danhieux-2.png"></itunes:image>
                                                                            <itunes:duration>00:34:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 191 Deep Dive: Fabian Partigliani | Breaking it Down into Buckets: Simplifying Cybersecurity for Boards]]>
                </title>
                <pubDate>Wed, 05 Jul 2023 16:00:27 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1510280</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-191-deep-dive-fabian-partigliani-breaking-it-down-into-buckets-simplifying-cybersecurity-for-boards</link>
                                <description>
                                            <![CDATA[<p dir="ltr">In this episode of KBKast, we are joined by cybersecurity expert Fabian Partigliani. They dive into the world of cybersecurity risk management and how to effectively communicate these risks to the board of a business. Throughout the episode, KB and Fabian stress the importance of making cybersecurity information easy for the board to understand, identifying critical issues, and considering the right level of investment in cybersecurity. The conversation concludes with Fabian sharing insights on how to approach the topic when presenting to a board and the importance of justifying security investments and scrutinizing team performance.</p>
<p dir="ltr">Fabian Partigliani is an experienced Global CEO and Chair/Director, with multi-sector experience in tech, agritech, manufacturing, and fast-moving consumer goods. Fabian has worked across all types of organizations, from blue-chip listed companies to public sector not-for-profits and start-ups. Fabian has always been passionate about helping people and businesses scale to fulfill their potential. Currently, Fabian is the CEO of RedShield Security, an enterprise web application security solution operating in North America, Europe, and Asia Pacific, and Chairman of plant-based food company Smartfoods.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we are joined by cybersecurity expert Fabian Partigliani. They dive into the world of cybersecurity risk management and how to effectively communicate these risks to the board of a business. Throughout the episode, KB and Fabian stress the importance of making cybersecurity information easy for the board to understand, identifying critical issues, and considering the right level of investment in cybersecurity. The conversation concludes with Fabian sharing insights on how to approach the topic when presenting to a board and the importance of justifying security investments and scrutinizing team performance.
Fabian Partigliani is an experienced Global CEO and Chair/Director, with multi-sector experience in tech, agritech, manufacturing, and fast-moving consumer goods. Fabian has worked across all types of organizations, from blue-chip listed companies to public sector not-for-profits and start-ups. Fabian has always been passionate about helping people and businesses scale to fulfill their potential. Currently, Fabian is the CEO of RedShield Security, an enterprise web application security solution operating in North America, Europe, and Asia Pacific, and Chairman of plant-based food company Smartfoods.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 191 Deep Dive: Fabian Partigliani | Breaking it Down into Buckets: Simplifying Cybersecurity for Boards]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p dir="ltr">In this episode of KBKast, we are joined by cybersecurity expert Fabian Partigliani. They dive into the world of cybersecurity risk management and how to effectively communicate these risks to the board of a business. Throughout the episode, KB and Fabian stress the importance of making cybersecurity information easy for the board to understand, identifying critical issues, and considering the right level of investment in cybersecurity. The conversation concludes with Fabian sharing insights on how to approach the topic when presenting to a board and the importance of justifying security investments and scrutinizing team performance.</p>
<p dir="ltr">Fabian Partigliani is an experienced Global CEO and Chair/Director, with multi-sector experience in tech, agritech, manufacturing, and fast-moving consumer goods. Fabian has worked across all types of organizations, from blue-chip listed companies to public sector not-for-profits and start-ups. Fabian has always been passionate about helping people and businesses scale to fulfill their potential. Currently, Fabian is the CEO of RedShield Security, an enterprise web application security solution operating in North America, Europe, and Asia Pacific, and Chairman of plant-based food company Smartfoods.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/4d22da62-e119-457f-998d-cf06b6ce47a7-KBKAST-EP-191-Fabian-Partigliani.mp3" length="48161502"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we are joined by cybersecurity expert Fabian Partigliani. They dive into the world of cybersecurity risk management and how to effectively communicate these risks to the board of a business. Throughout the episode, KB and Fabian stress the importance of making cybersecurity information easy for the board to understand, identifying critical issues, and considering the right level of investment in cybersecurity. The conversation concludes with Fabian sharing insights on how to approach the topic when presenting to a board and the importance of justifying security investments and scrutinizing team performance.
Fabian Partigliani is an experienced Global CEO and Chair/Director, with multi-sector experience in tech, agritech, manufacturing, and fast-moving consumer goods. Fabian has worked across all types of organizations, from blue-chip listed companies to public sector not-for-profits and start-ups. Fabian has always been passionate about helping people and businesses scale to fulfill their potential. Currently, Fabian is the CEO of RedShield Security, an enterprise web application security solution operating in North America, Europe, and Asia Pacific, and Chairman of plant-based food company Smartfoods.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1510280/1688462609-Fabian-Partigliani.png"></itunes:image>
                                                                            <itunes:duration>00:33:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 190 Deep Dive: Pete Murray | Backup and Recovery: Challenges in Protection and Access Management]]>
                </title>
                <pubDate>Wed, 28 Jun 2023 16:00:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1507765</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-190-deep-dive-pete-murray-backup-and-recovery-challenges-in-protection-and-access-management</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, Pete Murray dives deep into the world of data management and recovery, sharing valuable insights on determining data residence, the significance of backup and recovery when other security measures fail, and the importance of managing access to data with the right tools to determine who has access and whether said access is necessary.</p>
<p><span class="ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">An industry veteran with over 30 years of experience, Pete Murray is responsible for leading Veritas’ overall strategy, sales operations and new business growth in the ANZ region. Pete is passionate about making a difference by giving back to the IT community. In 2017, he co-founded the Jack Edge Connected Classroom Foundation, which provides secure video connectivity from homes to classrooms for terminally ill children.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, Pete Murray dives deep into the world of data management and recovery, sharing valuable insights on determining data residence, the significance of backup and recovery when other security measures fail, and the importance of managing access to data with the right tools to determine who has access and whether said access is necessary.
An industry veteran with over 30 years of experience, Pete Murray is responsible for leading Veritas’ overall strategy, sales operations and new business growth in the ANZ region. Pete is passionate about making a difference by giving back to the IT community. In 2017, he co-founded the Jack Edge Connected Classroom Foundation, which provides secure video connectivity from homes to classrooms for terminally ill children.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 190 Deep Dive: Pete Murray | Backup and Recovery: Challenges in Protection and Access Management]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, Pete Murray dives deep into the world of data management and recovery, sharing valuable insights on determining data residence, the significance of backup and recovery when other security measures fail, and the importance of managing access to data with the right tools to determine who has access and whether said access is necessary.</p>
<p><span class="ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">An industry veteran with over 30 years of experience, Pete Murray is responsible for leading Veritas’ overall strategy, sales operations and new business growth in the ANZ region. Pete is passionate about making a difference by giving back to the IT community. In 2017, he co-founded the Jack Edge Connected Classroom Foundation, which provides secure video connectivity from homes to classrooms for terminally ill children.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/4db56183-9879-4165-b796-ba0b03888dd2-KBKAST-EP-Pete-Murray.mp3" length="46712164"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, Pete Murray dives deep into the world of data management and recovery, sharing valuable insights on determining data residence, the significance of backup and recovery when other security measures fail, and the importance of managing access to data with the right tools to determine who has access and whether said access is necessary.
An industry veteran with over 30 years of experience, Pete Murray is responsible for leading Veritas’ overall strategy, sales operations and new business growth in the ANZ region. Pete is passionate about making a difference by giving back to the IT community. In 2017, he co-founded the Jack Edge Connected Classroom Foundation, which provides secure video connectivity from homes to classrooms for terminally ill children.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1507765/1687991173-Pete-Murray.png"></itunes:image>
                                                                            <itunes:duration>00:32:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 189 Deep Dive: Jason Murrell | Mentoring and Education: Revolutionising Australia’s Cybersecurity Landscape]]>
                </title>
                <pubDate>Wed, 21 Jun 2023 16:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1501374</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-189-deep-dive-jason-murrell-mentoring-and-education-revolutionising-australias-cybersecurity-landscape</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, Jason Murell talks about the challenges facing the cybersecurity startup ecosystem in Australia. They discuss the funding and support available for startups, the need for a cultural mindset change, and the importance of mentoring and education. Jason also talks about his groundbreaking initiative set to revolutionise the cybersecurity landscape in Australia. Additionally, they explore the opportunities in other countries, such as Israel and Canada, and the need for collaboration and open sharing of information within the cybersecurity community.</p>
<p>Jason Murrell is Group Executive at AustCyber and has been a long-time supporter of Australian start-ups for over 20 years, particularly in the cyber security space for the past 6 years. His accomplishments include helping to launch Cyber Aware in 2017, and most recently with Cyber Hive, after previously contributing to the growth of GRC platform 6clicks.</p>
<p>With a passion for championing, mentoring, and connecting Australia’s cyber networks, Jason is well-placed unite the Australian cyber community and get us as a nation to where we need to be – connected with cyber safety as a priority.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, Jason Murell talks about the challenges facing the cybersecurity startup ecosystem in Australia. They discuss the funding and support available for startups, the need for a cultural mindset change, and the importance of mentoring and education. Jason also talks about his groundbreaking initiative set to revolutionise the cybersecurity landscape in Australia. Additionally, they explore the opportunities in other countries, such as Israel and Canada, and the need for collaboration and open sharing of information within the cybersecurity community.
Jason Murrell is Group Executive at AustCyber and has been a long-time supporter of Australian start-ups for over 20 years, particularly in the cyber security space for the past 6 years. His accomplishments include helping to launch Cyber Aware in 2017, and most recently with Cyber Hive, after previously contributing to the growth of GRC platform 6clicks.
With a passion for championing, mentoring, and connecting Australia’s cyber networks, Jason is well-placed unite the Australian cyber community and get us as a nation to where we need to be – connected with cyber safety as a priority.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 189 Deep Dive: Jason Murrell | Mentoring and Education: Revolutionising Australia’s Cybersecurity Landscape]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, Jason Murell talks about the challenges facing the cybersecurity startup ecosystem in Australia. They discuss the funding and support available for startups, the need for a cultural mindset change, and the importance of mentoring and education. Jason also talks about his groundbreaking initiative set to revolutionise the cybersecurity landscape in Australia. Additionally, they explore the opportunities in other countries, such as Israel and Canada, and the need for collaboration and open sharing of information within the cybersecurity community.</p>
<p>Jason Murrell is Group Executive at AustCyber and has been a long-time supporter of Australian start-ups for over 20 years, particularly in the cyber security space for the past 6 years. His accomplishments include helping to launch Cyber Aware in 2017, and most recently with Cyber Hive, after previously contributing to the growth of GRC platform 6clicks.</p>
<p>With a passion for championing, mentoring, and connecting Australia’s cyber networks, Jason is well-placed unite the Australian cyber community and get us as a nation to where we need to be – connected with cyber safety as a priority.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/34ab2353-8a34-4def-900e-3dbd3230d755-KBKAST-EP-Jason-Murell.mp3" length="68093336"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, Jason Murell talks about the challenges facing the cybersecurity startup ecosystem in Australia. They discuss the funding and support available for startups, the need for a cultural mindset change, and the importance of mentoring and education. Jason also talks about his groundbreaking initiative set to revolutionise the cybersecurity landscape in Australia. Additionally, they explore the opportunities in other countries, such as Israel and Canada, and the need for collaboration and open sharing of information within the cybersecurity community.
Jason Murrell is Group Executive at AustCyber and has been a long-time supporter of Australian start-ups for over 20 years, particularly in the cyber security space for the past 6 years. His accomplishments include helping to launch Cyber Aware in 2017, and most recently with Cyber Hive, after previously contributing to the growth of GRC platform 6clicks.
With a passion for championing, mentoring, and connecting Australia’s cyber networks, Jason is well-placed unite the Australian cyber community and get us as a nation to where we need to be – connected with cyber safety as a priority.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1501374/1687319045-GUESTS-DO-NOT-TOUCH-22.png"></itunes:image>
                                                                            <itunes:duration>00:47:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 188 Deep Dive: Darren Reid | Prioritising Protection: Why Endpoint Security  Should be a Top Priority]]>
                </title>
                <pubDate>Wed, 14 Jun 2023 16:01:32 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1496347</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-188-deep-dive-darren-reid-prioritising-protection-why-endpoint-security-should-be-a-top-priority</link>
                                <description>
                                            <![CDATA[<p>In this episode, Darren delves into the challenges facing the security industry, with fragmented tools and technologies making it difficult for organisations to keep up with the overwhelming volume of data being produced. Bringing together endpoint, network, and identity detection can help pre-correlate and line up activity against a toolset to present legitimate intelligence to SoC teams, thus helping to reduce alert fatigue and enable quick response to potential threats. This episode also discusses the growing popularity of XDR, an extension to traditional cybersecurity tools designed to provide a single console view of network, endpoint, and identity telemetry. While not every organisation will deploy XDR, more and more will move towards its use to better prevent and respond to cyber attacks.</p>
<p>Darren is currently the Senior Director of the Security Business Unit for Asia-Pacific &amp; Japan at VMWare. He has over 25 years’ experience in leading organisations in the Information Technology industry. With both domestic and international experience, Darren has helped build and grow a number of organisations in a wide variety of countries.</p>
<div>
<p class="Default">As companies move to benefit from a multi-cloud world, ensuring their data and applications are secured while still providing an outstanding user experience becomes paramount. VMWare helps organisations of all sizes embrace multi-cloud while delivering a single, holistic, security experience to protect and enable their organisational transformation. From on-premise through private cloud, public cloud, and containers, Carbon Black supports all the different ways a customer may deploy their applications.</p>
</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Darren delves into the challenges facing the security industry, with fragmented tools and technologies making it difficult for organisations to keep up with the overwhelming volume of data being produced. Bringing together endpoint, network, and identity detection can help pre-correlate and line up activity against a toolset to present legitimate intelligence to SoC teams, thus helping to reduce alert fatigue and enable quick response to potential threats. This episode also discusses the growing popularity of XDR, an extension to traditional cybersecurity tools designed to provide a single console view of network, endpoint, and identity telemetry. While not every organisation will deploy XDR, more and more will move towards its use to better prevent and respond to cyber attacks.
Darren is currently the Senior Director of the Security Business Unit for Asia-Pacific & Japan at VMWare. He has over 25 years’ experience in leading organisations in the Information Technology industry. With both domestic and international experience, Darren has helped build and grow a number of organisations in a wide variety of countries.

As companies move to benefit from a multi-cloud world, ensuring their data and applications are secured while still providing an outstanding user experience becomes paramount. VMWare helps organisations of all sizes embrace multi-cloud while delivering a single, holistic, security experience to protect and enable their organisational transformation. From on-premise through private cloud, public cloud, and containers, Carbon Black supports all the different ways a customer may deploy their applications.

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 188 Deep Dive: Darren Reid | Prioritising Protection: Why Endpoint Security  Should be a Top Priority]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Darren delves into the challenges facing the security industry, with fragmented tools and technologies making it difficult for organisations to keep up with the overwhelming volume of data being produced. Bringing together endpoint, network, and identity detection can help pre-correlate and line up activity against a toolset to present legitimate intelligence to SoC teams, thus helping to reduce alert fatigue and enable quick response to potential threats. This episode also discusses the growing popularity of XDR, an extension to traditional cybersecurity tools designed to provide a single console view of network, endpoint, and identity telemetry. While not every organisation will deploy XDR, more and more will move towards its use to better prevent and respond to cyber attacks.</p>
<p>Darren is currently the Senior Director of the Security Business Unit for Asia-Pacific &amp; Japan at VMWare. He has over 25 years’ experience in leading organisations in the Information Technology industry. With both domestic and international experience, Darren has helped build and grow a number of organisations in a wide variety of countries.</p>
<div>
<p class="Default">As companies move to benefit from a multi-cloud world, ensuring their data and applications are secured while still providing an outstanding user experience becomes paramount. VMWare helps organisations of all sizes embrace multi-cloud while delivering a single, holistic, security experience to protect and enable their organisational transformation. From on-premise through private cloud, public cloud, and containers, Carbon Black supports all the different ways a customer may deploy their applications.</p>
</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/8f521726-1aa9-4643-a5f6-3ddf1c2a15ba-KBKAST-EP-Darren-Reid-edited.mp3" length="59923268"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Darren delves into the challenges facing the security industry, with fragmented tools and technologies making it difficult for organisations to keep up with the overwhelming volume of data being produced. Bringing together endpoint, network, and identity detection can help pre-correlate and line up activity against a toolset to present legitimate intelligence to SoC teams, thus helping to reduce alert fatigue and enable quick response to potential threats. This episode also discusses the growing popularity of XDR, an extension to traditional cybersecurity tools designed to provide a single console view of network, endpoint, and identity telemetry. While not every organisation will deploy XDR, more and more will move towards its use to better prevent and respond to cyber attacks.
Darren is currently the Senior Director of the Security Business Unit for Asia-Pacific & Japan at VMWare. He has over 25 years’ experience in leading organisations in the Information Technology industry. With both domestic and international experience, Darren has helped build and grow a number of organisations in a wide variety of countries.

As companies move to benefit from a multi-cloud world, ensuring their data and applications are secured while still providing an outstanding user experience becomes paramount. VMWare helps organisations of all sizes embrace multi-cloud while delivering a single, holistic, security experience to protect and enable their organisational transformation. From on-premise through private cloud, public cloud, and containers, Carbon Black supports all the different ways a customer may deploy their applications.

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1496347/1700181080-GUESTS-DO-NOT-TOUCH-20-1.png"></itunes:image>
                                                                            <itunes:duration>00:41:34</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 187 Deep Dive: Brian Grant | Securing Your Data: A Social Responsibility]]>
                </title>
                <pubDate>Wed, 07 Jun 2023 16:00:47 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1492170</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-187-deep-dive-brian-grant-securing-your-data-a-social-responsibility</link>
                                <description>
                                            <![CDATA[<p>In this episode, Brian Grant shares his insights on data security and why organizations should prioritise securing their data before anything else. He emphasises that effective data security starts with a fundamental change in how organizations approach the issue as a social responsibility, not just a business concern. The discussion also delves into the consequences of data breaches, including the potential for life-threatening outcomes, and the need for everyone to prioritise safety in the digital age. Additionally, Grant discusses the critical role of education and consulting in putting cybersecurity controls and investments in context, and how raising awareness can lead to a tipping point where organizations and individuals prioritize it as a foundational value.</p>
<p>Brian Grant is the Thales Regional Director with responsibility for the Data Protection business in Australia and New Zealand. He started his career in technology when he enlisted in the Royal Australian Air Force, working on critical air traffic control systems. He has had extensive hands on and leadership experience in delivering innovative and unique solutions for organisations, with a particular emphasis on networking and cybersecurity. He has held regional leadership roles for a number of technology start-ups and is passionately committed to helping clients embed data security to better deliver confidentiality, integrity and availability in our data dependent world.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Brian Grant shares his insights on data security and why organizations should prioritise securing their data before anything else. He emphasises that effective data security starts with a fundamental change in how organizations approach the issue as a social responsibility, not just a business concern. The discussion also delves into the consequences of data breaches, including the potential for life-threatening outcomes, and the need for everyone to prioritise safety in the digital age. Additionally, Grant discusses the critical role of education and consulting in putting cybersecurity controls and investments in context, and how raising awareness can lead to a tipping point where organizations and individuals prioritize it as a foundational value.
Brian Grant is the Thales Regional Director with responsibility for the Data Protection business in Australia and New Zealand. He started his career in technology when he enlisted in the Royal Australian Air Force, working on critical air traffic control systems. He has had extensive hands on and leadership experience in delivering innovative and unique solutions for organisations, with a particular emphasis on networking and cybersecurity. He has held regional leadership roles for a number of technology start-ups and is passionately committed to helping clients embed data security to better deliver confidentiality, integrity and availability in our data dependent world.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 187 Deep Dive: Brian Grant | Securing Your Data: A Social Responsibility]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Brian Grant shares his insights on data security and why organizations should prioritise securing their data before anything else. He emphasises that effective data security starts with a fundamental change in how organizations approach the issue as a social responsibility, not just a business concern. The discussion also delves into the consequences of data breaches, including the potential for life-threatening outcomes, and the need for everyone to prioritise safety in the digital age. Additionally, Grant discusses the critical role of education and consulting in putting cybersecurity controls and investments in context, and how raising awareness can lead to a tipping point where organizations and individuals prioritize it as a foundational value.</p>
<p>Brian Grant is the Thales Regional Director with responsibility for the Data Protection business in Australia and New Zealand. He started his career in technology when he enlisted in the Royal Australian Air Force, working on critical air traffic control systems. He has had extensive hands on and leadership experience in delivering innovative and unique solutions for organisations, with a particular emphasis on networking and cybersecurity. He has held regional leadership roles for a number of technology start-ups and is passionately committed to helping clients embed data security to better deliver confidentiality, integrity and availability in our data dependent world.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/fa896f64-0054-4a56-930e-ae1700b1a433-KBKAST-EP-Brian-Grant-edited.mp3" length="56928344"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Brian Grant shares his insights on data security and why organizations should prioritise securing their data before anything else. He emphasises that effective data security starts with a fundamental change in how organizations approach the issue as a social responsibility, not just a business concern. The discussion also delves into the consequences of data breaches, including the potential for life-threatening outcomes, and the need for everyone to prioritise safety in the digital age. Additionally, Grant discusses the critical role of education and consulting in putting cybersecurity controls and investments in context, and how raising awareness can lead to a tipping point where organizations and individuals prioritize it as a foundational value.
Brian Grant is the Thales Regional Director with responsibility for the Data Protection business in Australia and New Zealand. He started his career in technology when he enlisted in the Royal Australian Air Force, working on critical air traffic control systems. He has had extensive hands on and leadership experience in delivering innovative and unique solutions for organisations, with a particular emphasis on networking and cybersecurity. He has held regional leadership roles for a number of technology start-ups and is passionately committed to helping clients embed data security to better deliver confidentiality, integrity and availability in our data dependent world.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1492170/1686117441-GUESTS-DO-NOT-TOUCH-15.png"></itunes:image>
                                                                            <itunes:duration>00:39:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 186: Deep Dive: Raj Samani | Cybersecurity as a Team Sport: How Transparency Can Reduce the Likelihood of Breaches]]>
                </title>
                <pubDate>Wed, 31 May 2023 16:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1488012</guid>
                                    <link>https://kbkast.castos.com/episodes/deep-dive-raj-samani-cybersecurity-as-a-team-sport-how-transparency-can-reduce-the-likelihood-of-breaches</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we delve into the world of cybersecurity and the impact of breaches on organizations and society. Raj provides insights into his experience with past cases, emphasizing the importance of being open and transparent in handling breaches and reducing the impact on customers. We uncover the risks posed by social media, the challenge of managing expectations from regulators, and the economic impact of breaches. We also explore how cybersecurity extends beyond computer viruses and IT systems, and how the rise of autonomous vehicles and growing technology dependence increases the risk of attacks. Join us as we discuss the need for transparency and information sharing to improve the collective defense of the industry.</p>
<p>Raj Samani is a computer security expert responsible for extending the scope and reach of Rapid7’s research initiatives. He joins Rapid7 from McAfee where he served as McAfee Fellow and Chief Scientist after serving as VP and Chief Technical Officer in EMEA.</p>
<p>Raj has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3) in The Hague.</p>
<p>Raj has been recognized for his contributions to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, Intel Achievement Award, among others. He also co-authored the book ‘Applied Cyber Security and the Smart Grid’ as well as the CSA Guide to Cloud computing, and he has served as technical editor for numerous other publications. In addition to speaking at myriad cybersecurity industry events, Raj is sought after for his commentary on breaking news such as major security breaches and emerging threats. His commentary has appeared in Forbes, The Wall Street Journal, Business Insider, The Daily Beast, and more. He can be found on twitter @Raj_Samani.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we delve into the world of cybersecurity and the impact of breaches on organizations and society. Raj provides insights into his experience with past cases, emphasizing the importance of being open and transparent in handling breaches and reducing the impact on customers. We uncover the risks posed by social media, the challenge of managing expectations from regulators, and the economic impact of breaches. We also explore how cybersecurity extends beyond computer viruses and IT systems, and how the rise of autonomous vehicles and growing technology dependence increases the risk of attacks. Join us as we discuss the need for transparency and information sharing to improve the collective defense of the industry.
Raj Samani is a computer security expert responsible for extending the scope and reach of Rapid7’s research initiatives. He joins Rapid7 from McAfee where he served as McAfee Fellow and Chief Scientist after serving as VP and Chief Technical Officer in EMEA.
Raj has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3) in The Hague.
Raj has been recognized for his contributions to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, Intel Achievement Award, among others. He also co-authored the book ‘Applied Cyber Security and the Smart Grid’ as well as the CSA Guide to Cloud computing, and he has served as technical editor for numerous other publications. In addition to speaking at myriad cybersecurity industry events, Raj is sought after for his commentary on breaking news such as major security breaches and emerging threats. His commentary has appeared in Forbes, The Wall Street Journal, Business Insider, The Daily Beast, and more. He can be found on twitter @Raj_Samani.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 186: Deep Dive: Raj Samani | Cybersecurity as a Team Sport: How Transparency Can Reduce the Likelihood of Breaches]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we delve into the world of cybersecurity and the impact of breaches on organizations and society. Raj provides insights into his experience with past cases, emphasizing the importance of being open and transparent in handling breaches and reducing the impact on customers. We uncover the risks posed by social media, the challenge of managing expectations from regulators, and the economic impact of breaches. We also explore how cybersecurity extends beyond computer viruses and IT systems, and how the rise of autonomous vehicles and growing technology dependence increases the risk of attacks. Join us as we discuss the need for transparency and information sharing to improve the collective defense of the industry.</p>
<p>Raj Samani is a computer security expert responsible for extending the scope and reach of Rapid7’s research initiatives. He joins Rapid7 from McAfee where he served as McAfee Fellow and Chief Scientist after serving as VP and Chief Technical Officer in EMEA.</p>
<p>Raj has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3) in The Hague.</p>
<p>Raj has been recognized for his contributions to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, Intel Achievement Award, among others. He also co-authored the book ‘Applied Cyber Security and the Smart Grid’ as well as the CSA Guide to Cloud computing, and he has served as technical editor for numerous other publications. In addition to speaking at myriad cybersecurity industry events, Raj is sought after for his commentary on breaking news such as major security breaches and emerging threats. His commentary has appeared in Forbes, The Wall Street Journal, Business Insider, The Daily Beast, and more. He can be found on twitter @Raj_Samani.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/7b97bf9a-b3da-47e7-874d-8db6f415aae6-KBKAST-EP-Raj-Samani.mp3" length="58737762"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we delve into the world of cybersecurity and the impact of breaches on organizations and society. Raj provides insights into his experience with past cases, emphasizing the importance of being open and transparent in handling breaches and reducing the impact on customers. We uncover the risks posed by social media, the challenge of managing expectations from regulators, and the economic impact of breaches. We also explore how cybersecurity extends beyond computer viruses and IT systems, and how the rise of autonomous vehicles and growing technology dependence increases the risk of attacks. Join us as we discuss the need for transparency and information sharing to improve the collective defense of the industry.
Raj Samani is a computer security expert responsible for extending the scope and reach of Rapid7’s research initiatives. He joins Rapid7 from McAfee where he served as McAfee Fellow and Chief Scientist after serving as VP and Chief Technical Officer in EMEA.
Raj has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3) in The Hague.
Raj has been recognized for his contributions to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, Intel Achievement Award, among others. He also co-authored the book ‘Applied Cyber Security and the Smart Grid’ as well as the CSA Guide to Cloud computing, and he has served as technical editor for numerous other publications. In addition to speaking at myriad cybersecurity industry events, Raj is sought after for his commentary on breaking news such as major security breaches and emerging threats. His commentary has appeared in Forbes, The Wall Street Journal, Business Insider, The Daily Beast, and more. He can be found on twitter @Raj_Samani.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1488012/1685968602-GUESTS-DO-NOT-TOUCH-17.png"></itunes:image>
                                                                            <itunes:duration>00:40:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Security Round-up: Marty Edwards | Compliance Costs and Enhanced Protections: Australia’s New Cybersecurity Protocol]]>
                </title>
                <pubDate>Mon, 29 May 2023 16:00:21 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1486659</guid>
                                    <link>https://kbkast.castos.com/episodes/security-round-up-marty-edwards-compliance-costs-and-enhanced-protections-australias-new-cybersecurity-protocol</link>
                                <description>
                                            <![CDATA[<p>In this episode of KBKast, we take a look into the recent announcement from the Australian government about their new cybersecurity regulations for businesses. The new risk management protocol covers cybersecurity, physical security, personnel security, and supply chain security, all aimed at encouraging companies to enhance overall protection measures rather than punishing directors for noncompliance. Marty points out that Australia’s situation with cybersecurity is similar to other countries in the world, with many governments implementing baseline standards to encourage better cybersecurity practices. However, some organizations have made progress in cybersecurity, while others need more government intervention to ensure critical infrastructure security. He also touches on the importance of investing in operational technology systems, including industrial control systems, which have been underinvested in cybersecurity, despite their vital role in operating electricity, gas, water, and transportation systems. As more governments require cybersecurity standards for these systems, both public and private sector organizations should invest in the security of these systems.</p>
<p>Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy’s (DOE’s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute’s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode of KBKast, we take a look into the recent announcement from the Australian government about their new cybersecurity regulations for businesses. The new risk management protocol covers cybersecurity, physical security, personnel security, and supply chain security, all aimed at encouraging companies to enhance overall protection measures rather than punishing directors for noncompliance. Marty points out that Australia’s situation with cybersecurity is similar to other countries in the world, with many governments implementing baseline standards to encourage better cybersecurity practices. However, some organizations have made progress in cybersecurity, while others need more government intervention to ensure critical infrastructure security. He also touches on the importance of investing in operational technology systems, including industrial control systems, which have been underinvested in cybersecurity, despite their vital role in operating electricity, gas, water, and transportation systems. As more governments require cybersecurity standards for these systems, both public and private sector organizations should invest in the security of these systems.
Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy’s (DOE’s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute’s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Security Round-up: Marty Edwards | Compliance Costs and Enhanced Protections: Australia’s New Cybersecurity Protocol]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode of KBKast, we take a look into the recent announcement from the Australian government about their new cybersecurity regulations for businesses. The new risk management protocol covers cybersecurity, physical security, personnel security, and supply chain security, all aimed at encouraging companies to enhance overall protection measures rather than punishing directors for noncompliance. Marty points out that Australia’s situation with cybersecurity is similar to other countries in the world, with many governments implementing baseline standards to encourage better cybersecurity practices. However, some organizations have made progress in cybersecurity, while others need more government intervention to ensure critical infrastructure security. He also touches on the importance of investing in operational technology systems, including industrial control systems, which have been underinvested in cybersecurity, despite their vital role in operating electricity, gas, water, and transportation systems. As more governments require cybersecurity standards for these systems, both public and private sector organizations should invest in the security of these systems.</p>
<p>Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy’s (DOE’s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute’s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/ecc141b8-71c2-4e04-ac92-77009a242e90-Security-Round-up-Marty-Edwards-Compliance-Costs-and-Enhanced-Protections-Australia-s-New-Cyber.mp3" length="3832749"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode of KBKast, we take a look into the recent announcement from the Australian government about their new cybersecurity regulations for businesses. The new risk management protocol covers cybersecurity, physical security, personnel security, and supply chain security, all aimed at encouraging companies to enhance overall protection measures rather than punishing directors for noncompliance. Marty points out that Australia’s situation with cybersecurity is similar to other countries in the world, with many governments implementing baseline standards to encourage better cybersecurity practices. However, some organizations have made progress in cybersecurity, while others need more government intervention to ensure critical infrastructure security. He also touches on the importance of investing in operational technology systems, including industrial control systems, which have been underinvested in cybersecurity, despite their vital role in operating electricity, gas, water, and transportation systems. As more governments require cybersecurity standards for these systems, both public and private sector organizations should invest in the security of these systems.
Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy’s (DOE’s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute’s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1486659/1685336768-KBKAST-EP-108-Marty-Edwards.png"></itunes:image>
                                                                            <itunes:duration>00:03:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 185: Rajesh Ganesan]]>
                </title>
                <pubDate>Wed, 24 May 2023 16:00:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1482947</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-185-rajesh-ganesan</link>
                                <description>
                                            <![CDATA[<table>
<tbody>
<tr>
<td>Rajesh Ganesan is President at ManageEngine, the IT management division of Zoho Corporation. He is a part of the leadership team overseeing product strategy and direction for the overall suite. Rajesh has been with Zoho Corp. for over 20 years developing software products in various domains including telecommunications, network management, and IT security. He is currently focussed on delivering enterprise IT management solutions as SaaS.
<p> </p>
<p> </p></td>
</tr>
</tbody>
</table>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[


Rajesh Ganesan is President at ManageEngine, the IT management division of Zoho Corporation. He is a part of the leadership team overseeing product strategy and direction for the overall suite. Rajesh has been with Zoho Corp. for over 20 years developing software products in various domains including telecommunications, network management, and IT security. He is currently focussed on delivering enterprise IT management solutions as SaaS.
 
 



]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 185: Rajesh Ganesan]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<table>
<tbody>
<tr>
<td>Rajesh Ganesan is President at ManageEngine, the IT management division of Zoho Corporation. He is a part of the leadership team overseeing product strategy and direction for the overall suite. Rajesh has been with Zoho Corp. for over 20 years developing software products in various domains including telecommunications, network management, and IT security. He is currently focussed on delivering enterprise IT management solutions as SaaS.
<p> </p>
<p> </p></td>
</tr>
</tbody>
</table>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/ac3e9b54-67d4-4436-a66f-bd986a4e6cd4-KBKAST-EP-Rajesh-Ganesan.mp3" length="69525768"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[


Rajesh Ganesan is President at ManageEngine, the IT management division of Zoho Corporation. He is a part of the leadership team overseeing product strategy and direction for the overall suite. Rajesh has been with Zoho Corp. for over 20 years developing software products in various domains including telecommunications, network management, and IT security. He is currently focussed on delivering enterprise IT management solutions as SaaS.
 
 



]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1482947/1685004310-GUESTS-DO-NOT-TOUCH-14.png"></itunes:image>
                                                                            <itunes:duration>00:48:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 184: Eugene Shablygin]]>
                </title>
                <pubDate>Wed, 17 May 2023 16:00:16 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1477388</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-184-eugene-shablygin</link>
                                <description>
                                            <![CDATA[<p>Gene Shablygin is a former nuclear physicist and current computer security storyteller. Life-long ham radio operator, relatively young (just under 1000 flight hours) private pilot. Loves classical live music, high-end audio, and fast cars from Zuffenhausen.</p>
<p>As a founder and CEO of WWPass, Gene is focused on freeing individuals and enterprises from ineffective, insecure password systems that can’t protect their data from increasingly sophisticated security threats.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Gene Shablygin is a former nuclear physicist and current computer security storyteller. Life-long ham radio operator, relatively young (just under 1000 flight hours) private pilot. Loves classical live music, high-end audio, and fast cars from Zuffenhausen.
As a founder and CEO of WWPass, Gene is focused on freeing individuals and enterprises from ineffective, insecure password systems that can’t protect their data from increasingly sophisticated security threats.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 184: Eugene Shablygin]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Gene Shablygin is a former nuclear physicist and current computer security storyteller. Life-long ham radio operator, relatively young (just under 1000 flight hours) private pilot. Loves classical live music, high-end audio, and fast cars from Zuffenhausen.</p>
<p>As a founder and CEO of WWPass, Gene is focused on freeing individuals and enterprises from ineffective, insecure password systems that can’t protect their data from increasingly sophisticated security threats.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3a6f248f-4b87-4a5a-9510-e7afe3ea1522-KBKAST-EP-Eugene-Shablygin-edited.mp3" length="54062320"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Gene Shablygin is a former nuclear physicist and current computer security storyteller. Life-long ham radio operator, relatively young (just under 1000 flight hours) private pilot. Loves classical live music, high-end audio, and fast cars from Zuffenhausen.
As a founder and CEO of WWPass, Gene is focused on freeing individuals and enterprises from ineffective, insecure password systems that can’t protect their data from increasingly sophisticated security threats.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1477388/1700181081-GUESTS-DO-NOT-TOUCH-11.png"></itunes:image>
                                                                            <itunes:duration>00:37:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 183: Rik Ferguson]]>
                </title>
                <pubDate>Wed, 10 May 2023 16:00:13 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1475537</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-183-rik-ferguson</link>
                                <description>
                                            <![CDATA[<p><span>Rik Ferguson is the Vice President of Security Intelligence at Forescout. He is also a Special Advisor to Europol’s European Cyber Crime Centre (EC3), a multi-award-winning producer and writer, and a Fellow of the Royal Society of Arts. In April 2011 Rik was inducted into the Infosecurity Hall of Fame.</span><span> </span></p>
<p><span>Rik is a researcher, storyteller, and futurist. He helps governments, law enforcement, businesses and individuals to understand the complexities of technology, and its intersection with cybercrime, contributing to global initiatives to combat cybercrime and reduce risk through participation at the United Nations, European and national Parliaments.</span><span> </span></p>
<p><span>Over his twenty-five plus years of professional practice, he has taken deep dives into the cybercriminal underground and helped the wider world understand the threats of today and how those threats might evolve over time. </span><span> </span></p>
<p><span>A recognised futurist and world-renowned speaker, Rik has spoken at global events including RSA Conference, Mobile World Congress, Milken Institute, RUSI, GITEX, Infosecurity, Virus Bulletin, e-Crime Congress, IPExpo, CloudExpo, Webit, GovSec, and many more, and is often quoted by media around the world.</span><span> </span></p>
<p><span>Rik joined Forescout in 2022. Prior to assuming his current role, he served as Vice President Security Research at Trend Micro for 15 years</span><span> </span></p>
<p><span>Rik Ferguson holds a Bachelor of Arts degree from the University of Wales and has qualified as a Certified Ethical Hacker (</span><i><span>C|EH</span></i><span>), Certified Information Systems Security Professional (</span><i><span>CISSP</span></i><span>) and an Information Systems Security Architecture Professional (</span><i><span>ISSAP</span></i><span>)</span><span>.</span><span> </span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Rik Ferguson is the Vice President of Security Intelligence at Forescout. He is also a Special Advisor to Europol’s European Cyber Crime Centre (EC3), a multi-award-winning producer and writer, and a Fellow of the Royal Society of Arts. In April 2011 Rik was inducted into the Infosecurity Hall of Fame. 
Rik is a researcher, storyteller, and futurist. He helps governments, law enforcement, businesses and individuals to understand the complexities of technology, and its intersection with cybercrime, contributing to global initiatives to combat cybercrime and reduce risk through participation at the United Nations, European and national Parliaments. 
Over his twenty-five plus years of professional practice, he has taken deep dives into the cybercriminal underground and helped the wider world understand the threats of today and how those threats might evolve over time.  
A recognised futurist and world-renowned speaker, Rik has spoken at global events including RSA Conference, Mobile World Congress, Milken Institute, RUSI, GITEX, Infosecurity, Virus Bulletin, e-Crime Congress, IPExpo, CloudExpo, Webit, GovSec, and many more, and is often quoted by media around the world. 
Rik joined Forescout in 2022. Prior to assuming his current role, he served as Vice President Security Research at Trend Micro for 15 years 
Rik Ferguson holds a Bachelor of Arts degree from the University of Wales and has qualified as a Certified Ethical Hacker (C|EH), Certified Information Systems Security Professional (CISSP) and an Information Systems Security Architecture Professional (ISSAP). 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 183: Rik Ferguson]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span>Rik Ferguson is the Vice President of Security Intelligence at Forescout. He is also a Special Advisor to Europol’s European Cyber Crime Centre (EC3), a multi-award-winning producer and writer, and a Fellow of the Royal Society of Arts. In April 2011 Rik was inducted into the Infosecurity Hall of Fame.</span><span> </span></p>
<p><span>Rik is a researcher, storyteller, and futurist. He helps governments, law enforcement, businesses and individuals to understand the complexities of technology, and its intersection with cybercrime, contributing to global initiatives to combat cybercrime and reduce risk through participation at the United Nations, European and national Parliaments.</span><span> </span></p>
<p><span>Over his twenty-five plus years of professional practice, he has taken deep dives into the cybercriminal underground and helped the wider world understand the threats of today and how those threats might evolve over time. </span><span> </span></p>
<p><span>A recognised futurist and world-renowned speaker, Rik has spoken at global events including RSA Conference, Mobile World Congress, Milken Institute, RUSI, GITEX, Infosecurity, Virus Bulletin, e-Crime Congress, IPExpo, CloudExpo, Webit, GovSec, and many more, and is often quoted by media around the world.</span><span> </span></p>
<p><span>Rik joined Forescout in 2022. Prior to assuming his current role, he served as Vice President Security Research at Trend Micro for 15 years</span><span> </span></p>
<p><span>Rik Ferguson holds a Bachelor of Arts degree from the University of Wales and has qualified as a Certified Ethical Hacker (</span><i><span>C|EH</span></i><span>), Certified Information Systems Security Professional (</span><i><span>CISSP</span></i><span>) and an Information Systems Security Architecture Professional (</span><i><span>ISSAP</span></i><span>)</span><span>.</span><span> </span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/25a4ee5a-28d2-4199-8458-9e80838670c4-KBKAST-EP-Rik-Ferguson.mp3" length="69518392"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Rik Ferguson is the Vice President of Security Intelligence at Forescout. He is also a Special Advisor to Europol’s European Cyber Crime Centre (EC3), a multi-award-winning producer and writer, and a Fellow of the Royal Society of Arts. In April 2011 Rik was inducted into the Infosecurity Hall of Fame. 
Rik is a researcher, storyteller, and futurist. He helps governments, law enforcement, businesses and individuals to understand the complexities of technology, and its intersection with cybercrime, contributing to global initiatives to combat cybercrime and reduce risk through participation at the United Nations, European and national Parliaments. 
Over his twenty-five plus years of professional practice, he has taken deep dives into the cybercriminal underground and helped the wider world understand the threats of today and how those threats might evolve over time.  
A recognised futurist and world-renowned speaker, Rik has spoken at global events including RSA Conference, Mobile World Congress, Milken Institute, RUSI, GITEX, Infosecurity, Virus Bulletin, e-Crime Congress, IPExpo, CloudExpo, Webit, GovSec, and many more, and is often quoted by media around the world. 
Rik joined Forescout in 2022. Prior to assuming his current role, he served as Vice President Security Research at Trend Micro for 15 years 
Rik Ferguson holds a Bachelor of Arts degree from the University of Wales and has qualified as a Certified Ethical Hacker (C|EH), Certified Information Systems Security Professional (CISSP) and an Information Systems Security Architecture Professional (ISSAP). 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1475537/1700181081-GUESTS-DO-NOT-TOUCH-3.png"></itunes:image>
                                                                            <itunes:duration>00:48:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 182: Thomas Fikentscher]]>
                </title>
                <pubDate>Thu, 04 May 2023 16:00:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1468275</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-182-thomas-fikentscher</link>
                                <description>
                                            <![CDATA[<p style="font-weight:400;">Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk’s emerging cloud business in the region.</p>
<p style="font-weight:400;">Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years’ experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience – particularly in the cloud domain – has been invaluable to CyberArk, helping grow demand for Identity Security solutions.</p>
<p style="font-weight:400;">When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk’s emerging cloud business in the region.
Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years’ experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience – particularly in the cloud domain – has been invaluable to CyberArk, helping grow demand for Identity Security solutions.
When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 182: Thomas Fikentscher]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p style="font-weight:400;">Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk’s emerging cloud business in the region.</p>
<p style="font-weight:400;">Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years’ experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience – particularly in the cloud domain – has been invaluable to CyberArk, helping grow demand for Identity Security solutions.</p>
<p style="font-weight:400;">When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/0a38003b-c287-4c00-9908-8dadecda7947-KBKAST-EP-Thomas-Fikentscher.mp3" length="48452252"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk’s emerging cloud business in the region.
Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years’ experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience – particularly in the cloud domain – has been invaluable to CyberArk, helping grow demand for Identity Security solutions.
When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1468275/1700181082-GUESTS-DO-NOT-TOUCH-6.png"></itunes:image>
                                                                            <itunes:duration>00:33:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 181: Mark Thomas]]>
                </title>
                <pubDate>Tue, 02 May 2023 16:00:47 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1468273</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-181-mark-thomas</link>
                                <description>
                                            <![CDATA[<p><i>Mark Thomas, Director, Security Services, ANZ at Arctic Wolf, aims to build, direct and mature the operations of Arctic Wolf’s security services within the region. For the past 21 years, Mark has worked in the Cyber Security field establishing pragmatic, business-aligned risk minimisation strategies and cyber defenses to reduce losses, protect brand reputation, and achieve return on investment. Mark has held senior leadership and technical management roles, driving mission-critical SOC operations in geographically dispersed matrix environments, enabling greater business resilience and security agility. His previous roles include Senior Director, Threat Intelligence at NTT Ltd Global Threat Intelligence Centre (GTIC), and prior to that, Senior Director, Cybersecurity at Dimension Data.</i></p>
<p>See also:<a href="https://cybersecurity.arcticwolf.com/2023-Arctic-Wolf-Labs-Threat-Report.html"> 2023 Arctic Wolf Labs Threat Report</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mark Thomas, Director, Security Services, ANZ at Arctic Wolf, aims to build, direct and mature the operations of Arctic Wolf’s security services within the region. For the past 21 years, Mark has worked in the Cyber Security field establishing pragmatic, business-aligned risk minimisation strategies and cyber defenses to reduce losses, protect brand reputation, and achieve return on investment. Mark has held senior leadership and technical management roles, driving mission-critical SOC operations in geographically dispersed matrix environments, enabling greater business resilience and security agility. His previous roles include Senior Director, Threat Intelligence at NTT Ltd Global Threat Intelligence Centre (GTIC), and prior to that, Senior Director, Cybersecurity at Dimension Data.
See also: 2023 Arctic Wolf Labs Threat Report
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 181: Mark Thomas]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><i>Mark Thomas, Director, Security Services, ANZ at Arctic Wolf, aims to build, direct and mature the operations of Arctic Wolf’s security services within the region. For the past 21 years, Mark has worked in the Cyber Security field establishing pragmatic, business-aligned risk minimisation strategies and cyber defenses to reduce losses, protect brand reputation, and achieve return on investment. Mark has held senior leadership and technical management roles, driving mission-critical SOC operations in geographically dispersed matrix environments, enabling greater business resilience and security agility. His previous roles include Senior Director, Threat Intelligence at NTT Ltd Global Threat Intelligence Centre (GTIC), and prior to that, Senior Director, Cybersecurity at Dimension Data.</i></p>
<p>See also:<a href="https://cybersecurity.arcticwolf.com/2023-Arctic-Wolf-Labs-Threat-Report.html"> 2023 Arctic Wolf Labs Threat Report</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/f5eb5692-1603-455c-aa7d-34ac98ba623b-KBKAST-EP-Mark-Thomas.mp3" length="57874164"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mark Thomas, Director, Security Services, ANZ at Arctic Wolf, aims to build, direct and mature the operations of Arctic Wolf’s security services within the region. For the past 21 years, Mark has worked in the Cyber Security field establishing pragmatic, business-aligned risk minimisation strategies and cyber defenses to reduce losses, protect brand reputation, and achieve return on investment. Mark has held senior leadership and technical management roles, driving mission-critical SOC operations in geographically dispersed matrix environments, enabling greater business resilience and security agility. His previous roles include Senior Director, Threat Intelligence at NTT Ltd Global Threat Intelligence Centre (GTIC), and prior to that, Senior Director, Cybersecurity at Dimension Data.
See also: 2023 Arctic Wolf Labs Threat Report
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1468273/1700181082-GUESTS-DO-NOT-TOUCH-5.png"></itunes:image>
                                                                            <itunes:duration>00:40:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 180: Sean Duca]]>
                </title>
                <pubDate>Thu, 27 Apr 2023 16:00:56 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1464733</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-180-sean-duca</link>
                                <description>
                                            <![CDATA[<p>Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives. With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.</p>
<p>Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions. Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.</p>
<p>Read the report <a href="https://start.paloaltonetworks.com/2023-unit42-ransomware-extortion-report">here</a>.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives. With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions. Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.
Read the report here.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 180: Sean Duca]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives. With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.</p>
<p>Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions. Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.</p>
<p>Read the report <a href="https://start.paloaltonetworks.com/2023-unit42-ransomware-extortion-report">here</a>.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3d0ef136-0a5a-425b-a66a-3e2e6f830b2d-KBKAST-EP-Sean-Duca.mp3" length="59533686"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives. With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions. Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.
Read the report here.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1464733/c1a-5k0v-6zd4jqv0bjxv-czxvc1.png"></itunes:image>
                                                                            <itunes:duration>00:41:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 179: David Fairman]]>
                </title>
                <pubDate>Tue, 25 Apr 2023 16:00:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1463374</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-179-david-fairman</link>
                                <description>
                                            <![CDATA[<p style="font-weight:400;">David Fairman is an experienced CIO/CSO/CISO, strategic advisor and investor.</p>
<p style="font-weight:400;">David has extensive experience in the global financial services sector. David is currently the APAC CIO &amp; CSO for Netskope helping customers manage their digital and cyber risk programs in addition to working across industry with the aim of making the digital economy a safer place to do business. Furthermore, David is a Partner and CISO-in-residence at SixThirty Ventures, driving innovation and helping build great technology companies.  Previously, David was the Chief Security Officer (CSO) at NAB owning all aspects of Physical Security, Fraud, Investigations and Cyber Security. Prior to NAB, he was the Group Chief Information Security Officer (CISO) for the Royal Bank of Canada. David has been a senior leader at JP Morgan Chase &amp; Co and the Royal Bank of Scotland (RBS) having held several regional CISO and Global Head roles.</p>
<p style="font-weight:400;">David has lived and worked in Australia, the UK, the Netherlands and the USA.</p>
<p style="font-weight:400;">David was raised and educated in Australia where he received his Bachelor of Information Technology in Software Engineering and Computer Science. He holds a Masters of Business Administration and a Masters of Project Management. David began his career in Information Security while serving in the Royal Australian Air Force’s Electronic Warfare and Communications group, where he gained valuable experience in the technology, policy and process aspects of security and risk management.  Subsequently, David worked in a variety of roles in technology and cyber, including in the utilities sector (gas and electricity).</p>
<p style="font-weight:400;">David holds a number of positions on boards of directors and was a founding member of the Security Advisor Alliance (<a href="https://www.securityadvisoralliance.org/">www.securityadvisoralliance.org</a>), and the Canadian Cyber Threat Exchange. During his tenure at NAB, David was the Chair for the Board of Directors for the Australian Financial Crimes Exchange and spear headed the formation of a taskforce involving the big 4 banks, AFP, ASD and ACSC to detect and disrupt cyber-crime impacting Australia. David also advises a number of VC funds and Cyber Security companies.</p>
<p style="font-weight:400;">Recently, David was recognised in the Top 50 Australian Professionals, as profiled by the Top 100 Magazine. David has also been named as one of the <a href="https://www.information-management.com/gallery/Chief-Information-Security-Officer-CISO-List-Trends-10027134-1.html">Top 10 CISOs to know</a>, and is recognised as a thought leader in the cyber security industry as profiled by K-Logix <a href="https://www.klogixsecurity.com/blog/david-fairman-ciso-royal-bank-of-canada">here</a>.</p>
<p style="font-weight:400;">David co-authored “Cyber Risk” (2016) and co-edited “Fintech: Growth and Deregulation” (2018) published by <em>Risk Books </em>and was the Technical Editor for “Zero Trust Journey Across The Digital Estate” (2022) published CRC Press.</p>
<p style="font-weight:400;">David is passionate about education. He has held Adjunct Professorships at both the University of New York and the University of Toronto and is currently working with Deakin University in Australia.</p>
<p style="font-weight:400;">David currently resides in both Melbourne and Brisbane, Australia.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[David Fairman is an experienced CIO/CSO/CISO, strategic advisor and investor.
David has extensive experience in the global financial services sector. David is currently the APAC CIO & CSO for Netskope helping customers manage their digital and cyber risk programs in addition to working across industry with the aim of making the digital economy a safer place to do business. Furthermore, David is a Partner and CISO-in-residence at SixThirty Ventures, driving innovation and helping build great technology companies.  Previously, David was the Chief Security Officer (CSO) at NAB owning all aspects of Physical Security, Fraud, Investigations and Cyber Security. Prior to NAB, he was the Group Chief Information Security Officer (CISO) for the Royal Bank of Canada. David has been a senior leader at JP Morgan Chase & Co and the Royal Bank of Scotland (RBS) having held several regional CISO and Global Head roles.
David has lived and worked in Australia, the UK, the Netherlands and the USA.
David was raised and educated in Australia where he received his Bachelor of Information Technology in Software Engineering and Computer Science. He holds a Masters of Business Administration and a Masters of Project Management. David began his career in Information Security while serving in the Royal Australian Air Force’s Electronic Warfare and Communications group, where he gained valuable experience in the technology, policy and process aspects of security and risk management.  Subsequently, David worked in a variety of roles in technology and cyber, including in the utilities sector (gas and electricity).
David holds a number of positions on boards of directors and was a founding member of the Security Advisor Alliance (www.securityadvisoralliance.org), and the Canadian Cyber Threat Exchange. During his tenure at NAB, David was the Chair for the Board of Directors for the Australian Financial Crimes Exchange and spear headed the formation of a taskforce involving the big 4 banks, AFP, ASD and ACSC to detect and disrupt cyber-crime impacting Australia. David also advises a number of VC funds and Cyber Security companies.
Recently, David was recognised in the Top 50 Australian Professionals, as profiled by the Top 100 Magazine. David has also been named as one of the Top 10 CISOs to know, and is recognised as a thought leader in the cyber security industry as profiled by K-Logix here.
David co-authored “Cyber Risk” (2016) and co-edited “Fintech: Growth and Deregulation” (2018) published by Risk Books and was the Technical Editor for “Zero Trust Journey Across The Digital Estate” (2022) published CRC Press.
David is passionate about education. He has held Adjunct Professorships at both the University of New York and the University of Toronto and is currently working with Deakin University in Australia.
David currently resides in both Melbourne and Brisbane, Australia.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 179: David Fairman]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p style="font-weight:400;">David Fairman is an experienced CIO/CSO/CISO, strategic advisor and investor.</p>
<p style="font-weight:400;">David has extensive experience in the global financial services sector. David is currently the APAC CIO &amp; CSO for Netskope helping customers manage their digital and cyber risk programs in addition to working across industry with the aim of making the digital economy a safer place to do business. Furthermore, David is a Partner and CISO-in-residence at SixThirty Ventures, driving innovation and helping build great technology companies.  Previously, David was the Chief Security Officer (CSO) at NAB owning all aspects of Physical Security, Fraud, Investigations and Cyber Security. Prior to NAB, he was the Group Chief Information Security Officer (CISO) for the Royal Bank of Canada. David has been a senior leader at JP Morgan Chase &amp; Co and the Royal Bank of Scotland (RBS) having held several regional CISO and Global Head roles.</p>
<p style="font-weight:400;">David has lived and worked in Australia, the UK, the Netherlands and the USA.</p>
<p style="font-weight:400;">David was raised and educated in Australia where he received his Bachelor of Information Technology in Software Engineering and Computer Science. He holds a Masters of Business Administration and a Masters of Project Management. David began his career in Information Security while serving in the Royal Australian Air Force’s Electronic Warfare and Communications group, where he gained valuable experience in the technology, policy and process aspects of security and risk management.  Subsequently, David worked in a variety of roles in technology and cyber, including in the utilities sector (gas and electricity).</p>
<p style="font-weight:400;">David holds a number of positions on boards of directors and was a founding member of the Security Advisor Alliance (<a href="https://www.securityadvisoralliance.org/">www.securityadvisoralliance.org</a>), and the Canadian Cyber Threat Exchange. During his tenure at NAB, David was the Chair for the Board of Directors for the Australian Financial Crimes Exchange and spear headed the formation of a taskforce involving the big 4 banks, AFP, ASD and ACSC to detect and disrupt cyber-crime impacting Australia. David also advises a number of VC funds and Cyber Security companies.</p>
<p style="font-weight:400;">Recently, David was recognised in the Top 50 Australian Professionals, as profiled by the Top 100 Magazine. David has also been named as one of the <a href="https://www.information-management.com/gallery/Chief-Information-Security-Officer-CISO-List-Trends-10027134-1.html">Top 10 CISOs to know</a>, and is recognised as a thought leader in the cyber security industry as profiled by K-Logix <a href="https://www.klogixsecurity.com/blog/david-fairman-ciso-royal-bank-of-canada">here</a>.</p>
<p style="font-weight:400;">David co-authored “Cyber Risk” (2016) and co-edited “Fintech: Growth and Deregulation” (2018) published by <em>Risk Books </em>and was the Technical Editor for “Zero Trust Journey Across The Digital Estate” (2022) published CRC Press.</p>
<p style="font-weight:400;">David is passionate about education. He has held Adjunct Professorships at both the University of New York and the University of Toronto and is currently working with Deakin University in Australia.</p>
<p style="font-weight:400;">David currently resides in both Melbourne and Brisbane, Australia.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5fd6a098-4627-47ab-a50f-46a4c47645b2-KBKAST-EP-David-Fairman.mp3" length="55962990"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[David Fairman is an experienced CIO/CSO/CISO, strategic advisor and investor.
David has extensive experience in the global financial services sector. David is currently the APAC CIO & CSO for Netskope helping customers manage their digital and cyber risk programs in addition to working across industry with the aim of making the digital economy a safer place to do business. Furthermore, David is a Partner and CISO-in-residence at SixThirty Ventures, driving innovation and helping build great technology companies.  Previously, David was the Chief Security Officer (CSO) at NAB owning all aspects of Physical Security, Fraud, Investigations and Cyber Security. Prior to NAB, he was the Group Chief Information Security Officer (CISO) for the Royal Bank of Canada. David has been a senior leader at JP Morgan Chase & Co and the Royal Bank of Scotland (RBS) having held several regional CISO and Global Head roles.
David has lived and worked in Australia, the UK, the Netherlands and the USA.
David was raised and educated in Australia where he received his Bachelor of Information Technology in Software Engineering and Computer Science. He holds a Masters of Business Administration and a Masters of Project Management. David began his career in Information Security while serving in the Royal Australian Air Force’s Electronic Warfare and Communications group, where he gained valuable experience in the technology, policy and process aspects of security and risk management.  Subsequently, David worked in a variety of roles in technology and cyber, including in the utilities sector (gas and electricity).
David holds a number of positions on boards of directors and was a founding member of the Security Advisor Alliance (www.securityadvisoralliance.org), and the Canadian Cyber Threat Exchange. During his tenure at NAB, David was the Chair for the Board of Directors for the Australian Financial Crimes Exchange and spear headed the formation of a taskforce involving the big 4 banks, AFP, ASD and ACSC to detect and disrupt cyber-crime impacting Australia. David also advises a number of VC funds and Cyber Security companies.
Recently, David was recognised in the Top 50 Australian Professionals, as profiled by the Top 100 Magazine. David has also been named as one of the Top 10 CISOs to know, and is recognised as a thought leader in the cyber security industry as profiled by K-Logix here.
David co-authored “Cyber Risk” (2016) and co-edited “Fintech: Growth and Deregulation” (2018) published by Risk Books and was the Technical Editor for “Zero Trust Journey Across The Digital Estate” (2022) published CRC Press.
David is passionate about education. He has held Adjunct Professorships at both the University of New York and the University of Toronto and is currently working with Deakin University in Australia.
David currently resides in both Melbourne and Brisbane, Australia.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1463374/1700181082-GUESTS-DO-NOT-TOUCH-3.png"></itunes:image>
                                                                            <itunes:duration>00:38:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 178: Kunal Anand]]>
                </title>
                <pubDate>Thu, 20 Apr 2023 16:00:59 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1459531</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-178-kunal-anand</link>
                                <description>
                                            <![CDATA[<p>Chief Technology Officer and Chief Information Security Officer</p>
<p>Kunal joined Imperva when Prevoty, a company he co-founded in 2013 and where he served as CTO, was acquired by Imperva in August 2018. Before joining Prevoty, he was the Director of Technology at BBC Worldwide. Kunal has a deep history of innovation and technical expertise, and has held roles leading security, data, technology, and engineering teams at Gravity, MySpace, and the NASA Jet Propulsion Lab.</p>
<p><span style="font-weight:400;">He holds a BS from Babson College.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Chief Technology Officer and Chief Information Security Officer
Kunal joined Imperva when Prevoty, a company he co-founded in 2013 and where he served as CTO, was acquired by Imperva in August 2018. Before joining Prevoty, he was the Director of Technology at BBC Worldwide. Kunal has a deep history of innovation and technical expertise, and has held roles leading security, data, technology, and engineering teams at Gravity, MySpace, and the NASA Jet Propulsion Lab.
He holds a BS from Babson College.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 178: Kunal Anand]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Chief Technology Officer and Chief Information Security Officer</p>
<p>Kunal joined Imperva when Prevoty, a company he co-founded in 2013 and where he served as CTO, was acquired by Imperva in August 2018. Before joining Prevoty, he was the Director of Technology at BBC Worldwide. Kunal has a deep history of innovation and technical expertise, and has held roles leading security, data, technology, and engineering teams at Gravity, MySpace, and the NASA Jet Propulsion Lab.</p>
<p><span style="font-weight:400;">He holds a BS from Babson College.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/cee76f4b-f6a8-49b1-8487-cc149817c8dc-KBKAST-EP-Kunal-Anand.mp3" length="72827772"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Chief Technology Officer and Chief Information Security Officer
Kunal joined Imperva when Prevoty, a company he co-founded in 2013 and where he served as CTO, was acquired by Imperva in August 2018. Before joining Prevoty, he was the Director of Technology at BBC Worldwide. Kunal has a deep history of innovation and technical expertise, and has held roles leading security, data, technology, and engineering teams at Gravity, MySpace, and the NASA Jet Propulsion Lab.
He holds a BS from Babson College.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1459531/1700181082-GUESTS-DO-NOT-TOUCH.png"></itunes:image>
                                                                            <itunes:duration>00:50:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 177: Riccardo Galbiati]]>
                </title>
                <pubDate>Tue, 18 Apr 2023 16:00:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1459527</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-177-riccardo-galbiati</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Riccardo Galbiati is the Chief Technology Office for Australia and New Zealand at Palo Alto Networks. With 15+ years of experience in the cyber-security industry, he is able to offer strategic advice to CISOs, CTOs and executives, especially when it comes to rationalising technology adoption and leveraging a Zero Trust approach that aims at business resilience in spite of cyber-attacks.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Riccardo Galbiati is the Chief Technology Office for Australia and New Zealand at Palo Alto Networks. With 15+ years of experience in the cyber-security industry, he is able to offer strategic advice to CISOs, CTOs and executives, especially when it comes to rationalising technology adoption and leveraging a Zero Trust approach that aims at business resilience in spite of cyber-attacks.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 177: Riccardo Galbiati]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Riccardo Galbiati is the Chief Technology Office for Australia and New Zealand at Palo Alto Networks. With 15+ years of experience in the cyber-security industry, he is able to offer strategic advice to CISOs, CTOs and executives, especially when it comes to rationalising technology adoption and leveraging a Zero Trust approach that aims at business resilience in spite of cyber-attacks.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5e3333c0-2a8e-48ea-868a-078166179dec-KBKAST-EP-Riccardo-Galbiati.mp3" length="65706688"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Riccardo Galbiati is the Chief Technology Office for Australia and New Zealand at Palo Alto Networks. With 15+ years of experience in the cyber-security industry, he is able to offer strategic advice to CISOs, CTOs and executives, especially when it comes to rationalising technology adoption and leveraging a Zero Trust approach that aims at business resilience in spite of cyber-attacks.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1459527/c1a-5k0v-1p0qj7mzsmg-6p1bsr.png"></itunes:image>
                                                                            <itunes:duration>00:45:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 176: David Chow]]>
                </title>
                <pubDate>Thu, 13 Apr 2023 16:00:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1454202</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-176-david-chow</link>
                                <description>
                                            <![CDATA[<p><b>David Chow</b><span style="font-weight:400;"> brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency’s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[David Chow brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency’s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 176: David Chow]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><b>David Chow</b><span style="font-weight:400;"> brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency’s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/da05c6f3-4660-4ef5-9525-4fecca39c995-KBKAST-EP-David-Chow.mp3" length="64710914"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[David Chow brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency’s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1454202/1700181082-FOR-KBI-DO-NOT-TOUCH-79.png"></itunes:image>
                                                                            <itunes:duration>00:44:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 175: William Gooderson]]>
                </title>
                <pubDate>Tue, 11 Apr 2023 16:00:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1453309</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-175-william-gooderson</link>
                                <description>
                                            <![CDATA[<p>William Gooderson is a high-performance coach and speaker who has worked across Australia and the Asia Pacific region providing coaching and workshops to multiple public and private sector organisations. He focuses on training around personal well-being, building resilience in self and others, leading high performing teams in complex environments, and overcoming cultural challenges in the workplace.</p>
<p>William’s experience has been developed over two decades that included: serving as a British Army officer, paratrooper, and engineer, across Europe and the Middle East leading large multinational teams in both the special forces and human intelligence communities; and working in the Australian private and public sectors developing leaders and team’s capabilities on the skills required to lead self and others, whilst adapting to the challenges of evolving workforces and a hybrid pandemic environment.</p>
<p>William is an Adjunct Lecturer on resilience at the University of Tasmania’s school of medicine and is a frequent speaker with multiple National and State groups. In his spare time, he has enjoyed coaching his son’s rugby and basketball teams, is a member of societal relevance projects that educate refugee schoolchildren and disadvantaged individuals on how to take ownership of their circumstances and runs a mental health and wellbeing group for local Dads.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[William Gooderson is a high-performance coach and speaker who has worked across Australia and the Asia Pacific region providing coaching and workshops to multiple public and private sector organisations. He focuses on training around personal well-being, building resilience in self and others, leading high performing teams in complex environments, and overcoming cultural challenges in the workplace.
William’s experience has been developed over two decades that included: serving as a British Army officer, paratrooper, and engineer, across Europe and the Middle East leading large multinational teams in both the special forces and human intelligence communities; and working in the Australian private and public sectors developing leaders and team’s capabilities on the skills required to lead self and others, whilst adapting to the challenges of evolving workforces and a hybrid pandemic environment.
William is an Adjunct Lecturer on resilience at the University of Tasmania’s school of medicine and is a frequent speaker with multiple National and State groups. In his spare time, he has enjoyed coaching his son’s rugby and basketball teams, is a member of societal relevance projects that educate refugee schoolchildren and disadvantaged individuals on how to take ownership of their circumstances and runs a mental health and wellbeing group for local Dads.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 175: William Gooderson]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>William Gooderson is a high-performance coach and speaker who has worked across Australia and the Asia Pacific region providing coaching and workshops to multiple public and private sector organisations. He focuses on training around personal well-being, building resilience in self and others, leading high performing teams in complex environments, and overcoming cultural challenges in the workplace.</p>
<p>William’s experience has been developed over two decades that included: serving as a British Army officer, paratrooper, and engineer, across Europe and the Middle East leading large multinational teams in both the special forces and human intelligence communities; and working in the Australian private and public sectors developing leaders and team’s capabilities on the skills required to lead self and others, whilst adapting to the challenges of evolving workforces and a hybrid pandemic environment.</p>
<p>William is an Adjunct Lecturer on resilience at the University of Tasmania’s school of medicine and is a frequent speaker with multiple National and State groups. In his spare time, he has enjoyed coaching his son’s rugby and basketball teams, is a member of societal relevance projects that educate refugee schoolchildren and disadvantaged individuals on how to take ownership of their circumstances and runs a mental health and wellbeing group for local Dads.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/f8dff82c-1390-490a-a4d4-b23b1b55e42f-KBKAST-EP-William-Gooderson.mp3" length="81031165"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[William Gooderson is a high-performance coach and speaker who has worked across Australia and the Asia Pacific region providing coaching and workshops to multiple public and private sector organisations. He focuses on training around personal well-being, building resilience in self and others, leading high performing teams in complex environments, and overcoming cultural challenges in the workplace.
William’s experience has been developed over two decades that included: serving as a British Army officer, paratrooper, and engineer, across Europe and the Middle East leading large multinational teams in both the special forces and human intelligence communities; and working in the Australian private and public sectors developing leaders and team’s capabilities on the skills required to lead self and others, whilst adapting to the challenges of evolving workforces and a hybrid pandemic environment.
William is an Adjunct Lecturer on resilience at the University of Tasmania’s school of medicine and is a frequent speaker with multiple National and State groups. In his spare time, he has enjoyed coaching his son’s rugby and basketball teams, is a member of societal relevance projects that educate refugee schoolchildren and disadvantaged individuals on how to take ownership of their circumstances and runs a mental health and wellbeing group for local Dads.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1453309/1700181083-FOR-KBI-DO-NOT-TOUCH-76.png"></itunes:image>
                                                                            <itunes:duration>00:56:13</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 174: Peter Bauer]]>
                </title>
                <pubDate>Thu, 06 Apr 2023 16:00:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1451135</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-174-peter-bauer</link>
                                <description>
                                            <![CDATA[<p>Peter Bauer is the CEO, Co-founder and Board Member at Mimecast, which he launched in 2003 with fellow Board Member and Co-founder, Neil Murray.</p>
<p>He is the visionary behind Mimecast’s SaaS strategy, which empowers businesses across the globe with comprehensive cyber resilience for email. Mimecast’s security, archiving, business continuity and risk mitigation products and services are all delivered from a single cloud platform. This home-grown, pure-cloud delivery mechanism enables an intuitive user experience, suited to the way people interact with email today.</p>
<p>The combination of next-generation technology and seamless integration with existing email systems, is the driving force behind Mimecast’s success in its mission to transform the way people remain productive, collaborative and efficient in today’s ever-changing threat landscape.</p>
<p>Peter was born and raised in South Africa, trained as a Microsoft systems engineer, and began working with corporate messaging systems in the mid-1990s. He moved to the UK where Mimecast was founded and then moved once more, arriving in Boston, Massachusetts in 2011, to lead Mimecast’s aggressive push into North America. Since that time, Mimecast has been one of the strongest performers in its market segment in terms of customer acquisition and top-line growth, making Peter one of only a handful of CEOs to have lead a pure-Saas company for over 15 years while acquiring tens of thousands of customers worldwide.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Peter Bauer is the CEO, Co-founder and Board Member at Mimecast, which he launched in 2003 with fellow Board Member and Co-founder, Neil Murray.
He is the visionary behind Mimecast’s SaaS strategy, which empowers businesses across the globe with comprehensive cyber resilience for email. Mimecast’s security, archiving, business continuity and risk mitigation products and services are all delivered from a single cloud platform. This home-grown, pure-cloud delivery mechanism enables an intuitive user experience, suited to the way people interact with email today.
The combination of next-generation technology and seamless integration with existing email systems, is the driving force behind Mimecast’s success in its mission to transform the way people remain productive, collaborative and efficient in today’s ever-changing threat landscape.
Peter was born and raised in South Africa, trained as a Microsoft systems engineer, and began working with corporate messaging systems in the mid-1990s. He moved to the UK where Mimecast was founded and then moved once more, arriving in Boston, Massachusetts in 2011, to lead Mimecast’s aggressive push into North America. Since that time, Mimecast has been one of the strongest performers in its market segment in terms of customer acquisition and top-line growth, making Peter one of only a handful of CEOs to have lead a pure-Saas company for over 15 years while acquiring tens of thousands of customers worldwide.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 174: Peter Bauer]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Peter Bauer is the CEO, Co-founder and Board Member at Mimecast, which he launched in 2003 with fellow Board Member and Co-founder, Neil Murray.</p>
<p>He is the visionary behind Mimecast’s SaaS strategy, which empowers businesses across the globe with comprehensive cyber resilience for email. Mimecast’s security, archiving, business continuity and risk mitigation products and services are all delivered from a single cloud platform. This home-grown, pure-cloud delivery mechanism enables an intuitive user experience, suited to the way people interact with email today.</p>
<p>The combination of next-generation technology and seamless integration with existing email systems, is the driving force behind Mimecast’s success in its mission to transform the way people remain productive, collaborative and efficient in today’s ever-changing threat landscape.</p>
<p>Peter was born and raised in South Africa, trained as a Microsoft systems engineer, and began working with corporate messaging systems in the mid-1990s. He moved to the UK where Mimecast was founded and then moved once more, arriving in Boston, Massachusetts in 2011, to lead Mimecast’s aggressive push into North America. Since that time, Mimecast has been one of the strongest performers in its market segment in terms of customer acquisition and top-line growth, making Peter one of only a handful of CEOs to have lead a pure-Saas company for over 15 years while acquiring tens of thousands of customers worldwide.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/a86c63f3-97f8-4f3c-8f9b-d8567572de8d-KBKAST-EP-Peter-Bauer.mp3" length="49477140"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Peter Bauer is the CEO, Co-founder and Board Member at Mimecast, which he launched in 2003 with fellow Board Member and Co-founder, Neil Murray.
He is the visionary behind Mimecast’s SaaS strategy, which empowers businesses across the globe with comprehensive cyber resilience for email. Mimecast’s security, archiving, business continuity and risk mitigation products and services are all delivered from a single cloud platform. This home-grown, pure-cloud delivery mechanism enables an intuitive user experience, suited to the way people interact with email today.
The combination of next-generation technology and seamless integration with existing email systems, is the driving force behind Mimecast’s success in its mission to transform the way people remain productive, collaborative and efficient in today’s ever-changing threat landscape.
Peter was born and raised in South Africa, trained as a Microsoft systems engineer, and began working with corporate messaging systems in the mid-1990s. He moved to the UK where Mimecast was founded and then moved once more, arriving in Boston, Massachusetts in 2011, to lead Mimecast’s aggressive push into North America. Since that time, Mimecast has been one of the strongest performers in its market segment in terms of customer acquisition and top-line growth, making Peter one of only a handful of CEOs to have lead a pure-Saas company for over 15 years while acquiring tens of thousands of customers worldwide.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1451135/aa62b6162de5232a62cfab7ce8088450-FOR-KBI-DO-NOT-TOUCH-72.png"></itunes:image>
                                                                            <itunes:duration>00:34:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 173: Dr. Kevin Tham]]>
                </title>
                <pubDate>Tue, 04 Apr 2023 16:00:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1451735</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-173-dr-kevin-tham</link>
                                <description>
                                            <![CDATA[<p>Kevin is a CISO leader in the Australian Digital Banking sector and a seasoned information security veteran in the financial services industry.  Kevin’s practical approach to Cyber Security is often seen as pushing the boundaries and balance between user centric design and effective controls.</p>
<p>Kevin began his career as an academia researcher in the late 90s, an educator, and a security engineer, slowly climbing his way through organisations, developing and implementing security controls, when many organisations do not regard information security as a risk.</p>
<p>Today, Kevin is the CISO of a fintech organisation, which is aiming to make a difference to individuals through well thought out banking solutions and products.</p>
<p>During his spare time, Kevin devotes his time by volunteering and giving his time back to the Security industry through his involvement with the ISACA Sydney Chapter. He served on the ISACA Sydney Chapter Board for 8 years and was also a former President, dedicated to serving its over 1600 Chapter members.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kevin is a CISO leader in the Australian Digital Banking sector and a seasoned information security veteran in the financial services industry.  Kevin’s practical approach to Cyber Security is often seen as pushing the boundaries and balance between user centric design and effective controls.
Kevin began his career as an academia researcher in the late 90s, an educator, and a security engineer, slowly climbing his way through organisations, developing and implementing security controls, when many organisations do not regard information security as a risk.
Today, Kevin is the CISO of a fintech organisation, which is aiming to make a difference to individuals through well thought out banking solutions and products.
During his spare time, Kevin devotes his time by volunteering and giving his time back to the Security industry through his involvement with the ISACA Sydney Chapter. He served on the ISACA Sydney Chapter Board for 8 years and was also a former President, dedicated to serving its over 1600 Chapter members.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 173: Dr. Kevin Tham]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Kevin is a CISO leader in the Australian Digital Banking sector and a seasoned information security veteran in the financial services industry.  Kevin’s practical approach to Cyber Security is often seen as pushing the boundaries and balance between user centric design and effective controls.</p>
<p>Kevin began his career as an academia researcher in the late 90s, an educator, and a security engineer, slowly climbing his way through organisations, developing and implementing security controls, when many organisations do not regard information security as a risk.</p>
<p>Today, Kevin is the CISO of a fintech organisation, which is aiming to make a difference to individuals through well thought out banking solutions and products.</p>
<p>During his spare time, Kevin devotes his time by volunteering and giving his time back to the Security industry through his involvement with the ISACA Sydney Chapter. He served on the ISACA Sydney Chapter Board for 8 years and was also a former President, dedicated to serving its over 1600 Chapter members.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/f9c97275-8865-4979-be40-c5224daeddde-KBKAST-EP-Kevin-Tham.mp3" length="55618198"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kevin is a CISO leader in the Australian Digital Banking sector and a seasoned information security veteran in the financial services industry.  Kevin’s practical approach to Cyber Security is often seen as pushing the boundaries and balance between user centric design and effective controls.
Kevin began his career as an academia researcher in the late 90s, an educator, and a security engineer, slowly climbing his way through organisations, developing and implementing security controls, when many organisations do not regard information security as a risk.
Today, Kevin is the CISO of a fintech organisation, which is aiming to make a difference to individuals through well thought out banking solutions and products.
During his spare time, Kevin devotes his time by volunteering and giving his time back to the Security industry through his involvement with the ISACA Sydney Chapter. He served on the ISACA Sydney Chapter Board for 8 years and was also a former President, dedicated to serving its over 1600 Chapter members.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1451735/FOR-KBI-DO-NOT-TOUCH-74.png"></itunes:image>
                                                                            <itunes:duration>00:38:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 172: Richard Stiennon]]>
                </title>
                <pubDate>Thu, 30 Mar 2023 16:00:49 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1444941</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-172-richard-stiennon</link>
                                <description>
                                            <![CDATA[<p>Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of<em> Surviving Cyberwar</em> (Government Institutes, 2010) and Washington Post Best Seller, <em>There Will Be Cyberwar</em>.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book <em>Security Yearbook 2022</em> was released in June, 2022. Get a copy <a href="https://it-harvest.com/shop/security-yearbook-2022/">here</a>.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2022 was released in June, 2022. Get a copy here.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 172: Richard Stiennon]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of<em> Surviving Cyberwar</em> (Government Institutes, 2010) and Washington Post Best Seller, <em>There Will Be Cyberwar</em>.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book <em>Security Yearbook 2022</em> was released in June, 2022. Get a copy <a href="https://it-harvest.com/shop/security-yearbook-2022/">here</a>.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/ed6eb24f-66a7-449a-b46b-893e8a9c975c-KBKAST-EP-172-Richard-Stiennon.mp3" length="75134806"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2022 was released in June, 2022. Get a copy here.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1444941/15ebd76562fcd8e2932e64b32e35f766-FOR-KBI-DO-NOT-TOUCH-64.png"></itunes:image>
                                                                            <itunes:duration>00:52:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 171: Glen Pendley]]>
                </title>
                <pubDate>Tue, 28 Mar 2023 16:00:20 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1444940</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-171-glen-pendley</link>
                                <description>
                                            <![CDATA[<p>Glen Pendley is chief technology officer (CTO) at Tenable, where he is responsible for driving the company’s long-term vision, strategy and continued product innovation. Glen has over 20 years of experience in the industry and deep roots leading cutting-edge engineering, research and product teams for global cybersecurity brands. Before his role as CTO, Glen served as Tenable’s deputy CTO and senior vice president of research &amp; development where he led the global engineering and security research teams. Prior to joining Tenable, he was director for research, development and product Management at McAfee, Inc., where he oversaw engineering and product functions across the globe. Glen serves as an executive advisor to a number of companies and began his career in the United States Marines Corps.</p>
<p>Resource:<br />
<a href="https://www.tenable.com/blog/exposure-management-our-vision-for-securing-the-modern-attack-surface"><em>Exposure Management: Our Vision for Securing the Modern Attack Surface</em></a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Glen Pendley is chief technology officer (CTO) at Tenable, where he is responsible for driving the company’s long-term vision, strategy and continued product innovation. Glen has over 20 years of experience in the industry and deep roots leading cutting-edge engineering, research and product teams for global cybersecurity brands. Before his role as CTO, Glen served as Tenable’s deputy CTO and senior vice president of research & development where he led the global engineering and security research teams. Prior to joining Tenable, he was director for research, development and product Management at McAfee, Inc., where he oversaw engineering and product functions across the globe. Glen serves as an executive advisor to a number of companies and began his career in the United States Marines Corps.
Resource:
Exposure Management: Our Vision for Securing the Modern Attack Surface
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 171: Glen Pendley]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Glen Pendley is chief technology officer (CTO) at Tenable, where he is responsible for driving the company’s long-term vision, strategy and continued product innovation. Glen has over 20 years of experience in the industry and deep roots leading cutting-edge engineering, research and product teams for global cybersecurity brands. Before his role as CTO, Glen served as Tenable’s deputy CTO and senior vice president of research &amp; development where he led the global engineering and security research teams. Prior to joining Tenable, he was director for research, development and product Management at McAfee, Inc., where he oversaw engineering and product functions across the globe. Glen serves as an executive advisor to a number of companies and began his career in the United States Marines Corps.</p>
<p>Resource:<br />
<a href="https://www.tenable.com/blog/exposure-management-our-vision-for-securing-the-modern-attack-surface"><em>Exposure Management: Our Vision for Securing the Modern Attack Surface</em></a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/d425661d-d872-4a57-908a-a87059052f8f-KBKAST-EP-171-Glen-Pendley.mp3" length="71955344"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Glen Pendley is chief technology officer (CTO) at Tenable, where he is responsible for driving the company’s long-term vision, strategy and continued product innovation. Glen has over 20 years of experience in the industry and deep roots leading cutting-edge engineering, research and product teams for global cybersecurity brands. Before his role as CTO, Glen served as Tenable’s deputy CTO and senior vice president of research & development where he led the global engineering and security research teams. Prior to joining Tenable, he was director for research, development and product Management at McAfee, Inc., where he oversaw engineering and product functions across the globe. Glen serves as an executive advisor to a number of companies and began his career in the United States Marines Corps.
Resource:
Exposure Management: Our Vision for Securing the Modern Attack Surface
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1444940/f93a8e7293d006a142306c4b17669516-FOR-KBI-DO-NOT-TOUCH-62.png"></itunes:image>
                                                                            <itunes:duration>00:49:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 170: Adam P. Henry]]>
                </title>
                <pubDate>Thu, 23 Mar 2023 16:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1437328</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-170-adam-p-henry</link>
                                <description>
                                            <![CDATA[<p>Adam P. Henry is a cyber security thought leader, published author, international speaker and executive. He has developed research and programs focused on addressing the education, skills and workforce gaps, cyber disaster response/resilience, and cyber warfare. His research and initiatives have focused on developing strategies and effective responses to these key issues. He is Senior Advisor at the Social Cyber Institute and an Adjunct Lecturer at the UNSW Canberra.</p>
<p>Adam has participated in national and international projects and programs and also spoken at major conferences in Australia and internationally. Adam has established strong collaborative networks while in search of impactful partnerships in providing innovative solutions to our biggest technological challenges.</p>
<p>Adam has extensive experience in digital and cyber leadership including transformation, developing, leading and executing technology business solutions and strategies. He is a new thought leader in this field, pushing the boundaries with his research while implementing practical solutions to these global issues.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Adam P. Henry is a cyber security thought leader, published author, international speaker and executive. He has developed research and programs focused on addressing the education, skills and workforce gaps, cyber disaster response/resilience, and cyber warfare. His research and initiatives have focused on developing strategies and effective responses to these key issues. He is Senior Advisor at the Social Cyber Institute and an Adjunct Lecturer at the UNSW Canberra.
Adam has participated in national and international projects and programs and also spoken at major conferences in Australia and internationally. Adam has established strong collaborative networks while in search of impactful partnerships in providing innovative solutions to our biggest technological challenges.
Adam has extensive experience in digital and cyber leadership including transformation, developing, leading and executing technology business solutions and strategies. He is a new thought leader in this field, pushing the boundaries with his research while implementing practical solutions to these global issues.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 170: Adam P. Henry]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Adam P. Henry is a cyber security thought leader, published author, international speaker and executive. He has developed research and programs focused on addressing the education, skills and workforce gaps, cyber disaster response/resilience, and cyber warfare. His research and initiatives have focused on developing strategies and effective responses to these key issues. He is Senior Advisor at the Social Cyber Institute and an Adjunct Lecturer at the UNSW Canberra.</p>
<p>Adam has participated in national and international projects and programs and also spoken at major conferences in Australia and internationally. Adam has established strong collaborative networks while in search of impactful partnerships in providing innovative solutions to our biggest technological challenges.</p>
<p>Adam has extensive experience in digital and cyber leadership including transformation, developing, leading and executing technology business solutions and strategies. He is a new thought leader in this field, pushing the boundaries with his research while implementing practical solutions to these global issues.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5ce11bb0-34d1-476b-ad89-f60068517784-KBKAST-EP-Adam-Henry.mp3" length="76483478"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Adam P. Henry is a cyber security thought leader, published author, international speaker and executive. He has developed research and programs focused on addressing the education, skills and workforce gaps, cyber disaster response/resilience, and cyber warfare. His research and initiatives have focused on developing strategies and effective responses to these key issues. He is Senior Advisor at the Social Cyber Institute and an Adjunct Lecturer at the UNSW Canberra.
Adam has participated in national and international projects and programs and also spoken at major conferences in Australia and internationally. Adam has established strong collaborative networks while in search of impactful partnerships in providing innovative solutions to our biggest technological challenges.
Adam has extensive experience in digital and cyber leadership including transformation, developing, leading and executing technology business solutions and strategies. He is a new thought leader in this field, pushing the boundaries with his research while implementing practical solutions to these global issues.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1437328/c1a-5k0v-wwz53pdjcq4n-xu9ewl.png"></itunes:image>
                                                                            <itunes:duration>00:53:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 169: Lori MacVittie]]>
                </title>
                <pubDate>Tue, 21 Mar 2023 16:00:29 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1437333</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-169-lori-macvittie</link>
                                <description>
                                            <![CDATA[<p>Lori MacVittie is Principal Technical Evangelist, Office of the CTO, for application security and delivery company, F5. She and F5 CTO, Geng Lin, recently published their book, ‘<a href="https://www.amazon.com/Enterprise-Architecture-Digital-Business-Transforming/dp/1098121457">Enterprise Architecture for Digital Business</a>’, which outlines how to modernise IT for a digital-first world.</p>
<p>The book clarifies why companies struggle with digital transformation, and what it takes to transform IT to become a data-driven, AI-supported digital business.</p>
<p>The book outlines an architecture framework for transitioning IT to operate as a digital business, support innovation and address today’s biggest IT challenges. Each chapter focuses on a specific domain and analyses the trends and technologies driving change, as well as provides recommendations to help organisations adapt.</p>
<p>Lori is a technologist and principal technical evangelist in F5’s Office of the CTO with an emphasis on emerging architectures and technologies including cloud and edge computing, digital transformation, automation and orchestration, microservices, and application delivery.</p>
<p>She has more than 25 years of industry experience spanning application development, IT architecture, and network and systems operation. She co-authored the CADD profile for ANSI NCITS 320-1998 and holds a US patent for application delivery provisioning. MacVittie is a contributing author of books on cloud security and object-oriented development and has authored books on application security and XAML.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Lori MacVittie is Principal Technical Evangelist, Office of the CTO, for application security and delivery company, F5. She and F5 CTO, Geng Lin, recently published their book, ‘Enterprise Architecture for Digital Business’, which outlines how to modernise IT for a digital-first world.
The book clarifies why companies struggle with digital transformation, and what it takes to transform IT to become a data-driven, AI-supported digital business.
The book outlines an architecture framework for transitioning IT to operate as a digital business, support innovation and address today’s biggest IT challenges. Each chapter focuses on a specific domain and analyses the trends and technologies driving change, as well as provides recommendations to help organisations adapt.
Lori is a technologist and principal technical evangelist in F5’s Office of the CTO with an emphasis on emerging architectures and technologies including cloud and edge computing, digital transformation, automation and orchestration, microservices, and application delivery.
She has more than 25 years of industry experience spanning application development, IT architecture, and network and systems operation. She co-authored the CADD profile for ANSI NCITS 320-1998 and holds a US patent for application delivery provisioning. MacVittie is a contributing author of books on cloud security and object-oriented development and has authored books on application security and XAML.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 169: Lori MacVittie]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Lori MacVittie is Principal Technical Evangelist, Office of the CTO, for application security and delivery company, F5. She and F5 CTO, Geng Lin, recently published their book, ‘<a href="https://www.amazon.com/Enterprise-Architecture-Digital-Business-Transforming/dp/1098121457">Enterprise Architecture for Digital Business</a>’, which outlines how to modernise IT for a digital-first world.</p>
<p>The book clarifies why companies struggle with digital transformation, and what it takes to transform IT to become a data-driven, AI-supported digital business.</p>
<p>The book outlines an architecture framework for transitioning IT to operate as a digital business, support innovation and address today’s biggest IT challenges. Each chapter focuses on a specific domain and analyses the trends and technologies driving change, as well as provides recommendations to help organisations adapt.</p>
<p>Lori is a technologist and principal technical evangelist in F5’s Office of the CTO with an emphasis on emerging architectures and technologies including cloud and edge computing, digital transformation, automation and orchestration, microservices, and application delivery.</p>
<p>She has more than 25 years of industry experience spanning application development, IT architecture, and network and systems operation. She co-authored the CADD profile for ANSI NCITS 320-1998 and holds a US patent for application delivery provisioning. MacVittie is a contributing author of books on cloud security and object-oriented development and has authored books on application security and XAML.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5da5230a-d27d-4346-85ef-c5889128a486-KBKAST-EP-Lori-Macvittie.mp3" length="50263476"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Lori MacVittie is Principal Technical Evangelist, Office of the CTO, for application security and delivery company, F5. She and F5 CTO, Geng Lin, recently published their book, ‘Enterprise Architecture for Digital Business’, which outlines how to modernise IT for a digital-first world.
The book clarifies why companies struggle with digital transformation, and what it takes to transform IT to become a data-driven, AI-supported digital business.
The book outlines an architecture framework for transitioning IT to operate as a digital business, support innovation and address today’s biggest IT challenges. Each chapter focuses on a specific domain and analyses the trends and technologies driving change, as well as provides recommendations to help organisations adapt.
Lori is a technologist and principal technical evangelist in F5’s Office of the CTO with an emphasis on emerging architectures and technologies including cloud and edge computing, digital transformation, automation and orchestration, microservices, and application delivery.
She has more than 25 years of industry experience spanning application development, IT architecture, and network and systems operation. She co-authored the CADD profile for ANSI NCITS 320-1998 and holds a US patent for application delivery provisioning. MacVittie is a contributing author of books on cloud security and object-oriented development and has authored books on application security and XAML.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1437333/a8ae7e2e24c6fd259e10cf1460da530a-FOR-KBI-DO-NOT-TOUCH-58.png"></itunes:image>
                                                                            <itunes:duration>00:34:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 168: Ryan O’Kell]]>
                </title>
                <pubDate>Thu, 16 Mar 2023 16:00:16 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1434446</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-168-ryan-okell</link>
                                <description>
                                            <![CDATA[<p><span lang="en-us" xml:lang="en-us">Ryan has almost 10 years’ experience within the Cyber Security and IT space. With a lifelong love of IT and Cyber Security, Ryan built his career with the goal of exposing himself to as many environments and unique technologies as possible, preparing himself for a successful pivot into the Cyber Security space.</span></p>
<p><span lang="en-us" xml:lang="en-us">After pivoting in 2020, Ryan quickly grew into the role of Head of Cyber Security (APAC) for Waterstons Australia and now leads a small team of security engineers. He is known for being an innovative, empathic leader who is focused on continuing to build the Australian team and services through the adoption of bleeding edge training, technologies and techniques.</span></p>
<p><span lang="en-us" xml:lang="en-us">Passionate about everything tech, Ryan has deep experience in cyber security. His strengths include Open Source Investigation, Security Operations, Incident Management and Penetration Testing.</span></p>
<p><span lang="en-us" xml:lang="en-us">Eager to share his knowledge and insight wherever possible, Ryan frequently provides mentoring and training within the industry to colleagues and students alike, having previously </span><span lang="en-us" xml:lang="en-us">led workshops, presentations and competitive hacking teams through Cyber Security competitions.</span></p>
<p><span lang="en-us" xml:lang="en-us">Having joined Waterstons Australia in it’s infancy, Ryan has leveraged his knowledge and team to build and deliver new services to clients globally, </span><span lang="en-us" xml:lang="en-us">including intelligence led scanning, penetration testing and BAU Security Operations.</span></p>
<p><span lang="en-us" xml:lang="en-us">Deeply curious and fascinated with the Internet and Cyber Security, Ryan spends large amounts of his spare time contributing to bug bounties, participating in </span><span lang="en-us" xml:lang="en-us">competitive hacking with his team, attending talks and presentations and eagerly exploring the Internet.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ryan has almost 10 years’ experience within the Cyber Security and IT space. With a lifelong love of IT and Cyber Security, Ryan built his career with the goal of exposing himself to as many environments and unique technologies as possible, preparing himself for a successful pivot into the Cyber Security space.
After pivoting in 2020, Ryan quickly grew into the role of Head of Cyber Security (APAC) for Waterstons Australia and now leads a small team of security engineers. He is known for being an innovative, empathic leader who is focused on continuing to build the Australian team and services through the adoption of bleeding edge training, technologies and techniques.
Passionate about everything tech, Ryan has deep experience in cyber security. His strengths include Open Source Investigation, Security Operations, Incident Management and Penetration Testing.
Eager to share his knowledge and insight wherever possible, Ryan frequently provides mentoring and training within the industry to colleagues and students alike, having previously led workshops, presentations and competitive hacking teams through Cyber Security competitions.
Having joined Waterstons Australia in it’s infancy, Ryan has leveraged his knowledge and team to build and deliver new services to clients globally, including intelligence led scanning, penetration testing and BAU Security Operations.
Deeply curious and fascinated with the Internet and Cyber Security, Ryan spends large amounts of his spare time contributing to bug bounties, participating in competitive hacking with his team, attending talks and presentations and eagerly exploring the Internet.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 168: Ryan O’Kell]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span lang="en-us" xml:lang="en-us">Ryan has almost 10 years’ experience within the Cyber Security and IT space. With a lifelong love of IT and Cyber Security, Ryan built his career with the goal of exposing himself to as many environments and unique technologies as possible, preparing himself for a successful pivot into the Cyber Security space.</span></p>
<p><span lang="en-us" xml:lang="en-us">After pivoting in 2020, Ryan quickly grew into the role of Head of Cyber Security (APAC) for Waterstons Australia and now leads a small team of security engineers. He is known for being an innovative, empathic leader who is focused on continuing to build the Australian team and services through the adoption of bleeding edge training, technologies and techniques.</span></p>
<p><span lang="en-us" xml:lang="en-us">Passionate about everything tech, Ryan has deep experience in cyber security. His strengths include Open Source Investigation, Security Operations, Incident Management and Penetration Testing.</span></p>
<p><span lang="en-us" xml:lang="en-us">Eager to share his knowledge and insight wherever possible, Ryan frequently provides mentoring and training within the industry to colleagues and students alike, having previously </span><span lang="en-us" xml:lang="en-us">led workshops, presentations and competitive hacking teams through Cyber Security competitions.</span></p>
<p><span lang="en-us" xml:lang="en-us">Having joined Waterstons Australia in it’s infancy, Ryan has leveraged his knowledge and team to build and deliver new services to clients globally, </span><span lang="en-us" xml:lang="en-us">including intelligence led scanning, penetration testing and BAU Security Operations.</span></p>
<p><span lang="en-us" xml:lang="en-us">Deeply curious and fascinated with the Internet and Cyber Security, Ryan spends large amounts of his spare time contributing to bug bounties, participating in </span><span lang="en-us" xml:lang="en-us">competitive hacking with his team, attending talks and presentations and eagerly exploring the Internet.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/c2bcfded-27da-4603-b792-d2eaa3957d9b-KBKAST-EP-Ryan-OKell.mp3" length="55708420"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ryan has almost 10 years’ experience within the Cyber Security and IT space. With a lifelong love of IT and Cyber Security, Ryan built his career with the goal of exposing himself to as many environments and unique technologies as possible, preparing himself for a successful pivot into the Cyber Security space.
After pivoting in 2020, Ryan quickly grew into the role of Head of Cyber Security (APAC) for Waterstons Australia and now leads a small team of security engineers. He is known for being an innovative, empathic leader who is focused on continuing to build the Australian team and services through the adoption of bleeding edge training, technologies and techniques.
Passionate about everything tech, Ryan has deep experience in cyber security. His strengths include Open Source Investigation, Security Operations, Incident Management and Penetration Testing.
Eager to share his knowledge and insight wherever possible, Ryan frequently provides mentoring and training within the industry to colleagues and students alike, having previously led workshops, presentations and competitive hacking teams through Cyber Security competitions.
Having joined Waterstons Australia in it’s infancy, Ryan has leveraged his knowledge and team to build and deliver new services to clients globally, including intelligence led scanning, penetration testing and BAU Security Operations.
Deeply curious and fascinated with the Internet and Cyber Security, Ryan spends large amounts of his spare time contributing to bug bounties, participating in competitive hacking with his team, attending talks and presentations and eagerly exploring the Internet.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1434446/7963a85e770c18eb610c2ca1e3ea8e2c-FOR-KBI-DO-NOT-TOUCH-53.png"></itunes:image>
                                                                            <itunes:duration>00:38:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 167: Satnam Narang]]>
                </title>
                <pubDate>Fri, 10 Mar 2023 16:00:50 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1426842</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-167-satnam-narang</link>
                                <description>
                                            <![CDATA[<p>In this episode, Satnam explores the dangers of pig butchering scams, which are a type of investment fraud that typically involve romance and human trafficking, originating in Southeast Asia. He discusses elaborate scams using romance platforms, and how criminals use stolen images of real women to present themselves as real people. He also explores the dangers of online dating scams and the repercussions which can be severe. Finally, He suggests people should always question if something seems too good to be true.</p>
<p>Satnam Narang is Sr. Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder.</p>
<p>He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[In this episode, Satnam explores the dangers of pig butchering scams, which are a type of investment fraud that typically involve romance and human trafficking, originating in Southeast Asia. He discusses elaborate scams using romance platforms, and how criminals use stolen images of real women to present themselves as real people. He also explores the dangers of online dating scams and the repercussions which can be severe. Finally, He suggests people should always question if something seems too good to be true.
Satnam Narang is Sr. Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder.
He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 167: Satnam Narang]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>In this episode, Satnam explores the dangers of pig butchering scams, which are a type of investment fraud that typically involve romance and human trafficking, originating in Southeast Asia. He discusses elaborate scams using romance platforms, and how criminals use stolen images of real women to present themselves as real people. He also explores the dangers of online dating scams and the repercussions which can be severe. Finally, He suggests people should always question if something seems too good to be true.</p>
<p>Satnam Narang is Sr. Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder.</p>
<p>He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3a27a5cd-8c7e-439d-97a8-7bfecb87825f-KBKAST-EP-Satnam-Narang.mp3" length="56326770"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[In this episode, Satnam explores the dangers of pig butchering scams, which are a type of investment fraud that typically involve romance and human trafficking, originating in Southeast Asia. He discusses elaborate scams using romance platforms, and how criminals use stolen images of real women to present themselves as real people. He also explores the dangers of online dating scams and the repercussions which can be severe. Finally, He suggests people should always question if something seems too good to be true.
Satnam Narang is Sr. Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder.
He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1426842/618207ec8ab755e50f362e1e506f7a65-FOR-KBI-DO-NOT-TOUCH-43.png"></itunes:image>
                                                                            <itunes:duration>00:39:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 166: Jane Frankland]]>
                </title>
                <pubDate>Wed, 08 Mar 2023 16:00:30 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1426840</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-166-jane-frankland</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Jane Frankland is an award-winning leader, best-selling author, speaker and change agent. Through her company, collaborations and partnerships, Jane is solving the problem of making women standard in male dominated industries like cyber, as she believes if you’re short on women, you are less safe, happy and prosperous. </span><span style="font-weight:400;">Having spent over two decades in cybersecurity, Jane has become one of the industry’s most celebrated female influencers and UNESCO has called her a trailblazing woman in tech. She started in tech by building her own hacking firm in the late 90s but has also worked as a senior executive for world renown consultancies. She regularly shares her thought leadership in the media, including the top broadsheets, at events, as a university guest lecturer and board adviser. She is known for spotting trends, bringing teams together for mutual wins, solving root problems fast, plus all the work she does with women. </span><span style="font-weight:400;">She is driven by her three children, an obsession to deliver outstanding quality and to make a positive difference in the world.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jane Frankland is an award-winning leader, best-selling author, speaker and change agent. Through her company, collaborations and partnerships, Jane is solving the problem of making women standard in male dominated industries like cyber, as she believes if you’re short on women, you are less safe, happy and prosperous. Having spent over two decades in cybersecurity, Jane has become one of the industry’s most celebrated female influencers and UNESCO has called her a trailblazing woman in tech. She started in tech by building her own hacking firm in the late 90s but has also worked as a senior executive for world renown consultancies. She regularly shares her thought leadership in the media, including the top broadsheets, at events, as a university guest lecturer and board adviser. She is known for spotting trends, bringing teams together for mutual wins, solving root problems fast, plus all the work she does with women. She is driven by her three children, an obsession to deliver outstanding quality and to make a positive difference in the world.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 166: Jane Frankland]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Jane Frankland is an award-winning leader, best-selling author, speaker and change agent. Through her company, collaborations and partnerships, Jane is solving the problem of making women standard in male dominated industries like cyber, as she believes if you’re short on women, you are less safe, happy and prosperous. </span><span style="font-weight:400;">Having spent over two decades in cybersecurity, Jane has become one of the industry’s most celebrated female influencers and UNESCO has called her a trailblazing woman in tech. She started in tech by building her own hacking firm in the late 90s but has also worked as a senior executive for world renown consultancies. She regularly shares her thought leadership in the media, including the top broadsheets, at events, as a university guest lecturer and board adviser. She is known for spotting trends, bringing teams together for mutual wins, solving root problems fast, plus all the work she does with women. </span><span style="font-weight:400;">She is driven by her three children, an obsession to deliver outstanding quality and to make a positive difference in the world.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/e6ca5c8a-1c1b-46c1-a9b9-7b0349ba774e-KBKAST-EP-Jane-Frankland.mp3" length="66090634"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jane Frankland is an award-winning leader, best-selling author, speaker and change agent. Through her company, collaborations and partnerships, Jane is solving the problem of making women standard in male dominated industries like cyber, as she believes if you’re short on women, you are less safe, happy and prosperous. Having spent over two decades in cybersecurity, Jane has become one of the industry’s most celebrated female influencers and UNESCO has called her a trailblazing woman in tech. She started in tech by building her own hacking firm in the late 90s but has also worked as a senior executive for world renown consultancies. She regularly shares her thought leadership in the media, including the top broadsheets, at events, as a university guest lecturer and board adviser. She is known for spotting trends, bringing teams together for mutual wins, solving root problems fast, plus all the work she does with women. She is driven by her three children, an obsession to deliver outstanding quality and to make a positive difference in the world.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1426840/e909bb980cc87bde0c69d57ac4e5bc8d-FOR-KBI-DO-NOT-TOUCH-48.png"></itunes:image>
                                                                            <itunes:duration>00:45:51</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 165: Brenton Cooper]]>
                </title>
                <pubDate>Thu, 02 Mar 2023 16:00:48 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1411506</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-165-brenton-cooper</link>
                                <description>
                                            <![CDATA[<p>As leader of Fivecast, Brenton is responsible for driving innovation in the security industry through the application of world leading data science techniques to the field of open-source intelligence (OSINT). Brenton was formerly CTO of the Data To Decisions CRC, a $100 million collaborative research initiative to address data analysis challenges facing Australia’s national security agencies. This work led to the formation and spin-out of Fivecast, where he and the team are working toward their mission to enable a safer world by providing digital intelligence solutions that help protect global communities. Brenton has a Ph.D. in neural networks and his 20+ year career spans technology and management roles for companies including BAE Systems, Tenix Defence and Motorola.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[As leader of Fivecast, Brenton is responsible for driving innovation in the security industry through the application of world leading data science techniques to the field of open-source intelligence (OSINT). Brenton was formerly CTO of the Data To Decisions CRC, a $100 million collaborative research initiative to address data analysis challenges facing Australia’s national security agencies. This work led to the formation and spin-out of Fivecast, where he and the team are working toward their mission to enable a safer world by providing digital intelligence solutions that help protect global communities. Brenton has a Ph.D. in neural networks and his 20+ year career spans technology and management roles for companies including BAE Systems, Tenix Defence and Motorola.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 165: Brenton Cooper]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>As leader of Fivecast, Brenton is responsible for driving innovation in the security industry through the application of world leading data science techniques to the field of open-source intelligence (OSINT). Brenton was formerly CTO of the Data To Decisions CRC, a $100 million collaborative research initiative to address data analysis challenges facing Australia’s national security agencies. This work led to the formation and spin-out of Fivecast, where he and the team are working toward their mission to enable a safer world by providing digital intelligence solutions that help protect global communities. Brenton has a Ph.D. in neural networks and his 20+ year career spans technology and management roles for companies including BAE Systems, Tenix Defence and Motorola.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3e521f9e-48bf-433f-b2b5-8305a0364e44-KBKAST-EP-Brenton-Cooper.mp3" length="53911804"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[As leader of Fivecast, Brenton is responsible for driving innovation in the security industry through the application of world leading data science techniques to the field of open-source intelligence (OSINT). Brenton was formerly CTO of the Data To Decisions CRC, a $100 million collaborative research initiative to address data analysis challenges facing Australia’s national security agencies. This work led to the formation and spin-out of Fivecast, where he and the team are working toward their mission to enable a safer world by providing digital intelligence solutions that help protect global communities. Brenton has a Ph.D. in neural networks and his 20+ year career spans technology and management roles for companies including BAE Systems, Tenix Defence and Motorola.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1411506/1700181085-FOR-KBI-DO-NOT-TOUCH-45.png"></itunes:image>
                                                                            <itunes:duration>00:37:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 164: Liam Ryan]]>
                </title>
                <pubDate>Tue, 28 Feb 2023 16:00:29 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1410825</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-164-liam-ryan</link>
                                <description>
                                            <![CDATA[<p>Liam RYAN is the CEO of GM Risk Group, a Intelligence Solutions and High Risk Consultancy firm with its Head Office in Australia and entities in both The US and Netherlands. He  has 15 + years industry experience ranging from operational surveillance, close personal protection and logistics in high risk and conflict zones around the globe, to executive security and risk management, corporate advisory and the provision of complex security solutions for large multinationals and ultra-high net worth entities.</p>
<p>Operational experience though out Australia, South East Asia, North, East, South and West Africa, the Americas,  Middle East and most recently Ukraine.</p>
<p>Liam has recently returned after multiple deployments in Ukraine where GM Risk Group have been providing Security Advisory, Logistics, Close Protection and Emergency Management for media clients covering the ongoing conflict with Russia.</p>
<p>Liam and GM Risk Group first deployed to Ukraine in early January 2022, and in the following months had over 15 teams across the country. They maintained a presence since and have also been providing civilian evacuations, safe access for NGO’s and supply chains of aid.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Liam RYAN is the CEO of GM Risk Group, a Intelligence Solutions and High Risk Consultancy firm with its Head Office in Australia and entities in both The US and Netherlands. He  has 15 + years industry experience ranging from operational surveillance, close personal protection and logistics in high risk and conflict zones around the globe, to executive security and risk management, corporate advisory and the provision of complex security solutions for large multinationals and ultra-high net worth entities.
Operational experience though out Australia, South East Asia, North, East, South and West Africa, the Americas,  Middle East and most recently Ukraine.
Liam has recently returned after multiple deployments in Ukraine where GM Risk Group have been providing Security Advisory, Logistics, Close Protection and Emergency Management for media clients covering the ongoing conflict with Russia.
Liam and GM Risk Group first deployed to Ukraine in early January 2022, and in the following months had over 15 teams across the country. They maintained a presence since and have also been providing civilian evacuations, safe access for NGO’s and supply chains of aid.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 164: Liam Ryan]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Liam RYAN is the CEO of GM Risk Group, a Intelligence Solutions and High Risk Consultancy firm with its Head Office in Australia and entities in both The US and Netherlands. He  has 15 + years industry experience ranging from operational surveillance, close personal protection and logistics in high risk and conflict zones around the globe, to executive security and risk management, corporate advisory and the provision of complex security solutions for large multinationals and ultra-high net worth entities.</p>
<p>Operational experience though out Australia, South East Asia, North, East, South and West Africa, the Americas,  Middle East and most recently Ukraine.</p>
<p>Liam has recently returned after multiple deployments in Ukraine where GM Risk Group have been providing Security Advisory, Logistics, Close Protection and Emergency Management for media clients covering the ongoing conflict with Russia.</p>
<p>Liam and GM Risk Group first deployed to Ukraine in early January 2022, and in the following months had over 15 teams across the country. They maintained a presence since and have also been providing civilian evacuations, safe access for NGO’s and supply chains of aid.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/34f27af6-a931-4d74-89e5-6262393cd1b5-KBKAST-EP-Liam-Ryan-Final.mp3" length="46800914"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Liam RYAN is the CEO of GM Risk Group, a Intelligence Solutions and High Risk Consultancy firm with its Head Office in Australia and entities in both The US and Netherlands. He  has 15 + years industry experience ranging from operational surveillance, close personal protection and logistics in high risk and conflict zones around the globe, to executive security and risk management, corporate advisory and the provision of complex security solutions for large multinationals and ultra-high net worth entities.
Operational experience though out Australia, South East Asia, North, East, South and West Africa, the Americas,  Middle East and most recently Ukraine.
Liam has recently returned after multiple deployments in Ukraine where GM Risk Group have been providing Security Advisory, Logistics, Close Protection and Emergency Management for media clients covering the ongoing conflict with Russia.
Liam and GM Risk Group first deployed to Ukraine in early January 2022, and in the following months had over 15 teams across the country. They maintained a presence since and have also been providing civilian evacuations, safe access for NGO’s and supply chains of aid.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1410825/FOR-KBI-DO-NOT-TOUCH-40.png"></itunes:image>
                                                                            <itunes:duration>00:32:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 163: Helen Hamilton-James]]>
                </title>
                <pubDate>Thu, 23 Feb 2023 16:00:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1410818</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-163-helen-hamilton-james</link>
                                <description>
                                            <![CDATA[<p>Helen Hamilton-James has over 28 years of experience providing assurance and advisory services to clients across many sectors in Australia, Papua New Guinea and the UK. Having started her career as a graduate in Deloitte’s London office, Helen moved to Sydney in 1997 as part of a global development program.</p>
<p>Since becoming Partner in 2004, Helen has held multiple leadership roles including Office Managing Partner for Papua New Guinea, Chief Operating Officer of Deloitte Private and Assurance and Advisory Leader in Deloitte’s Western Sydney and Canberra offices.</p>
<p>In her current role as Office Managing Partner for Western Sydney, Helen is a passionate advocate for the region and all that it has to offer. She is focused on providing exceptional service to our clients across the area and creating a great place to work for partners and employees based in our Western Sydney office.</p>
<p>Outside of work, Helen is currently a non-executive director serving on the boards of SDN Children’s Services and Good360 Australia</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Helen Hamilton-James has over 28 years of experience providing assurance and advisory services to clients across many sectors in Australia, Papua New Guinea and the UK. Having started her career as a graduate in Deloitte’s London office, Helen moved to Sydney in 1997 as part of a global development program.
Since becoming Partner in 2004, Helen has held multiple leadership roles including Office Managing Partner for Papua New Guinea, Chief Operating Officer of Deloitte Private and Assurance and Advisory Leader in Deloitte’s Western Sydney and Canberra offices.
In her current role as Office Managing Partner for Western Sydney, Helen is a passionate advocate for the region and all that it has to offer. She is focused on providing exceptional service to our clients across the area and creating a great place to work for partners and employees based in our Western Sydney office.
Outside of work, Helen is currently a non-executive director serving on the boards of SDN Children’s Services and Good360 Australia
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 163: Helen Hamilton-James]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Helen Hamilton-James has over 28 years of experience providing assurance and advisory services to clients across many sectors in Australia, Papua New Guinea and the UK. Having started her career as a graduate in Deloitte’s London office, Helen moved to Sydney in 1997 as part of a global development program.</p>
<p>Since becoming Partner in 2004, Helen has held multiple leadership roles including Office Managing Partner for Papua New Guinea, Chief Operating Officer of Deloitte Private and Assurance and Advisory Leader in Deloitte’s Western Sydney and Canberra offices.</p>
<p>In her current role as Office Managing Partner for Western Sydney, Helen is a passionate advocate for the region and all that it has to offer. She is focused on providing exceptional service to our clients across the area and creating a great place to work for partners and employees based in our Western Sydney office.</p>
<p>Outside of work, Helen is currently a non-executive director serving on the boards of SDN Children’s Services and Good360 Australia</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/dcd38e6e-b304-483b-a8ca-0c28640cbfcf-KBKAST-EP-Helen-Hamilton-James.mp3" length="50660361"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Helen Hamilton-James has over 28 years of experience providing assurance and advisory services to clients across many sectors in Australia, Papua New Guinea and the UK. Having started her career as a graduate in Deloitte’s London office, Helen moved to Sydney in 1997 as part of a global development program.
Since becoming Partner in 2004, Helen has held multiple leadership roles including Office Managing Partner for Papua New Guinea, Chief Operating Officer of Deloitte Private and Assurance and Advisory Leader in Deloitte’s Western Sydney and Canberra offices.
In her current role as Office Managing Partner for Western Sydney, Helen is a passionate advocate for the region and all that it has to offer. She is focused on providing exceptional service to our clients across the area and creating a great place to work for partners and employees based in our Western Sydney office.
Outside of work, Helen is currently a non-executive director serving on the boards of SDN Children’s Services and Good360 Australia
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1410818/FOR-KBI-DO-NOT-TOUCH-42.png"></itunes:image>
                                                                            <itunes:duration>00:35:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 162: Steve Singer]]>
                </title>
                <pubDate>Tue, 21 Feb 2023 16:00:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1410810</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-162-steve-singer</link>
                                <description>
                                            <![CDATA[<p>Stephen is a proven sales and business leader with over 15 years’ experience in cloud-based IT. He has led high growth businesses in both North America and ANZ from small to enterprise software organisations</p>
<p>His passion and ability to recruit, motivate and lead extraordinary teams is the key to consistently exceeding business goals. His leadership style is a transparent and consultative approach that focuses on driving value for the customer first and working from the front lines with his team. In every engagement from clients, to partners and colleagues, he demands high ethics and integrity each step of the way.</p>
<p>Within Zscaler, Steve helps organisations secure their business, clients, and staff with world-leading technology.</p>
<p>Access the report here: <a href="https://info.zscaler.com/resources-industry-report-2022-vpn-risk-report-by-cybersecurity-insiders-zscaler">2022 VPN Risk Report Industry report by Cybersecurity Insiders</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Stephen is a proven sales and business leader with over 15 years’ experience in cloud-based IT. He has led high growth businesses in both North America and ANZ from small to enterprise software organisations
His passion and ability to recruit, motivate and lead extraordinary teams is the key to consistently exceeding business goals. His leadership style is a transparent and consultative approach that focuses on driving value for the customer first and working from the front lines with his team. In every engagement from clients, to partners and colleagues, he demands high ethics and integrity each step of the way.
Within Zscaler, Steve helps organisations secure their business, clients, and staff with world-leading technology.
Access the report here: 2022 VPN Risk Report Industry report by Cybersecurity Insiders
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 162: Steve Singer]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Stephen is a proven sales and business leader with over 15 years’ experience in cloud-based IT. He has led high growth businesses in both North America and ANZ from small to enterprise software organisations</p>
<p>His passion and ability to recruit, motivate and lead extraordinary teams is the key to consistently exceeding business goals. His leadership style is a transparent and consultative approach that focuses on driving value for the customer first and working from the front lines with his team. In every engagement from clients, to partners and colleagues, he demands high ethics and integrity each step of the way.</p>
<p>Within Zscaler, Steve helps organisations secure their business, clients, and staff with world-leading technology.</p>
<p>Access the report here: <a href="https://info.zscaler.com/resources-industry-report-2022-vpn-risk-report-by-cybersecurity-insiders-zscaler">2022 VPN Risk Report Industry report by Cybersecurity Insiders</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1f3978e4-fc9c-49e4-90fb-2973fbbf9720-KBKAST-EP-Steve-Singer.mp3" length="57682824"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Stephen is a proven sales and business leader with over 15 years’ experience in cloud-based IT. He has led high growth businesses in both North America and ANZ from small to enterprise software organisations
His passion and ability to recruit, motivate and lead extraordinary teams is the key to consistently exceeding business goals. His leadership style is a transparent and consultative approach that focuses on driving value for the customer first and working from the front lines with his team. In every engagement from clients, to partners and colleagues, he demands high ethics and integrity each step of the way.
Within Zscaler, Steve helps organisations secure their business, clients, and staff with world-leading technology.
Access the report here: 2022 VPN Risk Report Industry report by Cybersecurity Insiders
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1410810/FOR-KBI-DO-NOT-TOUCH-37.png"></itunes:image>
                                                                            <itunes:duration>00:40:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 161: Mike Johnson]]>
                </title>
                <pubDate>Fri, 17 Feb 2023 16:00:47 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1410804</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-161-mike-johnson</link>
                                <description>
                                            <![CDATA[<p>Mike Johnson joined Fastly as Chief Information Security Officer in 2019 and has more than 20 years’ experience in the security industry having previously been CISO at Lyft and at Salesforce for nine years where his leadership was instrumental in building and growing the company’s detection and response organisation. At Fastly, Mike is focused on supporting the company’s mission to build a more trustworthy Internet and bolstering security alongside performance, scale and edge functionality as the company continues to grow its edge computing offerings.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mike Johnson joined Fastly as Chief Information Security Officer in 2019 and has more than 20 years’ experience in the security industry having previously been CISO at Lyft and at Salesforce for nine years where his leadership was instrumental in building and growing the company’s detection and response organisation. At Fastly, Mike is focused on supporting the company’s mission to build a more trustworthy Internet and bolstering security alongside performance, scale and edge functionality as the company continues to grow its edge computing offerings.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 161: Mike Johnson]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mike Johnson joined Fastly as Chief Information Security Officer in 2019 and has more than 20 years’ experience in the security industry having previously been CISO at Lyft and at Salesforce for nine years where his leadership was instrumental in building and growing the company’s detection and response organisation. At Fastly, Mike is focused on supporting the company’s mission to build a more trustworthy Internet and bolstering security alongside performance, scale and edge functionality as the company continues to grow its edge computing offerings.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/e09e4baf-4fd0-43ae-9574-cd1c6715b520-KBKAST-EP-Mike-Johnson-edited.mp3" length="65008622"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mike Johnson joined Fastly as Chief Information Security Officer in 2019 and has more than 20 years’ experience in the security industry having previously been CISO at Lyft and at Salesforce for nine years where his leadership was instrumental in building and growing the company’s detection and response organisation. At Fastly, Mike is focused on supporting the company’s mission to build a more trustworthy Internet and bolstering security alongside performance, scale and edge functionality as the company continues to grow its edge computing offerings.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1410804/FOR-KBI-DO-NOT-TOUCH-34.png"></itunes:image>
                                                                            <itunes:duration>00:45:06</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 160: Mark Guntrip]]>
                </title>
                <pubDate>Wed, 15 Feb 2023 16:00:26 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1405802</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-160-mark-guntrip</link>
                                <description>
                                            <![CDATA[<p>Mark Guntrip leads cybersecurity strategy at Menlo Security. He brings over twenty years experience in the enterprise security market where, through a range of roles including engineering, product management and product marketing. He has a proven track record of building success in new markets as well as promoting growth within more established areas. Prior to Menlo Security, Guntrip held various management roles within companies including Proofpoint, Symantec and Cisco. Guntrip earned his Master’s degree in Electronic Engineering from Southampton University, UK.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mark Guntrip leads cybersecurity strategy at Menlo Security. He brings over twenty years experience in the enterprise security market where, through a range of roles including engineering, product management and product marketing. He has a proven track record of building success in new markets as well as promoting growth within more established areas. Prior to Menlo Security, Guntrip held various management roles within companies including Proofpoint, Symantec and Cisco. Guntrip earned his Master’s degree in Electronic Engineering from Southampton University, UK.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 160: Mark Guntrip]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mark Guntrip leads cybersecurity strategy at Menlo Security. He brings over twenty years experience in the enterprise security market where, through a range of roles including engineering, product management and product marketing. He has a proven track record of building success in new markets as well as promoting growth within more established areas. Prior to Menlo Security, Guntrip held various management roles within companies including Proofpoint, Symantec and Cisco. Guntrip earned his Master’s degree in Electronic Engineering from Southampton University, UK.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/18a9247a-a883-4e28-af80-4d631d33182d-KBKAST-EP-Mark-Guntrip.mp3" length="63441398"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mark Guntrip leads cybersecurity strategy at Menlo Security. He brings over twenty years experience in the enterprise security market where, through a range of roles including engineering, product management and product marketing. He has a proven track record of building success in new markets as well as promoting growth within more established areas. Prior to Menlo Security, Guntrip held various management roles within companies including Proofpoint, Symantec and Cisco. Guntrip earned his Master’s degree in Electronic Engineering from Southampton University, UK.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1405802/FOR-KBI-DO-NOT-TOUCH-33.png"></itunes:image>
                                                                            <itunes:duration>00:44:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Epsiode 159: Rosie Anderson]]>
                </title>
                <pubDate>Wed, 08 Feb 2023 16:00:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1403643</guid>
                                    <link>https://kbkast.castos.com/episodes/epsiode-159-rosie-anderson</link>
                                <description>
                                            <![CDATA[<p>Rosie Anderson has worked in tech recruitment since 2002, and cyber security recruitment for over 7 years. After having a second baby right at the start of the pandemic, she decided to leave a stable career in recruitment and joined a start up recruitment business in Manchester, called Honeypot Digital at the beginning of 2021.</p>
<p>Rosie prides herself on being open and transparent, which sometimes means asking tough questions – either about a person’s career or about a company hiring process and culture. Having worked in recruitment for two decades now, Rosie has built many successful relationships with companies and candidates and looks to share her advice on how to get recruitment right and how to avoid costly mistakes.</p>
<p>Businesses need great talent management to grow, and Rosie looks to partner with her customers to be that integral function of their business, often representing clients and candidates exclusively. She strives to not only resolve recruitment and career challenges but to safeguard both parties interests and deliver real solutions while doing so.</p>
<p>As a working parent, working working in a start-up Rosie knows how to juggle like the best of them. She also heads up the Industry Mentoring Programme for Capslock, a cyber training provider that retrains adult learners into future cyber security talent in as little as 16 weeks.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Rosie Anderson has worked in tech recruitment since 2002, and cyber security recruitment for over 7 years. After having a second baby right at the start of the pandemic, she decided to leave a stable career in recruitment and joined a start up recruitment business in Manchester, called Honeypot Digital at the beginning of 2021.
Rosie prides herself on being open and transparent, which sometimes means asking tough questions – either about a person’s career or about a company hiring process and culture. Having worked in recruitment for two decades now, Rosie has built many successful relationships with companies and candidates and looks to share her advice on how to get recruitment right and how to avoid costly mistakes.
Businesses need great talent management to grow, and Rosie looks to partner with her customers to be that integral function of their business, often representing clients and candidates exclusively. She strives to not only resolve recruitment and career challenges but to safeguard both parties interests and deliver real solutions while doing so.
As a working parent, working working in a start-up Rosie knows how to juggle like the best of them. She also heads up the Industry Mentoring Programme for Capslock, a cyber training provider that retrains adult learners into future cyber security talent in as little as 16 weeks.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Epsiode 159: Rosie Anderson]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Rosie Anderson has worked in tech recruitment since 2002, and cyber security recruitment for over 7 years. After having a second baby right at the start of the pandemic, she decided to leave a stable career in recruitment and joined a start up recruitment business in Manchester, called Honeypot Digital at the beginning of 2021.</p>
<p>Rosie prides herself on being open and transparent, which sometimes means asking tough questions – either about a person’s career or about a company hiring process and culture. Having worked in recruitment for two decades now, Rosie has built many successful relationships with companies and candidates and looks to share her advice on how to get recruitment right and how to avoid costly mistakes.</p>
<p>Businesses need great talent management to grow, and Rosie looks to partner with her customers to be that integral function of their business, often representing clients and candidates exclusively. She strives to not only resolve recruitment and career challenges but to safeguard both parties interests and deliver real solutions while doing so.</p>
<p>As a working parent, working working in a start-up Rosie knows how to juggle like the best of them. She also heads up the Industry Mentoring Programme for Capslock, a cyber training provider that retrains adult learners into future cyber security talent in as little as 16 weeks.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2f7208bf-171e-44f0-961e-48698851ab60-KBKAST-EP-Rosie-Anderson.mp3" length="65477148"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Rosie Anderson has worked in tech recruitment since 2002, and cyber security recruitment for over 7 years. After having a second baby right at the start of the pandemic, she decided to leave a stable career in recruitment and joined a start up recruitment business in Manchester, called Honeypot Digital at the beginning of 2021.
Rosie prides herself on being open and transparent, which sometimes means asking tough questions – either about a person’s career or about a company hiring process and culture. Having worked in recruitment for two decades now, Rosie has built many successful relationships with companies and candidates and looks to share her advice on how to get recruitment right and how to avoid costly mistakes.
Businesses need great talent management to grow, and Rosie looks to partner with her customers to be that integral function of their business, often representing clients and candidates exclusively. She strives to not only resolve recruitment and career challenges but to safeguard both parties interests and deliver real solutions while doing so.
As a working parent, working working in a start-up Rosie knows how to juggle like the best of them. She also heads up the Industry Mentoring Programme for Capslock, a cyber training provider that retrains adult learners into future cyber security talent in as little as 16 weeks.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1403643/1700181087-FOR-KBI-DO-NOT-TOUCH-30.png"></itunes:image>
                                                                            <itunes:duration>00:45:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 158: Alton Johnson]]>
                </title>
                <pubDate>Wed, 01 Feb 2023 16:00:51 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1395341</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-158-alton-johnson</link>
                                <description>
                                            <![CDATA[<p><b>ALTON JOHNSON</b><b><br />
</b><span style="font-weight:400;">Founder &amp; Principal Security Consultant</span></p>
<p><span style="font-weight:400;">Alton Johnson is the Founder and Principal Security Consultant for Vonahi Security. Prior to Vonahi Security, Alton worked at several large and small cybersecurity consulting firms as a Principal Security Consultant. Throughout his professional career, he has performed hundreds of security assessments for organizations ranging from small businesses to Fortune 10. He is proficient in performing both traditional security assessments, such as network, physical, and application penetration testing, as well as advanced security assessments, such as red team engagements.</span></p>
<p> </p>
<p><span style="font-weight:400;">With over a decade of experience as a security consultant and over 10 industry-related certifications, Alton has helped hundreds of organizations requiring unique, modern-day approaches to solve today’s most complex security challenges. </span></p>
<p><span style="font-weight:400;">As the Founder of Vonahi Security, Alton regularly conducts research to identify ways to help organizations combat ever-changing cyber threats through efficient, automated, cost-effective, and non-traditional security assessments.</span></p>
<p> </p>
<p><b>Notable Accomplishments</b></p>
<p><span style="font-weight:400;">Alton has developed several penetration testing tools and scripts that are used widely within the information security industry. Alton also developed and published several open-source tools to platforms such as GitHub, Metasploit Framework, as well as Kali Linux (formerly known as Backtrack Linux), all of which are the most recognized and used tools and operating systems within the information security consulting industry.</span></p>
<p> </p>
<p><span style="font-weight:400;">The penetration testing tools that were developed by Alton were written in multiple scripting languages, which provides him the ability to quickly and efficiently develop exploits and scripts that can be used for network traffic analysis, protocol/service fuzzing, exploitation, and quick completion of extremely time-consuming network-related tasks.</span></p>
<p> </p>
<p><b>Certifications &amp; Training</b></p>
<p><span style="font-weight:400;">Alton successfully obtained some of the industry’s most challenging and respected security certifications, including Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), as well as eLearnSecurity’s Certified Professional Penetration Tester (eCPPT). He also regularly attends information security conferences and has spoken at DerbyCon, Podcasts, and local community events.</span></p>
<p> </p>
<p><b>Areas of Expertise</b></p>
<p><span style="font-weight:400;">Cybersecurity, automated penetration testing, vulnerability research, exploit development, coding, cryptography, malware, phishing, social engineering, and technology innovation.</span></p>
<p> </p>
<p><b>Non-Hacking Hobbies</b></p>
<p><span style="font-weight:400;">Aside from cybersecurity, Alton is also a car enthusiast. He enjoys modifying and racing his car on the tracks. He’s also into photography, especially automotive photography, and shooting pool as often as possible.</span></p>
<p> </p>
<p><b>Connect with Alton</b></p>
<p><span style="font-weight:400;">Email: </span><a href="mailto:alton@vonahi.io"><span style="font-weight:400;">alton@vonahi.io</span></a></p>
<p><span style="font-weight:400;">Website: </span><a href="https://www.altonj.io"><span style="font-weight:400;">www.altonj.io</span></a><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Linkedin: </span><a href="https://www.linkedin.com/in/altonjx/"><span style="font-weight:400;">https://www.linkedin.com/in/altonjx/</span></a></p>
<p><span style="font-weight:400;">Twitter: </span><a href="https://twitter.com/altonjx"><span style="font-weight:400;">https://twitter.com...</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[ALTON JOHNSON
Founder & Principal Security Consultant
Alton Johnson is the Founder and Principal Security Consultant for Vonahi Security. Prior to Vonahi Security, Alton worked at several large and small cybersecurity consulting firms as a Principal Security Consultant. Throughout his professional career, he has performed hundreds of security assessments for organizations ranging from small businesses to Fortune 10. He is proficient in performing both traditional security assessments, such as network, physical, and application penetration testing, as well as advanced security assessments, such as red team engagements.
 
With over a decade of experience as a security consultant and over 10 industry-related certifications, Alton has helped hundreds of organizations requiring unique, modern-day approaches to solve today’s most complex security challenges. 
As the Founder of Vonahi Security, Alton regularly conducts research to identify ways to help organizations combat ever-changing cyber threats through efficient, automated, cost-effective, and non-traditional security assessments.
 
Notable Accomplishments
Alton has developed several penetration testing tools and scripts that are used widely within the information security industry. Alton also developed and published several open-source tools to platforms such as GitHub, Metasploit Framework, as well as Kali Linux (formerly known as Backtrack Linux), all of which are the most recognized and used tools and operating systems within the information security consulting industry.
 
The penetration testing tools that were developed by Alton were written in multiple scripting languages, which provides him the ability to quickly and efficiently develop exploits and scripts that can be used for network traffic analysis, protocol/service fuzzing, exploitation, and quick completion of extremely time-consuming network-related tasks.
 
Certifications & Training
Alton successfully obtained some of the industry’s most challenging and respected security certifications, including Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), as well as eLearnSecurity’s Certified Professional Penetration Tester (eCPPT). He also regularly attends information security conferences and has spoken at DerbyCon, Podcasts, and local community events.
 
Areas of Expertise
Cybersecurity, automated penetration testing, vulnerability research, exploit development, coding, cryptography, malware, phishing, social engineering, and technology innovation.
 
Non-Hacking Hobbies
Aside from cybersecurity, Alton is also a car enthusiast. He enjoys modifying and racing his car on the tracks. He’s also into photography, especially automotive photography, and shooting pool as often as possible.
 
Connect with Alton
Email: alton@vonahi.io
Website: www.altonj.io 
Linkedin: https://www.linkedin.com/in/altonjx/
Twitter: https://twitter.com...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 158: Alton Johnson]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><b>ALTON JOHNSON</b><b><br />
</b><span style="font-weight:400;">Founder &amp; Principal Security Consultant</span></p>
<p><span style="font-weight:400;">Alton Johnson is the Founder and Principal Security Consultant for Vonahi Security. Prior to Vonahi Security, Alton worked at several large and small cybersecurity consulting firms as a Principal Security Consultant. Throughout his professional career, he has performed hundreds of security assessments for organizations ranging from small businesses to Fortune 10. He is proficient in performing both traditional security assessments, such as network, physical, and application penetration testing, as well as advanced security assessments, such as red team engagements.</span></p>
<p> </p>
<p><span style="font-weight:400;">With over a decade of experience as a security consultant and over 10 industry-related certifications, Alton has helped hundreds of organizations requiring unique, modern-day approaches to solve today’s most complex security challenges. </span></p>
<p><span style="font-weight:400;">As the Founder of Vonahi Security, Alton regularly conducts research to identify ways to help organizations combat ever-changing cyber threats through efficient, automated, cost-effective, and non-traditional security assessments.</span></p>
<p> </p>
<p><b>Notable Accomplishments</b></p>
<p><span style="font-weight:400;">Alton has developed several penetration testing tools and scripts that are used widely within the information security industry. Alton also developed and published several open-source tools to platforms such as GitHub, Metasploit Framework, as well as Kali Linux (formerly known as Backtrack Linux), all of which are the most recognized and used tools and operating systems within the information security consulting industry.</span></p>
<p> </p>
<p><span style="font-weight:400;">The penetration testing tools that were developed by Alton were written in multiple scripting languages, which provides him the ability to quickly and efficiently develop exploits and scripts that can be used for network traffic analysis, protocol/service fuzzing, exploitation, and quick completion of extremely time-consuming network-related tasks.</span></p>
<p> </p>
<p><b>Certifications &amp; Training</b></p>
<p><span style="font-weight:400;">Alton successfully obtained some of the industry’s most challenging and respected security certifications, including Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), as well as eLearnSecurity’s Certified Professional Penetration Tester (eCPPT). He also regularly attends information security conferences and has spoken at DerbyCon, Podcasts, and local community events.</span></p>
<p> </p>
<p><b>Areas of Expertise</b></p>
<p><span style="font-weight:400;">Cybersecurity, automated penetration testing, vulnerability research, exploit development, coding, cryptography, malware, phishing, social engineering, and technology innovation.</span></p>
<p> </p>
<p><b>Non-Hacking Hobbies</b></p>
<p><span style="font-weight:400;">Aside from cybersecurity, Alton is also a car enthusiast. He enjoys modifying and racing his car on the tracks. He’s also into photography, especially automotive photography, and shooting pool as often as possible.</span></p>
<p> </p>
<p><b>Connect with Alton</b></p>
<p><span style="font-weight:400;">Email: </span><a href="mailto:alton@vonahi.io"><span style="font-weight:400;">alton@vonahi.io</span></a></p>
<p><span style="font-weight:400;">Website: </span><a href="https://www.altonj.io"><span style="font-weight:400;">www.altonj.io</span></a><span style="font-weight:400;"> </span></p>
<p><span style="font-weight:400;">Linkedin: </span><a href="https://www.linkedin.com/in/altonjx/"><span style="font-weight:400;">https://www.linkedin.com/in/altonjx/</span></a></p>
<p><span style="font-weight:400;">Twitter: </span><a href="https://twitter.com/altonjx"><span style="font-weight:400;">https://twitter.com/altonjx</span></a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/edfea182-4618-41bf-9f26-5369b01ceaa4-KBKAST-EP-Alton-Johnson.mp3" length="56204214"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[ALTON JOHNSON
Founder & Principal Security Consultant
Alton Johnson is the Founder and Principal Security Consultant for Vonahi Security. Prior to Vonahi Security, Alton worked at several large and small cybersecurity consulting firms as a Principal Security Consultant. Throughout his professional career, he has performed hundreds of security assessments for organizations ranging from small businesses to Fortune 10. He is proficient in performing both traditional security assessments, such as network, physical, and application penetration testing, as well as advanced security assessments, such as red team engagements.
 
With over a decade of experience as a security consultant and over 10 industry-related certifications, Alton has helped hundreds of organizations requiring unique, modern-day approaches to solve today’s most complex security challenges. 
As the Founder of Vonahi Security, Alton regularly conducts research to identify ways to help organizations combat ever-changing cyber threats through efficient, automated, cost-effective, and non-traditional security assessments.
 
Notable Accomplishments
Alton has developed several penetration testing tools and scripts that are used widely within the information security industry. Alton also developed and published several open-source tools to platforms such as GitHub, Metasploit Framework, as well as Kali Linux (formerly known as Backtrack Linux), all of which are the most recognized and used tools and operating systems within the information security consulting industry.
 
The penetration testing tools that were developed by Alton were written in multiple scripting languages, which provides him the ability to quickly and efficiently develop exploits and scripts that can be used for network traffic analysis, protocol/service fuzzing, exploitation, and quick completion of extremely time-consuming network-related tasks.
 
Certifications & Training
Alton successfully obtained some of the industry’s most challenging and respected security certifications, including Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), as well as eLearnSecurity’s Certified Professional Penetration Tester (eCPPT). He also regularly attends information security conferences and has spoken at DerbyCon, Podcasts, and local community events.
 
Areas of Expertise
Cybersecurity, automated penetration testing, vulnerability research, exploit development, coding, cryptography, malware, phishing, social engineering, and technology innovation.
 
Non-Hacking Hobbies
Aside from cybersecurity, Alton is also a car enthusiast. He enjoys modifying and racing his car on the tracks. He’s also into photography, especially automotive photography, and shooting pool as often as possible.
 
Connect with Alton
Email: alton@vonahi.io
Website: www.altonj.io 
Linkedin: https://www.linkedin.com/in/altonjx/
Twitter: https://twitter.com...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1395341/1700181087-FOR-KBI-DO-NOT-TOUCH-24.png"></itunes:image>
                                                                            <itunes:duration>00:38:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 157: Thomas Kinsella]]>
                </title>
                <pubDate>Wed, 25 Jan 2023 16:00:42 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1388730</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-157-thomas-kinsella</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Thomas Kinsella is the Co-founder and COO of Tines, a no-code automation platform for security teams. Before Tines, Thomas led security teams in companies like Deloitte, eBay, and DocuSign. As COO, Thomas is responsible for customer success, professional services, and more. Thomas has a degree in Management Science and Information Systems Studies from Trinity College in Dublin.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Thomas Kinsella is the Co-founder and COO of Tines, a no-code automation platform for security teams. Before Tines, Thomas led security teams in companies like Deloitte, eBay, and DocuSign. As COO, Thomas is responsible for customer success, professional services, and more. Thomas has a degree in Management Science and Information Systems Studies from Trinity College in Dublin.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 157: Thomas Kinsella]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Thomas Kinsella is the Co-founder and COO of Tines, a no-code automation platform for security teams. Before Tines, Thomas led security teams in companies like Deloitte, eBay, and DocuSign. As COO, Thomas is responsible for customer success, professional services, and more. Thomas has a degree in Management Science and Information Systems Studies from Trinity College in Dublin.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/0278cae2-6a27-4abe-afba-de536785bb67-KBKAST-EP-Thomas-Kinsella.mp3" length="61870144"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Thomas Kinsella is the Co-founder and COO of Tines, a no-code automation platform for security teams. Before Tines, Thomas led security teams in companies like Deloitte, eBay, and DocuSign. As COO, Thomas is responsible for customer success, professional services, and more. Thomas has a degree in Management Science and Information Systems Studies from Trinity College in Dublin.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1388730/1700181087-FOR-KBI-DO-NOT-TOUCH-18.png"></itunes:image>
                                                                            <itunes:duration>00:42:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 156: Dave Maunsell]]>
                </title>
                <pubDate>Wed, 18 Jan 2023 10:00:44 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1378323</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-156-dave-maunsell</link>
                                <description>
                                            <![CDATA[<p>Dave is an accomplished executive with a strong affinity for technology and a keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating them into outcomes.</p>
<p>Prior to joining Haventec, Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture’s Financial Services clients.</p>
<p>Prior to joining Accenture, Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dave is an accomplished executive with a strong affinity for technology and a keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating them into outcomes.
Prior to joining Haventec, Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture’s Financial Services clients.
Prior to joining Accenture, Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 156: Dave Maunsell]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Dave is an accomplished executive with a strong affinity for technology and a keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating them into outcomes.</p>
<p>Prior to joining Haventec, Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture’s Financial Services clients.</p>
<p>Prior to joining Accenture, Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/d98875e7-4f9b-4804-bd0f-f6e3a3f7b94b-KBKAST-EP-Dave-Maunsell.mp3" length="55483688"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dave is an accomplished executive with a strong affinity for technology and a keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating them into outcomes.
Prior to joining Haventec, Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture’s Financial Services clients.
Prior to joining Accenture, Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1378323/1700181087-FOR-KBI-DO-NOT-TOUCH-15.png"></itunes:image>
                                                                            <itunes:duration>00:38:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 155: Elliot Dellys and Daniel Hood]]>
                </title>
                <pubDate>Wed, 11 Jan 2023 16:00:52 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1372477</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-155-elliot-dellys-and-daniel-hood</link>
                                <description>
                                            <![CDATA[<p><a href="https://www.linkedin.com/in/elliot-dellys">Elliot Dellys</a> (PCI QSA, CISSP, CISM, CIS LA) is the founder and Chief Realist (CEO) of Phronesis Security, Australia’s first B Corp certified cyber security consultancy, with a mission to do ‘cyber security for good’. Previously, Elliot worked for the Australian Signals Directorate and a global managed service provider, where he led the Strategic Consulting division across the Europe, Middle East and Africa region. Elliot is also an industry-recognised information security content publisher, with articles appearing in Computerworld, CSO, Australian Cyber Security Magazine, and InfoSecurity Magazine, covering topics such as cyber security in diplomacy, threat forecasts, and the challenges of coordinating cyber security efforts across government and private industry.</p>
<p><a href="https://www.linkedin.com/in/daniel-hood-71904216/">Daniel Hood</a> is the Chief Optimist (CTO) at Phronesis Security, Australia’s first B Corp certified cyber security consultancy. But more importantly, when Daniel isn’t helping organisations build secure architectures or sitting on the boards of charities, he is playing hockey in his tuxedo for nachos. A former Director for a global MSSP, Daniel has seen it all – from misconfigured security technology to out-of-control cyber incidents to misspent budgets. As the Chief Optimist, Daniel runs the Penetration Testing and Security Architecture teams and believes deeply in helping his clients reduce wastage and headaches. He has been in the industry for over a decade in a variety of roles, ranging from network security engineer for Australia’s largest network to a security architect performing an uplift to the cyber security of a few small nation’s governments.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Elliot Dellys (PCI QSA, CISSP, CISM, CIS LA) is the founder and Chief Realist (CEO) of Phronesis Security, Australia’s first B Corp certified cyber security consultancy, with a mission to do ‘cyber security for good’. Previously, Elliot worked for the Australian Signals Directorate and a global managed service provider, where he led the Strategic Consulting division across the Europe, Middle East and Africa region. Elliot is also an industry-recognised information security content publisher, with articles appearing in Computerworld, CSO, Australian Cyber Security Magazine, and InfoSecurity Magazine, covering topics such as cyber security in diplomacy, threat forecasts, and the challenges of coordinating cyber security efforts across government and private industry.
Daniel Hood is the Chief Optimist (CTO) at Phronesis Security, Australia’s first B Corp certified cyber security consultancy. But more importantly, when Daniel isn’t helping organisations build secure architectures or sitting on the boards of charities, he is playing hockey in his tuxedo for nachos. A former Director for a global MSSP, Daniel has seen it all – from misconfigured security technology to out-of-control cyber incidents to misspent budgets. As the Chief Optimist, Daniel runs the Penetration Testing and Security Architecture teams and believes deeply in helping his clients reduce wastage and headaches. He has been in the industry for over a decade in a variety of roles, ranging from network security engineer for Australia’s largest network to a security architect performing an uplift to the cyber security of a few small nation’s governments.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 155: Elliot Dellys and Daniel Hood]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><a href="https://www.linkedin.com/in/elliot-dellys">Elliot Dellys</a> (PCI QSA, CISSP, CISM, CIS LA) is the founder and Chief Realist (CEO) of Phronesis Security, Australia’s first B Corp certified cyber security consultancy, with a mission to do ‘cyber security for good’. Previously, Elliot worked for the Australian Signals Directorate and a global managed service provider, where he led the Strategic Consulting division across the Europe, Middle East and Africa region. Elliot is also an industry-recognised information security content publisher, with articles appearing in Computerworld, CSO, Australian Cyber Security Magazine, and InfoSecurity Magazine, covering topics such as cyber security in diplomacy, threat forecasts, and the challenges of coordinating cyber security efforts across government and private industry.</p>
<p><a href="https://www.linkedin.com/in/daniel-hood-71904216/">Daniel Hood</a> is the Chief Optimist (CTO) at Phronesis Security, Australia’s first B Corp certified cyber security consultancy. But more importantly, when Daniel isn’t helping organisations build secure architectures or sitting on the boards of charities, he is playing hockey in his tuxedo for nachos. A former Director for a global MSSP, Daniel has seen it all – from misconfigured security technology to out-of-control cyber incidents to misspent budgets. As the Chief Optimist, Daniel runs the Penetration Testing and Security Architecture teams and believes deeply in helping his clients reduce wastage and headaches. He has been in the industry for over a decade in a variety of roles, ranging from network security engineer for Australia’s largest network to a security architect performing an uplift to the cyber security of a few small nation’s governments.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/9c6b8df4-2f88-4cfc-8ebb-a8f7b4707948-KBKAST-EP-Elliot-Dellys-Daniel-Hood.mp3" length="54274269"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Elliot Dellys (PCI QSA, CISSP, CISM, CIS LA) is the founder and Chief Realist (CEO) of Phronesis Security, Australia’s first B Corp certified cyber security consultancy, with a mission to do ‘cyber security for good’. Previously, Elliot worked for the Australian Signals Directorate and a global managed service provider, where he led the Strategic Consulting division across the Europe, Middle East and Africa region. Elliot is also an industry-recognised information security content publisher, with articles appearing in Computerworld, CSO, Australian Cyber Security Magazine, and InfoSecurity Magazine, covering topics such as cyber security in diplomacy, threat forecasts, and the challenges of coordinating cyber security efforts across government and private industry.
Daniel Hood is the Chief Optimist (CTO) at Phronesis Security, Australia’s first B Corp certified cyber security consultancy. But more importantly, when Daniel isn’t helping organisations build secure architectures or sitting on the boards of charities, he is playing hockey in his tuxedo for nachos. A former Director for a global MSSP, Daniel has seen it all – from misconfigured security technology to out-of-control cyber incidents to misspent budgets. As the Chief Optimist, Daniel runs the Penetration Testing and Security Architecture teams and believes deeply in helping his clients reduce wastage and headaches. He has been in the industry for over a decade in a variety of roles, ranging from network security engineer for Australia’s largest network to a security architect performing an uplift to the cyber security of a few small nation’s governments.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1372477/1700181087-FOR-KBI-DO-NOT-TOUCH-11.png"></itunes:image>
                                                                            <itunes:duration>00:37:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 154: Shishir Singh]]>
                </title>
                <pubDate>Wed, 04 Jan 2023 14:19:24 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1368525</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-154-shishir-singh</link>
                                <description>
                                            <![CDATA[<p>Shishir Singh is the Executive Vice President and Chief Technology Officer for the BlackBerry Cybersecurity business. A seasoned senior executive, Shishir brings 15+ years of cybersecurity leadership. With his wealth of experience and expertise, Shishir works across the entire organization to set a clear vision roadmap for our next-generation cybersecurity products and services. He engages with our customer base on strategic direction, and identify key partnerships to implement a market-winning technical strategy and vision. Shishir is a passionate advocate for customer-centric design and the use of data and analytics to create compelling offerings that thrill customers.</p>
<p>Before BlackBerry, Shishir served as Senior Vice President and Chief Product Officer, Enterprise Business Group at McAfee. In this role, he was responsible for product strategy, execution, and delivering cutting-edge cybersecurity offerings that protect Enterprise customers from threats to their applications, networks, data, devices, and other critical assets. During his tenure, he transformed the company into a true cloud company and pioneered the teams that delivered McAfee’s XDR, CNAPP, and SASE (Unified Cloud Edge) solutions in the industry. These products are offered in both on-premises and cloud form factors. They have a footprint across the entire gamut of industry segments, ranging from fledgling start-ups to established banks, Fortune 500 Enterprises, and federal institutions across the globe.</p>
<p>Shishir has also held various engineering, development, and product leadership positions at Cyphort (acquired by Juniper), Cisco, IronPort Systems (acquired by Cisco), Bluecoat Systems (acquired by SYMC/Broadcom), and Silicon Graphics. At the onset of his career, Shishir worked for the Defense Research and Development Organization, (DRDO), a public service undertaking that develops advanced avionics systems for India’s vast defense sector. He was nominated for the Young Scientist of the Year award for his contribution to the indigenous AWACS project for India.</p>
<p>Shishir holds master’s degrees in Computer Science from Allahabad University and Electrical Engineering from the Indian Institute of Science, Bangalore, India. Additionally, he has published and presented multiple academic papers for IEEE and holds several patents in the fields of Neural Networks, Artificial Intelligence, and behavior-based modeling for malware analysis. Apart from his boundless passion for his work, in his free time, Shishir enjoys keeping himself active. He loves hot yoga, playing squash, and hiking.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Shishir Singh is the Executive Vice President and Chief Technology Officer for the BlackBerry Cybersecurity business. A seasoned senior executive, Shishir brings 15+ years of cybersecurity leadership. With his wealth of experience and expertise, Shishir works across the entire organization to set a clear vision roadmap for our next-generation cybersecurity products and services. He engages with our customer base on strategic direction, and identify key partnerships to implement a market-winning technical strategy and vision. Shishir is a passionate advocate for customer-centric design and the use of data and analytics to create compelling offerings that thrill customers.
Before BlackBerry, Shishir served as Senior Vice President and Chief Product Officer, Enterprise Business Group at McAfee. In this role, he was responsible for product strategy, execution, and delivering cutting-edge cybersecurity offerings that protect Enterprise customers from threats to their applications, networks, data, devices, and other critical assets. During his tenure, he transformed the company into a true cloud company and pioneered the teams that delivered McAfee’s XDR, CNAPP, and SASE (Unified Cloud Edge) solutions in the industry. These products are offered in both on-premises and cloud form factors. They have a footprint across the entire gamut of industry segments, ranging from fledgling start-ups to established banks, Fortune 500 Enterprises, and federal institutions across the globe.
Shishir has also held various engineering, development, and product leadership positions at Cyphort (acquired by Juniper), Cisco, IronPort Systems (acquired by Cisco), Bluecoat Systems (acquired by SYMC/Broadcom), and Silicon Graphics. At the onset of his career, Shishir worked for the Defense Research and Development Organization, (DRDO), a public service undertaking that develops advanced avionics systems for India’s vast defense sector. He was nominated for the Young Scientist of the Year award for his contribution to the indigenous AWACS project for India.
Shishir holds master’s degrees in Computer Science from Allahabad University and Electrical Engineering from the Indian Institute of Science, Bangalore, India. Additionally, he has published and presented multiple academic papers for IEEE and holds several patents in the fields of Neural Networks, Artificial Intelligence, and behavior-based modeling for malware analysis. Apart from his boundless passion for his work, in his free time, Shishir enjoys keeping himself active. He loves hot yoga, playing squash, and hiking.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 154: Shishir Singh]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Shishir Singh is the Executive Vice President and Chief Technology Officer for the BlackBerry Cybersecurity business. A seasoned senior executive, Shishir brings 15+ years of cybersecurity leadership. With his wealth of experience and expertise, Shishir works across the entire organization to set a clear vision roadmap for our next-generation cybersecurity products and services. He engages with our customer base on strategic direction, and identify key partnerships to implement a market-winning technical strategy and vision. Shishir is a passionate advocate for customer-centric design and the use of data and analytics to create compelling offerings that thrill customers.</p>
<p>Before BlackBerry, Shishir served as Senior Vice President and Chief Product Officer, Enterprise Business Group at McAfee. In this role, he was responsible for product strategy, execution, and delivering cutting-edge cybersecurity offerings that protect Enterprise customers from threats to their applications, networks, data, devices, and other critical assets. During his tenure, he transformed the company into a true cloud company and pioneered the teams that delivered McAfee’s XDR, CNAPP, and SASE (Unified Cloud Edge) solutions in the industry. These products are offered in both on-premises and cloud form factors. They have a footprint across the entire gamut of industry segments, ranging from fledgling start-ups to established banks, Fortune 500 Enterprises, and federal institutions across the globe.</p>
<p>Shishir has also held various engineering, development, and product leadership positions at Cyphort (acquired by Juniper), Cisco, IronPort Systems (acquired by Cisco), Bluecoat Systems (acquired by SYMC/Broadcom), and Silicon Graphics. At the onset of his career, Shishir worked for the Defense Research and Development Organization, (DRDO), a public service undertaking that develops advanced avionics systems for India’s vast defense sector. He was nominated for the Young Scientist of the Year award for his contribution to the indigenous AWACS project for India.</p>
<p>Shishir holds master’s degrees in Computer Science from Allahabad University and Electrical Engineering from the Indian Institute of Science, Bangalore, India. Additionally, he has published and presented multiple academic papers for IEEE and holds several patents in the fields of Neural Networks, Artificial Intelligence, and behavior-based modeling for malware analysis. Apart from his boundless passion for his work, in his free time, Shishir enjoys keeping himself active. He loves hot yoga, playing squash, and hiking.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/8c73aba5-cdba-425e-9bbc-4bc1b90c3e3c-KBKAST-EP-Shishir-Singh.mp3" length="54267996"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Shishir Singh is the Executive Vice President and Chief Technology Officer for the BlackBerry Cybersecurity business. A seasoned senior executive, Shishir brings 15+ years of cybersecurity leadership. With his wealth of experience and expertise, Shishir works across the entire organization to set a clear vision roadmap for our next-generation cybersecurity products and services. He engages with our customer base on strategic direction, and identify key partnerships to implement a market-winning technical strategy and vision. Shishir is a passionate advocate for customer-centric design and the use of data and analytics to create compelling offerings that thrill customers.
Before BlackBerry, Shishir served as Senior Vice President and Chief Product Officer, Enterprise Business Group at McAfee. In this role, he was responsible for product strategy, execution, and delivering cutting-edge cybersecurity offerings that protect Enterprise customers from threats to their applications, networks, data, devices, and other critical assets. During his tenure, he transformed the company into a true cloud company and pioneered the teams that delivered McAfee’s XDR, CNAPP, and SASE (Unified Cloud Edge) solutions in the industry. These products are offered in both on-premises and cloud form factors. They have a footprint across the entire gamut of industry segments, ranging from fledgling start-ups to established banks, Fortune 500 Enterprises, and federal institutions across the globe.
Shishir has also held various engineering, development, and product leadership positions at Cyphort (acquired by Juniper), Cisco, IronPort Systems (acquired by Cisco), Bluecoat Systems (acquired by SYMC/Broadcom), and Silicon Graphics. At the onset of his career, Shishir worked for the Defense Research and Development Organization, (DRDO), a public service undertaking that develops advanced avionics systems for India’s vast defense sector. He was nominated for the Young Scientist of the Year award for his contribution to the indigenous AWACS project for India.
Shishir holds master’s degrees in Computer Science from Allahabad University and Electrical Engineering from the Indian Institute of Science, Bangalore, India. Additionally, he has published and presented multiple academic papers for IEEE and holds several patents in the fields of Neural Networks, Artificial Intelligence, and behavior-based modeling for malware analysis. Apart from his boundless passion for his work, in his free time, Shishir enjoys keeping himself active. He loves hot yoga, playing squash, and hiking.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1368525/1700181087-FOR-KBI-DO-NOT-TOUCH-7.png"></itunes:image>
                                                                            <itunes:duration>00:37:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 153: Chrystal Taylor]]>
                </title>
                <pubDate>Wed, 28 Dec 2022 16:00:12 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1361710</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-153-chrystal-taylor</link>
                                <description>
                                            <![CDATA[<p>Chrystal Taylor is a dedicated technologist with nearly a decade of experience and has built her career by leveraging curiosity to solve problems, no matter the size, industry, or client. Whether tinkering with the family computer, or inflicting general destruction in MS-DOS Tank Wars, Chrystal has always been a geek.</p>
<p>Chrystal is a SolarWinds deployment veteran who’s built a successful IT career by translating client needs into optimised and performant systems. She loves customising current deployments to ensure systems grow in tandem with user needs. She’s achieved several SolarWinds certifications. A THWACK<sup>®</sup> MVP since 2011, she understands the power of community and the SolarWinds commitment to its users.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Chrystal Taylor is a dedicated technologist with nearly a decade of experience and has built her career by leveraging curiosity to solve problems, no matter the size, industry, or client. Whether tinkering with the family computer, or inflicting general destruction in MS-DOS Tank Wars, Chrystal has always been a geek.
Chrystal is a SolarWinds deployment veteran who’s built a successful IT career by translating client needs into optimised and performant systems. She loves customising current deployments to ensure systems grow in tandem with user needs. She’s achieved several SolarWinds certifications. A THWACK® MVP since 2011, she understands the power of community and the SolarWinds commitment to its users.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 153: Chrystal Taylor]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Chrystal Taylor is a dedicated technologist with nearly a decade of experience and has built her career by leveraging curiosity to solve problems, no matter the size, industry, or client. Whether tinkering with the family computer, or inflicting general destruction in MS-DOS Tank Wars, Chrystal has always been a geek.</p>
<p>Chrystal is a SolarWinds deployment veteran who’s built a successful IT career by translating client needs into optimised and performant systems. She loves customising current deployments to ensure systems grow in tandem with user needs. She’s achieved several SolarWinds certifications. A THWACK<sup>®</sup> MVP since 2011, she understands the power of community and the SolarWinds commitment to its users.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/18bb4dd4-9aee-4e9e-9999-815e3eaf1b9e-KBKAST-EP-Chrystal-Taylor-edited.mp3" length="54735349"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Chrystal Taylor is a dedicated technologist with nearly a decade of experience and has built her career by leveraging curiosity to solve problems, no matter the size, industry, or client. Whether tinkering with the family computer, or inflicting general destruction in MS-DOS Tank Wars, Chrystal has always been a geek.
Chrystal is a SolarWinds deployment veteran who’s built a successful IT career by translating client needs into optimised and performant systems. She loves customising current deployments to ensure systems grow in tandem with user needs. She’s achieved several SolarWinds certifications. A THWACK® MVP since 2011, she understands the power of community and the SolarWinds commitment to its users.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1361710/1700181088-FOR-KBI-DO-NOT-TOUCH-4.png"></itunes:image>
                                                                            <itunes:duration>00:37:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 152: Remy Coll and Simon Smalley]]>
                </title>
                <pubDate>Thu, 22 Dec 2022 16:00:25 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1355769</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-152-remy-coll-and-simon-smalley</link>
                                <description>
                                            <![CDATA[<p>Remy is a blue team cyber security expert with a decade of experience in Federal Government, Private Sector, Law Enforcement, and the Military. He holds a Diploma in Networking, and a Diploma in Systems Administration. He is a GIAC certified security leader, ISO 27001 lead auditor, and IRAP assessor #194.</p>
<p>Remy has been awarded a commendation for his cyber training programs, commanded the first Army Cyber Protection Team, and MC’s the ADF Cyber Skills Challenge conference every year. He studied Acting at Victorian College of the Arts and has performed in theatres nationally. Every training program, workshop, or presentation that involves him is always more engaging and entertaining than anything involving cyber security has the right to be.</p>
<p>Find Remy on Linkedin: <a href="https://www.linkedin.com/in/remy-coll-809946203/">https://www.linkedin.com/in/remy-coll-809946203/</a></p>
<p>Simon is a red team cyber security expert with experience in National Intelligence, the Military, and Law Enforcement. He holds a Master of Cyber Security (Advanced Tradecraft) with Excellence from UNSW ADFA. He is an OSCP, eCPPT, a GIAC certified security leader, GIAC certified systems auditor, and IRAP assessor #1308.</p>
<p>A former NSW Police officer, Simon has worked in counter-terrorism &amp; special tactics, investigations, and digital forensics. More recently, Simon has been working directly for the Australian Government within the National Intelligence Community. He has spoken at a number of cyber security conferences, on both technical subjects and case studies on technical investigations, and is a mentor on the ADF Cyber Gap Program.</p>
<p>Find Simon on Linkedin: <a href="https://www.linkedin.com/in/simon-smalley-b673a2233/">https://www.linkedin.com/in/simon-smalley-b673a2233/</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Remy is a blue team cyber security expert with a decade of experience in Federal Government, Private Sector, Law Enforcement, and the Military. He holds a Diploma in Networking, and a Diploma in Systems Administration. He is a GIAC certified security leader, ISO 27001 lead auditor, and IRAP assessor #194.
Remy has been awarded a commendation for his cyber training programs, commanded the first Army Cyber Protection Team, and MC’s the ADF Cyber Skills Challenge conference every year. He studied Acting at Victorian College of the Arts and has performed in theatres nationally. Every training program, workshop, or presentation that involves him is always more engaging and entertaining than anything involving cyber security has the right to be.
Find Remy on Linkedin: https://www.linkedin.com/in/remy-coll-809946203/
Simon is a red team cyber security expert with experience in National Intelligence, the Military, and Law Enforcement. He holds a Master of Cyber Security (Advanced Tradecraft) with Excellence from UNSW ADFA. He is an OSCP, eCPPT, a GIAC certified security leader, GIAC certified systems auditor, and IRAP assessor #1308.
A former NSW Police officer, Simon has worked in counter-terrorism & special tactics, investigations, and digital forensics. More recently, Simon has been working directly for the Australian Government within the National Intelligence Community. He has spoken at a number of cyber security conferences, on both technical subjects and case studies on technical investigations, and is a mentor on the ADF Cyber Gap Program.
Find Simon on Linkedin: https://www.linkedin.com/in/simon-smalley-b673a2233/
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 152: Remy Coll and Simon Smalley]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Remy is a blue team cyber security expert with a decade of experience in Federal Government, Private Sector, Law Enforcement, and the Military. He holds a Diploma in Networking, and a Diploma in Systems Administration. He is a GIAC certified security leader, ISO 27001 lead auditor, and IRAP assessor #194.</p>
<p>Remy has been awarded a commendation for his cyber training programs, commanded the first Army Cyber Protection Team, and MC’s the ADF Cyber Skills Challenge conference every year. He studied Acting at Victorian College of the Arts and has performed in theatres nationally. Every training program, workshop, or presentation that involves him is always more engaging and entertaining than anything involving cyber security has the right to be.</p>
<p>Find Remy on Linkedin: <a href="https://www.linkedin.com/in/remy-coll-809946203/">https://www.linkedin.com/in/remy-coll-809946203/</a></p>
<p>Simon is a red team cyber security expert with experience in National Intelligence, the Military, and Law Enforcement. He holds a Master of Cyber Security (Advanced Tradecraft) with Excellence from UNSW ADFA. He is an OSCP, eCPPT, a GIAC certified security leader, GIAC certified systems auditor, and IRAP assessor #1308.</p>
<p>A former NSW Police officer, Simon has worked in counter-terrorism &amp; special tactics, investigations, and digital forensics. More recently, Simon has been working directly for the Australian Government within the National Intelligence Community. He has spoken at a number of cyber security conferences, on both technical subjects and case studies on technical investigations, and is a mentor on the ADF Cyber Gap Program.</p>
<p>Find Simon on Linkedin: <a href="https://www.linkedin.com/in/simon-smalley-b673a2233/">https://www.linkedin.com/in/simon-smalley-b673a2233/</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3eaa6cd7-52bb-4914-adfe-dd3010a2bcff-KBKAST-EP-Remy-Coll-Simon-Smalley.mp3" length="64442385"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Remy is a blue team cyber security expert with a decade of experience in Federal Government, Private Sector, Law Enforcement, and the Military. He holds a Diploma in Networking, and a Diploma in Systems Administration. He is a GIAC certified security leader, ISO 27001 lead auditor, and IRAP assessor #194.
Remy has been awarded a commendation for his cyber training programs, commanded the first Army Cyber Protection Team, and MC’s the ADF Cyber Skills Challenge conference every year. He studied Acting at Victorian College of the Arts and has performed in theatres nationally. Every training program, workshop, or presentation that involves him is always more engaging and entertaining than anything involving cyber security has the right to be.
Find Remy on Linkedin: https://www.linkedin.com/in/remy-coll-809946203/
Simon is a red team cyber security expert with experience in National Intelligence, the Military, and Law Enforcement. He holds a Master of Cyber Security (Advanced Tradecraft) with Excellence from UNSW ADFA. He is an OSCP, eCPPT, a GIAC certified security leader, GIAC certified systems auditor, and IRAP assessor #1308.
A former NSW Police officer, Simon has worked in counter-terrorism & special tactics, investigations, and digital forensics. More recently, Simon has been working directly for the Australian Government within the National Intelligence Community. He has spoken at a number of cyber security conferences, on both technical subjects and case studies on technical investigations, and is a mentor on the ADF Cyber Gap Program.
Find Simon on Linkedin: https://www.linkedin.com/in/simon-smalley-b673a2233/
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1355769/SIMON-AND-Remy.png"></itunes:image>
                                                                            <itunes:duration>00:44:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 151: Torsten George]]>
                </title>
                <pubDate>Wed, 21 Dec 2022 16:00:27 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1353940</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-151-torsten-george</link>
                                <description>
                                            <![CDATA[<p>Torsten George is currently a cyber security evangelist at <a href="https://www.absolute.com/"><strong>Absolute Software</strong></a>, which helps organizations establish resilient security controls on endpoints. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 27 years and regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege For Dummies book. Torsten has held executive level positions with Centrify, RiskSense, RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global, an ASSA ABLOY™ Group brand), Digital Link, and Everdream Corporation (acquired by Dell).</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Torsten George is currently a cyber security evangelist at Absolute Software, which helps organizations establish resilient security controls on endpoints. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 27 years and regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege For Dummies book. Torsten has held executive level positions with Centrify, RiskSense, RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global, an ASSA ABLOY™ Group brand), Digital Link, and Everdream Corporation (acquired by Dell).
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 151: Torsten George]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Torsten George is currently a cyber security evangelist at <a href="https://www.absolute.com/"><strong>Absolute Software</strong></a>, which helps organizations establish resilient security controls on endpoints. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 27 years and regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege For Dummies book. Torsten has held executive level positions with Centrify, RiskSense, RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global, an ASSA ABLOY™ Group brand), Digital Link, and Everdream Corporation (acquired by Dell).</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5b27f2ef-c908-48e4-ad30-e135e9ebb228-KBKAST-EP-Torsten-George.mp3" length="57213954"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Torsten George is currently a cyber security evangelist at Absolute Software, which helps organizations establish resilient security controls on endpoints. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 27 years and regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege For Dummies book. Torsten has held executive level positions with Centrify, RiskSense, RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global, an ASSA ABLOY™ Group brand), Digital Link, and Everdream Corporation (acquired by Dell).
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1353940/1700181088-Torsten.png"></itunes:image>
                                                                            <itunes:duration>00:39:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 150: Edgard Capdevielle]]>
                </title>
                <pubDate>Wed, 14 Dec 2022 16:00:09 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1348165</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-150-edgard-capdevielle</link>
                                <description>
                                            <![CDATA[<p class="xm2695081588078953269m6720636871701313085gmail-m-8348018691133588858xmsonormal">Edgard Capdevielle is President, CEO and co-founder of operational tech and IoT firm Nozomi Networks. Edgard brings an extensive background in successfully managing and expanding markets for both start-ups and established technology companies to his role as CEO. Previously he was Vice President of Product Management and Marketing for Imperva, where he led teams that made the company’s web and data security products leaders in their space. Prior to that he was a key executive at storage companies Data Domain and EMC.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Edgard Capdevielle is President, CEO and co-founder of operational tech and IoT firm Nozomi Networks. Edgard brings an extensive background in successfully managing and expanding markets for both start-ups and established technology companies to his role as CEO. Previously he was Vice President of Product Management and Marketing for Imperva, where he led teams that made the company’s web and data security products leaders in their space. Prior to that he was a key executive at storage companies Data Domain and EMC.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 150: Edgard Capdevielle]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p class="xm2695081588078953269m6720636871701313085gmail-m-8348018691133588858xmsonormal">Edgard Capdevielle is President, CEO and co-founder of operational tech and IoT firm Nozomi Networks. Edgard brings an extensive background in successfully managing and expanding markets for both start-ups and established technology companies to his role as CEO. Previously he was Vice President of Product Management and Marketing for Imperva, where he led teams that made the company’s web and data security products leaders in their space. Prior to that he was a key executive at storage companies Data Domain and EMC.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/21d83864-b0cc-47a5-8767-946a602d150b-KBKAST-EP-Edgard-Capdevielle.mp3" length="53832310"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Edgard Capdevielle is President, CEO and co-founder of operational tech and IoT firm Nozomi Networks. Edgard brings an extensive background in successfully managing and expanding markets for both start-ups and established technology companies to his role as CEO. Previously he was Vice President of Product Management and Marketing for Imperva, where he led teams that made the company’s web and data security products leaders in their space. Prior to that he was a key executive at storage companies Data Domain and EMC.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1348165/c1a-5k0v-mk026wm5up7-nfqhnv.png"></itunes:image>
                                                                            <itunes:duration>00:37:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 149: Matt Johnston]]>
                </title>
                <pubDate>Wed, 07 Dec 2022 16:00:14 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1341866</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-149-matt-johnston</link>
                                <description>
                                            <![CDATA[<div class="page" title="Page 1">
<div class="section">
<div class="layoutArea">
<div class="column">
<p>Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an international career as an entrepreneur and founder, creating and leading companies in verticals including service, manufacturing, distribution and direct to consumer. Johnston’s early career was in Security Risk Management and Investigation, working as a Security Consultant and other related roles.</p>
<p>With a passion for furthering society through innovation and technology, Johnston currently works with founder-led companies and private and institutional investors to create value for all stakeholders through Venture Capital, Private Equity and other investment. His track record of excellence and his balance of business acumen, technology knowledge and finance experience, sees Johnston advising startups, securing startup finance, advising established companies on exit strategies, as well as executing for them on mergers and acquisitions.</p>
<p>In addition to his core business activities, he works with a number of US based startup accelerators in vetting and selecting startup companies for investment and/or engagement in accelerator programs.</p>
</div>
</div>
</div>
</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[



Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an international career as an entrepreneur and founder, creating and leading companies in verticals including service, manufacturing, distribution and direct to consumer. Johnston’s early career was in Security Risk Management and Investigation, working as a Security Consultant and other related roles.
With a passion for furthering society through innovation and technology, Johnston currently works with founder-led companies and private and institutional investors to create value for all stakeholders through Venture Capital, Private Equity and other investment. His track record of excellence and his balance of business acumen, technology knowledge and finance experience, sees Johnston advising startups, securing startup finance, advising established companies on exit strategies, as well as executing for them on mergers and acquisitions.
In addition to his core business activities, he works with a number of US based startup accelerators in vetting and selecting startup companies for investment and/or engagement in accelerator programs.




]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 149: Matt Johnston]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div class="page" title="Page 1">
<div class="section">
<div class="layoutArea">
<div class="column">
<p>Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an international career as an entrepreneur and founder, creating and leading companies in verticals including service, manufacturing, distribution and direct to consumer. Johnston’s early career was in Security Risk Management and Investigation, working as a Security Consultant and other related roles.</p>
<p>With a passion for furthering society through innovation and technology, Johnston currently works with founder-led companies and private and institutional investors to create value for all stakeholders through Venture Capital, Private Equity and other investment. His track record of excellence and his balance of business acumen, technology knowledge and finance experience, sees Johnston advising startups, securing startup finance, advising established companies on exit strategies, as well as executing for them on mergers and acquisitions.</p>
<p>In addition to his core business activities, he works with a number of US based startup accelerators in vetting and selecting startup companies for investment and/or engagement in accelerator programs.</p>
</div>
</div>
</div>
</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/bf9cc918-305e-403d-b7a1-af17047b8a6e-KBKAST-EP-Matt-Johnston.mp3" length="59125410"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[



Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an international career as an entrepreneur and founder, creating and leading companies in verticals including service, manufacturing, distribution and direct to consumer. Johnston’s early career was in Security Risk Management and Investigation, working as a Security Consultant and other related roles.
With a passion for furthering society through innovation and technology, Johnston currently works with founder-led companies and private and institutional investors to create value for all stakeholders through Venture Capital, Private Equity and other investment. His track record of excellence and his balance of business acumen, technology knowledge and finance experience, sees Johnston advising startups, securing startup finance, advising established companies on exit strategies, as well as executing for them on mergers and acquisitions.
In addition to his core business activities, he works with a number of US based startup accelerators in vetting and selecting startup companies for investment and/or engagement in accelerator programs.




]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1341866/c1a-5k0v-z3z60px8f85r-fn1ecc.png"></itunes:image>
                                                                            <itunes:duration>00:41:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 148: Lena Smart]]>
                </title>
                <pubDate>Fri, 02 Dec 2022 16:00:47 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1339405</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-148-lena-smart</link>
                                <description>
                                            <![CDATA[<p>Lena joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was the Global Chief Information Security Officer for the international fintech company, Tradeweb, where she was responsible for all aspects of cybersecurity. She also served as CIO and Chief Security Officer for the New York Power Authority, the largest state power organization in the country. Lena is a founding member of Cybersecurity at MIT Sloan, formerly the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity, which allows security leaders in academia and the private sector to collaborate on tackling the most challenging security issues. Lena is a member of IT-ISAC, frequently speaks at industry events and has been featured in Fortune, Dark Reading and CSO Online.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Lena joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was the Global Chief Information Security Officer for the international fintech company, Tradeweb, where she was responsible for all aspects of cybersecurity. She also served as CIO and Chief Security Officer for the New York Power Authority, the largest state power organization in the country. Lena is a founding member of Cybersecurity at MIT Sloan, formerly the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity, which allows security leaders in academia and the private sector to collaborate on tackling the most challenging security issues. Lena is a member of IT-ISAC, frequently speaks at industry events and has been featured in Fortune, Dark Reading and CSO Online.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 148: Lena Smart]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Lena joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was the Global Chief Information Security Officer for the international fintech company, Tradeweb, where she was responsible for all aspects of cybersecurity. She also served as CIO and Chief Security Officer for the New York Power Authority, the largest state power organization in the country. Lena is a founding member of Cybersecurity at MIT Sloan, formerly the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity, which allows security leaders in academia and the private sector to collaborate on tackling the most challenging security issues. Lena is a member of IT-ISAC, frequently speaks at industry events and has been featured in Fortune, Dark Reading and CSO Online.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/124aac00-17d4-43e9-916a-83d9982a7afa-KBKAST-EP-Lena-Smart-edited.mp3" length="64522702"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Lena joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was the Global Chief Information Security Officer for the international fintech company, Tradeweb, where she was responsible for all aspects of cybersecurity. She also served as CIO and Chief Security Officer for the New York Power Authority, the largest state power organization in the country. Lena is a founding member of Cybersecurity at MIT Sloan, formerly the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity, which allows security leaders in academia and the private sector to collaborate on tackling the most challenging security issues. Lena is a member of IT-ISAC, frequently speaks at industry events and has been featured in Fortune, Dark Reading and CSO Online.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1339405/Lena.png"></itunes:image>
                                                                            <itunes:duration>00:44:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 147: Sean Duca]]>
                </title>
                <pubDate>Tue, 29 Nov 2022 12:00:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1336401</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-147-sean-duca</link>
                                <description>
                                            <![CDATA[<p>Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.<br />
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.</p>
<p>Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.<br />
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 147: Sean Duca]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.<br />
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.</p>
<p>Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.<br />
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/86251671-ab8d-4095-96fb-f28d015ba7c8-KBKAST-EP-Sean-Duca.mp3" length="42397942"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1336401/c1a-5k0v-1p0qj7m3a4q6-cblzvh.png"></itunes:image>
                                                                            <itunes:duration>00:29:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 146: Dan Woods]]>
                </title>
                <pubDate>Fri, 25 Nov 2022 16:00:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1333196</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-146-dan-woods</link>
                                <description>
                                            <![CDATA[<p><b>Dan Woods is the Global Head of Intelligence at F5</b>. Prior to F5, Dan spent more than 20 years with local, state, and federal law enforcement and intelligence organizations including the FBI as a special agent and the CIA as a cyber operations officer.</p>
<p>See also:</p>
<ul>
<li><a href="https://www.f5.com/company/blog/bot-traffic-percentage-fake-accounts-expert"> I’m a former CIA cyber-operations officer who studies bot traffic. Here’s why it’s plausible that more than 80% of Twitter’s accounts are actually fake—and Twitter is not alone.</a></li>
<li><a href="https://www.tesmanian.com/blogs/tesmanian-blog/former-fbi-agent-confirms-elon-musks-claim-of-undercounting-bot-accounts-on-twitter-by-conducting-his-own-research">Former FBI Agent Confirms Elon Musk’s Claim of Undercounting Bot Accounts on Twitter by Conducting His Own Research</a></li>
</ul>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dan Woods is the Global Head of Intelligence at F5. Prior to F5, Dan spent more than 20 years with local, state, and federal law enforcement and intelligence organizations including the FBI as a special agent and the CIA as a cyber operations officer.
See also:

 I’m a former CIA cyber-operations officer who studies bot traffic. Here’s why it’s plausible that more than 80% of Twitter’s accounts are actually fake—and Twitter is not alone.
Former FBI Agent Confirms Elon Musk’s Claim of Undercounting Bot Accounts on Twitter by Conducting His Own Research

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 146: Dan Woods]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><b>Dan Woods is the Global Head of Intelligence at F5</b>. Prior to F5, Dan spent more than 20 years with local, state, and federal law enforcement and intelligence organizations including the FBI as a special agent and the CIA as a cyber operations officer.</p>
<p>See also:</p>
<ul>
<li><a href="https://www.f5.com/company/blog/bot-traffic-percentage-fake-accounts-expert"> I’m a former CIA cyber-operations officer who studies bot traffic. Here’s why it’s plausible that more than 80% of Twitter’s accounts are actually fake—and Twitter is not alone.</a></li>
<li><a href="https://www.tesmanian.com/blogs/tesmanian-blog/former-fbi-agent-confirms-elon-musks-claim-of-undercounting-bot-accounts-on-twitter-by-conducting-his-own-research">Former FBI Agent Confirms Elon Musk’s Claim of Undercounting Bot Accounts on Twitter by Conducting His Own Research</a></li>
</ul>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5995c590-2dd6-44a6-b27a-0fb7f5fd09f5-KBKAST-EP-Dan-Woods.mp3" length="72646096"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dan Woods is the Global Head of Intelligence at F5. Prior to F5, Dan spent more than 20 years with local, state, and federal law enforcement and intelligence organizations including the FBI as a special agent and the CIA as a cyber operations officer.
See also:

 I’m a former CIA cyber-operations officer who studies bot traffic. Here’s why it’s plausible that more than 80% of Twitter’s accounts are actually fake—and Twitter is not alone.
Former FBI Agent Confirms Elon Musk’s Claim of Undercounting Bot Accounts on Twitter by Conducting His Own Research

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1333196/Dan-Woods.png"></itunes:image>
                                                                            <itunes:duration>00:50:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 145: Nathan Wenzler]]>
                </title>
                <pubDate>Wed, 23 Nov 2022 16:00:16 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1329947</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-145-nathan-wenzler</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.</span></p>
<p><span style="font-weight:400;">As the Chief Security Strategist for Tenable, Nathan brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.</span></p>
<p>See also: <a href="https://www.proofpoint.com/us/resources/threat-reports/cost-of-insider-threats">2022 Ponemon Cost of Insider Threats Global Report</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.
As the Chief Security Strategist for Tenable, Nathan brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.
See also: 2022 Ponemon Cost of Insider Threats Global Report
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 145: Nathan Wenzler]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.</span></p>
<p><span style="font-weight:400;">As the Chief Security Strategist for Tenable, Nathan brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.</span></p>
<p>See also: <a href="https://www.proofpoint.com/us/resources/threat-reports/cost-of-insider-threats">2022 Ponemon Cost of Insider Threats Global Report</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3d4638c4-2066-48f7-b593-7d1141ec17eb-KBKAST-EP-Nathan-Wenzler.mp3" length="67964112"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.
As the Chief Security Strategist for Tenable, Nathan brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.
See also: 2022 Ponemon Cost of Insider Threats Global Report
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1329947/1700181090-Nathan-Wenzler.png"></itunes:image>
                                                                            <itunes:duration>00:47:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 144: Dane Meah]]>
                </title>
                <pubDate>Fri, 18 Nov 2022 16:00:23 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1318422</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-144-dane-meah</link>
                                <description>
                                            <![CDATA[<p>Dane’s first business adventure was at aged 18 where he developed and sold digital information products from his home, via online stores. This experience gave Dane a taste for business and pursued a career in sales. After several years in the recruitment and pharmaceutical sectors, Dane relocated to Australia and entered the cybersecurity industry with an early cloud provider called MessageLabs.</p>
<p>Dane played a key role in MessageLabs becoming the market leader in Australia, earning regular accolades along the way, including “global top performer”.  In this role, he worked with senior IT executives from many of Australia’s largest businesses to secure their network from cybercrime.</p>
<p>In 2014, Dane identified a gap in the market in the way organisations were addressing security management and co-founded InfoTrust. InfoTrust are a specialised cybersecurity practice, that supports their clients to become secure and more productive.</p>
<p>InfoTrust has evolved to over 40 staff to develop deep expertise that combines internally developed products, professional services, managed services and third party technologies, across a range of cybersecurity domains.</p>
<p>In 2021, InfoTrust split off a SaaS platform project to incorporate MyCISO. MyCISO simplifies the journey for organisations and their IT providers to assess, improve and manage their cybersecurity improvement journey.</p>
<p>As at July 2022, the MyCISO team consists of 12 staff made up of Product and Software Engineers (9) Operational (2), Sales and Pre-Sales (2).</p>
<p>Dane is married, a father to 3 children and lives between Sydney and a farm in the hunter valley.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dane’s first business adventure was at aged 18 where he developed and sold digital information products from his home, via online stores. This experience gave Dane a taste for business and pursued a career in sales. After several years in the recruitment and pharmaceutical sectors, Dane relocated to Australia and entered the cybersecurity industry with an early cloud provider called MessageLabs.
Dane played a key role in MessageLabs becoming the market leader in Australia, earning regular accolades along the way, including “global top performer”.  In this role, he worked with senior IT executives from many of Australia’s largest businesses to secure their network from cybercrime.
In 2014, Dane identified a gap in the market in the way organisations were addressing security management and co-founded InfoTrust. InfoTrust are a specialised cybersecurity practice, that supports their clients to become secure and more productive.
InfoTrust has evolved to over 40 staff to develop deep expertise that combines internally developed products, professional services, managed services and third party technologies, across a range of cybersecurity domains.
In 2021, InfoTrust split off a SaaS platform project to incorporate MyCISO. MyCISO simplifies the journey for organisations and their IT providers to assess, improve and manage their cybersecurity improvement journey.
As at July 2022, the MyCISO team consists of 12 staff made up of Product and Software Engineers (9) Operational (2), Sales and Pre-Sales (2).
Dane is married, a father to 3 children and lives between Sydney and a farm in the hunter valley.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 144: Dane Meah]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Dane’s first business adventure was at aged 18 where he developed and sold digital information products from his home, via online stores. This experience gave Dane a taste for business and pursued a career in sales. After several years in the recruitment and pharmaceutical sectors, Dane relocated to Australia and entered the cybersecurity industry with an early cloud provider called MessageLabs.</p>
<p>Dane played a key role in MessageLabs becoming the market leader in Australia, earning regular accolades along the way, including “global top performer”.  In this role, he worked with senior IT executives from many of Australia’s largest businesses to secure their network from cybercrime.</p>
<p>In 2014, Dane identified a gap in the market in the way organisations were addressing security management and co-founded InfoTrust. InfoTrust are a specialised cybersecurity practice, that supports their clients to become secure and more productive.</p>
<p>InfoTrust has evolved to over 40 staff to develop deep expertise that combines internally developed products, professional services, managed services and third party technologies, across a range of cybersecurity domains.</p>
<p>In 2021, InfoTrust split off a SaaS platform project to incorporate MyCISO. MyCISO simplifies the journey for organisations and their IT providers to assess, improve and manage their cybersecurity improvement journey.</p>
<p>As at July 2022, the MyCISO team consists of 12 staff made up of Product and Software Engineers (9) Operational (2), Sales and Pre-Sales (2).</p>
<p>Dane is married, a father to 3 children and lives between Sydney and a farm in the hunter valley.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/c0f150b7-b69f-4bf7-b6a2-a6aa34c75786-KBKAST-EP-Dane-Meah-edited.mp3" length="53835002"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dane’s first business adventure was at aged 18 where he developed and sold digital information products from his home, via online stores. This experience gave Dane a taste for business and pursued a career in sales. After several years in the recruitment and pharmaceutical sectors, Dane relocated to Australia and entered the cybersecurity industry with an early cloud provider called MessageLabs.
Dane played a key role in MessageLabs becoming the market leader in Australia, earning regular accolades along the way, including “global top performer”.  In this role, he worked with senior IT executives from many of Australia’s largest businesses to secure their network from cybercrime.
In 2014, Dane identified a gap in the market in the way organisations were addressing security management and co-founded InfoTrust. InfoTrust are a specialised cybersecurity practice, that supports their clients to become secure and more productive.
InfoTrust has evolved to over 40 staff to develop deep expertise that combines internally developed products, professional services, managed services and third party technologies, across a range of cybersecurity domains.
In 2021, InfoTrust split off a SaaS platform project to incorporate MyCISO. MyCISO simplifies the journey for organisations and their IT providers to assess, improve and manage their cybersecurity improvement journey.
As at July 2022, the MyCISO team consists of 12 staff made up of Product and Software Engineers (9) Operational (2), Sales and Pre-Sales (2).
Dane is married, a father to 3 children and lives between Sydney and a farm in the hunter valley.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1318422/Dane-meah-1.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 143: Arun Vishwanath]]>
                </title>
                <pubDate>Wed, 16 Nov 2022 16:00:47 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1318398</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-143-arun-vishwanath</link>
                                <description>
                                            <![CDATA[<p>Dr. Arun Vishwanath studies the “people problem” of cybersecurity.</p>
<p>His research focuses on improving individual, organizational, and national resilience to cyber attacks by focusing on the weakest links in cyber security—Internet users.</p>
<p>His particular interest is in understanding why people fall prey to social engineering attacks that come in through email and social media, and on ways we can harness this understanding to secure cyberspace.</p>
<p>Dr. Vishwanath is an alumnus of the <a href="https://cyber.harvard.edu/people/avish">Berkman Klein Center at Harvard University</a>.  He was a tenured associate professor at the University at Buffalo and was faculty at Indiana University, Bloomington.  He serves as the CTO of <a href="https://www.avantresearchgroup.com/">Avant Research Group (ARG)</a>—a Buffalo, New York based cyber security research and advisory firm, where he consults for major corporations and government agencies on issues ranging from cybersecurity to consumer protection. He also serves as a distinguished expert for the <a href="https://cps-vo.org/group/sos/papercompetition/reviewers">NSA’s Science of Security &amp; Privacy</a> directorate.</p>
<p>Dr. Vishwanath’s research on improving cyber resilience against online social engineering has been funded by the National Science Foundation. He has published <a href="https://www.arunvishwanath.us/https;//www.arunvishwanath.us/publications/">close to 50 articles on technology users and cybersecurity issues</a> and his research <a href="https://www.arunvishwanath.us/https;//www.arunvishwanath.us/invited-talks/">has been presented to principals at national security and law enforcement agencies around the world</a>. He has also presented his work at <a href="https://www.arunvishwanath.us/https;//www.arunvishwanath.us/conference-papers/">leading global security conferences, multiple times by invitation at the US Senate/SSA and House, as well as four consecutive times at BlackHat</a>.</p>
<p>Here’s the link to the book and the discount code. Anyone ordering the book with a US address can get 15% off The Weakest Link when you enter the discount code “READMIT15” here:</p>
<div class="js-react-root"><span class="loader-wrapper"><span><a class="css-11f6v4u" href="https://www.penguinrandomhouse.com/search/site/?q=9780262047494"><span class="css-1awfwlv"><span class="css-1n3444m"><img class="smart-link-icon css-qq5phv" src="https://www.penguinrandomhouse.com/favicon.ico" alt="favicon.ico" /></span><span class="smart-link-title-wrapper css-0">The Weakest Link by Arun Vishwanath: 9780262047494 | PenguinRandomHouse.com: Books</span></span></a></span></span></div>
<div class="wp-caption alignleft"></div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dr. Arun Vishwanath studies the “people problem” of cybersecurity.
His research focuses on improving individual, organizational, and national resilience to cyber attacks by focusing on the weakest links in cyber security—Internet users.
His particular interest is in understanding why people fall prey to social engineering attacks that come in through email and social media, and on ways we can harness this understanding to secure cyberspace.
Dr. Vishwanath is an alumnus of the Berkman Klein Center at Harvard University.  He was a tenured associate professor at the University at Buffalo and was faculty at Indiana University, Bloomington.  He serves as the CTO of Avant Research Group (ARG)—a Buffalo, New York based cyber security research and advisory firm, where he consults for major corporations and government agencies on issues ranging from cybersecurity to consumer protection. He also serves as a distinguished expert for the NSA’s Science of Security & Privacy directorate.
Dr. Vishwanath’s research on improving cyber resilience against online social engineering has been funded by the National Science Foundation. He has published close to 50 articles on technology users and cybersecurity issues and his research has been presented to principals at national security and law enforcement agencies around the world. He has also presented his work at leading global security conferences, multiple times by invitation at the US Senate/SSA and House, as well as four consecutive times at BlackHat.
Here’s the link to the book and the discount code. Anyone ordering the book with a US address can get 15% off The Weakest Link when you enter the discount code “READMIT15” here:
The Weakest Link by Arun Vishwanath: 9780262047494 | PenguinRandomHouse.com: Books

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 143: Arun Vishwanath]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Dr. Arun Vishwanath studies the “people problem” of cybersecurity.</p>
<p>His research focuses on improving individual, organizational, and national resilience to cyber attacks by focusing on the weakest links in cyber security—Internet users.</p>
<p>His particular interest is in understanding why people fall prey to social engineering attacks that come in through email and social media, and on ways we can harness this understanding to secure cyberspace.</p>
<p>Dr. Vishwanath is an alumnus of the <a href="https://cyber.harvard.edu/people/avish">Berkman Klein Center at Harvard University</a>.  He was a tenured associate professor at the University at Buffalo and was faculty at Indiana University, Bloomington.  He serves as the CTO of <a href="https://www.avantresearchgroup.com/">Avant Research Group (ARG)</a>—a Buffalo, New York based cyber security research and advisory firm, where he consults for major corporations and government agencies on issues ranging from cybersecurity to consumer protection. He also serves as a distinguished expert for the <a href="https://cps-vo.org/group/sos/papercompetition/reviewers">NSA’s Science of Security &amp; Privacy</a> directorate.</p>
<p>Dr. Vishwanath’s research on improving cyber resilience against online social engineering has been funded by the National Science Foundation. He has published <a href="https://www.arunvishwanath.us/https;//www.arunvishwanath.us/publications/">close to 50 articles on technology users and cybersecurity issues</a> and his research <a href="https://www.arunvishwanath.us/https;//www.arunvishwanath.us/invited-talks/">has been presented to principals at national security and law enforcement agencies around the world</a>. He has also presented his work at <a href="https://www.arunvishwanath.us/https;//www.arunvishwanath.us/conference-papers/">leading global security conferences, multiple times by invitation at the US Senate/SSA and House, as well as four consecutive times at BlackHat</a>.</p>
<p>Here’s the link to the book and the discount code. Anyone ordering the book with a US address can get 15% off The Weakest Link when you enter the discount code “READMIT15” here:</p>
<div class="js-react-root"><span class="loader-wrapper"><span><a class="css-11f6v4u" href="https://www.penguinrandomhouse.com/search/site/?q=9780262047494"><span class="css-1awfwlv"><span class="css-1n3444m"><img class="smart-link-icon css-qq5phv" src="https://www.penguinrandomhouse.com/favicon.ico" alt="favicon.ico" /></span><span class="smart-link-title-wrapper css-0">The Weakest Link by Arun Vishwanath: 9780262047494 | PenguinRandomHouse.com: Books</span></span></a></span></span></div>
<div class="wp-caption alignleft"></div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/4dba50bd-d4f9-4321-a1cd-a41f1cf43d2c-KBKAST-EP-Arun-Vishwanath.mp3" length="86486342"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dr. Arun Vishwanath studies the “people problem” of cybersecurity.
His research focuses on improving individual, organizational, and national resilience to cyber attacks by focusing on the weakest links in cyber security—Internet users.
His particular interest is in understanding why people fall prey to social engineering attacks that come in through email and social media, and on ways we can harness this understanding to secure cyberspace.
Dr. Vishwanath is an alumnus of the Berkman Klein Center at Harvard University.  He was a tenured associate professor at the University at Buffalo and was faculty at Indiana University, Bloomington.  He serves as the CTO of Avant Research Group (ARG)—a Buffalo, New York based cyber security research and advisory firm, where he consults for major corporations and government agencies on issues ranging from cybersecurity to consumer protection. He also serves as a distinguished expert for the NSA’s Science of Security & Privacy directorate.
Dr. Vishwanath’s research on improving cyber resilience against online social engineering has been funded by the National Science Foundation. He has published close to 50 articles on technology users and cybersecurity issues and his research has been presented to principals at national security and law enforcement agencies around the world. He has also presented his work at leading global security conferences, multiple times by invitation at the US Senate/SSA and House, as well as four consecutive times at BlackHat.
Here’s the link to the book and the discount code. Anyone ordering the book with a US address can get 15% off The Weakest Link when you enter the discount code “READMIT15” here:
The Weakest Link by Arun Vishwanath: 9780262047494 | PenguinRandomHouse.com: Books

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1318398/1700181091-Arun-Vishwanath.png"></itunes:image>
                                                                            <itunes:duration>01:00:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 142: Alastair Dickson]]>
                </title>
                <pubDate>Wed, 09 Nov 2022 16:00:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1314375</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-142-alastair-dickson</link>
                                <description>
                                            <![CDATA[<p>Alastair has spent the last 20 years working in Cyber Security and Risk Management. He is a passionate believer that security solutions should enable a business to take advantage of all the benefits of the digital world, while not putting the organisation’s data or productivity at risk.</p>
<p>From working within start-ups to established vendors Alastair has the knowledge to launch and grow markets for technology that cuts through the noise to recommend a methodology that really moves his clients forward, maturing the approach they take.</p>
<p>Having 4 children means he knows what it takes to keep teams focused on the right challenges to delight their customers every day. Building trust at all levels is crucial to this success.</p>
<p>Helping to de-mystify the Cyber market is Alastair’s a key objective, as he believes it can only help the cause if we work together and share intelligence to keep the bad guys out and businesses operating smoothly.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Alastair has spent the last 20 years working in Cyber Security and Risk Management. He is a passionate believer that security solutions should enable a business to take advantage of all the benefits of the digital world, while not putting the organisation’s data or productivity at risk.
From working within start-ups to established vendors Alastair has the knowledge to launch and grow markets for technology that cuts through the noise to recommend a methodology that really moves his clients forward, maturing the approach they take.
Having 4 children means he knows what it takes to keep teams focused on the right challenges to delight their customers every day. Building trust at all levels is crucial to this success.
Helping to de-mystify the Cyber market is Alastair’s a key objective, as he believes it can only help the cause if we work together and share intelligence to keep the bad guys out and businesses operating smoothly.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 142: Alastair Dickson]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Alastair has spent the last 20 years working in Cyber Security and Risk Management. He is a passionate believer that security solutions should enable a business to take advantage of all the benefits of the digital world, while not putting the organisation’s data or productivity at risk.</p>
<p>From working within start-ups to established vendors Alastair has the knowledge to launch and grow markets for technology that cuts through the noise to recommend a methodology that really moves his clients forward, maturing the approach they take.</p>
<p>Having 4 children means he knows what it takes to keep teams focused on the right challenges to delight their customers every day. Building trust at all levels is crucial to this success.</p>
<p>Helping to de-mystify the Cyber market is Alastair’s a key objective, as he believes it can only help the cause if we work together and share intelligence to keep the bad guys out and businesses operating smoothly.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5901345e-a854-49ba-8bb9-bb9c4f73a227-KBKAST-EP-Alastair-Dickson.mp3" length="59514368"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Alastair has spent the last 20 years working in Cyber Security and Risk Management. He is a passionate believer that security solutions should enable a business to take advantage of all the benefits of the digital world, while not putting the organisation’s data or productivity at risk.
From working within start-ups to established vendors Alastair has the knowledge to launch and grow markets for technology that cuts through the noise to recommend a methodology that really moves his clients forward, maturing the approach they take.
Having 4 children means he knows what it takes to keep teams focused on the right challenges to delight their customers every day. Building trust at all levels is crucial to this success.
Helping to de-mystify the Cyber market is Alastair’s a key objective, as he believes it can only help the cause if we work together and share intelligence to keep the bad guys out and businesses operating smoothly.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1314375/1700181091-Al-Dickson.png"></itunes:image>
                                                                            <itunes:duration>00:41:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 141: Sarah Sloan]]>
                </title>
                <pubDate>Fri, 04 Nov 2022 16:00:46 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1311365</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-141-sarah-sloan</link>
                                <description>
                                            <![CDATA[<p>Sarah Sloan is the Head of Government Affairs &amp; Public Policy for Australia and New Zealand at Palo Alto Networks. She advises the company’s leadership on a range of cyber and technology policy/regulatory issues, builds strategic relationships across all tiers of government and acts as a trusted private sector adviser to governments in the region.</p>
<p>Prior to her role with Palo Alto Networks, Sarah worked at Accenture Security on a number of government projects and quickly developed a formidable reputation for delivery and stakeholder management in challenging and nationally significant programs..</p>
<p>Sarah has spent 10+ years working in the Federal Government, predominantly in cyber crime and cyber security. She has a proven track record of delivering results at the operational and strategic levels of government and is passionate about improving Australia and New Zealand’s cyber security posture.</p>
<p>Sarah is a graduate of the Australian National University with a Bachelor of Laws (Hons.) and Bachelor of Asia and the Pacific Studies. She also holds a Graduate Diploma of Asia and the Pacific Studies (Japanese), Graduate Diploma of Legal Practice, and a Master of International Laws, where she wrote her thesis on international norms and cyber security.</p>
<p>Sarah is Chair of the Australian Information Industry Association (AIIA) Cyber Security Policy Advisory Network and is an elected member of the AIIA ACT/Federal Council. She is also a member of the AmCham Digital Economy and Innovation Committee.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sarah Sloan is the Head of Government Affairs & Public Policy for Australia and New Zealand at Palo Alto Networks. She advises the company’s leadership on a range of cyber and technology policy/regulatory issues, builds strategic relationships across all tiers of government and acts as a trusted private sector adviser to governments in the region.
Prior to her role with Palo Alto Networks, Sarah worked at Accenture Security on a number of government projects and quickly developed a formidable reputation for delivery and stakeholder management in challenging and nationally significant programs..
Sarah has spent 10+ years working in the Federal Government, predominantly in cyber crime and cyber security. She has a proven track record of delivering results at the operational and strategic levels of government and is passionate about improving Australia and New Zealand’s cyber security posture.
Sarah is a graduate of the Australian National University with a Bachelor of Laws (Hons.) and Bachelor of Asia and the Pacific Studies. She also holds a Graduate Diploma of Asia and the Pacific Studies (Japanese), Graduate Diploma of Legal Practice, and a Master of International Laws, where she wrote her thesis on international norms and cyber security.
Sarah is Chair of the Australian Information Industry Association (AIIA) Cyber Security Policy Advisory Network and is an elected member of the AIIA ACT/Federal Council. She is also a member of the AmCham Digital Economy and Innovation Committee.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 141: Sarah Sloan]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Sarah Sloan is the Head of Government Affairs &amp; Public Policy for Australia and New Zealand at Palo Alto Networks. She advises the company’s leadership on a range of cyber and technology policy/regulatory issues, builds strategic relationships across all tiers of government and acts as a trusted private sector adviser to governments in the region.</p>
<p>Prior to her role with Palo Alto Networks, Sarah worked at Accenture Security on a number of government projects and quickly developed a formidable reputation for delivery and stakeholder management in challenging and nationally significant programs..</p>
<p>Sarah has spent 10+ years working in the Federal Government, predominantly in cyber crime and cyber security. She has a proven track record of delivering results at the operational and strategic levels of government and is passionate about improving Australia and New Zealand’s cyber security posture.</p>
<p>Sarah is a graduate of the Australian National University with a Bachelor of Laws (Hons.) and Bachelor of Asia and the Pacific Studies. She also holds a Graduate Diploma of Asia and the Pacific Studies (Japanese), Graduate Diploma of Legal Practice, and a Master of International Laws, where she wrote her thesis on international norms and cyber security.</p>
<p>Sarah is Chair of the Australian Information Industry Association (AIIA) Cyber Security Policy Advisory Network and is an elected member of the AIIA ACT/Federal Council. She is also a member of the AmCham Digital Economy and Innovation Committee.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/83a70d7c-c2cd-49fb-b956-b919e0619068-KBKAST-EP-Sarah-Sloan.mp3" length="43967648"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sarah Sloan is the Head of Government Affairs & Public Policy for Australia and New Zealand at Palo Alto Networks. She advises the company’s leadership on a range of cyber and technology policy/regulatory issues, builds strategic relationships across all tiers of government and acts as a trusted private sector adviser to governments in the region.
Prior to her role with Palo Alto Networks, Sarah worked at Accenture Security on a number of government projects and quickly developed a formidable reputation for delivery and stakeholder management in challenging and nationally significant programs..
Sarah has spent 10+ years working in the Federal Government, predominantly in cyber crime and cyber security. She has a proven track record of delivering results at the operational and strategic levels of government and is passionate about improving Australia and New Zealand’s cyber security posture.
Sarah is a graduate of the Australian National University with a Bachelor of Laws (Hons.) and Bachelor of Asia and the Pacific Studies. She also holds a Graduate Diploma of Asia and the Pacific Studies (Japanese), Graduate Diploma of Legal Practice, and a Master of International Laws, where she wrote her thesis on international norms and cyber security.
Sarah is Chair of the Australian Information Industry Association (AIIA) Cyber Security Policy Advisory Network and is an elected member of the AIIA ACT/Federal Council. She is also a member of the AmCham Digital Economy and Innovation Committee.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1311365/Sarah-SLoan.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 140: Chad Skipper]]>
                </title>
                <pubDate>Wed, 02 Nov 2022 16:00:10 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1309720</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-140-chad-skipper</link>
                                <description>
                                            <![CDATA[<p>Chad Skipper serves as global security technologist at VMware. With more than 25 years in information security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Chad Skipper serves as global security technologist at VMware. With more than 25 years in information security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 140: Chad Skipper]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Chad Skipper serves as global security technologist at VMware. With more than 25 years in information security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/018554c2-aabc-493d-8c63-c845255c8816-KBKAST-EP-Chad-Skipper.mp3" length="55678166"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Chad Skipper serves as global security technologist at VMware. With more than 25 years in information security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1309720/Chad-Skipper-1.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:37</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 139: Jo Stewart-Rattray]]>
                </title>
                <pubDate>Thu, 27 Oct 2022 16:00:41 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1301163</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-139-jo-stewart-rattray</link>
                                <description>
                                            <![CDATA[<div>Jo is a member of ISACA’s Information Security Advisory Board and Global Ambassador for ANZ. Her areas of expertise include information security governance and strategy, development of policy, security awareness and education, ISO 27000 series implementation and advice, risk assessment, systems audit.</div>
<div></div>
<div>See also: <a href="https://kbi.media/wp-content/uploads/2022/10/State-of-Digital-Trust-2022.pdf">State of Digital Trust 2022</a></div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jo is a member of ISACA’s Information Security Advisory Board and Global Ambassador for ANZ. Her areas of expertise include information security governance and strategy, development of policy, security awareness and education, ISO 27000 series implementation and advice, risk assessment, systems audit.

See also: State of Digital Trust 2022
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 139: Jo Stewart-Rattray]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div>Jo is a member of ISACA’s Information Security Advisory Board and Global Ambassador for ANZ. Her areas of expertise include information security governance and strategy, development of policy, security awareness and education, ISO 27000 series implementation and advice, risk assessment, systems audit.</div>
<div></div>
<div>See also: <a href="https://kbi.media/wp-content/uploads/2022/10/State-of-Digital-Trust-2022.pdf">State of Digital Trust 2022</a></div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/611340c5-5e72-48e9-951f-959ddf5e24de-KBKAST-EP-Jo-Stewart-Rattray.mp3" length="41514455"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jo is a member of ISACA’s Information Security Advisory Board and Global Ambassador for ANZ. Her areas of expertise include information security governance and strategy, development of policy, security awareness and education, ISO 27000 series implementation and advice, risk assessment, systems audit.

See also: State of Digital Trust 2022
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1301163/Jo-Rattray.jpg"></itunes:image>
                                                                            <itunes:duration>00:28:47</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 138: Nicholas Boyle]]>
                </title>
                <pubDate>Tue, 25 Oct 2022 10:00:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1300762</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-138-nicholas-boyle</link>
                                <description>
                                            <![CDATA[<p>Nick Boyle is a partner in the IP &amp; Technology team at DLA Piper, and is based in Sydney. He advises clients on data protection and cyber-security related matters, as well as digital transformation, IT procurement and implementation and other complex procurement projects.  Nick’s clients range from start-up companies, to large listed and private Australian corporations, to multi-national organisations.</p>
<p>Nick has experience and expertise in advising clients on issues arising in connection with the Privacy Act 1988 (Cth) and State and Territory privacy legislation, including in relation to the collection, use, processing and cross-border transfers of data, cyber security risks and mitigations. This includes assisting clients in navigating these issues in both pre- and post-incident scenarios and information and security related regulatory issues, including as part of digital transformation and BPO projects and in response to cyber incidents.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Nick Boyle is a partner in the IP & Technology team at DLA Piper, and is based in Sydney. He advises clients on data protection and cyber-security related matters, as well as digital transformation, IT procurement and implementation and other complex procurement projects.  Nick’s clients range from start-up companies, to large listed and private Australian corporations, to multi-national organisations.
Nick has experience and expertise in advising clients on issues arising in connection with the Privacy Act 1988 (Cth) and State and Territory privacy legislation, including in relation to the collection, use, processing and cross-border transfers of data, cyber security risks and mitigations. This includes assisting clients in navigating these issues in both pre- and post-incident scenarios and information and security related regulatory issues, including as part of digital transformation and BPO projects and in response to cyber incidents.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 138: Nicholas Boyle]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Nick Boyle is a partner in the IP &amp; Technology team at DLA Piper, and is based in Sydney. He advises clients on data protection and cyber-security related matters, as well as digital transformation, IT procurement and implementation and other complex procurement projects.  Nick’s clients range from start-up companies, to large listed and private Australian corporations, to multi-national organisations.</p>
<p>Nick has experience and expertise in advising clients on issues arising in connection with the Privacy Act 1988 (Cth) and State and Territory privacy legislation, including in relation to the collection, use, processing and cross-border transfers of data, cyber security risks and mitigations. This includes assisting clients in navigating these issues in both pre- and post-incident scenarios and information and security related regulatory issues, including as part of digital transformation and BPO projects and in response to cyber incidents.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/9a8aa4fd-0829-4393-8ea3-d9e0abfa1a42-KBKAST-EP-Nicholas-Boyle.mp3" length="69648814"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Nick Boyle is a partner in the IP & Technology team at DLA Piper, and is based in Sydney. He advises clients on data protection and cyber-security related matters, as well as digital transformation, IT procurement and implementation and other complex procurement projects.  Nick’s clients range from start-up companies, to large listed and private Australian corporations, to multi-national organisations.
Nick has experience and expertise in advising clients on issues arising in connection with the Privacy Act 1988 (Cth) and State and Territory privacy legislation, including in relation to the collection, use, processing and cross-border transfers of data, cyber security risks and mitigations. This includes assisting clients in navigating these issues in both pre- and post-incident scenarios and information and security related regulatory issues, including as part of digital transformation and BPO projects and in response to cyber incidents.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1300762/1700181092-Nick-Boyle.jpg"></itunes:image>
                                                                            <itunes:duration>00:48:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 137: Jason Van der Schyff]]>
                </title>
                <pubDate>Wed, 19 Oct 2022 16:00:47 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1295438</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-137-jason-van-der-schyff</link>
                                <description>
                                            <![CDATA[<p>Jason Van der Schyff is Chief Operating Officer of slightly controversial, quietly confident’ venture-backed company <a href="https://softiron.com/"><strong>SoftIron</strong></a> – a global leader in purpose-built and performance-optimised data centre solutions.</p>
<p> </p>
<p>SoftIron is about to change the game when it comes to Australian business and government cyber control of sensitive data (and better storage of massive amounts of data).</p>
<p> </p>
<p>Soon this year, SoftIron will be launching the first-ever base-level computer manufacturing facility on Australian soil. The facility is set to supply ‘clean’ computer servers for firms and government agencies needing assurance there is no malicious or unknown code in their data centres. SoftIron builds and manufactures hardware designed with totally-auditable provenance. SoftIron is the only company in the world that provides fully auditable processes.</p>
<p> </p>
<p>Jason brings both technical and operational experience to SoftIron having previously held roles in R&amp;D engineering, sales and marketing roles with Heliox Technologies, James Fisher Defence and a number of early-stage Silicon Valley companies.</p>
<p> </p>
<p>With extensive manufacturing experience both domestically and abroad in both consumer and B2B high volume products, Jason leads SoftIron’s efforts in vertically integrated manufacturing and domestic assembly.</p>
<p> </p>
<p>Jason recently published his first book, Asymmetric Advantage, available for purchase physically and digitally.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jason Van der Schyff is Chief Operating Officer of slightly controversial, quietly confident’ venture-backed company SoftIron – a global leader in purpose-built and performance-optimised data centre solutions.
 
SoftIron is about to change the game when it comes to Australian business and government cyber control of sensitive data (and better storage of massive amounts of data).
 
Soon this year, SoftIron will be launching the first-ever base-level computer manufacturing facility on Australian soil. The facility is set to supply ‘clean’ computer servers for firms and government agencies needing assurance there is no malicious or unknown code in their data centres. SoftIron builds and manufactures hardware designed with totally-auditable provenance. SoftIron is the only company in the world that provides fully auditable processes.
 
Jason brings both technical and operational experience to SoftIron having previously held roles in R&D engineering, sales and marketing roles with Heliox Technologies, James Fisher Defence and a number of early-stage Silicon Valley companies.
 
With extensive manufacturing experience both domestically and abroad in both consumer and B2B high volume products, Jason leads SoftIron’s efforts in vertically integrated manufacturing and domestic assembly.
 
Jason recently published his first book, Asymmetric Advantage, available for purchase physically and digitally.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 137: Jason Van der Schyff]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jason Van der Schyff is Chief Operating Officer of slightly controversial, quietly confident’ venture-backed company <a href="https://softiron.com/"><strong>SoftIron</strong></a> – a global leader in purpose-built and performance-optimised data centre solutions.</p>
<p> </p>
<p>SoftIron is about to change the game when it comes to Australian business and government cyber control of sensitive data (and better storage of massive amounts of data).</p>
<p> </p>
<p>Soon this year, SoftIron will be launching the first-ever base-level computer manufacturing facility on Australian soil. The facility is set to supply ‘clean’ computer servers for firms and government agencies needing assurance there is no malicious or unknown code in their data centres. SoftIron builds and manufactures hardware designed with totally-auditable provenance. SoftIron is the only company in the world that provides fully auditable processes.</p>
<p> </p>
<p>Jason brings both technical and operational experience to SoftIron having previously held roles in R&amp;D engineering, sales and marketing roles with Heliox Technologies, James Fisher Defence and a number of early-stage Silicon Valley companies.</p>
<p> </p>
<p>With extensive manufacturing experience both domestically and abroad in both consumer and B2B high volume products, Jason leads SoftIron’s efforts in vertically integrated manufacturing and domestic assembly.</p>
<p> </p>
<p>Jason recently published his first book, Asymmetric Advantage, available for purchase physically and digitally.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/4525839e-9969-47c6-b2e1-be1cdd20bb9e-KBKAST-Jason-Van-Der-Schyff.mp3" length="61795786"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jason Van der Schyff is Chief Operating Officer of slightly controversial, quietly confident’ venture-backed company SoftIron – a global leader in purpose-built and performance-optimised data centre solutions.
 
SoftIron is about to change the game when it comes to Australian business and government cyber control of sensitive data (and better storage of massive amounts of data).
 
Soon this year, SoftIron will be launching the first-ever base-level computer manufacturing facility on Australian soil. The facility is set to supply ‘clean’ computer servers for firms and government agencies needing assurance there is no malicious or unknown code in their data centres. SoftIron builds and manufactures hardware designed with totally-auditable provenance. SoftIron is the only company in the world that provides fully auditable processes.
 
Jason brings both technical and operational experience to SoftIron having previously held roles in R&D engineering, sales and marketing roles with Heliox Technologies, James Fisher Defence and a number of early-stage Silicon Valley companies.
 
With extensive manufacturing experience both domestically and abroad in both consumer and B2B high volume products, Jason leads SoftIron’s efforts in vertically integrated manufacturing and domestic assembly.
 
Jason recently published his first book, Asymmetric Advantage, available for purchase physically and digitally.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1295438/Jason-Van-Der-Schyff.png"></itunes:image>
                                                                            <itunes:duration>00:42:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 136: Ashkan Tashvir]]>
                </title>
                <pubDate>Fri, 14 Oct 2022 16:00:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1293190</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-136-ashkan-tashvir</link>
                                <description>
                                            <![CDATA[<p>Ashkan Tashvir built and launched the first of several businesses at the age of fifteen and subsequently led a series of businesses to become thriving and successful enterprises across various industries. With a master’s degree in information systems management, he was amongst the youngest Certified Microsoft Trainers at the time and has worked on various technology projects for government bodies and a range of sectors, including legal, finance and hospitality. During this time, his interest in business and entrepreneurship continued to evolve and he led or advised several startups and SMEs to become sustainable, scalable ventures before becoming an investor and venture builder himself.</p>
<p>In addition to his extensive business and technological engineering qualifications and experience, Ashkan is a deep thinker, voracious reader and philosopher with a profound interest in and knowledge of Western and Eastern philosophy.</p>
<p>For more than a decade, he was driven by a quest to discover why there is so much dysfunction and suffering in the world and to find the answer to a burning question, ‘Why are we human beings the way we are and what drives our decisions, behaviours and actions?’ His quest led him to a crossroads between the realms of technology, business, leadership and philosophy.</p>
<p>Observing a distinct lack of logical, ontological and systematic thinking in the areas of human consciousness, transformation and leadership, particularly in terms of how they empower people to generate opportunity and wealth for themselves and others, Ashkan set his mind to using his newly discovered knowledge to devise a series of practical frameworks, tools and methodologies, one of which is the Being Framework™. The framework is laid out in his best-selling books BEING and Human Being.</p>
<p>This framework, which incorporates the Being Profile® assessment tool and the Transformation Methodology™, is now supporting people from all over the world to create significant economic and social benefits in their organisations and personally derive fulfilment from their contribution in life. He has since also designed and built the Genesis Framework™, a revolutionary business venture building paradigm.</p>
<p> </p>
<div><b>Obtain a copy of Human Being, by Ashkan Tashvir:</b> <a href="https://humanbeingbook.net/" target="_blank" rel="noreferrer noopener">https://humanbeingbook.net/</a></div>
<div><b>Article about the Being Framework within organisations:</b> <a href="https://engenesis.com/a/how-the-integrity-of-our-being-is-critical-to-an-organisations-performance-the-application-of-the-being-framework-in-the-workplace" target="_blank" rel="noreferrer noopener">https://engenesis.com/a/how-the-integrity-of-our-being-is-critical-to-an-organisations-performance-the-application-of-the-being-framework-in-the-workplace</a></div>
<div><b>More resources from Ashkan: </b><a href="https://ashkan.engenesis.com/" target="_blank" rel="noreferrer noopener">ashkan.engenesis.com</a></div>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ashkan Tashvir built and launched the first of several businesses at the age of fifteen and subsequently led a series of businesses to become thriving and successful enterprises across various industries. With a master’s degree in information systems management, he was amongst the youngest Certified Microsoft Trainers at the time and has worked on various technology projects for government bodies and a range of sectors, including legal, finance and hospitality. During this time, his interest in business and entrepreneurship continued to evolve and he led or advised several startups and SMEs to become sustainable, scalable ventures before becoming an investor and venture builder himself.
In addition to his extensive business and technological engineering qualifications and experience, Ashkan is a deep thinker, voracious reader and philosopher with a profound interest in and knowledge of Western and Eastern philosophy.
For more than a decade, he was driven by a quest to discover why there is so much dysfunction and suffering in the world and to find the answer to a burning question, ‘Why are we human beings the way we are and what drives our decisions, behaviours and actions?’ His quest led him to a crossroads between the realms of technology, business, leadership and philosophy.
Observing a distinct lack of logical, ontological and systematic thinking in the areas of human consciousness, transformation and leadership, particularly in terms of how they empower people to generate opportunity and wealth for themselves and others, Ashkan set his mind to using his newly discovered knowledge to devise a series of practical frameworks, tools and methodologies, one of which is the Being Framework™. The framework is laid out in his best-selling books BEING and Human Being.
This framework, which incorporates the Being Profile® assessment tool and the Transformation Methodology™, is now supporting people from all over the world to create significant economic and social benefits in their organisations and personally derive fulfilment from their contribution in life. He has since also designed and built the Genesis Framework™, a revolutionary business venture building paradigm.
 
Obtain a copy of Human Being, by Ashkan Tashvir: https://humanbeingbook.net/
Article about the Being Framework within organisations: https://engenesis.com/a/how-the-integrity-of-our-being-is-critical-to-an-organisations-performance-the-application-of-the-being-framework-in-the-workplace
More resources from Ashkan: ashkan.engenesis.com
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 136: Ashkan Tashvir]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Ashkan Tashvir built and launched the first of several businesses at the age of fifteen and subsequently led a series of businesses to become thriving and successful enterprises across various industries. With a master’s degree in information systems management, he was amongst the youngest Certified Microsoft Trainers at the time and has worked on various technology projects for government bodies and a range of sectors, including legal, finance and hospitality. During this time, his interest in business and entrepreneurship continued to evolve and he led or advised several startups and SMEs to become sustainable, scalable ventures before becoming an investor and venture builder himself.</p>
<p>In addition to his extensive business and technological engineering qualifications and experience, Ashkan is a deep thinker, voracious reader and philosopher with a profound interest in and knowledge of Western and Eastern philosophy.</p>
<p>For more than a decade, he was driven by a quest to discover why there is so much dysfunction and suffering in the world and to find the answer to a burning question, ‘Why are we human beings the way we are and what drives our decisions, behaviours and actions?’ His quest led him to a crossroads between the realms of technology, business, leadership and philosophy.</p>
<p>Observing a distinct lack of logical, ontological and systematic thinking in the areas of human consciousness, transformation and leadership, particularly in terms of how they empower people to generate opportunity and wealth for themselves and others, Ashkan set his mind to using his newly discovered knowledge to devise a series of practical frameworks, tools and methodologies, one of which is the Being Framework™. The framework is laid out in his best-selling books BEING and Human Being.</p>
<p>This framework, which incorporates the Being Profile® assessment tool and the Transformation Methodology™, is now supporting people from all over the world to create significant economic and social benefits in their organisations and personally derive fulfilment from their contribution in life. He has since also designed and built the Genesis Framework™, a revolutionary business venture building paradigm.</p>
<p> </p>
<div><b>Obtain a copy of Human Being, by Ashkan Tashvir:</b> <a href="https://humanbeingbook.net/" target="_blank" rel="noreferrer noopener">https://humanbeingbook.net/</a></div>
<div><b>Article about the Being Framework within organisations:</b> <a href="https://engenesis.com/a/how-the-integrity-of-our-being-is-critical-to-an-organisations-performance-the-application-of-the-being-framework-in-the-workplace" target="_blank" rel="noreferrer noopener">https://engenesis.com/a/how-the-integrity-of-our-being-is-critical-to-an-organisations-performance-the-application-of-the-being-framework-in-the-workplace</a></div>
<div><b>More resources from Ashkan: </b><a href="https://ashkan.engenesis.com/" target="_blank" rel="noreferrer noopener">ashkan.engenesis.com</a></div>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/922fbc29-43d7-45da-8743-18c05f937812-KBKAST-EP-Ashkan-Tashvir-Edited.mp3" length="57156700"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ashkan Tashvir built and launched the first of several businesses at the age of fifteen and subsequently led a series of businesses to become thriving and successful enterprises across various industries. With a master’s degree in information systems management, he was amongst the youngest Certified Microsoft Trainers at the time and has worked on various technology projects for government bodies and a range of sectors, including legal, finance and hospitality. During this time, his interest in business and entrepreneurship continued to evolve and he led or advised several startups and SMEs to become sustainable, scalable ventures before becoming an investor and venture builder himself.
In addition to his extensive business and technological engineering qualifications and experience, Ashkan is a deep thinker, voracious reader and philosopher with a profound interest in and knowledge of Western and Eastern philosophy.
For more than a decade, he was driven by a quest to discover why there is so much dysfunction and suffering in the world and to find the answer to a burning question, ‘Why are we human beings the way we are and what drives our decisions, behaviours and actions?’ His quest led him to a crossroads between the realms of technology, business, leadership and philosophy.
Observing a distinct lack of logical, ontological and systematic thinking in the areas of human consciousness, transformation and leadership, particularly in terms of how they empower people to generate opportunity and wealth for themselves and others, Ashkan set his mind to using his newly discovered knowledge to devise a series of practical frameworks, tools and methodologies, one of which is the Being Framework™. The framework is laid out in his best-selling books BEING and Human Being.
This framework, which incorporates the Being Profile® assessment tool and the Transformation Methodology™, is now supporting people from all over the world to create significant economic and social benefits in their organisations and personally derive fulfilment from their contribution in life. He has since also designed and built the Genesis Framework™, a revolutionary business venture building paradigm.
 
Obtain a copy of Human Being, by Ashkan Tashvir: https://humanbeingbook.net/
Article about the Being Framework within organisations: https://engenesis.com/a/how-the-integrity-of-our-being-is-critical-to-an-organisations-performance-the-application-of-the-being-framework-in-the-workplace
More resources from Ashkan: ashkan.engenesis.com
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1293190/Ashkan-Tashvir-2.png"></itunes:image>
                                                                            <itunes:duration>00:39:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 135: Anthony Woodward]]>
                </title>
                <pubDate>Wed, 12 Oct 2022 16:00:28 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1291096</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-135-anthony-woodward</link>
                                <description>
                                            <![CDATA[<p><strong>Anthony Woodward –  Chief Executive Officer, Founder &amp; Director | Mentor &amp; Advisor | Digital Transformation | Cloud | Growth | M&amp;A</strong></p>
<p>For more than 25 years, Anthony has built, scaled and run technology companies in the internet and cloud services space. By helping businesses to understand how to use technology to advance strategic objectives and enable performance, he has converted game-changing market opportunities into leading businesses as a CEO, Executive Director and Entrepreneur.</p>
<p>Leveraging access technologies to create Zip World in 1995, the market-leading retail and wholesale provider was sold to NASDAQ listed Pacific Internet (now Telstra) in 1999. He then founded Bulletproof, which he grew to be the leading end-to-end Cloud Services provider in ANZ, took public through a listing on the ASX in 2014, and led a rapid growth trajectory to c.$50m revenues in FY17 before its acquisition by AC3 in 2018. Anthony joined Logicalis Australia in July 2021, as Chief Executive Officer.</p>
<p> </p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Anthony Woodward –  Chief Executive Officer, Founder & Director | Mentor & Advisor | Digital Transformation | Cloud | Growth | M&A
For more than 25 years, Anthony has built, scaled and run technology companies in the internet and cloud services space. By helping businesses to understand how to use technology to advance strategic objectives and enable performance, he has converted game-changing market opportunities into leading businesses as a CEO, Executive Director and Entrepreneur.
Leveraging access technologies to create Zip World in 1995, the market-leading retail and wholesale provider was sold to NASDAQ listed Pacific Internet (now Telstra) in 1999. He then founded Bulletproof, which he grew to be the leading end-to-end Cloud Services provider in ANZ, took public through a listing on the ASX in 2014, and led a rapid growth trajectory to c.$50m revenues in FY17 before its acquisition by AC3 in 2018. Anthony joined Logicalis Australia in July 2021, as Chief Executive Officer.
 
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 135: Anthony Woodward]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Anthony Woodward –  Chief Executive Officer, Founder &amp; Director | Mentor &amp; Advisor | Digital Transformation | Cloud | Growth | M&amp;A</strong></p>
<p>For more than 25 years, Anthony has built, scaled and run technology companies in the internet and cloud services space. By helping businesses to understand how to use technology to advance strategic objectives and enable performance, he has converted game-changing market opportunities into leading businesses as a CEO, Executive Director and Entrepreneur.</p>
<p>Leveraging access technologies to create Zip World in 1995, the market-leading retail and wholesale provider was sold to NASDAQ listed Pacific Internet (now Telstra) in 1999. He then founded Bulletproof, which he grew to be the leading end-to-end Cloud Services provider in ANZ, took public through a listing on the ASX in 2014, and led a rapid growth trajectory to c.$50m revenues in FY17 before its acquisition by AC3 in 2018. Anthony joined Logicalis Australia in July 2021, as Chief Executive Officer.</p>
<p> </p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/42db4866-fff8-41e0-a52c-0eb0d3339282-KBKAST-EP-Anthony-Woodward.mp3" length="59218830"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Anthony Woodward –  Chief Executive Officer, Founder & Director | Mentor & Advisor | Digital Transformation | Cloud | Growth | M&A
For more than 25 years, Anthony has built, scaled and run technology companies in the internet and cloud services space. By helping businesses to understand how to use technology to advance strategic objectives and enable performance, he has converted game-changing market opportunities into leading businesses as a CEO, Executive Director and Entrepreneur.
Leveraging access technologies to create Zip World in 1995, the market-leading retail and wholesale provider was sold to NASDAQ listed Pacific Internet (now Telstra) in 1999. He then founded Bulletproof, which he grew to be the leading end-to-end Cloud Services provider in ANZ, took public through a listing on the ASX in 2014, and led a rapid growth trajectory to c.$50m revenues in FY17 before its acquisition by AC3 in 2018. Anthony joined Logicalis Australia in July 2021, as Chief Executive Officer.
 
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1291096/Anthoy-Wodward.png"></itunes:image>
                                                                            <itunes:duration>00:41:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 134: Tony Jarvis]]>
                </title>
                <pubDate>Wed, 05 Oct 2022 16:00:55 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1283167</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-134-tony-jarvis</link>
                                <description>
                                            <![CDATA[<p><a href="https://sg.linkedin.com/in/tony-jarvis"><strong>Tony Jarvis</strong></a></p>
<p><strong>Director of Enterprise Security, Asia Pacific Japan</strong></p>
<p><strong>Based in Singapore</strong></p>
<p>Tony Jarvis is a CISO advisor and cybersecurity strategist who has advised Fortune 500 clients across the world and served as a thought leader within the industry. Tony has held a variety of leadership and advisory roles with leading brands such as FireEye, Standard Chartered Bank and Telstra, and has an acute understanding of how to successfully deliver cybersecurity engagements which strategically align with business objectives. He is passionate about educating audiences on the risks posed by modern cyber threats and advises business leaders as they undertake major cybersecurity transformation projects and initiatives. Tony holds a BA of Information systems from the University of Melbourne.</p>
<p>See also: <a href="https://www.dfat.gov.au/sites/default/files/minisite/static/4ca0813c-585e-4fe1-86eb-de665e65001a/fpwhitepaper/foreign-policy-white-paper/chapter-five-keeping-australia-and-australians-safe-secure-and-free-0.html">Guarding Against Foreign Interference</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Tony Jarvis
Director of Enterprise Security, Asia Pacific Japan
Based in Singapore
Tony Jarvis is a CISO advisor and cybersecurity strategist who has advised Fortune 500 clients across the world and served as a thought leader within the industry. Tony has held a variety of leadership and advisory roles with leading brands such as FireEye, Standard Chartered Bank and Telstra, and has an acute understanding of how to successfully deliver cybersecurity engagements which strategically align with business objectives. He is passionate about educating audiences on the risks posed by modern cyber threats and advises business leaders as they undertake major cybersecurity transformation projects and initiatives. Tony holds a BA of Information systems from the University of Melbourne.
See also: Guarding Against Foreign Interference
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 134: Tony Jarvis]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><a href="https://sg.linkedin.com/in/tony-jarvis"><strong>Tony Jarvis</strong></a></p>
<p><strong>Director of Enterprise Security, Asia Pacific Japan</strong></p>
<p><strong>Based in Singapore</strong></p>
<p>Tony Jarvis is a CISO advisor and cybersecurity strategist who has advised Fortune 500 clients across the world and served as a thought leader within the industry. Tony has held a variety of leadership and advisory roles with leading brands such as FireEye, Standard Chartered Bank and Telstra, and has an acute understanding of how to successfully deliver cybersecurity engagements which strategically align with business objectives. He is passionate about educating audiences on the risks posed by modern cyber threats and advises business leaders as they undertake major cybersecurity transformation projects and initiatives. Tony holds a BA of Information systems from the University of Melbourne.</p>
<p>See also: <a href="https://www.dfat.gov.au/sites/default/files/minisite/static/4ca0813c-585e-4fe1-86eb-de665e65001a/fpwhitepaper/foreign-policy-white-paper/chapter-five-keeping-australia-and-australians-safe-secure-and-free-0.html">Guarding Against Foreign Interference</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/7129698b-7fec-48a1-88af-095772978c2b-KBKAST-EP-Tony-Jarvis.mp3" length="63274048"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Tony Jarvis
Director of Enterprise Security, Asia Pacific Japan
Based in Singapore
Tony Jarvis is a CISO advisor and cybersecurity strategist who has advised Fortune 500 clients across the world and served as a thought leader within the industry. Tony has held a variety of leadership and advisory roles with leading brands such as FireEye, Standard Chartered Bank and Telstra, and has an acute understanding of how to successfully deliver cybersecurity engagements which strategically align with business objectives. He is passionate about educating audiences on the risks posed by modern cyber threats and advises business leaders as they undertake major cybersecurity transformation projects and initiatives. Tony holds a BA of Information systems from the University of Melbourne.
See also: Guarding Against Foreign Interference
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1283167/Tony-Jarvis.png"></itunes:image>
                                                                            <itunes:duration>00:43:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 133: Scott Fletcher and Tom Walker]]>
                </title>
                <pubDate>Fri, 30 Sep 2022 16:00:40 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1284798</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-133-scott-fletcher-and-tom-walker</link>
                                <description>
                                            <![CDATA[<p><strong>Scott Fletcher</strong> is a Cloud Security Engineer at Oracle. His background includes Penetration Testing, Software Development &amp; Security Consulting. He has also held Principal Consultant roles in both Australia &amp; New Zealand, and worked for a number of enterprise and financial services organisations.</p>
<p>In an IT career spanning two decades across a range of technical implementation, architecture and leadership roles for some of Australia’s most recognised brands, <strong>Tom Walker</strong> has established a reputation for delivering the improbable whilst embedding significant and impactful organisational change on the teams he has led. An advocate for a security first culture, Tom takes a pragmatic approach to transformation, and always challenges the status quo believing “better” is only a transient state to “best”.</p>
<p><a href="https://www.linkedin.com/in/scotti-fletcher/">Scott’s LinkedIn</a> | <a href="https://www.oracle.com/">Oracle</a><br />
<a href="https://www.linkedin.com/in/tomcwalker">Tom’s LinkedIn</a> | <a href="https://www.kelima.com.au">Kelima</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Scott Fletcher is a Cloud Security Engineer at Oracle. His background includes Penetration Testing, Software Development & Security Consulting. He has also held Principal Consultant roles in both Australia & New Zealand, and worked for a number of enterprise and financial services organisations.
In an IT career spanning two decades across a range of technical implementation, architecture and leadership roles for some of Australia’s most recognised brands, Tom Walker has established a reputation for delivering the improbable whilst embedding significant and impactful organisational change on the teams he has led. An advocate for a security first culture, Tom takes a pragmatic approach to transformation, and always challenges the status quo believing “better” is only a transient state to “best”.
Scott’s LinkedIn | Oracle
Tom’s LinkedIn | Kelima
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 133: Scott Fletcher and Tom Walker]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Scott Fletcher</strong> is a Cloud Security Engineer at Oracle. His background includes Penetration Testing, Software Development &amp; Security Consulting. He has also held Principal Consultant roles in both Australia &amp; New Zealand, and worked for a number of enterprise and financial services organisations.</p>
<p>In an IT career spanning two decades across a range of technical implementation, architecture and leadership roles for some of Australia’s most recognised brands, <strong>Tom Walker</strong> has established a reputation for delivering the improbable whilst embedding significant and impactful organisational change on the teams he has led. An advocate for a security first culture, Tom takes a pragmatic approach to transformation, and always challenges the status quo believing “better” is only a transient state to “best”.</p>
<p><a href="https://www.linkedin.com/in/scotti-fletcher/">Scott’s LinkedIn</a> | <a href="https://www.oracle.com/">Oracle</a><br />
<a href="https://www.linkedin.com/in/tomcwalker">Tom’s LinkedIn</a> | <a href="https://www.kelima.com.au">Kelima</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/4d76c774-66c0-46b4-8068-8d3d102f46fb-KBKAST-EP-Scott-Fletcher-and-Tom-Walker.mp3" length="64578652"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Scott Fletcher is a Cloud Security Engineer at Oracle. His background includes Penetration Testing, Software Development & Security Consulting. He has also held Principal Consultant roles in both Australia & New Zealand, and worked for a number of enterprise and financial services organisations.
In an IT career spanning two decades across a range of technical implementation, architecture and leadership roles for some of Australia’s most recognised brands, Tom Walker has established a reputation for delivering the improbable whilst embedding significant and impactful organisational change on the teams he has led. An advocate for a security first culture, Tom takes a pragmatic approach to transformation, and always challenges the status quo believing “better” is only a transient state to “best”.
Scott’s LinkedIn | Oracle
Tom’s LinkedIn | Kelima
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1284798/KBKAST-EP-Scott-Fletcher-and-Tom-Walker.png"></itunes:image>
                                                                            <itunes:duration>00:44:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 132: Alan Jenkins]]>
                </title>
                <pubDate>Wed, 28 Sep 2022 16:00:44 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-132-alan-jenkins</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-132-alan-jenkins</link>
                                <description>
                                            <![CDATA[<p>Alan is a highly confident, effective and adaptable leader, manager &amp; team player, with some 30 years experience in all facets of security, particularly cyber and enterprise security risk management, with a focus on ‘value-at-risk’. Currently, Alan is the Director of Advisory Services for Decipher Cyber, where he works with founder Tinesh Chhaya to grow their business and deliver quality outcomes at a reasonable cost based on the value of change required in a transparent manner.</p>
<p>During his career as a senior RAF Police officer, he has accrued extensive operational exposure in the UK &amp; overseas, in both multi-national &amp; multi-agency environments, against the backdrop of a broad threat spectrum &amp; across all 3 of the so-called physical, personnel &amp; information security pillars.</p>
<p>Since leaving the RAF in 2006, he has added management consulting plus business development, delivery &amp; pre-sales experience in both Public &amp; Private sectors in the role of a Trusted Advisor &amp; SME. After spells at CSC &amp; T-Systems as UK Chief Security Officer and being responsible for end-end security governance, operations and risk, he joined Babcock International Group as their first CISO in 2013. He led the delivery of significant improvements in the Group’s cyber security capabilities to the benefit of the wider business &amp; its customers. After a year as an Independent, he later joined IBM Security in 2015 as an Associate Partner leading activities in the UK’s FinSvces Sector, where he also led the delivery of a £multi-million security workstream as part of a £1.2 billion contract with a Tier 1 Bank. He returned to freelancing in 2018, working through Cybercorre &amp; then joining a start-up, Guardian Cyber Services, in 2019, before landing an all-too-brief role at 2-Sec Consulting. He has been on contract to Hitachi Europe’s Security Business Group since October 2019 and has also been CISO-in-Residence at CyLon Labs since March of even year, supporting 2 Cohorts of startup/scale ups and supporting a CyLon Spark workshop in Oman in 2020.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Alan is a highly confident, effective and adaptable leader, manager & team player, with some 30 years experience in all facets of security, particularly cyber and enterprise security risk management, with a focus on ‘value-at-risk’. Currently, Alan is the Director of Advisory Services for Decipher Cyber, where he works with founder Tinesh Chhaya to grow their business and deliver quality outcomes at a reasonable cost based on the value of change required in a transparent manner.
During his career as a senior RAF Police officer, he has accrued extensive operational exposure in the UK & overseas, in both multi-national & multi-agency environments, against the backdrop of a broad threat spectrum & across all 3 of the so-called physical, personnel & information security pillars.
Since leaving the RAF in 2006, he has added management consulting plus business development, delivery & pre-sales experience in both Public & Private sectors in the role of a Trusted Advisor & SME. After spells at CSC & T-Systems as UK Chief Security Officer and being responsible for end-end security governance, operations and risk, he joined Babcock International Group as their first CISO in 2013. He led the delivery of significant improvements in the Group’s cyber security capabilities to the benefit of the wider business & its customers. After a year as an Independent, he later joined IBM Security in 2015 as an Associate Partner leading activities in the UK’s FinSvces Sector, where he also led the delivery of a £multi-million security workstream as part of a £1.2 billion contract with a Tier 1 Bank. He returned to freelancing in 2018, working through Cybercorre & then joining a start-up, Guardian Cyber Services, in 2019, before landing an all-too-brief role at 2-Sec Consulting. He has been on contract to Hitachi Europe’s Security Business Group since October 2019 and has also been CISO-in-Residence at CyLon Labs since March of even year, supporting 2 Cohorts of startup/scale ups and supporting a CyLon Spark workshop in Oman in 2020.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 132: Alan Jenkins]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Alan is a highly confident, effective and adaptable leader, manager &amp; team player, with some 30 years experience in all facets of security, particularly cyber and enterprise security risk management, with a focus on ‘value-at-risk’. Currently, Alan is the Director of Advisory Services for Decipher Cyber, where he works with founder Tinesh Chhaya to grow their business and deliver quality outcomes at a reasonable cost based on the value of change required in a transparent manner.</p>
<p>During his career as a senior RAF Police officer, he has accrued extensive operational exposure in the UK &amp; overseas, in both multi-national &amp; multi-agency environments, against the backdrop of a broad threat spectrum &amp; across all 3 of the so-called physical, personnel &amp; information security pillars.</p>
<p>Since leaving the RAF in 2006, he has added management consulting plus business development, delivery &amp; pre-sales experience in both Public &amp; Private sectors in the role of a Trusted Advisor &amp; SME. After spells at CSC &amp; T-Systems as UK Chief Security Officer and being responsible for end-end security governance, operations and risk, he joined Babcock International Group as their first CISO in 2013. He led the delivery of significant improvements in the Group’s cyber security capabilities to the benefit of the wider business &amp; its customers. After a year as an Independent, he later joined IBM Security in 2015 as an Associate Partner leading activities in the UK’s FinSvces Sector, where he also led the delivery of a £multi-million security workstream as part of a £1.2 billion contract with a Tier 1 Bank. He returned to freelancing in 2018, working through Cybercorre &amp; then joining a start-up, Guardian Cyber Services, in 2019, before landing an all-too-brief role at 2-Sec Consulting. He has been on contract to Hitachi Europe’s Security Business Group since October 2019 and has also been CISO-in-Residence at CyLon Labs since March of even year, supporting 2 Cohorts of startup/scale ups and supporting a CyLon Spark workshop in Oman in 2020.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/d4142262-d948-4ce5-aaa2-affc9c2d9cc0-KBKAST-EP-Alan-Jenkins.mp3" length="70514992"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Alan is a highly confident, effective and adaptable leader, manager & team player, with some 30 years experience in all facets of security, particularly cyber and enterprise security risk management, with a focus on ‘value-at-risk’. Currently, Alan is the Director of Advisory Services for Decipher Cyber, where he works with founder Tinesh Chhaya to grow their business and deliver quality outcomes at a reasonable cost based on the value of change required in a transparent manner.
During his career as a senior RAF Police officer, he has accrued extensive operational exposure in the UK & overseas, in both multi-national & multi-agency environments, against the backdrop of a broad threat spectrum & across all 3 of the so-called physical, personnel & information security pillars.
Since leaving the RAF in 2006, he has added management consulting plus business development, delivery & pre-sales experience in both Public & Private sectors in the role of a Trusted Advisor & SME. After spells at CSC & T-Systems as UK Chief Security Officer and being responsible for end-end security governance, operations and risk, he joined Babcock International Group as their first CISO in 2013. He led the delivery of significant improvements in the Group’s cyber security capabilities to the benefit of the wider business & its customers. After a year as an Independent, he later joined IBM Security in 2015 as an Associate Partner leading activities in the UK’s FinSvces Sector, where he also led the delivery of a £multi-million security workstream as part of a £1.2 billion contract with a Tier 1 Bank. He returned to freelancing in 2018, working through Cybercorre & then joining a start-up, Guardian Cyber Services, in 2019, before landing an all-too-brief role at 2-Sec Consulting. He has been on contract to Hitachi Europe’s Security Business Group since October 2019 and has also been CISO-in-Residence at CyLon Labs since March of even year, supporting 2 Cohorts of startup/scale ups and supporting a CyLon Spark workshop in Oman in 2020.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1282846/1700181093-KBKAST-EP-132-Alan-Jenkins.png"></itunes:image>
                                                                            <itunes:duration>00:48:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 131: Kylie Watson]]>
                </title>
                <pubDate>Wed, 21 Sep 2022 16:00:06 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/kylie-watson</guid>
                                    <link>https://kbkast.castos.com/episodes/kylie-watson</link>
                                <description>
                                            <![CDATA[<p>Kylie is the Lead Client Partner for Defence and National Security in Australia and New Zealand at IBM with the remit to helping solve some of the nation’s more complex national security problems with consulting specialities in data, AI, automation, cyber security, hybrid cloud, openshift, innovative technologies and agile processes. Kylie previously ran Cybersecurity for IBM Consulting as well as Hybrid Cloud and Cloud Security for all industries across A/NZ.  Prior to that she was a Risk Partner managing Cybersecurity and data analytics for government clients at Deloitte and a Lead Client Partner for Defence on Risk.</p>
<p>Kylie has a strong interest in human behaviour in regards to technologies including users and cyber criminal behaviour, and regularly advises clients on strengthening security based on her insights. She is both a Sociologist and a Technologist with experience and degrees in sociology, management, cyber and data. She has advised and managed clients across Australia, New Zealand, South Africa, Thailand, Singapore, Malaysia, Japan and Korea with innovation, data management, advanced analytics and security.</p>
<p>Her insights into cyber warfare and criminal activity hinge on the human side of malicious attacks with an intent to determine the intent of the actors, degree of maliciousness and to help teams prepare their cyber defence (or level of offence). Kylie holds a top secret Australian government security clearance. On top of that she loves exploring why people are drawn to cyber crime.</p>
<p>Kylie has won awards for innovation, new products/services, business and community service and has a track record of leading large multifaceted teams of hundreds of people with deep technical expertise on technology projects and programs for consulting budgets as large as $300M+. In her spare time she is the Chair of a Charity Think Tank the National Institute for Strategic Resilience (NISR) that seeks to gather perspectives and encourage diversity of thought on national resilience and security policy…. and can be seen on the basketball court most weekends managing junior premier league teams, coaching, mentoring emerging coaches, and watching her children play.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kylie is the Lead Client Partner for Defence and National Security in Australia and New Zealand at IBM with the remit to helping solve some of the nation’s more complex national security problems with consulting specialities in data, AI, automation, cyber security, hybrid cloud, openshift, innovative technologies and agile processes. Kylie previously ran Cybersecurity for IBM Consulting as well as Hybrid Cloud and Cloud Security for all industries across A/NZ.  Prior to that she was a Risk Partner managing Cybersecurity and data analytics for government clients at Deloitte and a Lead Client Partner for Defence on Risk.
Kylie has a strong interest in human behaviour in regards to technologies including users and cyber criminal behaviour, and regularly advises clients on strengthening security based on her insights. She is both a Sociologist and a Technologist with experience and degrees in sociology, management, cyber and data. She has advised and managed clients across Australia, New Zealand, South Africa, Thailand, Singapore, Malaysia, Japan and Korea with innovation, data management, advanced analytics and security.
Her insights into cyber warfare and criminal activity hinge on the human side of malicious attacks with an intent to determine the intent of the actors, degree of maliciousness and to help teams prepare their cyber defence (or level of offence). Kylie holds a top secret Australian government security clearance. On top of that she loves exploring why people are drawn to cyber crime.
Kylie has won awards for innovation, new products/services, business and community service and has a track record of leading large multifaceted teams of hundreds of people with deep technical expertise on technology projects and programs for consulting budgets as large as $300M+. In her spare time she is the Chair of a Charity Think Tank the National Institute for Strategic Resilience (NISR) that seeks to gather perspectives and encourage diversity of thought on national resilience and security policy…. and can be seen on the basketball court most weekends managing junior premier league teams, coaching, mentoring emerging coaches, and watching her children play.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 131: Kylie Watson]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Kylie is the Lead Client Partner for Defence and National Security in Australia and New Zealand at IBM with the remit to helping solve some of the nation’s more complex national security problems with consulting specialities in data, AI, automation, cyber security, hybrid cloud, openshift, innovative technologies and agile processes. Kylie previously ran Cybersecurity for IBM Consulting as well as Hybrid Cloud and Cloud Security for all industries across A/NZ.  Prior to that she was a Risk Partner managing Cybersecurity and data analytics for government clients at Deloitte and a Lead Client Partner for Defence on Risk.</p>
<p>Kylie has a strong interest in human behaviour in regards to technologies including users and cyber criminal behaviour, and regularly advises clients on strengthening security based on her insights. She is both a Sociologist and a Technologist with experience and degrees in sociology, management, cyber and data. She has advised and managed clients across Australia, New Zealand, South Africa, Thailand, Singapore, Malaysia, Japan and Korea with innovation, data management, advanced analytics and security.</p>
<p>Her insights into cyber warfare and criminal activity hinge on the human side of malicious attacks with an intent to determine the intent of the actors, degree of maliciousness and to help teams prepare their cyber defence (or level of offence). Kylie holds a top secret Australian government security clearance. On top of that she loves exploring why people are drawn to cyber crime.</p>
<p>Kylie has won awards for innovation, new products/services, business and community service and has a track record of leading large multifaceted teams of hundreds of people with deep technical expertise on technology projects and programs for consulting budgets as large as $300M+. In her spare time she is the Chair of a Charity Think Tank the National Institute for Strategic Resilience (NISR) that seeks to gather perspectives and encourage diversity of thought on national resilience and security policy…. and can be seen on the basketball court most weekends managing junior premier league teams, coaching, mentoring emerging coaches, and watching her children play.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/a27514ae-1cde-4d81-8f89-7193c63f0be0-KBKAST-EP-Kylie-Watson.mp3" length="64142938"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kylie is the Lead Client Partner for Defence and National Security in Australia and New Zealand at IBM with the remit to helping solve some of the nation’s more complex national security problems with consulting specialities in data, AI, automation, cyber security, hybrid cloud, openshift, innovative technologies and agile processes. Kylie previously ran Cybersecurity for IBM Consulting as well as Hybrid Cloud and Cloud Security for all industries across A/NZ.  Prior to that she was a Risk Partner managing Cybersecurity and data analytics for government clients at Deloitte and a Lead Client Partner for Defence on Risk.
Kylie has a strong interest in human behaviour in regards to technologies including users and cyber criminal behaviour, and regularly advises clients on strengthening security based on her insights. She is both a Sociologist and a Technologist with experience and degrees in sociology, management, cyber and data. She has advised and managed clients across Australia, New Zealand, South Africa, Thailand, Singapore, Malaysia, Japan and Korea with innovation, data management, advanced analytics and security.
Her insights into cyber warfare and criminal activity hinge on the human side of malicious attacks with an intent to determine the intent of the actors, degree of maliciousness and to help teams prepare their cyber defence (or level of offence). Kylie holds a top secret Australian government security clearance. On top of that she loves exploring why people are drawn to cyber crime.
Kylie has won awards for innovation, new products/services, business and community service and has a track record of leading large multifaceted teams of hundreds of people with deep technical expertise on technology projects and programs for consulting budgets as large as $300M+. In her spare time she is the Chair of a Charity Think Tank the National Institute for Strategic Resilience (NISR) that seeks to gather perspectives and encourage diversity of thought on national resilience and security policy…. and can be seen on the basketball court most weekends managing junior premier league teams, coaching, mentoring emerging coaches, and watching her children play.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1274282/1700181093-Kylie-watson.png"></itunes:image>
                                                                            <itunes:duration>00:44:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 130: Apurva Chiranewala]]>
                </title>
                <pubDate>Fri, 16 Sep 2022 16:00:59 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-130-apurva-chiranewala</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-130-apurva-chiranewala</link>
                                <description>
                                            <![CDATA[<p>Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and expansion, and builds strategic partnerships.</p>
<p>Formerly head of shipping at eBay and chief development officer at fast-growing logistics scale-up Sendle, Chiranewala has worked in a number of high-profile leadership roles at large corporations and startups alike.</p>
<p>As an early pioneer in eCommerce, Chiranewala has closely witnessed the disruption of traditional retail and shipping industries globally during his career first at Snapdeal, one of India’s earliest eCommerce unicorns, at <a class="c-link" href="https://catch.com/" target="_blank" rel="noreferrer noopener">Catch.com</a> and Sendle here in Australia. Chiranewala foresees a parallel path of disruption happening now due to blockchain technology in the traditional finance space.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and expansion, and builds strategic partnerships.
Formerly head of shipping at eBay and chief development officer at fast-growing logistics scale-up Sendle, Chiranewala has worked in a number of high-profile leadership roles at large corporations and startups alike.
As an early pioneer in eCommerce, Chiranewala has closely witnessed the disruption of traditional retail and shipping industries globally during his career first at Snapdeal, one of India’s earliest eCommerce unicorns, at Catch.com and Sendle here in Australia. Chiranewala foresees a parallel path of disruption happening now due to blockchain technology in the traditional finance space.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 130: Apurva Chiranewala]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and expansion, and builds strategic partnerships.</p>
<p>Formerly head of shipping at eBay and chief development officer at fast-growing logistics scale-up Sendle, Chiranewala has worked in a number of high-profile leadership roles at large corporations and startups alike.</p>
<p>As an early pioneer in eCommerce, Chiranewala has closely witnessed the disruption of traditional retail and shipping industries globally during his career first at Snapdeal, one of India’s earliest eCommerce unicorns, at <a class="c-link" href="https://catch.com/" target="_blank" rel="noreferrer noopener">Catch.com</a> and Sendle here in Australia. Chiranewala foresees a parallel path of disruption happening now due to blockchain technology in the traditional finance space.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/30b2f431-5c7b-44ef-be23-1b8229c8adc1-KBKAST-EP-Apurva-Chiranewala.mp3" length="78099764"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and expansion, and builds strategic partnerships.
Formerly head of shipping at eBay and chief development officer at fast-growing logistics scale-up Sendle, Chiranewala has worked in a number of high-profile leadership roles at large corporations and startups alike.
As an early pioneer in eCommerce, Chiranewala has closely witnessed the disruption of traditional retail and shipping industries globally during his career first at Snapdeal, one of India’s earliest eCommerce unicorns, at Catch.com and Sendle here in Australia. Chiranewala foresees a parallel path of disruption happening now due to blockchain technology in the traditional finance space.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1271415/1700181094-Featured-image-2.png"></itunes:image>
                                                                            <itunes:duration>00:54:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 129: Jake Moore]]>
                </title>
                <pubDate>Wed, 14 Sep 2022 16:00:34 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-129-jake-moore</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-129-jake-moore</link>
                                <description>
                                            <![CDATA[<div>Jake Moore is the Global Cybersecurity Advisor for ESET. He helps businesses and employees understand cybersecurity and the risks involved to remain better protected. Jake previously worked for Dorset Police for 14 years investigating computer crime in the Digital Forensics Unit before being a cybersecurity advisor for the force delivering tailored advice to the public and local businesses.</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jake Moore is the Global Cybersecurity Advisor for ESET. He helps businesses and employees understand cybersecurity and the risks involved to remain better protected. Jake previously worked for Dorset Police for 14 years investigating computer crime in the Digital Forensics Unit before being a cybersecurity advisor for the force delivering tailored advice to the public and local businesses.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 129: Jake Moore]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div>Jake Moore is the Global Cybersecurity Advisor for ESET. He helps businesses and employees understand cybersecurity and the risks involved to remain better protected. Jake previously worked for Dorset Police for 14 years investigating computer crime in the Digital Forensics Unit before being a cybersecurity advisor for the force delivering tailored advice to the public and local businesses.</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/d91ef25b-1bd5-421c-93c8-3e6eaec64698-KBKAST-EP-Jake-Moore.mp3" length="61989634"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jake Moore is the Global Cybersecurity Advisor for ESET. He helps businesses and employees understand cybersecurity and the risks involved to remain better protected. Jake previously worked for Dorset Police for 14 years investigating computer crime in the Digital Forensics Unit before being a cybersecurity advisor for the force delivering tailored advice to the public and local businesses.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1270102/c1a-5k0v-5zg2jd8vf78k-3ojxts.png"></itunes:image>
                                                                            <itunes:duration>00:43:00</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 128: Chirag Joshi]]>
                </title>
                <pubDate>Wed, 07 Sep 2022 16:00:53 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-128-chirag-joshi</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-128-chirag-joshi</link>
                                <description>
                                            <![CDATA[<p>Chirag’s ambitious goal is simple—to enable human progress through technology. To accomplish this, he wants to help build a world where there is trust in digital systems, protection against cyber threats, and a safe environment online for communication, commerce, and engagement. He is especially passionate about the safety of children and vulnerable sections of society online. This goal has served as a motivation that has led Chirag to become a sought-after speaker and advocate at various industry-leading conferences and events. Chirag is respected as a thought leader in cyber security with keynotes and presentations at forums in United States, Australia, and Asia. His podcast features insights from distinguished professionals in a wide range of disciplines including media, entrepreneurship, executive leadership, and futurology.</p>
<p>He is the author of the highly successful book “7 Rules to Influence Behaviour and Win at Cyber Security Awareness” which has been purchased in over 11 countries across the world and became an Amazon Australia Best-Seller in its category.</p>
<p>During the course of his career spanning across multiple sectors and countries, he has built, implemented, and successfully managed cyber security, risk management, compliance, and awareness programs. The success of these programs was a result of unyielding focus on business priorities, a pragmatic approach to cyber threats, and most importantly, effective stakeholder engagement. Chirag has held senior leadership positions in large, complex organisations and excels at the art of translating business and technical speak in a manner that optimises value.</p>
<p>Chirag has also conducted several successful cyber security education sessions for executives and non-technical audiences in diverse industries such as finance, energy, healthcare, and higher education. He has led teams, managed multi-million-dollar budget and transformation programs. He has experience in both IT and OT environments, and leading cyber security through de-mergers and divestments.</p>
<p>Chirag has extensive experience with a wide range of standards, frameworks and regulations including NIST CSF, APRA CPS 234, AESCSF, PCI DSS, Health Insurance Portability and Accountability Act (HIPAA) and ISO 27001/2.</p>
<p>Chirag’s academic qualifications include a master’s degree in telecommunications management from Oklahoma State University and a bachelor’s degree in electronics and telecommunications engineering from the University of Mumbai. He holds multiple certifications, including Certified Information Security Manager, Certified Information Systems Auditor, Certified in Risk and Information Systems Control, and Certified Data Privacy Solutions Engineer.</p>
<p>His areas of expertise include strategic cyber advisory to executives, cyber risk management, cyber strategy and architecture, security and technology governance, cyber transformation programs and security awareness training.</p>
<p>Get a copy of <strong>7 Rules to Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals </strong>on <a href="https://www.amazon.com.au/dp/0648662381">Amazon</a> and <a href="https://www.chiragdjoshi.com/">Chirag’s website</a>.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Chirag’s ambitious goal is simple—to enable human progress through technology. To accomplish this, he wants to help build a world where there is trust in digital systems, protection against cyber threats, and a safe environment online for communication, commerce, and engagement. He is especially passionate about the safety of children and vulnerable sections of society online. This goal has served as a motivation that has led Chirag to become a sought-after speaker and advocate at various industry-leading conferences and events. Chirag is respected as a thought leader in cyber security with keynotes and presentations at forums in United States, Australia, and Asia. His podcast features insights from distinguished professionals in a wide range of disciplines including media, entrepreneurship, executive leadership, and futurology.
He is the author of the highly successful book “7 Rules to Influence Behaviour and Win at Cyber Security Awareness” which has been purchased in over 11 countries across the world and became an Amazon Australia Best-Seller in its category.
During the course of his career spanning across multiple sectors and countries, he has built, implemented, and successfully managed cyber security, risk management, compliance, and awareness programs. The success of these programs was a result of unyielding focus on business priorities, a pragmatic approach to cyber threats, and most importantly, effective stakeholder engagement. Chirag has held senior leadership positions in large, complex organisations and excels at the art of translating business and technical speak in a manner that optimises value.
Chirag has also conducted several successful cyber security education sessions for executives and non-technical audiences in diverse industries such as finance, energy, healthcare, and higher education. He has led teams, managed multi-million-dollar budget and transformation programs. He has experience in both IT and OT environments, and leading cyber security through de-mergers and divestments.
Chirag has extensive experience with a wide range of standards, frameworks and regulations including NIST CSF, APRA CPS 234, AESCSF, PCI DSS, Health Insurance Portability and Accountability Act (HIPAA) and ISO 27001/2.
Chirag’s academic qualifications include a master’s degree in telecommunications management from Oklahoma State University and a bachelor’s degree in electronics and telecommunications engineering from the University of Mumbai. He holds multiple certifications, including Certified Information Security Manager, Certified Information Systems Auditor, Certified in Risk and Information Systems Control, and Certified Data Privacy Solutions Engineer.
His areas of expertise include strategic cyber advisory to executives, cyber risk management, cyber strategy and architecture, security and technology governance, cyber transformation programs and security awareness training.
Get a copy of 7 Rules to Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals on Amazon and Chirag’s website.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 128: Chirag Joshi]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Chirag’s ambitious goal is simple—to enable human progress through technology. To accomplish this, he wants to help build a world where there is trust in digital systems, protection against cyber threats, and a safe environment online for communication, commerce, and engagement. He is especially passionate about the safety of children and vulnerable sections of society online. This goal has served as a motivation that has led Chirag to become a sought-after speaker and advocate at various industry-leading conferences and events. Chirag is respected as a thought leader in cyber security with keynotes and presentations at forums in United States, Australia, and Asia. His podcast features insights from distinguished professionals in a wide range of disciplines including media, entrepreneurship, executive leadership, and futurology.</p>
<p>He is the author of the highly successful book “7 Rules to Influence Behaviour and Win at Cyber Security Awareness” which has been purchased in over 11 countries across the world and became an Amazon Australia Best-Seller in its category.</p>
<p>During the course of his career spanning across multiple sectors and countries, he has built, implemented, and successfully managed cyber security, risk management, compliance, and awareness programs. The success of these programs was a result of unyielding focus on business priorities, a pragmatic approach to cyber threats, and most importantly, effective stakeholder engagement. Chirag has held senior leadership positions in large, complex organisations and excels at the art of translating business and technical speak in a manner that optimises value.</p>
<p>Chirag has also conducted several successful cyber security education sessions for executives and non-technical audiences in diverse industries such as finance, energy, healthcare, and higher education. He has led teams, managed multi-million-dollar budget and transformation programs. He has experience in both IT and OT environments, and leading cyber security through de-mergers and divestments.</p>
<p>Chirag has extensive experience with a wide range of standards, frameworks and regulations including NIST CSF, APRA CPS 234, AESCSF, PCI DSS, Health Insurance Portability and Accountability Act (HIPAA) and ISO 27001/2.</p>
<p>Chirag’s academic qualifications include a master’s degree in telecommunications management from Oklahoma State University and a bachelor’s degree in electronics and telecommunications engineering from the University of Mumbai. He holds multiple certifications, including Certified Information Security Manager, Certified Information Systems Auditor, Certified in Risk and Information Systems Control, and Certified Data Privacy Solutions Engineer.</p>
<p>His areas of expertise include strategic cyber advisory to executives, cyber risk management, cyber strategy and architecture, security and technology governance, cyber transformation programs and security awareness training.</p>
<p>Get a copy of <strong>7 Rules to Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals </strong>on <a href="https://www.amazon.com.au/dp/0648662381">Amazon</a> and <a href="https://www.chiragdjoshi.com/">Chirag’s website</a>.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/dde52840-5cc2-4ecc-b415-b1d8e810f14e-KBKAST-EP-Chirag-Joshi.mp3" length="52213256"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Chirag’s ambitious goal is simple—to enable human progress through technology. To accomplish this, he wants to help build a world where there is trust in digital systems, protection against cyber threats, and a safe environment online for communication, commerce, and engagement. He is especially passionate about the safety of children and vulnerable sections of society online. This goal has served as a motivation that has led Chirag to become a sought-after speaker and advocate at various industry-leading conferences and events. Chirag is respected as a thought leader in cyber security with keynotes and presentations at forums in United States, Australia, and Asia. His podcast features insights from distinguished professionals in a wide range of disciplines including media, entrepreneurship, executive leadership, and futurology.
He is the author of the highly successful book “7 Rules to Influence Behaviour and Win at Cyber Security Awareness” which has been purchased in over 11 countries across the world and became an Amazon Australia Best-Seller in its category.
During the course of his career spanning across multiple sectors and countries, he has built, implemented, and successfully managed cyber security, risk management, compliance, and awareness programs. The success of these programs was a result of unyielding focus on business priorities, a pragmatic approach to cyber threats, and most importantly, effective stakeholder engagement. Chirag has held senior leadership positions in large, complex organisations and excels at the art of translating business and technical speak in a manner that optimises value.
Chirag has also conducted several successful cyber security education sessions for executives and non-technical audiences in diverse industries such as finance, energy, healthcare, and higher education. He has led teams, managed multi-million-dollar budget and transformation programs. He has experience in both IT and OT environments, and leading cyber security through de-mergers and divestments.
Chirag has extensive experience with a wide range of standards, frameworks and regulations including NIST CSF, APRA CPS 234, AESCSF, PCI DSS, Health Insurance Portability and Accountability Act (HIPAA) and ISO 27001/2.
Chirag’s academic qualifications include a master’s degree in telecommunications management from Oklahoma State University and a bachelor’s degree in electronics and telecommunications engineering from the University of Mumbai. He holds multiple certifications, including Certified Information Security Manager, Certified Information Systems Auditor, Certified in Risk and Information Systems Control, and Certified Data Privacy Solutions Engineer.
His areas of expertise include strategic cyber advisory to executives, cyber risk management, cyber strategy and architecture, security and technology governance, cyber transformation programs and security awareness training.
Get a copy of 7 Rules to Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals on Amazon and Chirag’s website.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1255091/1700181095-Chirag-Joshi.png"></itunes:image>
                                                                            <itunes:duration>00:36:13</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 127: John Pironti]]>
                </title>
                <pubDate>Fri, 02 Sep 2022 16:00:16 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-127-john-pironti</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-127-john-pironti</link>
                                <description>
                                            <![CDATA[<p>With over 20 years experience in information technology, John is an accomplished consulting practice leader, management and sales consultant, published author and writer, global thought leader in information risk management and security, governance, risk, and compliance.  John addresses business, technology, and compliance issues on a global scale.</p>
<p>See also: <a href="https://kbi.media/wp-content/uploads/2022/09/ISACA_SupplyChain_Block_Infographic_INI_copy.pdf">ISACA Supply Chain Block Infographic</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[With over 20 years experience in information technology, John is an accomplished consulting practice leader, management and sales consultant, published author and writer, global thought leader in information risk management and security, governance, risk, and compliance.  John addresses business, technology, and compliance issues on a global scale.
See also: ISACA Supply Chain Block Infographic
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 127: John Pironti]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>With over 20 years experience in information technology, John is an accomplished consulting practice leader, management and sales consultant, published author and writer, global thought leader in information risk management and security, governance, risk, and compliance.  John addresses business, technology, and compliance issues on a global scale.</p>
<p>See also: <a href="https://kbi.media/wp-content/uploads/2022/09/ISACA_SupplyChain_Block_Infographic_INI_copy.pdf">ISACA Supply Chain Block Infographic</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/fecf8e45-8393-46b6-8936-b9218c7d9183-KBKAST-EP-127-John-Pironti.mp3" length="72063987"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[With over 20 years experience in information technology, John is an accomplished consulting practice leader, management and sales consultant, published author and writer, global thought leader in information risk management and security, governance, risk, and compliance.  John addresses business, technology, and compliance issues on a global scale.
See also: ISACA Supply Chain Block Infographic
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1256293/c1a-5k0v-xxv59gqzs9qd-fuk5k8.png"></itunes:image>
                                                                            <itunes:duration>00:50:00</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 126: Andrew Slater]]>
                </title>
                <pubDate>Wed, 31 Aug 2022 16:00:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-126-andrew-slater</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-126-andrew-slater</link>
                                <description>
                                            <![CDATA[<p dir="ltr">Starting his career in Army Signals, Andrew has spent the last 20+ years working across a variety of ICT roles. As a Technologist, with a passion for security Andrew has designed and delivered secure solutions across Government and Private organisations.</p>
<p dir="ltr">In his current role as the Director of AUSHIELD, Andrew leads Cybermerc’s technical teams to deliver sovereign cyber threat intelligence solutions along with protecting Australian organisations.</p>
<p dir="ltr">Andrew is regularly engaged for bespoke technical research and enjoys giving back to the industry through volunteer work and technical presentations at conferences.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Starting his career in Army Signals, Andrew has spent the last 20+ years working across a variety of ICT roles. As a Technologist, with a passion for security Andrew has designed and delivered secure solutions across Government and Private organisations.
In his current role as the Director of AUSHIELD, Andrew leads Cybermerc’s technical teams to deliver sovereign cyber threat intelligence solutions along with protecting Australian organisations.
Andrew is regularly engaged for bespoke technical research and enjoys giving back to the industry through volunteer work and technical presentations at conferences.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 126: Andrew Slater]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p dir="ltr">Starting his career in Army Signals, Andrew has spent the last 20+ years working across a variety of ICT roles. As a Technologist, with a passion for security Andrew has designed and delivered secure solutions across Government and Private organisations.</p>
<p dir="ltr">In his current role as the Director of AUSHIELD, Andrew leads Cybermerc’s technical teams to deliver sovereign cyber threat intelligence solutions along with protecting Australian organisations.</p>
<p dir="ltr">Andrew is regularly engaged for bespoke technical research and enjoys giving back to the industry through volunteer work and technical presentations at conferences.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/0f34e992-689f-4348-93a2-a80bba391030-KBKAST-EP-Andrew-Slater.mp3" length="58383740"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Starting his career in Army Signals, Andrew has spent the last 20+ years working across a variety of ICT roles. As a Technologist, with a passion for security Andrew has designed and delivered secure solutions across Government and Private organisations.
In his current role as the Director of AUSHIELD, Andrew leads Cybermerc’s technical teams to deliver sovereign cyber threat intelligence solutions along with protecting Australian organisations.
Andrew is regularly engaged for bespoke technical research and enjoys giving back to the industry through volunteer work and technical presentations at conferences.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1248946/1700181095-Andrew-Slater.png"></itunes:image>
                                                                            <itunes:duration>00:40:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 125: William Makdessi]]>
                </title>
                <pubDate>Wed, 24 Aug 2022 16:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-125-william-makdessi</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-125-william-makdessi</link>
                                <description>
                                            <![CDATA[<p>William is an IT Professional and ISACA-certified Cyber Security Auditor with over 15 years experience in Networks and Information Technology across a broad range of industries including local government, insurance, public health, construction, automotive and commercial design.</p>
<p>William is the Cyber Risk Lead at InConsult, helping organisations to develop or improve their Cyber Resilience. In recent years, he has worked with a large number of Local Government Areas, State Government, Insurers and Health Insurers to assess maturity, aid in continual improvement and even develop complete frameworks from scratch in line with ISO 27001, APRA CPS 234 and the NIST Cyber Security Framework.</p>
<p>With a highly technical background, William provides a uniquely personal point of view having dealt with threats first hand. Through framework development, awareness training, phishing campaigns and much more, he is on a mission to help critical areas of Australian business better prepare rather than waiting around to respond.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[William is an IT Professional and ISACA-certified Cyber Security Auditor with over 15 years experience in Networks and Information Technology across a broad range of industries including local government, insurance, public health, construction, automotive and commercial design.
William is the Cyber Risk Lead at InConsult, helping organisations to develop or improve their Cyber Resilience. In recent years, he has worked with a large number of Local Government Areas, State Government, Insurers and Health Insurers to assess maturity, aid in continual improvement and even develop complete frameworks from scratch in line with ISO 27001, APRA CPS 234 and the NIST Cyber Security Framework.
With a highly technical background, William provides a uniquely personal point of view having dealt with threats first hand. Through framework development, awareness training, phishing campaigns and much more, he is on a mission to help critical areas of Australian business better prepare rather than waiting around to respond.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 125: William Makdessi]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>William is an IT Professional and ISACA-certified Cyber Security Auditor with over 15 years experience in Networks and Information Technology across a broad range of industries including local government, insurance, public health, construction, automotive and commercial design.</p>
<p>William is the Cyber Risk Lead at InConsult, helping organisations to develop or improve their Cyber Resilience. In recent years, he has worked with a large number of Local Government Areas, State Government, Insurers and Health Insurers to assess maturity, aid in continual improvement and even develop complete frameworks from scratch in line with ISO 27001, APRA CPS 234 and the NIST Cyber Security Framework.</p>
<p>With a highly technical background, William provides a uniquely personal point of view having dealt with threats first hand. Through framework development, awareness training, phishing campaigns and much more, he is on a mission to help critical areas of Australian business better prepare rather than waiting around to respond.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/c72467c2-36e8-412e-8ef4-eabb144cd9de-KBKast-EP-125-William-Makdessi-final.mp3" length="58232612"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[William is an IT Professional and ISACA-certified Cyber Security Auditor with over 15 years experience in Networks and Information Technology across a broad range of industries including local government, insurance, public health, construction, automotive and commercial design.
William is the Cyber Risk Lead at InConsult, helping organisations to develop or improve their Cyber Resilience. In recent years, he has worked with a large number of Local Government Areas, State Government, Insurers and Health Insurers to assess maturity, aid in continual improvement and even develop complete frameworks from scratch in line with ISO 27001, APRA CPS 234 and the NIST Cyber Security Framework.
With a highly technical background, William provides a uniquely personal point of view having dealt with threats first hand. Through framework development, awareness training, phishing campaigns and much more, he is on a mission to help critical areas of Australian business better prepare rather than waiting around to respond.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1242727/c1a-5k0v-8d4pjo56upr5-ot2l2v.png"></itunes:image>
                                                                            <itunes:duration>00:40:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 124: Kevin Chen]]>
                </title>
                <pubDate>Fri, 19 Aug 2022 16:00:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-124-kevin-chen</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-124-kevin-chen</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Kevin Chen is one of the pioneer preachers of the Chinese blockchain industry and a well experienced international investor in the Fintech industry. He has achieved successful business investment and management experience in China, Malaysia, Hong Kong, Dubai and Australia. Kevin is the founder of Australia KJ Strategic Investment Pty Ltd and CloudTech Group and served as the Chief Strategic Officer of China Fortune Holdings Limited during 2017-2019 and the Financial Director of Country Heights Holding Berhad, Malaysia, from 2020-2022. As one of the most well-known institutional investors in the blockchain industry, Kevin is actively involved in project incubation and early investment. He has been an angel investor in many well-known projects, such as Binance, VeChain and aelf cloud network. After founding CloudTech Group in Dubai and Australia, he led the team to successfully establish the Blockchain World Summit and host the DCS 2021 summit in Dubai.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kevin Chen is one of the pioneer preachers of the Chinese blockchain industry and a well experienced international investor in the Fintech industry. He has achieved successful business investment and management experience in China, Malaysia, Hong Kong, Dubai and Australia. Kevin is the founder of Australia KJ Strategic Investment Pty Ltd and CloudTech Group and served as the Chief Strategic Officer of China Fortune Holdings Limited during 2017-2019 and the Financial Director of Country Heights Holding Berhad, Malaysia, from 2020-2022. As one of the most well-known institutional investors in the blockchain industry, Kevin is actively involved in project incubation and early investment. He has been an angel investor in many well-known projects, such as Binance, VeChain and aelf cloud network. After founding CloudTech Group in Dubai and Australia, he led the team to successfully establish the Blockchain World Summit and host the DCS 2021 summit in Dubai.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 124: Kevin Chen]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Kevin Chen is one of the pioneer preachers of the Chinese blockchain industry and a well experienced international investor in the Fintech industry. He has achieved successful business investment and management experience in China, Malaysia, Hong Kong, Dubai and Australia. Kevin is the founder of Australia KJ Strategic Investment Pty Ltd and CloudTech Group and served as the Chief Strategic Officer of China Fortune Holdings Limited during 2017-2019 and the Financial Director of Country Heights Holding Berhad, Malaysia, from 2020-2022. As one of the most well-known institutional investors in the blockchain industry, Kevin is actively involved in project incubation and early investment. He has been an angel investor in many well-known projects, such as Binance, VeChain and aelf cloud network. After founding CloudTech Group in Dubai and Australia, he led the team to successfully establish the Blockchain World Summit and host the DCS 2021 summit in Dubai.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3d0fc07e-7aac-4b15-988d-bfabba25210b-KBKast-EP-Kevin-Chen.mp3" length="57276068"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kevin Chen is one of the pioneer preachers of the Chinese blockchain industry and a well experienced international investor in the Fintech industry. He has achieved successful business investment and management experience in China, Malaysia, Hong Kong, Dubai and Australia. Kevin is the founder of Australia KJ Strategic Investment Pty Ltd and CloudTech Group and served as the Chief Strategic Officer of China Fortune Holdings Limited during 2017-2019 and the Financial Director of Country Heights Holding Berhad, Malaysia, from 2020-2022. As one of the most well-known institutional investors in the blockchain industry, Kevin is actively involved in project incubation and early investment. He has been an angel investor in many well-known projects, such as Binance, VeChain and aelf cloud network. After founding CloudTech Group in Dubai and Australia, he led the team to successfully establish the Blockchain World Summit and host the DCS 2021 summit in Dubai.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1237364/1700181096-Kevin-Chen-final.png"></itunes:image>
                                                                            <itunes:duration>00:39:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 123: Jim Bates]]>
                </title>
                <pubDate>Wed, 17 Aug 2022 16:00:49 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-123-jim-bates</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-123-jim-bates</link>
                                <description>
                                            <![CDATA[<p>Jim Bates, PMP (certified Project Management Professional) is the founder, President and CEO of Business Improvement Group, Inc. (<a href="https://www.go-big.com/">BIG</a>) and an Adjunct Professor in several schools at the University of Alaska Anchorage (UAA), including the Master of Science in Project Management (<a href="https://www.uaa.alaska.edu/academics/college-of-engineering/departments/engineering-science-project-management/degree-programs-espm/pm/ms-project-management.cshtml">MSPM</a>) program. Jim has served in various volunteer roles with the Project Management Institute Alaska Chapter (PMIAK) Since 2011 and served as Chapter President from October 2019 through December 2021.</p>
<p>Jim’s vast career spans 40+ years with proficiencies in Business Management, Project Management, and Information Technology. Jim is a certified leadership coach with <a href="https://www.giant.tv/jimbates">GiANT</a>, a Lean Six Sigma Master Black Belt, and holds Master Certificates in Business Analysis, Lean Six Sigma, and Project Management from Villanova University. Jim has been published in <a href="https://magazine.cioreview.com/July-2014/PublicSector/"><strong><em>CIO Review</em></strong></a> and <a href="https://www.govtech.com/state/Alaska-Monitors-Lights-Out-Data-Center-via-the-Cloud.html"><strong><em>Government Technology</em></strong></a> magazines among various other publications, and is a public speaker and renown expert on leadership, business process improvement, project management, and information technology.</p>
<p>Jim is an experienced executive and consultant who is passionate about leading business transformation and offering innovative, high-value solutions to everyday business challenges. He has a proven ability to successfully analyze an organization’s critical business requirements, identify deficiencies and potential opportunities, and align and integrate technology. He strives to help companies develop innovative and cost-effective solutions for enhancing competitiveness, increasing revenues, and improving customer service offerings.</p>
<p>Jim and his wife, Mechelle, (both life-long Alaskans) live in Eagle River, Alaska where they raised seven children. They now enjoy 15 grandchildren. Jim likes outdoor activities, woodworking, and reading. He enjoys giving back, and in addition to his contributions to local charities, has been involved in numerous missions to Africa and the Philippine Islands contributing to, promoting, and implementing quality-of-life improvement.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jim Bates, PMP (certified Project Management Professional) is the founder, President and CEO of Business Improvement Group, Inc. (BIG) and an Adjunct Professor in several schools at the University of Alaska Anchorage (UAA), including the Master of Science in Project Management (MSPM) program. Jim has served in various volunteer roles with the Project Management Institute Alaska Chapter (PMIAK) Since 2011 and served as Chapter President from October 2019 through December 2021.
Jim’s vast career spans 40+ years with proficiencies in Business Management, Project Management, and Information Technology. Jim is a certified leadership coach with GiANT, a Lean Six Sigma Master Black Belt, and holds Master Certificates in Business Analysis, Lean Six Sigma, and Project Management from Villanova University. Jim has been published in CIO Review and Government Technology magazines among various other publications, and is a public speaker and renown expert on leadership, business process improvement, project management, and information technology.
Jim is an experienced executive and consultant who is passionate about leading business transformation and offering innovative, high-value solutions to everyday business challenges. He has a proven ability to successfully analyze an organization’s critical business requirements, identify deficiencies and potential opportunities, and align and integrate technology. He strives to help companies develop innovative and cost-effective solutions for enhancing competitiveness, increasing revenues, and improving customer service offerings.
Jim and his wife, Mechelle, (both life-long Alaskans) live in Eagle River, Alaska where they raised seven children. They now enjoy 15 grandchildren. Jim likes outdoor activities, woodworking, and reading. He enjoys giving back, and in addition to his contributions to local charities, has been involved in numerous missions to Africa and the Philippine Islands contributing to, promoting, and implementing quality-of-life improvement.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 123: Jim Bates]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jim Bates, PMP (certified Project Management Professional) is the founder, President and CEO of Business Improvement Group, Inc. (<a href="https://www.go-big.com/">BIG</a>) and an Adjunct Professor in several schools at the University of Alaska Anchorage (UAA), including the Master of Science in Project Management (<a href="https://www.uaa.alaska.edu/academics/college-of-engineering/departments/engineering-science-project-management/degree-programs-espm/pm/ms-project-management.cshtml">MSPM</a>) program. Jim has served in various volunteer roles with the Project Management Institute Alaska Chapter (PMIAK) Since 2011 and served as Chapter President from October 2019 through December 2021.</p>
<p>Jim’s vast career spans 40+ years with proficiencies in Business Management, Project Management, and Information Technology. Jim is a certified leadership coach with <a href="https://www.giant.tv/jimbates">GiANT</a>, a Lean Six Sigma Master Black Belt, and holds Master Certificates in Business Analysis, Lean Six Sigma, and Project Management from Villanova University. Jim has been published in <a href="https://magazine.cioreview.com/July-2014/PublicSector/"><strong><em>CIO Review</em></strong></a> and <a href="https://www.govtech.com/state/Alaska-Monitors-Lights-Out-Data-Center-via-the-Cloud.html"><strong><em>Government Technology</em></strong></a> magazines among various other publications, and is a public speaker and renown expert on leadership, business process improvement, project management, and information technology.</p>
<p>Jim is an experienced executive and consultant who is passionate about leading business transformation and offering innovative, high-value solutions to everyday business challenges. He has a proven ability to successfully analyze an organization’s critical business requirements, identify deficiencies and potential opportunities, and align and integrate technology. He strives to help companies develop innovative and cost-effective solutions for enhancing competitiveness, increasing revenues, and improving customer service offerings.</p>
<p>Jim and his wife, Mechelle, (both life-long Alaskans) live in Eagle River, Alaska where they raised seven children. They now enjoy 15 grandchildren. Jim likes outdoor activities, woodworking, and reading. He enjoys giving back, and in addition to his contributions to local charities, has been involved in numerous missions to Africa and the Philippine Islands contributing to, promoting, and implementing quality-of-life improvement.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/7a02e76f-53ad-454a-b23b-856f543179e7-KBKast-EP-123-Jim-Bates.mp3" length="91627820"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jim Bates, PMP (certified Project Management Professional) is the founder, President and CEO of Business Improvement Group, Inc. (BIG) and an Adjunct Professor in several schools at the University of Alaska Anchorage (UAA), including the Master of Science in Project Management (MSPM) program. Jim has served in various volunteer roles with the Project Management Institute Alaska Chapter (PMIAK) Since 2011 and served as Chapter President from October 2019 through December 2021.
Jim’s vast career spans 40+ years with proficiencies in Business Management, Project Management, and Information Technology. Jim is a certified leadership coach with GiANT, a Lean Six Sigma Master Black Belt, and holds Master Certificates in Business Analysis, Lean Six Sigma, and Project Management from Villanova University. Jim has been published in CIO Review and Government Technology magazines among various other publications, and is a public speaker and renown expert on leadership, business process improvement, project management, and information technology.
Jim is an experienced executive and consultant who is passionate about leading business transformation and offering innovative, high-value solutions to everyday business challenges. He has a proven ability to successfully analyze an organization’s critical business requirements, identify deficiencies and potential opportunities, and align and integrate technology. He strives to help companies develop innovative and cost-effective solutions for enhancing competitiveness, increasing revenues, and improving customer service offerings.
Jim and his wife, Mechelle, (both life-long Alaskans) live in Eagle River, Alaska where they raised seven children. They now enjoy 15 grandchildren. Jim likes outdoor activities, woodworking, and reading. He enjoys giving back, and in addition to his contributions to local charities, has been involved in numerous missions to Africa and the Philippine Islands contributing to, promoting, and implementing quality-of-life improvement.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1237337/1700181096-Jim-Bates.png"></itunes:image>
                                                                            <itunes:duration>01:03:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 122: Asaf Katz]]>
                </title>
                <pubDate>Wed, 10 Aug 2022 16:00:47 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1201754</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-122-asaf-katz</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Asaf helps cyber security and SaaS companies land their first $1M ARR. </span><span style="font-weight:400;">Asaf has tackled this challenge for his own companies and multiple clients. </span><span style="font-weight:400;">He has co-founded education, software and telehealth businesses and is now working with Cyber security, InsurTech and automation startups in Israel, US and Australia. </span></p>
<p><span style="font-weight:400;">Struggling to get sales results in his startup in 2013, Asaf had to figure out that “marketing and sales thing”.  As a Major in the Israeli Air Force in a Cyber Security Unit, Asaf has learnt that nothing is done without proper intelligence. </span><span style="font-weight:400;">He quickly realised the current marketing and sales approaches lacked fundamental elements to be effective.</span></p>
<p><span style="font-weight:400;">So he developed a framework that has allowed him to land for his own companies and his clients over $46M in revenue, win multiple awards and unlock growth for clients globally.</span></p>
<p><span style="font-weight:400;">Asaf is the Co-Founder of Cannvalate, Managing Director of Ducere Global Business School, Faculty of Cyber (acquired), and is working with public and private companies globally.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Asaf helps cyber security and SaaS companies land their first $1M ARR. Asaf has tackled this challenge for his own companies and multiple clients. He has co-founded education, software and telehealth businesses and is now working with Cyber security, InsurTech and automation startups in Israel, US and Australia. 
Struggling to get sales results in his startup in 2013, Asaf had to figure out that “marketing and sales thing”.  As a Major in the Israeli Air Force in a Cyber Security Unit, Asaf has learnt that nothing is done without proper intelligence. He quickly realised the current marketing and sales approaches lacked fundamental elements to be effective.
So he developed a framework that has allowed him to land for his own companies and his clients over $46M in revenue, win multiple awards and unlock growth for clients globally.
Asaf is the Co-Founder of Cannvalate, Managing Director of Ducere Global Business School, Faculty of Cyber (acquired), and is working with public and private companies globally.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 122: Asaf Katz]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Asaf helps cyber security and SaaS companies land their first $1M ARR. </span><span style="font-weight:400;">Asaf has tackled this challenge for his own companies and multiple clients. </span><span style="font-weight:400;">He has co-founded education, software and telehealth businesses and is now working with Cyber security, InsurTech and automation startups in Israel, US and Australia. </span></p>
<p><span style="font-weight:400;">Struggling to get sales results in his startup in 2013, Asaf had to figure out that “marketing and sales thing”.  As a Major in the Israeli Air Force in a Cyber Security Unit, Asaf has learnt that nothing is done without proper intelligence. </span><span style="font-weight:400;">He quickly realised the current marketing and sales approaches lacked fundamental elements to be effective.</span></p>
<p><span style="font-weight:400;">So he developed a framework that has allowed him to land for his own companies and his clients over $46M in revenue, win multiple awards and unlock growth for clients globally.</span></p>
<p><span style="font-weight:400;">Asaf is the Co-Founder of Cannvalate, Managing Director of Ducere Global Business School, Faculty of Cyber (acquired), and is working with public and private companies globally.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/2e6106f3-0930-4ecc-851c-79a7d3fa66d2-KBKAST-EP-119-Asaf-Katz.mp3" length="76087376"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Asaf helps cyber security and SaaS companies land their first $1M ARR. Asaf has tackled this challenge for his own companies and multiple clients. He has co-founded education, software and telehealth businesses and is now working with Cyber security, InsurTech and automation startups in Israel, US and Australia. 
Struggling to get sales results in his startup in 2013, Asaf had to figure out that “marketing and sales thing”.  As a Major in the Israeli Air Force in a Cyber Security Unit, Asaf has learnt that nothing is done without proper intelligence. He quickly realised the current marketing and sales approaches lacked fundamental elements to be effective.
So he developed a framework that has allowed him to land for his own companies and his clients over $46M in revenue, win multiple awards and unlock growth for clients globally.
Asaf is the Co-Founder of Cannvalate, Managing Director of Ducere Global Business School, Faculty of Cyber (acquired), and is working with public and private companies globally.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1201754/c1a-5k0v-pk956v1jumzp-2wepab.png"></itunes:image>
                                                                            <itunes:duration>00:52:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 121: Louay Saleh]]>
                </title>
                <pubDate>Fri, 05 Aug 2022 16:00:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-121-louay-saleh</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-121-louay-saleh</link>
                                <description>
                                            <![CDATA[<p>Louay Saleh is a Cyber Security Senior Manager with more than 13 years of experience in the domain and overall experience of more than 21 years. When he was at his junior year at the university, Louay started to develop his passion for Cyber Security and realized that this is the field in which he wants to specialize.</p>
<p>Starting his career in the Software Development area and then moving to the IT Support and Operations, Louay was always aiming to advance his knowledge and experience in different IT areas in order to move to the Cyber Security. It was when he joined one of the Big 4 firms; Deloitte, that Louay was finally able to start working in that area. He worked in both Security Consulting and IT Audit; where he advised large customers mainly in the Banking, Financial, and Telecommunication fields. He then moved to Ernst &amp; Young for a few months and similarly working with the same type of customers, before joining the National Bank of Egypt. Louay was responsible for building and leading the team in charge of the technical assessment activities such as the Vulnerability Management and Penetration Testing, in addition to the Incident Handling and Cyber Threat Intelligence. Louay considers those areas as his main specializations so he always tries to advance his knowledge and skills. A great deal of that is through doing the hands-on himself; whether during the work assignments or during the leisure time, as he always believes in building a good technical foundation and enhancing it whatever the job position one reaches. However, he also believes in balancing the technical expertise with the excellent leadership and business skills.</p>
<p>Louay acquired a few certificates such as GWAPT, CISSP, CISM, CRISC, and C|EH, and attended many hands-on trainings. Louay is also a seasonal Capture The Flag (CTF) player.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Louay Saleh is a Cyber Security Senior Manager with more than 13 years of experience in the domain and overall experience of more than 21 years. When he was at his junior year at the university, Louay started to develop his passion for Cyber Security and realized that this is the field in which he wants to specialize.
Starting his career in the Software Development area and then moving to the IT Support and Operations, Louay was always aiming to advance his knowledge and experience in different IT areas in order to move to the Cyber Security. It was when he joined one of the Big 4 firms; Deloitte, that Louay was finally able to start working in that area. He worked in both Security Consulting and IT Audit; where he advised large customers mainly in the Banking, Financial, and Telecommunication fields. He then moved to Ernst & Young for a few months and similarly working with the same type of customers, before joining the National Bank of Egypt. Louay was responsible for building and leading the team in charge of the technical assessment activities such as the Vulnerability Management and Penetration Testing, in addition to the Incident Handling and Cyber Threat Intelligence. Louay considers those areas as his main specializations so he always tries to advance his knowledge and skills. A great deal of that is through doing the hands-on himself; whether during the work assignments or during the leisure time, as he always believes in building a good technical foundation and enhancing it whatever the job position one reaches. However, he also believes in balancing the technical expertise with the excellent leadership and business skills.
Louay acquired a few certificates such as GWAPT, CISSP, CISM, CRISC, and C|EH, and attended many hands-on trainings. Louay is also a seasonal Capture The Flag (CTF) player.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 121: Louay Saleh]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Louay Saleh is a Cyber Security Senior Manager with more than 13 years of experience in the domain and overall experience of more than 21 years. When he was at his junior year at the university, Louay started to develop his passion for Cyber Security and realized that this is the field in which he wants to specialize.</p>
<p>Starting his career in the Software Development area and then moving to the IT Support and Operations, Louay was always aiming to advance his knowledge and experience in different IT areas in order to move to the Cyber Security. It was when he joined one of the Big 4 firms; Deloitte, that Louay was finally able to start working in that area. He worked in both Security Consulting and IT Audit; where he advised large customers mainly in the Banking, Financial, and Telecommunication fields. He then moved to Ernst &amp; Young for a few months and similarly working with the same type of customers, before joining the National Bank of Egypt. Louay was responsible for building and leading the team in charge of the technical assessment activities such as the Vulnerability Management and Penetration Testing, in addition to the Incident Handling and Cyber Threat Intelligence. Louay considers those areas as his main specializations so he always tries to advance his knowledge and skills. A great deal of that is through doing the hands-on himself; whether during the work assignments or during the leisure time, as he always believes in building a good technical foundation and enhancing it whatever the job position one reaches. However, he also believes in balancing the technical expertise with the excellent leadership and business skills.</p>
<p>Louay acquired a few certificates such as GWAPT, CISSP, CISM, CRISC, and C|EH, and attended many hands-on trainings. Louay is also a seasonal Capture The Flag (CTF) player.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/b2e0f8fd-c171-4440-98c8-a6105d96ff71-KBKast-EP-121-Louay-Saleh-FINAL.mp3" length="44264390"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Louay Saleh is a Cyber Security Senior Manager with more than 13 years of experience in the domain and overall experience of more than 21 years. When he was at his junior year at the university, Louay started to develop his passion for Cyber Security and realized that this is the field in which he wants to specialize.
Starting his career in the Software Development area and then moving to the IT Support and Operations, Louay was always aiming to advance his knowledge and experience in different IT areas in order to move to the Cyber Security. It was when he joined one of the Big 4 firms; Deloitte, that Louay was finally able to start working in that area. He worked in both Security Consulting and IT Audit; where he advised large customers mainly in the Banking, Financial, and Telecommunication fields. He then moved to Ernst & Young for a few months and similarly working with the same type of customers, before joining the National Bank of Egypt. Louay was responsible for building and leading the team in charge of the technical assessment activities such as the Vulnerability Management and Penetration Testing, in addition to the Incident Handling and Cyber Threat Intelligence. Louay considers those areas as his main specializations so he always tries to advance his knowledge and skills. A great deal of that is through doing the hands-on himself; whether during the work assignments or during the leisure time, as he always believes in building a good technical foundation and enhancing it whatever the job position one reaches. However, he also believes in balancing the technical expertise with the excellent leadership and business skills.
Louay acquired a few certificates such as GWAPT, CISSP, CISM, CRISC, and C|EH, and attended many hands-on trainings. Louay is also a seasonal Capture The Flag (CTF) player.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1208328/KBKast-EP-121-Louay-Saleh.png"></itunes:image>
                                                                            <itunes:duration>00:30:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 120: Jasun Tate]]>
                </title>
                <pubDate>Wed, 03 Aug 2022 16:00:49 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-120-jasun-tate</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-120-jasun-tate</link>
                                <description>
                                            <![CDATA[<div class="page" title="Page 9">
<div class="section">
<div class="layoutArea">
<div class="column">
<p>Sailor, Soldier, Hacker, Spy, Advisor, Alchemist</p>
<p>Jasun Tate is the founder of Black Alchemy Solutions Group a boutique privacy solutions development and cyber crisis management firm. He maintains a total of 17 years of actionable Cyber Warfare, Exploitation, and Defense experience both with the United States government and with a number foreign governmental agencies across the globe. Some of the agencies Mr. Tate has given his time, life and space working with include (but are not limited to)</p>
<p>• National Geo-spacial Intelligence Agency • Department of Defense<br />
• US Army Research Laboratories<br />
• National Security Agency<br />
• US Army Special Operations Command</p>
<p>With his Public Sector career spanning between various Department of Defense entities and US Intelligence Agencies. Having worked directly in countries all around the world in both advisory and operational capacities he has seen the world from a cyber lens of exploitation unlike many others.</p>
<p>Mr. Tate’s unique blend of cyber and tactical operation experience and delivers a unique blend of cyber security, intelligence operations, and tactical situational awareness with a level of relevance only obtained in the field. Beyond his public sector career, he has held senior officer positions with Fortune 100 companies.</p>
</div>
</div>
<div class="layoutArea">
<div class="column">
<p>Want inside my head? Listen to this podcast about my view on Cyber!</p>
</div>
<div class="column">
<p> </p>
<p>Yes Im in the news a simple Google of “Jasun Tate Cyber” works • instagram @blackalchemysolutions</p>
<p>• Twitter @bitsdigits &amp; @blackalchemyso2</p>
</div>
</div>
</div>
</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[



Sailor, Soldier, Hacker, Spy, Advisor, Alchemist
Jasun Tate is the founder of Black Alchemy Solutions Group a boutique privacy solutions development and cyber crisis management firm. He maintains a total of 17 years of actionable Cyber Warfare, Exploitation, and Defense experience both with the United States government and with a number foreign governmental agencies across the globe. Some of the agencies Mr. Tate has given his time, life and space working with include (but are not limited to)
• National Geo-spacial Intelligence Agency • Department of Defense
• US Army Research Laboratories
• National Security Agency
• US Army Special Operations Command
With his Public Sector career spanning between various Department of Defense entities and US Intelligence Agencies. Having worked directly in countries all around the world in both advisory and operational capacities he has seen the world from a cyber lens of exploitation unlike many others.
Mr. Tate’s unique blend of cyber and tactical operation experience and delivers a unique blend of cyber security, intelligence operations, and tactical situational awareness with a level of relevance only obtained in the field. Beyond his public sector career, he has held senior officer positions with Fortune 100 companies.




Want inside my head? Listen to this podcast about my view on Cyber!


 
Yes Im in the news a simple Google of “Jasun Tate Cyber” works • instagram @blackalchemysolutions
• Twitter @bitsdigits & @blackalchemyso2




]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 120: Jasun Tate]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div class="page" title="Page 9">
<div class="section">
<div class="layoutArea">
<div class="column">
<p>Sailor, Soldier, Hacker, Spy, Advisor, Alchemist</p>
<p>Jasun Tate is the founder of Black Alchemy Solutions Group a boutique privacy solutions development and cyber crisis management firm. He maintains a total of 17 years of actionable Cyber Warfare, Exploitation, and Defense experience both with the United States government and with a number foreign governmental agencies across the globe. Some of the agencies Mr. Tate has given his time, life and space working with include (but are not limited to)</p>
<p>• National Geo-spacial Intelligence Agency • Department of Defense<br />
• US Army Research Laboratories<br />
• National Security Agency<br />
• US Army Special Operations Command</p>
<p>With his Public Sector career spanning between various Department of Defense entities and US Intelligence Agencies. Having worked directly in countries all around the world in both advisory and operational capacities he has seen the world from a cyber lens of exploitation unlike many others.</p>
<p>Mr. Tate’s unique blend of cyber and tactical operation experience and delivers a unique blend of cyber security, intelligence operations, and tactical situational awareness with a level of relevance only obtained in the field. Beyond his public sector career, he has held senior officer positions with Fortune 100 companies.</p>
</div>
</div>
<div class="layoutArea">
<div class="column">
<p>Want inside my head? Listen to this podcast about my view on Cyber!</p>
</div>
<div class="column">
<p> </p>
<p>Yes Im in the news a simple Google of “Jasun Tate Cyber” works • instagram @blackalchemysolutions</p>
<p>• Twitter @bitsdigits &amp; @blackalchemyso2</p>
</div>
</div>
</div>
</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/04afd2e7-eba0-49b4-82cb-8dae00ab3777-KBKast-EP-120-Jasun-Tate.mp3" length="83981238"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[



Sailor, Soldier, Hacker, Spy, Advisor, Alchemist
Jasun Tate is the founder of Black Alchemy Solutions Group a boutique privacy solutions development and cyber crisis management firm. He maintains a total of 17 years of actionable Cyber Warfare, Exploitation, and Defense experience both with the United States government and with a number foreign governmental agencies across the globe. Some of the agencies Mr. Tate has given his time, life and space working with include (but are not limited to)
• National Geo-spacial Intelligence Agency • Department of Defense
• US Army Research Laboratories
• National Security Agency
• US Army Special Operations Command
With his Public Sector career spanning between various Department of Defense entities and US Intelligence Agencies. Having worked directly in countries all around the world in both advisory and operational capacities he has seen the world from a cyber lens of exploitation unlike many others.
Mr. Tate’s unique blend of cyber and tactical operation experience and delivers a unique blend of cyber security, intelligence operations, and tactical situational awareness with a level of relevance only obtained in the field. Beyond his public sector career, he has held senior officer positions with Fortune 100 companies.




Want inside my head? Listen to this podcast about my view on Cyber!


 
Yes Im in the news a simple Google of “Jasun Tate Cyber” works • instagram @blackalchemysolutions
• Twitter @bitsdigits & @blackalchemyso2




]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1208316/Featured-image.png"></itunes:image>
                                                                            <itunes:duration>00:58:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 119: Lachlan Feeney]]>
                </title>
                <pubDate>Wed, 27 Jul 2022 16:00:48 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-119-lachlan-feeney</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-119-lachlan-feeney</link>
                                <description>
                                            <![CDATA[<p>Lachlan Feeney is the Founder and CEO of Labrys – Australia’s leading provider of blockchain development and consulting services. Lachlan founded Labrys out of his bedroom at the age of 19. He was an early adopter of cryptocurrencies and blockchain technology and immediately realised the potential to build a better, more democratised future, with the technology. Labrys has worked with ASX listed Downer EDI, The Government of the Solomon Islands and global blockchain platform NEM Group, among others. Lachlan is on a mission to turn Labrys into a global blockchain-consulting authority as the technology moves further into the mainstream. Prior to starting Labrys, Lachlan has worked as a developer at fellow blockchain agency; Civic Ledger and as a cryptocurrency researcher at the Student Trading and Investment Association. Lachlan is also a co-author of The Handbook of Board Governance (2nd Edition).</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Lachlan Feeney is the Founder and CEO of Labrys – Australia’s leading provider of blockchain development and consulting services. Lachlan founded Labrys out of his bedroom at the age of 19. He was an early adopter of cryptocurrencies and blockchain technology and immediately realised the potential to build a better, more democratised future, with the technology. Labrys has worked with ASX listed Downer EDI, The Government of the Solomon Islands and global blockchain platform NEM Group, among others. Lachlan is on a mission to turn Labrys into a global blockchain-consulting authority as the technology moves further into the mainstream. Prior to starting Labrys, Lachlan has worked as a developer at fellow blockchain agency; Civic Ledger and as a cryptocurrency researcher at the Student Trading and Investment Association. Lachlan is also a co-author of The Handbook of Board Governance (2nd Edition).
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 119: Lachlan Feeney]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Lachlan Feeney is the Founder and CEO of Labrys – Australia’s leading provider of blockchain development and consulting services. Lachlan founded Labrys out of his bedroom at the age of 19. He was an early adopter of cryptocurrencies and blockchain technology and immediately realised the potential to build a better, more democratised future, with the technology. Labrys has worked with ASX listed Downer EDI, The Government of the Solomon Islands and global blockchain platform NEM Group, among others. Lachlan is on a mission to turn Labrys into a global blockchain-consulting authority as the technology moves further into the mainstream. Prior to starting Labrys, Lachlan has worked as a developer at fellow blockchain agency; Civic Ledger and as a cryptocurrency researcher at the Student Trading and Investment Association. Lachlan is also a co-author of The Handbook of Board Governance (2nd Edition).</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/a6e9ac93-0606-4e31-8ed6-7744b0d9269f-KBKast-EP-119-Lachlan-Feeney.mp3" length="84283633"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Lachlan Feeney is the Founder and CEO of Labrys – Australia’s leading provider of blockchain development and consulting services. Lachlan founded Labrys out of his bedroom at the age of 19. He was an early adopter of cryptocurrencies and blockchain technology and immediately realised the potential to build a better, more democratised future, with the technology. Labrys has worked with ASX listed Downer EDI, The Government of the Solomon Islands and global blockchain platform NEM Group, among others. Lachlan is on a mission to turn Labrys into a global blockchain-consulting authority as the technology moves further into the mainstream. Prior to starting Labrys, Lachlan has worked as a developer at fellow blockchain agency; Civic Ledger and as a cryptocurrency researcher at the Student Trading and Investment Association. Lachlan is also a co-author of The Handbook of Board Governance (2nd Edition).
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1205381/KBKast-EP-119-Lachlan-Feeney.png"></itunes:image>
                                                                            <itunes:duration>00:58:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 118: Satnam Narang]]>
                </title>
                <pubDate>Wed, 20 Jul 2022 16:00:40 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1184438</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-118-satnam-narang</link>
                                <description>
                                            <![CDATA[<p>Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder.</p>
<p>He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder.
He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 118: Satnam Narang]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder.</p>
<p>He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/693962b8-070b-494a-8aac-a611344a025f-KBKAST-EP-118-Satnam-Narang.mp3" length="66534480"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder.
He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1184438/Satnam.png"></itunes:image>
                                                                            <itunes:duration>00:46:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 117: Marilise de Villiers]]>
                </title>
                <pubDate>Wed, 13 Jul 2022 16:00:32 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-117-marilise-de-villiers</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-117-marilise-de-villiers</link>
                                <description>
                                            <![CDATA[<p><strong>Marilise de Villiers, Founder</strong><strong> &amp; CEO, ROAR! Coaching &amp; Consulting.</strong></p>
<p>Marilise is a Performance Coach, Best-selling Author, TEDx Speaker &amp; award-winning Behaviour Change Consultant that specialises in Finance, Technology &amp; Cyber Security Awareness, Culture &amp; Talent. She’s a podcast host, international keynote speaker &amp; regular podcast guest.</p>
<p>ROAR! is passionate about people living successful, healthy, and happy lives. It’s about making your whole life work and becoming your whole self.</p>
<p>Marilise combines over two decades of experience as a chartered accountant and change consultant in finance, audit and cyber security awareness, culture and talent. She’s led the design and roll-out of global behaviour change programmes in consulting, research and operational delivery roles, across a broad range of industries and disciplines. Over the last decade, she’s been specialising in addressing cyber security behaviours and culture, encouraging organisations to move away from compliance-led‚ tick box approaches, towards risk-based, people-centric approaches that embed secure mindsets and habits into organisational culture. She emphasises the need for a speak-up culture that allows suspicious behaviour and mistakes to be surfaced and addressed.</p>
<p>Marilise’s coaching curriculum is science backed and centred on the strategies and thought processes of the world’s highest performers. It focuses on clarity, energy, courage, productivity, influence, and purpose.</p>
<p>Her signature ROAR! Blueprint is designed to:</p>
<ol>
<li>Ignite your authentic purpose</li>
<li>Win your inner game (thoughts, feelings)</li>
<li>Win your outer game (words, actions)</li>
<li>Unleash your authentic voice – your ROAR!</li>
</ol>
<p>ROAR is a four-step process to having courageous conversations – with others and with yourself. It stands for Recognise, Observe, Assert, Redirect.</p>
<p>Marilise is South African-British, married to Heinie and they have two boys, Heinrich (14) and Andreas (12).</p>
<p>Her motto is: work hard, play hard &amp; be kind.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Marilise de Villiers, Founder & CEO, ROAR! Coaching & Consulting.
Marilise is a Performance Coach, Best-selling Author, TEDx Speaker & award-winning Behaviour Change Consultant that specialises in Finance, Technology & Cyber Security Awareness, Culture & Talent. She’s a podcast host, international keynote speaker & regular podcast guest.
ROAR! is passionate about people living successful, healthy, and happy lives. It’s about making your whole life work and becoming your whole self.
Marilise combines over two decades of experience as a chartered accountant and change consultant in finance, audit and cyber security awareness, culture and talent. She’s led the design and roll-out of global behaviour change programmes in consulting, research and operational delivery roles, across a broad range of industries and disciplines. Over the last decade, she’s been specialising in addressing cyber security behaviours and culture, encouraging organisations to move away from compliance-led‚ tick box approaches, towards risk-based, people-centric approaches that embed secure mindsets and habits into organisational culture. She emphasises the need for a speak-up culture that allows suspicious behaviour and mistakes to be surfaced and addressed.
Marilise’s coaching curriculum is science backed and centred on the strategies and thought processes of the world’s highest performers. It focuses on clarity, energy, courage, productivity, influence, and purpose.
Her signature ROAR! Blueprint is designed to:

Ignite your authentic purpose
Win your inner game (thoughts, feelings)
Win your outer game (words, actions)
Unleash your authentic voice – your ROAR!

ROAR is a four-step process to having courageous conversations – with others and with yourself. It stands for Recognise, Observe, Assert, Redirect.
Marilise is South African-British, married to Heinie and they have two boys, Heinrich (14) and Andreas (12).
Her motto is: work hard, play hard & be kind.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 117: Marilise de Villiers]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Marilise de Villiers, Founder</strong><strong> &amp; CEO, ROAR! Coaching &amp; Consulting.</strong></p>
<p>Marilise is a Performance Coach, Best-selling Author, TEDx Speaker &amp; award-winning Behaviour Change Consultant that specialises in Finance, Technology &amp; Cyber Security Awareness, Culture &amp; Talent. She’s a podcast host, international keynote speaker &amp; regular podcast guest.</p>
<p>ROAR! is passionate about people living successful, healthy, and happy lives. It’s about making your whole life work and becoming your whole self.</p>
<p>Marilise combines over two decades of experience as a chartered accountant and change consultant in finance, audit and cyber security awareness, culture and talent. She’s led the design and roll-out of global behaviour change programmes in consulting, research and operational delivery roles, across a broad range of industries and disciplines. Over the last decade, she’s been specialising in addressing cyber security behaviours and culture, encouraging organisations to move away from compliance-led‚ tick box approaches, towards risk-based, people-centric approaches that embed secure mindsets and habits into organisational culture. She emphasises the need for a speak-up culture that allows suspicious behaviour and mistakes to be surfaced and addressed.</p>
<p>Marilise’s coaching curriculum is science backed and centred on the strategies and thought processes of the world’s highest performers. It focuses on clarity, energy, courage, productivity, influence, and purpose.</p>
<p>Her signature ROAR! Blueprint is designed to:</p>
<ol>
<li>Ignite your authentic purpose</li>
<li>Win your inner game (thoughts, feelings)</li>
<li>Win your outer game (words, actions)</li>
<li>Unleash your authentic voice – your ROAR!</li>
</ol>
<p>ROAR is a four-step process to having courageous conversations – with others and with yourself. It stands for Recognise, Observe, Assert, Redirect.</p>
<p>Marilise is South African-British, married to Heinie and they have two boys, Heinrich (14) and Andreas (12).</p>
<p>Her motto is: work hard, play hard &amp; be kind.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/b34c62aa-e374-40fb-9fc9-418153c27ff1-KBkast-EP-Marilise-deVilliers.mp3" length="85496603"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Marilise de Villiers, Founder & CEO, ROAR! Coaching & Consulting.
Marilise is a Performance Coach, Best-selling Author, TEDx Speaker & award-winning Behaviour Change Consultant that specialises in Finance, Technology & Cyber Security Awareness, Culture & Talent. She’s a podcast host, international keynote speaker & regular podcast guest.
ROAR! is passionate about people living successful, healthy, and happy lives. It’s about making your whole life work and becoming your whole self.
Marilise combines over two decades of experience as a chartered accountant and change consultant in finance, audit and cyber security awareness, culture and talent. She’s led the design and roll-out of global behaviour change programmes in consulting, research and operational delivery roles, across a broad range of industries and disciplines. Over the last decade, she’s been specialising in addressing cyber security behaviours and culture, encouraging organisations to move away from compliance-led‚ tick box approaches, towards risk-based, people-centric approaches that embed secure mindsets and habits into organisational culture. She emphasises the need for a speak-up culture that allows suspicious behaviour and mistakes to be surfaced and addressed.
Marilise’s coaching curriculum is science backed and centred on the strategies and thought processes of the world’s highest performers. It focuses on clarity, energy, courage, productivity, influence, and purpose.
Her signature ROAR! Blueprint is designed to:

Ignite your authentic purpose
Win your inner game (thoughts, feelings)
Win your outer game (words, actions)
Unleash your authentic voice – your ROAR!

ROAR is a four-step process to having courageous conversations – with others and with yourself. It stands for Recognise, Observe, Assert, Redirect.
Marilise is South African-British, married to Heinie and they have two boys, Heinrich (14) and Andreas (12).
Her motto is: work hard, play hard & be kind.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1191970/KBKAST-Episode-110-Marilise-de-Villiers.jpg"></itunes:image>
                                                                            <itunes:duration>00:59:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 116: Shinesa Cambric]]>
                </title>
                <pubDate>Wed, 06 Jul 2022 16:00:14 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-116-shinesa-cambric</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-116-shinesa-cambric</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Shinesa Cambric (CCSP, CISSP, CISA, CISM, CDPSE) is a Cloud Security, Compliance, and Identity Architect with strategic expertise in technical design and implementation of security architecture and controls. Her experience includes designing identity management and governance solutions for cloud-based platforms, building insider threat programs, and providing unique subject matter expertise on the intersection of governance, risk, and compliance with IT and application security. </span></p>
<p><span style="font-weight:400;">As a Principal Program Manager within Microsoft’s Intelligent Protections team,  Shinesa currently focuses on architecting solutions for global organizations to identify, detect, protect, and respond to threats against identity and access. She is a task and certification content advisor for CertNexus and CompTIA, on the content review committee for Cloud Security Alliance, and her work has been included in global IT industry forums such as SANS, ITSPMagazine Podcast, RSAC, BrightTALK, Secure Software Summit, Devops.com, and Plan4Privacy.  As an active mentor, she volunteers with several organizations, including as the training lead for the Dallas chapter of Women’s Society of Cyberjutsu.  Shinesa is an active member of several other organizations, including Cloud Girls, Women in Cyber Security (WiCyS), ISACA, ISC2, Information Systems Security Association (ISSA), International Association of Privacy Professionals (IAPP), and AnitaB, and serves as an occasional host for the OWASP DevSlop YouTube and Twitch show.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Shinesa Cambric (CCSP, CISSP, CISA, CISM, CDPSE) is a Cloud Security, Compliance, and Identity Architect with strategic expertise in technical design and implementation of security architecture and controls. Her experience includes designing identity management and governance solutions for cloud-based platforms, building insider threat programs, and providing unique subject matter expertise on the intersection of governance, risk, and compliance with IT and application security. 
As a Principal Program Manager within Microsoft’s Intelligent Protections team,  Shinesa currently focuses on architecting solutions for global organizations to identify, detect, protect, and respond to threats against identity and access. She is a task and certification content advisor for CertNexus and CompTIA, on the content review committee for Cloud Security Alliance, and her work has been included in global IT industry forums such as SANS, ITSPMagazine Podcast, RSAC, BrightTALK, Secure Software Summit, Devops.com, and Plan4Privacy.  As an active mentor, she volunteers with several organizations, including as the training lead for the Dallas chapter of Women’s Society of Cyberjutsu.  Shinesa is an active member of several other organizations, including Cloud Girls, Women in Cyber Security (WiCyS), ISACA, ISC2, Information Systems Security Association (ISSA), International Association of Privacy Professionals (IAPP), and AnitaB, and serves as an occasional host for the OWASP DevSlop YouTube and Twitch show.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 116: Shinesa Cambric]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Shinesa Cambric (CCSP, CISSP, CISA, CISM, CDPSE) is a Cloud Security, Compliance, and Identity Architect with strategic expertise in technical design and implementation of security architecture and controls. Her experience includes designing identity management and governance solutions for cloud-based platforms, building insider threat programs, and providing unique subject matter expertise on the intersection of governance, risk, and compliance with IT and application security. </span></p>
<p><span style="font-weight:400;">As a Principal Program Manager within Microsoft’s Intelligent Protections team,  Shinesa currently focuses on architecting solutions for global organizations to identify, detect, protect, and respond to threats against identity and access. She is a task and certification content advisor for CertNexus and CompTIA, on the content review committee for Cloud Security Alliance, and her work has been included in global IT industry forums such as SANS, ITSPMagazine Podcast, RSAC, BrightTALK, Secure Software Summit, Devops.com, and Plan4Privacy.  As an active mentor, she volunteers with several organizations, including as the training lead for the Dallas chapter of Women’s Society of Cyberjutsu.  Shinesa is an active member of several other organizations, including Cloud Girls, Women in Cyber Security (WiCyS), ISACA, ISC2, Information Systems Security Association (ISSA), International Association of Privacy Professionals (IAPP), and AnitaB, and serves as an occasional host for the OWASP DevSlop YouTube and Twitch show.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3a02085b-878c-44b6-b415-b18b652fccc4-KBKAST-EP-Shinesa-Cambric.mp3" length="66783064"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Shinesa Cambric (CCSP, CISSP, CISA, CISM, CDPSE) is a Cloud Security, Compliance, and Identity Architect with strategic expertise in technical design and implementation of security architecture and controls. Her experience includes designing identity management and governance solutions for cloud-based platforms, building insider threat programs, and providing unique subject matter expertise on the intersection of governance, risk, and compliance with IT and application security. 
As a Principal Program Manager within Microsoft’s Intelligent Protections team,  Shinesa currently focuses on architecting solutions for global organizations to identify, detect, protect, and respond to threats against identity and access. She is a task and certification content advisor for CertNexus and CompTIA, on the content review committee for Cloud Security Alliance, and her work has been included in global IT industry forums such as SANS, ITSPMagazine Podcast, RSAC, BrightTALK, Secure Software Summit, Devops.com, and Plan4Privacy.  As an active mentor, she volunteers with several organizations, including as the training lead for the Dallas chapter of Women’s Society of Cyberjutsu.  Shinesa is an active member of several other organizations, including Cloud Girls, Women in Cyber Security (WiCyS), ISACA, ISC2, Information Systems Security Association (ISSA), International Association of Privacy Professionals (IAPP), and AnitaB, and serves as an occasional host for the OWASP DevSlop YouTube and Twitch show.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1180142/Shinesa.png"></itunes:image>
                                                                            <itunes:duration>00:46:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 115: Ian Murphy]]>
                </title>
                <pubDate>Wed, 29 Jun 2022 16:00:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-115-ian-murphy</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-115-ian-murphy</link>
                                <description>
                                            <![CDATA[<p> </p>
<p>Ian is a veteran in the security industry stretching back to the early 1990’s. He began with the UK Ministry of Defence before moving into the dot com bubble. Having spent 5 years with a leading security vendor he began his life as an entrepreneur offering contracting services to major industries and government departments. His new venture now breathes life into the dull world of security awareness. Mixing his blend of humour and vast experience his aim is to raise everyone’s cyber savvy so they can enjoy a safer online experience.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[ 
Ian is a veteran in the security industry stretching back to the early 1990’s. He began with the UK Ministry of Defence before moving into the dot com bubble. Having spent 5 years with a leading security vendor he began his life as an entrepreneur offering contracting services to major industries and government departments. His new venture now breathes life into the dull world of security awareness. Mixing his blend of humour and vast experience his aim is to raise everyone’s cyber savvy so they can enjoy a safer online experience.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 115: Ian Murphy]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p> </p>
<p>Ian is a veteran in the security industry stretching back to the early 1990’s. He began with the UK Ministry of Defence before moving into the dot com bubble. Having spent 5 years with a leading security vendor he began his life as an entrepreneur offering contracting services to major industries and government departments. His new venture now breathes life into the dull world of security awareness. Mixing his blend of humour and vast experience his aim is to raise everyone’s cyber savvy so they can enjoy a safer online experience.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/04254a99-48f0-4610-bff7-4f71153c4cae-KBKAST-EP-112-Ian-Murphy.mp3" length="79069847"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[ 
Ian is a veteran in the security industry stretching back to the early 1990’s. He began with the UK Ministry of Defence before moving into the dot com bubble. Having spent 5 years with a leading security vendor he began his life as an entrepreneur offering contracting services to major industries and government departments. His new venture now breathes life into the dull world of security awareness. Mixing his blend of humour and vast experience his aim is to raise everyone’s cyber savvy so they can enjoy a safer online experience.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1172408/Ian-Murphy.png"></itunes:image>
                                                                            <itunes:duration>00:54:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 114: Bob Huber]]>
                </title>
                <pubDate>Thu, 23 Jun 2022 16:00:55 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-114-bob-huber</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-114-bob-huber</link>
                                <description>
                                            <![CDATA[<p>Bob Huber, Chief Security Officer and Head of Research, Tenable</p>
<div class="field field--name-field-user-title field--type-string field--label-hidden field__item"><strong>Chief Security Officer</strong></div>
<div></div>
<div class="clearfix text-formatted field field--name-field-bio field--type-text-long field--label-hidden field__item">Robert Huber, Tenable’s chief security officer and head of research, oversees the company’s global security and research teams, working cross-functionally to reduce risk to the organisation, its customers and the broader industry. He has more than 20 years of information security experience across the financial, defence, and critical infrastructure sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks, where he focused on growing the company’s business and delivering omni-environment security solutions. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the Air National Guard for over 22 years. Before retiring in 2021, he served in a cyber operations squadron supporting federal and state mission</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Bob Huber, Chief Security Officer and Head of Research, Tenable
Chief Security Officer

Robert Huber, Tenable’s chief security officer and head of research, oversees the company’s global security and research teams, working cross-functionally to reduce risk to the organisation, its customers and the broader industry. He has more than 20 years of information security experience across the financial, defence, and critical infrastructure sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks, where he focused on growing the company’s business and delivering omni-environment security solutions. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the Air National Guard for over 22 years. Before retiring in 2021, he served in a cyber operations squadron supporting federal and state mission
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 114: Bob Huber]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Bob Huber, Chief Security Officer and Head of Research, Tenable</p>
<div class="field field--name-field-user-title field--type-string field--label-hidden field__item"><strong>Chief Security Officer</strong></div>
<div></div>
<div class="clearfix text-formatted field field--name-field-bio field--type-text-long field--label-hidden field__item">Robert Huber, Tenable’s chief security officer and head of research, oversees the company’s global security and research teams, working cross-functionally to reduce risk to the organisation, its customers and the broader industry. He has more than 20 years of information security experience across the financial, defence, and critical infrastructure sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks, where he focused on growing the company’s business and delivering omni-environment security solutions. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the Air National Guard for over 22 years. Before retiring in 2021, he served in a cyber operations squadron supporting federal and state mission</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/420512d6-7a9a-4e5c-a9a4-e9f9d0dea9dd-KBKast-EP-114-Bob-Huber.mp3" length="38241456"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Bob Huber, Chief Security Officer and Head of Research, Tenable
Chief Security Officer

Robert Huber, Tenable’s chief security officer and head of research, oversees the company’s global security and research teams, working cross-functionally to reduce risk to the organisation, its customers and the broader industry. He has more than 20 years of information security experience across the financial, defence, and critical infrastructure sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks, where he focused on growing the company’s business and delivering omni-environment security solutions. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the Air National Guard for over 22 years. Before retiring in 2021, he served in a cyber operations squadron supporting federal and state mission
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1169951/c1a-5k0v-jp4g6n9diqvo-pwbapx.png"></itunes:image>
                                                                            <itunes:duration>00:26:31</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 113: Rebecca Herold]]>
                </title>
                <pubDate>Wed, 22 Jun 2022 16:00:56 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-113-rebecca-herold</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-113-rebecca-herold</link>
                                <description>
                                            <![CDATA[<p>Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, &amp; privacy experience; CEO &amp; Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO &amp; Founder (2020) of Privacy &amp; Security Brainiacs; and host of the radio/podcast show “<a href="https://www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor">Data Security &amp; Privacy with the Privacy Professor</a>“. Founder (2014) &amp; Engineer/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.</p>
<p>Rebecca is an entrepreneur, author &amp; was an Adjunct Professor for the Norwich University Master of Science in Information Security &amp; Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca’s books include:</p>
<ul>
<li>Security &amp; Privacy when Working from Home &amp; Travelling</li>
<li>The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)</li>
<li>Data Privacy for the Smart Grid</li>
<li>The Privacy Papers</li>
<li>Managing an Information Security and Privacy Awareness and Training Program (2 editions)</li>
<li>Link to ISACA report: <a href="https://kbi.media/wp-content/uploads/2022/06/Privacy_in_Practice_2022_R3_FINAL.pdf">Privacy in Practice 2022</a></li>
</ul>
<p>Rebecca has a B.S. in Math &amp; Computer Science &amp; an M.A. in Computer Science &amp; Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE &amp; ACM.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, & privacy experience; CEO & Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO & Founder (2020) of Privacy & Security Brainiacs; and host of the radio/podcast show “Data Security & Privacy with the Privacy Professor“. Founder (2014) & Engineer/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.
Rebecca is an entrepreneur, author & was an Adjunct Professor for the Norwich University Master of Science in Information Security & Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca’s books include:

Security & Privacy when Working from Home & Travelling
The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)
Data Privacy for the Smart Grid
The Privacy Papers
Managing an Information Security and Privacy Awareness and Training Program (2 editions)
Link to ISACA report: Privacy in Practice 2022

Rebecca has a B.S. in Math & Computer Science & an M.A. in Computer Science & Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE & ACM.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 113: Rebecca Herold]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, &amp; privacy experience; CEO &amp; Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO &amp; Founder (2020) of Privacy &amp; Security Brainiacs; and host of the radio/podcast show “<a href="https://www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor">Data Security &amp; Privacy with the Privacy Professor</a>“. Founder (2014) &amp; Engineer/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.</p>
<p>Rebecca is an entrepreneur, author &amp; was an Adjunct Professor for the Norwich University Master of Science in Information Security &amp; Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca’s books include:</p>
<ul>
<li>Security &amp; Privacy when Working from Home &amp; Travelling</li>
<li>The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)</li>
<li>Data Privacy for the Smart Grid</li>
<li>The Privacy Papers</li>
<li>Managing an Information Security and Privacy Awareness and Training Program (2 editions)</li>
<li>Link to ISACA report: <a href="https://kbi.media/wp-content/uploads/2022/06/Privacy_in_Practice_2022_R3_FINAL.pdf">Privacy in Practice 2022</a></li>
</ul>
<p>Rebecca has a B.S. in Math &amp; Computer Science &amp; an M.A. in Computer Science &amp; Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE &amp; ACM.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/e562348a-4048-4da2-a212-b4a8e0ee93cc-KBKAST-EP-Rebecca-Herold.mp3" length="48112975"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, & privacy experience; CEO & Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO & Founder (2020) of Privacy & Security Brainiacs; and host of the radio/podcast show “Data Security & Privacy with the Privacy Professor“. Founder (2014) & Engineer/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.
Rebecca is an entrepreneur, author & was an Adjunct Professor for the Norwich University Master of Science in Information Security & Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca’s books include:

Security & Privacy when Working from Home & Travelling
The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)
Data Privacy for the Smart Grid
The Privacy Papers
Managing an Information Security and Privacy Awareness and Training Program (2 editions)
Link to ISACA report: Privacy in Practice 2022

Rebecca has a B.S. in Math & Computer Science & an M.A. in Computer Science & Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE & ACM.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1166630/c1a-5k0v-34kqjm8df26o-yqx1m3.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 112: Satnam Narang]]>
                </title>
                <pubDate>Wed, 15 Jun 2022 16:00:53 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-112-satnam-narang</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-112-satnam-narang</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder. </span></p>
<p><span style="font-weight:400;">He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.</span></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder. 
He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 112: Satnam Narang]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder. </span></p>
<p><span style="font-weight:400;">He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.</span></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/e9a3923e-da1e-458b-b7e6-5361b9c1d877-KBKAST-EP-Satnam-Narang.mp3" length="69269755"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder. 
He’s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1162138/Satnam.png"></itunes:image>
                                                                            <itunes:duration>00:48:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 111: Peter Soulsby]]>
                </title>
                <pubDate>Wed, 08 Jun 2022 16:00:20 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-111-peter-soulsby</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-111-peter-soulsby</link>
                                <description>
                                            <![CDATA[<p> </p>
<p>Peter advises CISOs on how to increase their business’s Cyber Resilience by transforming their Cybersecurity landscape. Peter is similarly passionate about building high performing teams with an emphasis on people and culture. To achieve this, he relies on his three key strengths: leadership, logic and numbers.</p>
<p>Peter has been fortunate enough to hold senior leadership positions in both the Cybersecurity and Applications industries. This has given him experience on how organizations function and what applications enable this, together with the inherent Cybersecurity risks that exist from infrastructure through to core business and client facing applications.</p>
<p>Peter is at his best when given the opportunity to overcome a challenge, together with the resources, space and support to get it done.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[ 
Peter advises CISOs on how to increase their business’s Cyber Resilience by transforming their Cybersecurity landscape. Peter is similarly passionate about building high performing teams with an emphasis on people and culture. To achieve this, he relies on his three key strengths: leadership, logic and numbers.
Peter has been fortunate enough to hold senior leadership positions in both the Cybersecurity and Applications industries. This has given him experience on how organizations function and what applications enable this, together with the inherent Cybersecurity risks that exist from infrastructure through to core business and client facing applications.
Peter is at his best when given the opportunity to overcome a challenge, together with the resources, space and support to get it done.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 111: Peter Soulsby]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p> </p>
<p>Peter advises CISOs on how to increase their business’s Cyber Resilience by transforming their Cybersecurity landscape. Peter is similarly passionate about building high performing teams with an emphasis on people and culture. To achieve this, he relies on his three key strengths: leadership, logic and numbers.</p>
<p>Peter has been fortunate enough to hold senior leadership positions in both the Cybersecurity and Applications industries. This has given him experience on how organizations function and what applications enable this, together with the inherent Cybersecurity risks that exist from infrastructure through to core business and client facing applications.</p>
<p>Peter is at his best when given the opportunity to overcome a challenge, together with the resources, space and support to get it done.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/e74b3164-ab9d-4278-b451-3c13d2ff9bab-KBKAST-EP-111-Peter-Soulsby.mp3" length="66201167"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[ 
Peter advises CISOs on how to increase their business’s Cyber Resilience by transforming their Cybersecurity landscape. Peter is similarly passionate about building high performing teams with an emphasis on people and culture. To achieve this, he relies on his three key strengths: leadership, logic and numbers.
Peter has been fortunate enough to hold senior leadership positions in both the Cybersecurity and Applications industries. This has given him experience on how organizations function and what applications enable this, together with the inherent Cybersecurity risks that exist from infrastructure through to core business and client facing applications.
Peter is at his best when given the opportunity to overcome a challenge, together with the resources, space and support to get it done.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1156044/KBKAST-EP-111-Peter-Soulsby.png"></itunes:image>
                                                                            <itunes:duration>00:45:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 110: Russell Weir]]>
                </title>
                <pubDate>Wed, 01 Jun 2022 16:00:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-110-russell-weir</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-110-russell-weir</link>
                                <description>
                                            <![CDATA[<p>Russell is a seasoned and respected Information Technology leader with over 20 years of experience who has held leadership positions globally, including the USA, China, Europe, and the UK.</p>
<p>He holds several industry certifications, including the OSCP and an MBA in Technology and Innovation.</p>
<p>His expertise extends to cybersecurity, strategy, technology innovation management, governance, risk, and compliance across various industries, including Casino and Gaming, Entertainment and leisure, Australian Defence Force, Local Government, and start-ups.</p>
<p>Russell also serves as a board member of a Not-For-Profit and is a Guest lecturer and Mentor across several universities in the fields of Information Technology and Cybersecurity.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Russell is a seasoned and respected Information Technology leader with over 20 years of experience who has held leadership positions globally, including the USA, China, Europe, and the UK.
He holds several industry certifications, including the OSCP and an MBA in Technology and Innovation.
His expertise extends to cybersecurity, strategy, technology innovation management, governance, risk, and compliance across various industries, including Casino and Gaming, Entertainment and leisure, Australian Defence Force, Local Government, and start-ups.
Russell also serves as a board member of a Not-For-Profit and is a Guest lecturer and Mentor across several universities in the fields of Information Technology and Cybersecurity.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 110: Russell Weir]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Russell is a seasoned and respected Information Technology leader with over 20 years of experience who has held leadership positions globally, including the USA, China, Europe, and the UK.</p>
<p>He holds several industry certifications, including the OSCP and an MBA in Technology and Innovation.</p>
<p>His expertise extends to cybersecurity, strategy, technology innovation management, governance, risk, and compliance across various industries, including Casino and Gaming, Entertainment and leisure, Australian Defence Force, Local Government, and start-ups.</p>
<p>Russell also serves as a board member of a Not-For-Profit and is a Guest lecturer and Mentor across several universities in the fields of Information Technology and Cybersecurity.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/6be3c762-6734-445a-b814-c14379508ed2-KBKAST-EP-110-Russell-Weir.mp3" length="77761170"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Russell is a seasoned and respected Information Technology leader with over 20 years of experience who has held leadership positions globally, including the USA, China, Europe, and the UK.
He holds several industry certifications, including the OSCP and an MBA in Technology and Innovation.
His expertise extends to cybersecurity, strategy, technology innovation management, governance, risk, and compliance across various industries, including Casino and Gaming, Entertainment and leisure, Australian Defence Force, Local Government, and start-ups.
Russell also serves as a board member of a Not-For-Profit and is a Guest lecturer and Mentor across several universities in the fields of Information Technology and Cybersecurity.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1130236/KBKAST-EP-109-Russell-Weir.png"></itunes:image>
                                                                            <itunes:duration>00:53:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 109: Anne Leslie]]>
                </title>
                <pubDate>Wed, 25 May 2022 16:00:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1127381</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-109-anne-leslie</link>
                                <description>
                                            <![CDATA[<ul>
<li>Anne Leslie is Cloud Risk and Controls Leader for IBM Cloud for Financial Services in Europe. Prior to joining IBM, her career spanned the intersection of financial services, European regulatory policy, blockchain and operational security in leadership roles in both sales and advisory.</li>
<li>Bilingual in French and English, she holds an Executive MBA from HEC Business School in Paris and the CCSP in Cloud Security from (ISC)² in addition to multiple technical platform certifications. Today, her focus is on enabling Europe’s banks to secure and de-risk their journey to public cloud, and she regularly contributes her thought leadership to industry conferences and working groups.</li>
<li>Determined to debunk the notion that the human element is the weakest link in cybersecurity, Anne also leads the application of Design Thinking to some of the most wicked problems facing practitioners and is a fervent champion of human-centered approaches to improving enterprise and ecosystem security outcomes.</li>
<li>Irish by nature and French by design, Anne was born and raised in the Republic of Ireland and lives happily with her three children in Paris, France which has been her home now for over twenty years.</li>
<li>Antifragile by Nassim Taleb: <a href="https://en.wikipedia.org/wiki/Antifragile_(book)">For Reference</a></li>
</ul>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[
Anne Leslie is Cloud Risk and Controls Leader for IBM Cloud for Financial Services in Europe. Prior to joining IBM, her career spanned the intersection of financial services, European regulatory policy, blockchain and operational security in leadership roles in both sales and advisory.
Bilingual in French and English, she holds an Executive MBA from HEC Business School in Paris and the CCSP in Cloud Security from (ISC)² in addition to multiple technical platform certifications. Today, her focus is on enabling Europe’s banks to secure and de-risk their journey to public cloud, and she regularly contributes her thought leadership to industry conferences and working groups.
Determined to debunk the notion that the human element is the weakest link in cybersecurity, Anne also leads the application of Design Thinking to some of the most wicked problems facing practitioners and is a fervent champion of human-centered approaches to improving enterprise and ecosystem security outcomes.
Irish by nature and French by design, Anne was born and raised in the Republic of Ireland and lives happily with her three children in Paris, France which has been her home now for over twenty years.
Antifragile by Nassim Taleb: For Reference

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 109: Anne Leslie]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<ul>
<li>Anne Leslie is Cloud Risk and Controls Leader for IBM Cloud for Financial Services in Europe. Prior to joining IBM, her career spanned the intersection of financial services, European regulatory policy, blockchain and operational security in leadership roles in both sales and advisory.</li>
<li>Bilingual in French and English, she holds an Executive MBA from HEC Business School in Paris and the CCSP in Cloud Security from (ISC)² in addition to multiple technical platform certifications. Today, her focus is on enabling Europe’s banks to secure and de-risk their journey to public cloud, and she regularly contributes her thought leadership to industry conferences and working groups.</li>
<li>Determined to debunk the notion that the human element is the weakest link in cybersecurity, Anne also leads the application of Design Thinking to some of the most wicked problems facing practitioners and is a fervent champion of human-centered approaches to improving enterprise and ecosystem security outcomes.</li>
<li>Irish by nature and French by design, Anne was born and raised in the Republic of Ireland and lives happily with her three children in Paris, France which has been her home now for over twenty years.</li>
<li>Antifragile by Nassim Taleb: <a href="https://en.wikipedia.org/wiki/Antifragile_(book)">For Reference</a></li>
</ul>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/4f0dac2e-1696-417b-b84f-d6013cf1917f-KBKAST-EP-108-Anne-Leslie.mp3" length="89228382"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[
Anne Leslie is Cloud Risk and Controls Leader for IBM Cloud for Financial Services in Europe. Prior to joining IBM, her career spanned the intersection of financial services, European regulatory policy, blockchain and operational security in leadership roles in both sales and advisory.
Bilingual in French and English, she holds an Executive MBA from HEC Business School in Paris and the CCSP in Cloud Security from (ISC)² in addition to multiple technical platform certifications. Today, her focus is on enabling Europe’s banks to secure and de-risk their journey to public cloud, and she regularly contributes her thought leadership to industry conferences and working groups.
Determined to debunk the notion that the human element is the weakest link in cybersecurity, Anne also leads the application of Design Thinking to some of the most wicked problems facing practitioners and is a fervent champion of human-centered approaches to improving enterprise and ecosystem security outcomes.
Irish by nature and French by design, Anne was born and raised in the Republic of Ireland and lives happily with her three children in Paris, France which has been her home now for over twenty years.
Antifragile by Nassim Taleb: For Reference

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1127381/1700181099-KBKAST-EP-108-Anne-Leslie.png"></itunes:image>
                                                                            <itunes:duration>01:01:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 108: Marty Edwards]]>
                </title>
                <pubDate>Wed, 18 May 2022 16:00:04 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-108-marty-edwards</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-108-marty-edwards</link>
                                <description>
                                            <![CDATA[<p>Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy’s (DOE’s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute’s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy’s (DOE’s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute’s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 108: Marty Edwards]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy’s (DOE’s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute’s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/fe588f54-c346-40fc-b7e7-cd0f57cb03ed-KBKAST-EP-108-Marty-Edwards.mp3" length="61233854"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards—a 30‐year industry veteran—served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest‐serving Director of the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS‐CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy’s (DOE’s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute’s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its “Federal 100 Awards” as being one of the top IT professionals in the U.S. federal government.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1135471/1700181100-KBKAST-EP-108-Marty-Edwards.png"></itunes:image>
                                                                            <itunes:duration>00:42:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 107: Sean Duca]]>
                </title>
                <pubDate>Wed, 11 May 2022 16:00:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-107-sean-duca</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-107-sean-duca</link>
                                <description>
                                            <![CDATA[<p><strong>Sean Duca</strong><br />
Vice President and Regional Chief Security<br />
Officer, Asia Pacific &amp; Japan<br />
Palo Alto Networks</p>
<p>Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.<br />
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.<br />
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.<br />
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sean Duca
Vice President and Regional Chief Security
Officer, Asia Pacific & Japan
Palo Alto Networks
Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 107: Sean Duca]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Sean Duca</strong><br />
Vice President and Regional Chief Security<br />
Officer, Asia Pacific &amp; Japan<br />
Palo Alto Networks</p>
<p>Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.<br />
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.<br />
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.<br />
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/7c92afad-7aef-4740-b832-a11c3514557f-KBKAST-EP-107-Sean-Duca.mp3" length="71610860"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sean Duca
Vice President and Regional Chief Security
Officer, Asia Pacific & Japan
Palo Alto Networks
Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1127187/KBKAST-EP-107-Sean-Duca.jpg"></itunes:image>
                                                                            <itunes:duration>00:49:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 106: Kim Coetzer & Fred Venter]]>
                </title>
                <pubDate>Wed, 04 May 2022 16:00:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-106-kim-coetzer-frederick-venter</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-106-kim-coetzer-frederick-venter</link>
                                <description>
                                            <![CDATA[<div>Kim Coetzer has more than two decades of experience in the delivery of projects within complex organisations, delivering outcomes by applying expert knowledge in Information Management, Leadership as well as wide ranging business expertise. His experience has been with a diverse array of business initiatives with a focus on the Financial Services, Mining, Oil &amp; Gas, Energy, and Insurance industries. He is well versed in modern information technology and business environments and has a broad range of skills including Problem Solving, Leadership, People Management, Strategic Insights, Stakeholder Management and Innovation.</div>
<div></div>
<div>A passionate Information Management Specialist and Program Manager with extensive experience in the delivery of projects within complex organisations, Frederick Venter has a proven track record of leading diverse teams. He thrives in environments that challenge conventional thinking, and his leadership achieves the ultimate goal of generating assets where previously only data existed while establishing governance structures to ensure ongoing value. A key focus for Fred is on the delivery of increased performance in organisations through successful implementation of business-driven outcomes supported by a commitment to stakeholder management.</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kim Coetzer has more than two decades of experience in the delivery of projects within complex organisations, delivering outcomes by applying expert knowledge in Information Management, Leadership as well as wide ranging business expertise. His experience has been with a diverse array of business initiatives with a focus on the Financial Services, Mining, Oil & Gas, Energy, and Insurance industries. He is well versed in modern information technology and business environments and has a broad range of skills including Problem Solving, Leadership, People Management, Strategic Insights, Stakeholder Management and Innovation.

A passionate Information Management Specialist and Program Manager with extensive experience in the delivery of projects within complex organisations, Frederick Venter has a proven track record of leading diverse teams. He thrives in environments that challenge conventional thinking, and his leadership achieves the ultimate goal of generating assets where previously only data existed while establishing governance structures to ensure ongoing value. A key focus for Fred is on the delivery of increased performance in organisations through successful implementation of business-driven outcomes supported by a commitment to stakeholder management.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 106: Kim Coetzer & Fred Venter]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div>Kim Coetzer has more than two decades of experience in the delivery of projects within complex organisations, delivering outcomes by applying expert knowledge in Information Management, Leadership as well as wide ranging business expertise. His experience has been with a diverse array of business initiatives with a focus on the Financial Services, Mining, Oil &amp; Gas, Energy, and Insurance industries. He is well versed in modern information technology and business environments and has a broad range of skills including Problem Solving, Leadership, People Management, Strategic Insights, Stakeholder Management and Innovation.</div>
<div></div>
<div>A passionate Information Management Specialist and Program Manager with extensive experience in the delivery of projects within complex organisations, Frederick Venter has a proven track record of leading diverse teams. He thrives in environments that challenge conventional thinking, and his leadership achieves the ultimate goal of generating assets where previously only data existed while establishing governance structures to ensure ongoing value. A key focus for Fred is on the delivery of increased performance in organisations through successful implementation of business-driven outcomes supported by a commitment to stakeholder management.</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/848bf685-da30-4943-8607-d0d5cc0213ae-KBKAST-EP-106-Kim-Coetzer-Fred-Venter.mp3" length="63696346"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kim Coetzer has more than two decades of experience in the delivery of projects within complex organisations, delivering outcomes by applying expert knowledge in Information Management, Leadership as well as wide ranging business expertise. His experience has been with a diverse array of business initiatives with a focus on the Financial Services, Mining, Oil & Gas, Energy, and Insurance industries. He is well versed in modern information technology and business environments and has a broad range of skills including Problem Solving, Leadership, People Management, Strategic Insights, Stakeholder Management and Innovation.

A passionate Information Management Specialist and Program Manager with extensive experience in the delivery of projects within complex organisations, Frederick Venter has a proven track record of leading diverse teams. He thrives in environments that challenge conventional thinking, and his leadership achieves the ultimate goal of generating assets where previously only data existed while establishing governance structures to ensure ongoing value. A key focus for Fred is on the delivery of increased performance in organisations through successful implementation of business-driven outcomes supported by a commitment to stakeholder management.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1116480/1700181100-Kim-Fred-NovoFinity.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 105: Reinhart Hansen]]>
                </title>
                <pubDate>Wed, 27 Apr 2022 16:30:31 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-105-reinhart-hansen</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-105-reinhart-hansen</link>
                                <description>
                                            <![CDATA[<p><b>Reinhart Hansen, Director of Technology, Office of the CTO, Imperva </b></p>
<p><span style="font-weight:400;">Reinhart is an experienced Information Technology and Cyber Security leader with over 25 years of experience.  His career is founded by a degree in Computer Science from the Royal Melbourne Institute of Technology (RMIT) where he majored in Data Security and Communications.</span></p>
<p><span style="font-weight:400;">Initially developing applications and security middleware for the Financial Services industry his career quickly became focused on helping organisations manage cyber risk by securing their applications, infrastructure and data using a wide variety of vendor technology combined with industry best security practices.   He has a demonstrated history of working in technology advisory, architecture, solution design and pre-sales roles.  </span></p>
<p><span style="font-weight:400;">Reinhart is passionate about all aspects of cyber security and has been with Imperva since 2015.  Initially working as a principal SE in the APJ region, he is currently a Director of Technology within Imperva’s CTO Office and reports to Kunal Anand, Imperva’s CTO.  </span></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Reinhart Hansen, Director of Technology, Office of the CTO, Imperva 
Reinhart is an experienced Information Technology and Cyber Security leader with over 25 years of experience.  His career is founded by a degree in Computer Science from the Royal Melbourne Institute of Technology (RMIT) where he majored in Data Security and Communications.
Initially developing applications and security middleware for the Financial Services industry his career quickly became focused on helping organisations manage cyber risk by securing their applications, infrastructure and data using a wide variety of vendor technology combined with industry best security practices.   He has a demonstrated history of working in technology advisory, architecture, solution design and pre-sales roles.  
Reinhart is passionate about all aspects of cyber security and has been with Imperva since 2015.  Initially working as a principal SE in the APJ region, he is currently a Director of Technology within Imperva’s CTO Office and reports to Kunal Anand, Imperva’s CTO.  
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 105: Reinhart Hansen]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><b>Reinhart Hansen, Director of Technology, Office of the CTO, Imperva </b></p>
<p><span style="font-weight:400;">Reinhart is an experienced Information Technology and Cyber Security leader with over 25 years of experience.  His career is founded by a degree in Computer Science from the Royal Melbourne Institute of Technology (RMIT) where he majored in Data Security and Communications.</span></p>
<p><span style="font-weight:400;">Initially developing applications and security middleware for the Financial Services industry his career quickly became focused on helping organisations manage cyber risk by securing their applications, infrastructure and data using a wide variety of vendor technology combined with industry best security practices.   He has a demonstrated history of working in technology advisory, architecture, solution design and pre-sales roles.  </span></p>
<p><span style="font-weight:400;">Reinhart is passionate about all aspects of cyber security and has been with Imperva since 2015.  Initially working as a principal SE in the APJ region, he is currently a Director of Technology within Imperva’s CTO Office and reports to Kunal Anand, Imperva’s CTO.  </span></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/697a7ccd-2d63-44a1-b87c-345445c52cd5-KBKAST-EP-105-Reinhart-Hansen.mp3" length="73774800"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Reinhart Hansen, Director of Technology, Office of the CTO, Imperva 
Reinhart is an experienced Information Technology and Cyber Security leader with over 25 years of experience.  His career is founded by a degree in Computer Science from the Royal Melbourne Institute of Technology (RMIT) where he majored in Data Security and Communications.
Initially developing applications and security middleware for the Financial Services industry his career quickly became focused on helping organisations manage cyber risk by securing their applications, infrastructure and data using a wide variety of vendor technology combined with industry best security practices.   He has a demonstrated history of working in technology advisory, architecture, solution design and pre-sales roles.  
Reinhart is passionate about all aspects of cyber security and has been with Imperva since 2015.  Initially working as a principal SE in the APJ region, he is currently a Director of Technology within Imperva’s CTO Office and reports to Kunal Anand, Imperva’s CTO.  
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1106793/1700181101-KBKAST-EP-105-Reinhart-Hansen-1.jpg"></itunes:image>
                                                                            <itunes:duration>00:51:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 104: Trent Telford]]>
                </title>
                <pubDate>Wed, 20 Apr 2022 16:30:07 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-104-trent-telford</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-104-trent-telford</link>
                                <description>
                                            <![CDATA[<p>A seasoned entrepreneur with deep experience in the technology sector, Trent is a seasoned data and security expert, often called upon by the government and enterprise to help advise on how to manage regulated data in complex environments.</p>
<p>Trent founded two technology companies in the U.S. and London with one culminating in an IPO. Today, Trent today is the CEO and Chairman of Cocoon Data and holds two board positions as a Non-Executive Director.</p>
<p>Prior to Cocoon Data, Trent founded and led the IPO of technology cyber security company Covata on the ASX. Prior to this, he ran a successful start-up specializing in telco/mobile marketing in partnership with STW/WPP (premium SMS voting on TV/radio/consumer products) and was Chairman of an Australian ASX listed Bio-tech company.</p>
<p>His foundation years in the technology industry was as a Business Analyst and Solutions Architect at one of the world’s first NASDAQ listed global technology consulting companies – Seranova. With graduate years spent with Bankers Trust and Deutsch Bank in London in global middle office and projects (FX/Euro conversion/Y2K)</p>
<p>Today, Trent and the Cocoon Data team leverage their secure object, patented technology to help keep companies and sovereign data safe, from harm’s way.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[A seasoned entrepreneur with deep experience in the technology sector, Trent is a seasoned data and security expert, often called upon by the government and enterprise to help advise on how to manage regulated data in complex environments.
Trent founded two technology companies in the U.S. and London with one culminating in an IPO. Today, Trent today is the CEO and Chairman of Cocoon Data and holds two board positions as a Non-Executive Director.
Prior to Cocoon Data, Trent founded and led the IPO of technology cyber security company Covata on the ASX. Prior to this, he ran a successful start-up specializing in telco/mobile marketing in partnership with STW/WPP (premium SMS voting on TV/radio/consumer products) and was Chairman of an Australian ASX listed Bio-tech company.
His foundation years in the technology industry was as a Business Analyst and Solutions Architect at one of the world’s first NASDAQ listed global technology consulting companies – Seranova. With graduate years spent with Bankers Trust and Deutsch Bank in London in global middle office and projects (FX/Euro conversion/Y2K)
Today, Trent and the Cocoon Data team leverage their secure object, patented technology to help keep companies and sovereign data safe, from harm’s way.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 104: Trent Telford]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>A seasoned entrepreneur with deep experience in the technology sector, Trent is a seasoned data and security expert, often called upon by the government and enterprise to help advise on how to manage regulated data in complex environments.</p>
<p>Trent founded two technology companies in the U.S. and London with one culminating in an IPO. Today, Trent today is the CEO and Chairman of Cocoon Data and holds two board positions as a Non-Executive Director.</p>
<p>Prior to Cocoon Data, Trent founded and led the IPO of technology cyber security company Covata on the ASX. Prior to this, he ran a successful start-up specializing in telco/mobile marketing in partnership with STW/WPP (premium SMS voting on TV/radio/consumer products) and was Chairman of an Australian ASX listed Bio-tech company.</p>
<p>His foundation years in the technology industry was as a Business Analyst and Solutions Architect at one of the world’s first NASDAQ listed global technology consulting companies – Seranova. With graduate years spent with Bankers Trust and Deutsch Bank in London in global middle office and projects (FX/Euro conversion/Y2K)</p>
<p>Today, Trent and the Cocoon Data team leverage their secure object, patented technology to help keep companies and sovereign data safe, from harm’s way.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/b72b7144-308c-421d-9491-a4216ac42c88-KBKAST-EP-104-Trent-Telford.mp3" length="77667410"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[A seasoned entrepreneur with deep experience in the technology sector, Trent is a seasoned data and security expert, often called upon by the government and enterprise to help advise on how to manage regulated data in complex environments.
Trent founded two technology companies in the U.S. and London with one culminating in an IPO. Today, Trent today is the CEO and Chairman of Cocoon Data and holds two board positions as a Non-Executive Director.
Prior to Cocoon Data, Trent founded and led the IPO of technology cyber security company Covata on the ASX. Prior to this, he ran a successful start-up specializing in telco/mobile marketing in partnership with STW/WPP (premium SMS voting on TV/radio/consumer products) and was Chairman of an Australian ASX listed Bio-tech company.
His foundation years in the technology industry was as a Business Analyst and Solutions Architect at one of the world’s first NASDAQ listed global technology consulting companies – Seranova. With graduate years spent with Bankers Trust and Deutsch Bank in London in global middle office and projects (FX/Euro conversion/Y2K)
Today, Trent and the Cocoon Data team leverage their secure object, patented technology to help keep companies and sovereign data safe, from harm’s way.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1106791/1700181101-KBKAST-EP-104-Trent-Telford.jpg"></itunes:image>
                                                                            <itunes:duration>00:53:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 103: Michael Livingstone]]>
                </title>
                <pubDate>Sun, 17 Apr 2022 15:31:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-103-michael-livingstone</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-103-michael-livingstone</link>
                                <description>
                                            <![CDATA[<p>Michael is a strategic leader with more than 20 years’ experience in Financial Services and Defence markets. He has demonstrable success in bringing early stage companies to market, utilising skills across Application Development, Product Management, Marketing and Sales. He operates collaboratively to distil technology solutions into customer value propositions, sales strategies and delivery models that are field enabled, integrated and commercially relevant.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Michael is a strategic leader with more than 20 years’ experience in Financial Services and Defence markets. He has demonstrable success in bringing early stage companies to market, utilising skills across Application Development, Product Management, Marketing and Sales. He operates collaboratively to distil technology solutions into customer value propositions, sales strategies and delivery models that are field enabled, integrated and commercially relevant.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 103: Michael Livingstone]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Michael is a strategic leader with more than 20 years’ experience in Financial Services and Defence markets. He has demonstrable success in bringing early stage companies to market, utilising skills across Application Development, Product Management, Marketing and Sales. He operates collaboratively to distil technology solutions into customer value propositions, sales strategies and delivery models that are field enabled, integrated and commercially relevant.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/08c7d9b6-d600-4053-91b5-bded8febadfc-KBKAST-Episode-103-Michael-Livingstone.mp3" length="90695015"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Michael is a strategic leader with more than 20 years’ experience in Financial Services and Defence markets. He has demonstrable success in bringing early stage companies to market, utilising skills across Application Development, Product Management, Marketing and Sales. He operates collaboratively to distil technology solutions into customer value propositions, sales strategies and delivery models that are field enabled, integrated and commercially relevant.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1091245/KBKAST-EP-9x-Michel-Livingstone.jpg"></itunes:image>
                                                                            <itunes:duration>01:02:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 102: John Karabin]]>
                </title>
                <pubDate>Wed, 06 Apr 2022 16:00:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1070699</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-102-john-karabin</link>
                                <description>
                                            <![CDATA[<p>John Karabin is the Senior Director of Cybersecurity for NTT Ltd in Australia, and is responsible for Australia’s security strategic direction, capability and go-to-market. He builds trusted partnerships with clients and technologists, bringing a keen focus to customer-centric delivery and operations.</p>
<p>John specialises in risk-based information security, combining a consulting led approach to meet the practical security needs for organisations increasingly dealing with a growing threat landscape and organisational change.</p>
<p>John has more than 25 years’ experience in information and communications technology (ICT), working in various locations around the world. He has dealt with a wide range of organisations, having worked with government and commercial entities across many geographies.</p>
<p>Before joining NTT, John was a Partner at EY leading their government risk and information security practice. Prior to this, he was the APAC Managing Director for Security at Verizon and also ran their Australian Telecommunications business.</p>
<p>John holds a Graduate Diploma in Technology Management from Deakin University and a bachelor’s degree from Curtin University in Communication Engineering, Electronics and Computer Science.</p>
<p>In his spare time, John is a volunteer firefighter with the NSW Rural Fire Service and a board member with Cyrise, Australia’s premier Cybersecurity start-up incubator.</p>
<p><a href="https://kbi.media/wp-content/uploads/2022/04/GTIC_Monthly_Threat_Report_January_2022.pdf">GTIC_Monthly_Threat_Report_January_2022</a></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[John Karabin is the Senior Director of Cybersecurity for NTT Ltd in Australia, and is responsible for Australia’s security strategic direction, capability and go-to-market. He builds trusted partnerships with clients and technologists, bringing a keen focus to customer-centric delivery and operations.
John specialises in risk-based information security, combining a consulting led approach to meet the practical security needs for organisations increasingly dealing with a growing threat landscape and organisational change.
John has more than 25 years’ experience in information and communications technology (ICT), working in various locations around the world. He has dealt with a wide range of organisations, having worked with government and commercial entities across many geographies.
Before joining NTT, John was a Partner at EY leading their government risk and information security practice. Prior to this, he was the APAC Managing Director for Security at Verizon and also ran their Australian Telecommunications business.
John holds a Graduate Diploma in Technology Management from Deakin University and a bachelor’s degree from Curtin University in Communication Engineering, Electronics and Computer Science.
In his spare time, John is a volunteer firefighter with the NSW Rural Fire Service and a board member with Cyrise, Australia’s premier Cybersecurity start-up incubator.
GTIC_Monthly_Threat_Report_January_2022
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 102: John Karabin]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>John Karabin is the Senior Director of Cybersecurity for NTT Ltd in Australia, and is responsible for Australia’s security strategic direction, capability and go-to-market. He builds trusted partnerships with clients and technologists, bringing a keen focus to customer-centric delivery and operations.</p>
<p>John specialises in risk-based information security, combining a consulting led approach to meet the practical security needs for organisations increasingly dealing with a growing threat landscape and organisational change.</p>
<p>John has more than 25 years’ experience in information and communications technology (ICT), working in various locations around the world. He has dealt with a wide range of organisations, having worked with government and commercial entities across many geographies.</p>
<p>Before joining NTT, John was a Partner at EY leading their government risk and information security practice. Prior to this, he was the APAC Managing Director for Security at Verizon and also ran their Australian Telecommunications business.</p>
<p>John holds a Graduate Diploma in Technology Management from Deakin University and a bachelor’s degree from Curtin University in Communication Engineering, Electronics and Computer Science.</p>
<p>In his spare time, John is a volunteer firefighter with the NSW Rural Fire Service and a board member with Cyrise, Australia’s premier Cybersecurity start-up incubator.</p>
<p><a href="https://kbi.media/wp-content/uploads/2022/04/GTIC_Monthly_Threat_Report_January_2022.pdf">GTIC_Monthly_Threat_Report_January_2022</a></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/3af4a76f-bc9e-4004-84ea-c089a6899166-KBKAST-EP-103-John-Karabin.mp3" length="78540577"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[John Karabin is the Senior Director of Cybersecurity for NTT Ltd in Australia, and is responsible for Australia’s security strategic direction, capability and go-to-market. He builds trusted partnerships with clients and technologists, bringing a keen focus to customer-centric delivery and operations.
John specialises in risk-based information security, combining a consulting led approach to meet the practical security needs for organisations increasingly dealing with a growing threat landscape and organisational change.
John has more than 25 years’ experience in information and communications technology (ICT), working in various locations around the world. He has dealt with a wide range of organisations, having worked with government and commercial entities across many geographies.
Before joining NTT, John was a Partner at EY leading their government risk and information security practice. Prior to this, he was the APAC Managing Director for Security at Verizon and also ran their Australian Telecommunications business.
John holds a Graduate Diploma in Technology Management from Deakin University and a bachelor’s degree from Curtin University in Communication Engineering, Electronics and Computer Science.
In his spare time, John is a volunteer firefighter with the NSW Rural Fire Service and a board member with Cyrise, Australia’s premier Cybersecurity start-up incubator.
GTIC_Monthly_Threat_Report_January_2022
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1070699/John-Karabin.png"></itunes:image>
                                                                            <itunes:duration>00:54:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 101: Eugene Fedorchenko]]>
                </title>
                <pubDate>Wed, 30 Mar 2022 16:00:31 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1051191</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-101-eugene-fedorchenko</link>
                                <description>
                                            <![CDATA[<p>My career is an example of professional shifts and huge amount of change. It started with the global legal consultancy names like Baker &amp; McKenzie, Chadbourne &amp; Parke. Following the completion of an internship at Deloitte (Zurich, Switzerland), I’ve spent around 8 years in Corporate Law, Tax Structuring and Digital Law across the EU and CEE.</p>
<p>I had my legal/management consulting business as a co-founder, based in Switzerland for three years and completed my Masters’ Degree in International Law and an Advanced Degree in the EU Commercial and Economical Law from the University of Lausanne (Switzerland) in 2010.</p>
<p>I brought my multifaceted global experience to the Australian soil in 2017, with an accompanying skillset and understanding of management, marketing and product strategy within the walls of the Melbourne Business School as an Enterprise Management Specialist. At the time I was working on the GTM for the cyber security and renewable energy startups internationally.</p>
<p>Currently I am developing the Regulation Technology business partnerships at Fastlane Solutions (Sydney/Melbourne) as a Business Development Partner, maintaining account management functions and growing major strategic partnership/vendor relationships. I run a think tank/advisory hub called IntFinite which provides business development avenues based on and subject to a Why? question and a robust Purpose of the organisation.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[My career is an example of professional shifts and huge amount of change. It started with the global legal consultancy names like Baker & McKenzie, Chadbourne & Parke. Following the completion of an internship at Deloitte (Zurich, Switzerland), I’ve spent around 8 years in Corporate Law, Tax Structuring and Digital Law across the EU and CEE.
I had my legal/management consulting business as a co-founder, based in Switzerland for three years and completed my Masters’ Degree in International Law and an Advanced Degree in the EU Commercial and Economical Law from the University of Lausanne (Switzerland) in 2010.
I brought my multifaceted global experience to the Australian soil in 2017, with an accompanying skillset and understanding of management, marketing and product strategy within the walls of the Melbourne Business School as an Enterprise Management Specialist. At the time I was working on the GTM for the cyber security and renewable energy startups internationally.
Currently I am developing the Regulation Technology business partnerships at Fastlane Solutions (Sydney/Melbourne) as a Business Development Partner, maintaining account management functions and growing major strategic partnership/vendor relationships. I run a think tank/advisory hub called IntFinite which provides business development avenues based on and subject to a Why? question and a robust Purpose of the organisation.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 101: Eugene Fedorchenko]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>My career is an example of professional shifts and huge amount of change. It started with the global legal consultancy names like Baker &amp; McKenzie, Chadbourne &amp; Parke. Following the completion of an internship at Deloitte (Zurich, Switzerland), I’ve spent around 8 years in Corporate Law, Tax Structuring and Digital Law across the EU and CEE.</p>
<p>I had my legal/management consulting business as a co-founder, based in Switzerland for three years and completed my Masters’ Degree in International Law and an Advanced Degree in the EU Commercial and Economical Law from the University of Lausanne (Switzerland) in 2010.</p>
<p>I brought my multifaceted global experience to the Australian soil in 2017, with an accompanying skillset and understanding of management, marketing and product strategy within the walls of the Melbourne Business School as an Enterprise Management Specialist. At the time I was working on the GTM for the cyber security and renewable energy startups internationally.</p>
<p>Currently I am developing the Regulation Technology business partnerships at Fastlane Solutions (Sydney/Melbourne) as a Business Development Partner, maintaining account management functions and growing major strategic partnership/vendor relationships. I run a think tank/advisory hub called IntFinite which provides business development avenues based on and subject to a Why? question and a robust Purpose of the organisation.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/28964798-1148-443c-bbef-4ebad923279d-KBKAST-EP-106-Eugene-Fedorchenko.mp3" length="79005804"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[My career is an example of professional shifts and huge amount of change. It started with the global legal consultancy names like Baker & McKenzie, Chadbourne & Parke. Following the completion of an internship at Deloitte (Zurich, Switzerland), I’ve spent around 8 years in Corporate Law, Tax Structuring and Digital Law across the EU and CEE.
I had my legal/management consulting business as a co-founder, based in Switzerland for three years and completed my Masters’ Degree in International Law and an Advanced Degree in the EU Commercial and Economical Law from the University of Lausanne (Switzerland) in 2010.
I brought my multifaceted global experience to the Australian soil in 2017, with an accompanying skillset and understanding of management, marketing and product strategy within the walls of the Melbourne Business School as an Enterprise Management Specialist. At the time I was working on the GTM for the cyber security and renewable energy startups internationally.
Currently I am developing the Regulation Technology business partnerships at Fastlane Solutions (Sydney/Melbourne) as a Business Development Partner, maintaining account management functions and growing major strategic partnership/vendor relationships. I run a think tank/advisory hub called IntFinite which provides business development avenues based on and subject to a Why? question and a robust Purpose of the organisation.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1051191/KBKAST-EP-9x-Eugene-Fedorchenko.jpg"></itunes:image>
                                                                            <itunes:duration>00:54:50</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 100: Mukesh Kapadia]]>
                </title>
                <pubDate>Wed, 23 Mar 2022 16:00:55 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1039191</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-100-mukesh-kapadia</link>
                                <description>
                                            <![CDATA[<p>Executive with over 20 years of experience leading IT functions and teams across different global markets, delivering complex digital and business transformation to improve customer service and employee experience. These include large scale technology programs and consolidation of IT Teams across different markets to drive efficiency and standardization of IT operating model and processes. Over the past 4 years, as the General Manager/Deputy CISO, has led the cybersecurity strategy and implementation of a multi-year roadmap across global FMCG organisation operating in 6 countries across Asia Pacific to mitigate the evolving risk against Cyber Threats.<br />
Proven track record and passionate about building and inspiring teams to deliver customer centric IT services</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Executive with over 20 years of experience leading IT functions and teams across different global markets, delivering complex digital and business transformation to improve customer service and employee experience. These include large scale technology programs and consolidation of IT Teams across different markets to drive efficiency and standardization of IT operating model and processes. Over the past 4 years, as the General Manager/Deputy CISO, has led the cybersecurity strategy and implementation of a multi-year roadmap across global FMCG organisation operating in 6 countries across Asia Pacific to mitigate the evolving risk against Cyber Threats.
Proven track record and passionate about building and inspiring teams to deliver customer centric IT services
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 100: Mukesh Kapadia]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Executive with over 20 years of experience leading IT functions and teams across different global markets, delivering complex digital and business transformation to improve customer service and employee experience. These include large scale technology programs and consolidation of IT Teams across different markets to drive efficiency and standardization of IT operating model and processes. Over the past 4 years, as the General Manager/Deputy CISO, has led the cybersecurity strategy and implementation of a multi-year roadmap across global FMCG organisation operating in 6 countries across Asia Pacific to mitigate the evolving risk against Cyber Threats.<br />
Proven track record and passionate about building and inspiring teams to deliver customer centric IT services</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/f555bb42-2d15-4ef5-8c8d-287f24efc5ab-KBKAST-EP-100-Mukesh-Kapadia.mp3" length="71371613"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Executive with over 20 years of experience leading IT functions and teams across different global markets, delivering complex digital and business transformation to improve customer service and employee experience. These include large scale technology programs and consolidation of IT Teams across different markets to drive efficiency and standardization of IT operating model and processes. Over the past 4 years, as the General Manager/Deputy CISO, has led the cybersecurity strategy and implementation of a multi-year roadmap across global FMCG organisation operating in 6 countries across Asia Pacific to mitigate the evolving risk against Cyber Threats.
Proven track record and passionate about building and inspiring teams to deliver customer centric IT services
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1039191/Mukesh-Kapadia.png"></itunes:image>
                                                                            <itunes:duration>00:49:31</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 99: Rebecca Herold]]>
                </title>
                <pubDate>Wed, 16 Mar 2022 16:00:20 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-99-rebecca-herold</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-99-rebecca-herold</link>
                                <description>
                                            <![CDATA[<p>Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, &amp; privacy experience; CEO &amp; Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO &amp; Founder (2020) of Privacy &amp; Security Brainiacs; and host of the radio/podcast show “<a href="https://www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor">Data Security &amp; Privacy with the Privacy Professor</a>“. Founder (2014) &amp; Engineer/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.</p>
<p>Rebecca is an entrepreneur, author &amp; was an Adjunct Professor for the Norwich University Master of Science in Information Security &amp; Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca’s books include:<br />
* Security &amp; Privacy when Working from Home &amp; Travelling<br />
* The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)<br />
* Data Privacy for the Smart Grid<br />
* The Privacy Papers<br />
* Managing an Information Security and Privacy Awareness and Training Program (2 editions)</p>
<p>Rebecca has a B.S. in Math &amp; Computer Science &amp; an M.A. in Computer Science &amp; Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE &amp; ACM.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, & privacy experience; CEO & Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO & Founder (2020) of Privacy & Security Brainiacs; and host of the radio/podcast show “Data Security & Privacy with the Privacy Professor“. Founder (2014) & Engineer/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.
Rebecca is an entrepreneur, author & was an Adjunct Professor for the Norwich University Master of Science in Information Security & Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca’s books include:
* Security & Privacy when Working from Home & Travelling
* The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)
* Data Privacy for the Smart Grid
* The Privacy Papers
* Managing an Information Security and Privacy Awareness and Training Program (2 editions)
Rebecca has a B.S. in Math & Computer Science & an M.A. in Computer Science & Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE & ACM.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 99: Rebecca Herold]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, &amp; privacy experience; CEO &amp; Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO &amp; Founder (2020) of Privacy &amp; Security Brainiacs; and host of the radio/podcast show “<a href="https://www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor">Data Security &amp; Privacy with the Privacy Professor</a>“. Founder (2014) &amp; Engineer/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.</p>
<p>Rebecca is an entrepreneur, author &amp; was an Adjunct Professor for the Norwich University Master of Science in Information Security &amp; Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca’s books include:<br />
* Security &amp; Privacy when Working from Home &amp; Travelling<br />
* The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)<br />
* Data Privacy for the Smart Grid<br />
* The Privacy Papers<br />
* Managing an Information Security and Privacy Awareness and Training Program (2 editions)</p>
<p>Rebecca has a B.S. in Math &amp; Computer Science &amp; an M.A. in Computer Science &amp; Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE &amp; ACM.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/0eec23df-b010-4f21-9efd-811f0e99a65c-KBKAST-EP-99-Rebecca-Herold.mp3" length="72410294"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, & privacy experience; CEO & Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO & Founder (2020) of Privacy & Security Brainiacs; and host of the radio/podcast show “Data Security & Privacy with the Privacy Professor“. Founder (2014) & Engineer/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.
Rebecca is an entrepreneur, author & was an Adjunct Professor for the Norwich University Master of Science in Information Security & Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca’s books include:
* Security & Privacy when Working from Home & Travelling
* The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)
* Data Privacy for the Smart Grid
* The Privacy Papers
* Managing an Information Security and Privacy Awareness and Training Program (2 editions)
Rebecca has a B.S. in Math & Computer Science & an M.A. in Computer Science & Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE & ACM.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1039371/1700181102-Rebecca-Herold-1.png"></itunes:image>
                                                                            <itunes:duration>00:50:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 98: Belinda McEachern M. Ed.]]>
                </title>
                <pubDate>Thu, 10 Mar 2022 04:57:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1030532</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-98-belinda-mceachern-m-ed-1</link>
                                <description>
                                            <![CDATA[<p>“I do not want you to be impressed by me, I want you to be blessed by me” is Belinda McEachern’s personal motto. And it’s a motto that she’s put to good use both professionally and personally, within all walks of life. Originally from Greenwood SC, Belinda now lives in Blythewood SC (suburb of Columbia) with her husband Danny (of 20 years) and her two children (Aaron – age 16 &amp; Camille –age 12).</p>
<p>Belinda is truly an individual that epitomizes the essence of selfless leadership and the true meaning of a leader. She possesses outstanding leadership traits (e.g., confidence, commitment, communication, and dedication that all persons seek and need in the 21st century). Belinda has had the privilege of holding a variety of leadership roles, both personally and professionally. Moreover, Belinda has had a stellar career in the fields of Education Leadership, Technology, Cyber Security, and Volunteerism.</p>
<p>Currently, Belinda is the Chapter President for one of the “BIT” Blacks In Technology Foundations” newest Chapters: “Blacks In Technology Columbia!” Blacks In Technology Columbia is the official Chapter for the Metro Columbia, SC region of the dynamic, growing, vibrant Blacks In Technology 501 (c)(3) non-profit organization. The purpose of this group is to network, learn best industry practices, and to advance Information Technology careers. The goal and mission is to “stomp the divide” between Black Tech workers and to fundamentally influence and effect change on an industry that has historically not sought parity with respect to Black workers. The intent of BIT Columbia is to level the playing field through training, education, networking, and mentorship with the support of allies, partners, sponsors, and most importantly their global members!
Belinda has impressive academic and professional credentials. She holds a Master of Education from Columbia College and a Bachelor of Arts in Art Education from the historical SC HBCU, Benedict College. Belinda has recently completed academic studies at the Institute for Veterans and Military Families (IVMF) at Syracuse University, with a concentration in Cybersecurity and continuing her Doctorate (EDD. ET) program with a concentration in Educational Leadership &amp; Educational Technology. Her ethical values and professionalism are above reproach.</p>
<p>Belinda exemplifies public service through her many volunteer endeavors, alongside Blacks In Technology Columbia. Her commitment to public service is manifested in her numerous volunteer and membership efforts. Belinda holds memberships with The National Coalition of 100 Black Women Inc., Columbia (SC) Chapter, whose mission is to advocate on behalf of black women and girls to promote leadership development and gender equity in the areas of health, education and economic empowerment; SC SkillsUSA Executive Board (currently Vice Chair): serving thousands of high school, college and middle school career and technical students and professional members enrolled in training programs in trade, technical and skilled service occupations, including health occupations.; Grow with Google Business Partner; NIST – NICE (National Initiative For Cybersecurity Education) Apprenticeship Subgroup/ Working Group; Career &amp; Technology Education (CTE) Advisory Council for SC School District Five of Lexington and Richland Counties; “BIC”- Blacks in Cybersecurity; SANS Women in Cybersecurity; SC Associationof School Administrators (SCASA); Women of Distinction Toastmasters (Toastmasters International); SC Codes (S.C. Department of Commerce’s Office of Innovation); mediaspace.global (The independent global social network for professionals in media, marketing, technology and regulation); siberX (Curating a global community of cybersecurity professionals and enthusiasts); “AYA” – Ally of the Year Awards 2021 (Judge/ Selection Committie), and Women’s Cyberjutsu; The Anti-Human Trafficking Alliance (Lexington,</p>
<p>SC); Carolina Alliance for Te...</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[“I do not want you to be impressed by me, I want you to be blessed by me” is Belinda McEachern’s personal motto. And it’s a motto that she’s put to good use both professionally and personally, within all walks of life. Originally from Greenwood SC, Belinda now lives in Blythewood SC (suburb of Columbia) with her husband Danny (of 20 years) and her two children (Aaron – age 16 & Camille –age 12).
Belinda is truly an individual that epitomizes the essence of selfless leadership and the true meaning of a leader. She possesses outstanding leadership traits (e.g., confidence, commitment, communication, and dedication that all persons seek and need in the 21st century). Belinda has had the privilege of holding a variety of leadership roles, both personally and professionally. Moreover, Belinda has had a stellar career in the fields of Education Leadership, Technology, Cyber Security, and Volunteerism.
Currently, Belinda is the Chapter President for one of the “BIT” Blacks In Technology Foundations” newest Chapters: “Blacks In Technology Columbia!” Blacks In Technology Columbia is the official Chapter for the Metro Columbia, SC region of the dynamic, growing, vibrant Blacks In Technology 501 (c)(3) non-profit organization. The purpose of this group is to network, learn best industry practices, and to advance Information Technology careers. The goal and mission is to “stomp the divide” between Black Tech workers and to fundamentally influence and effect change on an industry that has historically not sought parity with respect to Black workers. The intent of BIT Columbia is to level the playing field through training, education, networking, and mentorship with the support of allies, partners, sponsors, and most importantly their global members!
Belinda has impressive academic and professional credentials. She holds a Master of Education from Columbia College and a Bachelor of Arts in Art Education from the historical SC HBCU, Benedict College. Belinda has recently completed academic studies at the Institute for Veterans and Military Families (IVMF) at Syracuse University, with a concentration in Cybersecurity and continuing her Doctorate (EDD. ET) program with a concentration in Educational Leadership & Educational Technology. Her ethical values and professionalism are above reproach.
Belinda exemplifies public service through her many volunteer endeavors, alongside Blacks In Technology Columbia. Her commitment to public service is manifested in her numerous volunteer and membership efforts. Belinda holds memberships with The National Coalition of 100 Black Women Inc., Columbia (SC) Chapter, whose mission is to advocate on behalf of black women and girls to promote leadership development and gender equity in the areas of health, education and economic empowerment; SC SkillsUSA Executive Board (currently Vice Chair): serving thousands of high school, college and middle school career and technical students and professional members enrolled in training programs in trade, technical and skilled service occupations, including health occupations.; Grow with Google Business Partner; NIST – NICE (National Initiative For Cybersecurity Education) Apprenticeship Subgroup/ Working Group; Career & Technology Education (CTE) Advisory Council for SC School District Five of Lexington and Richland Counties; “BIC”- Blacks in Cybersecurity; SANS Women in Cybersecurity; SC Associationof School Administrators (SCASA); Women of Distinction Toastmasters (Toastmasters International); SC Codes (S.C. Department of Commerce’s Office of Innovation); mediaspace.global (The independent global social network for professionals in media, marketing, technology and regulation); siberX (Curating a global community of cybersecurity professionals and enthusiasts); “AYA” – Ally of the Year Awards 2021 (Judge/ Selection Committie), and Women’s Cyberjutsu; The Anti-Human Trafficking Alliance (Lexington,
SC); Carolina Alliance for Te...]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 98: Belinda McEachern M. Ed.]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>“I do not want you to be impressed by me, I want you to be blessed by me” is Belinda McEachern’s personal motto. And it’s a motto that she’s put to good use both professionally and personally, within all walks of life. Originally from Greenwood SC, Belinda now lives in Blythewood SC (suburb of Columbia) with her husband Danny (of 20 years) and her two children (Aaron – age 16 &amp; Camille –age 12).</p>
<p>Belinda is truly an individual that epitomizes the essence of selfless leadership and the true meaning of a leader. She possesses outstanding leadership traits (e.g., confidence, commitment, communication, and dedication that all persons seek and need in the 21st century). Belinda has had the privilege of holding a variety of leadership roles, both personally and professionally. Moreover, Belinda has had a stellar career in the fields of Education Leadership, Technology, Cyber Security, and Volunteerism.</p>
<p>Currently, Belinda is the Chapter President for one of the “BIT” Blacks In Technology Foundations” newest Chapters: “Blacks In Technology Columbia!” Blacks In Technology Columbia is the official Chapter for the Metro Columbia, SC region of the dynamic, growing, vibrant Blacks In Technology 501 (c)(3) non-profit organization. The purpose of this group is to network, learn best industry practices, and to advance Information Technology careers. The goal and mission is to “stomp the divide” between Black Tech workers and to fundamentally influence and effect change on an industry that has historically not sought parity with respect to Black workers. The intent of BIT Columbia is to level the playing field through training, education, networking, and mentorship with the support of allies, partners, sponsors, and most importantly their global members!
Belinda has impressive academic and professional credentials. She holds a Master of Education from Columbia College and a Bachelor of Arts in Art Education from the historical SC HBCU, Benedict College. Belinda has recently completed academic studies at the Institute for Veterans and Military Families (IVMF) at Syracuse University, with a concentration in Cybersecurity and continuing her Doctorate (EDD. ET) program with a concentration in Educational Leadership &amp; Educational Technology. Her ethical values and professionalism are above reproach.</p>
<p>Belinda exemplifies public service through her many volunteer endeavors, alongside Blacks In Technology Columbia. Her commitment to public service is manifested in her numerous volunteer and membership efforts. Belinda holds memberships with The National Coalition of 100 Black Women Inc., Columbia (SC) Chapter, whose mission is to advocate on behalf of black women and girls to promote leadership development and gender equity in the areas of health, education and economic empowerment; SC SkillsUSA Executive Board (currently Vice Chair): serving thousands of high school, college and middle school career and technical students and professional members enrolled in training programs in trade, technical and skilled service occupations, including health occupations.; Grow with Google Business Partner; NIST – NICE (National Initiative For Cybersecurity Education) Apprenticeship Subgroup/ Working Group; Career &amp; Technology Education (CTE) Advisory Council for SC School District Five of Lexington and Richland Counties; “BIC”- Blacks in Cybersecurity; SANS Women in Cybersecurity; SC Associationof School Administrators (SCASA); Women of Distinction Toastmasters (Toastmasters International); SC Codes (S.C. Department of Commerce’s Office of Innovation); mediaspace.global (The independent global social network for professionals in media, marketing, technology and regulation); siberX (Curating a global community of cybersecurity professionals and enthusiasts); “AYA” – Ally of the Year Awards 2021 (Judge/ Selection Committie), and Women’s Cyberjutsu; The Anti-Human Trafficking Alliance (Lexington,</p>
<p>SC); Carolina Alliance for Technology Parents in Partnership (CAT PIP), Columbia, SC; and IT-ology (K-12 STEAM), Columbia, SC.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/992e7c0a-b8fa-4f4d-be0e-cb08863836cb-KBKAST-Episode-98-Belinda-McEachern.mp3" length="79129210"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[“I do not want you to be impressed by me, I want you to be blessed by me” is Belinda McEachern’s personal motto. And it’s a motto that she’s put to good use both professionally and personally, within all walks of life. Originally from Greenwood SC, Belinda now lives in Blythewood SC (suburb of Columbia) with her husband Danny (of 20 years) and her two children (Aaron – age 16 & Camille –age 12).
Belinda is truly an individual that epitomizes the essence of selfless leadership and the true meaning of a leader. She possesses outstanding leadership traits (e.g., confidence, commitment, communication, and dedication that all persons seek and need in the 21st century). Belinda has had the privilege of holding a variety of leadership roles, both personally and professionally. Moreover, Belinda has had a stellar career in the fields of Education Leadership, Technology, Cyber Security, and Volunteerism.
Currently, Belinda is the Chapter President for one of the “BIT” Blacks In Technology Foundations” newest Chapters: “Blacks In Technology Columbia!” Blacks In Technology Columbia is the official Chapter for the Metro Columbia, SC region of the dynamic, growing, vibrant Blacks In Technology 501 (c)(3) non-profit organization. The purpose of this group is to network, learn best industry practices, and to advance Information Technology careers. The goal and mission is to “stomp the divide” between Black Tech workers and to fundamentally influence and effect change on an industry that has historically not sought parity with respect to Black workers. The intent of BIT Columbia is to level the playing field through training, education, networking, and mentorship with the support of allies, partners, sponsors, and most importantly their global members!
Belinda has impressive academic and professional credentials. She holds a Master of Education from Columbia College and a Bachelor of Arts in Art Education from the historical SC HBCU, Benedict College. Belinda has recently completed academic studies at the Institute for Veterans and Military Families (IVMF) at Syracuse University, with a concentration in Cybersecurity and continuing her Doctorate (EDD. ET) program with a concentration in Educational Leadership & Educational Technology. Her ethical values and professionalism are above reproach.
Belinda exemplifies public service through her many volunteer endeavors, alongside Blacks In Technology Columbia. Her commitment to public service is manifested in her numerous volunteer and membership efforts. Belinda holds memberships with The National Coalition of 100 Black Women Inc., Columbia (SC) Chapter, whose mission is to advocate on behalf of black women and girls to promote leadership development and gender equity in the areas of health, education and economic empowerment; SC SkillsUSA Executive Board (currently Vice Chair): serving thousands of high school, college and middle school career and technical students and professional members enrolled in training programs in trade, technical and skilled service occupations, including health occupations.; Grow with Google Business Partner; NIST – NICE (National Initiative For Cybersecurity Education) Apprenticeship Subgroup/ Working Group; Career & Technology Education (CTE) Advisory Council for SC School District Five of Lexington and Richland Counties; “BIC”- Blacks in Cybersecurity; SANS Women in Cybersecurity; SC Associationof School Administrators (SCASA); Women of Distinction Toastmasters (Toastmasters International); SC Codes (S.C. Department of Commerce’s Office of Innovation); mediaspace.global (The independent global social network for professionals in media, marketing, technology and regulation); siberX (Curating a global community of cybersecurity professionals and enthusiasts); “AYA” – Ally of the Year Awards 2021 (Judge/ Selection Committie), and Women’s Cyberjutsu; The Anti-Human Trafficking Alliance (Lexington,
SC); Carolina Alliance for Te...]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1030532/1700181102-KBKAST-Episode-98-Belinda-McEachern.jpg"></itunes:image>
                                                                            <itunes:duration>00:54:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 97: Abhijeth Dugginapeddi]]>
                </title>
                <pubDate>Thu, 03 Mar 2022 16:00:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-97-abhijeth-dugginapeddi</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-97-abhijeth-dugginapeddi</link>
                                <description>
                                            <![CDATA[<p>Abhijeth Dugginapeddi is a security practitioner, heads an AppSec team and an Adjunct lecturer at UNSW in Australia. Previously worked with CBA, Adobe Systems, TCS and Sourcenxt. Security Enthusiast in the fields of Penetration Testing, Application/Mobile/Infrastructure Security. Believes in need for more security awareness and free responsible disclosures. Got lucky in finding few vulnerabilities with Google, Yahoo, Facebook, Microsoft, Ebay, Dropbox, etc and one among Top researchers in Synack a bug bounty platform. Got a chance to speak at Defcon, Blackhat, OWASP AppSec USA, c0c0n, Secure-2018 Poland, CISO Summit, etc.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Abhijeth Dugginapeddi is a security practitioner, heads an AppSec team and an Adjunct lecturer at UNSW in Australia. Previously worked with CBA, Adobe Systems, TCS and Sourcenxt. Security Enthusiast in the fields of Penetration Testing, Application/Mobile/Infrastructure Security. Believes in need for more security awareness and free responsible disclosures. Got lucky in finding few vulnerabilities with Google, Yahoo, Facebook, Microsoft, Ebay, Dropbox, etc and one among Top researchers in Synack a bug bounty platform. Got a chance to speak at Defcon, Blackhat, OWASP AppSec USA, c0c0n, Secure-2018 Poland, CISO Summit, etc.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 97: Abhijeth Dugginapeddi]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Abhijeth Dugginapeddi is a security practitioner, heads an AppSec team and an Adjunct lecturer at UNSW in Australia. Previously worked with CBA, Adobe Systems, TCS and Sourcenxt. Security Enthusiast in the fields of Penetration Testing, Application/Mobile/Infrastructure Security. Believes in need for more security awareness and free responsible disclosures. Got lucky in finding few vulnerabilities with Google, Yahoo, Facebook, Microsoft, Ebay, Dropbox, etc and one among Top researchers in Synack a bug bounty platform. Got a chance to speak at Defcon, Blackhat, OWASP AppSec USA, c0c0n, Secure-2018 Poland, CISO Summit, etc.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/9d0c1448-5e7a-497c-b000-5c702c35cb10-KBKAST-EP-97-Abhijeth-Dugginapeddi.mp3" length="84569740"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Abhijeth Dugginapeddi is a security practitioner, heads an AppSec team and an Adjunct lecturer at UNSW in Australia. Previously worked with CBA, Adobe Systems, TCS and Sourcenxt. Security Enthusiast in the fields of Penetration Testing, Application/Mobile/Infrastructure Security. Believes in need for more security awareness and free responsible disclosures. Got lucky in finding few vulnerabilities with Google, Yahoo, Facebook, Microsoft, Ebay, Dropbox, etc and one among Top researchers in Synack a bug bounty platform. Got a chance to speak at Defcon, Blackhat, OWASP AppSec USA, c0c0n, Secure-2018 Poland, CISO Summit, etc.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1019133/1700181102-KBKAST-Episode-97-Abhijeth-Dugginapeddi.jpg"></itunes:image>
                                                                            <itunes:duration>00:58:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 96: Jason Yakencheck]]>
                </title>
                <pubDate>Tue, 22 Feb 2022 12:33:56 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-96-jason-yakencheck</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-96-jason-yakencheck</link>
                                <description>
                                            <![CDATA[<p>Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic planning. He’s leads IBM’s cybersecurity initiatives across Department of Homeland Security, Department of Justice, and Foreign Affairs. Jason designed and led many client security programs to drive success and innovation in areas such as vulnerability management programs, security operations, risk management, identity and access management, and solution architecture design efforts. Jason is adept at leading project teams, cyber capacity building, and implementing solutions in complex environments. He holds the following certifications: PMP, ITIL, CISSP-ISSAP, CISM, CISA, SAFe 5 Architect.</p>
<p>Jason received multiple leadership awards for his contributions to the technology sector both in the Washington, D.C. region and globally. He served as the President of the ISACA Greater Washington, D.C. Chapter (GWDC) from 2018-2020. He is a featured writer for Govloop and an ISACA Expert Speaker. Jason is a sought-after industry expert in the cybersecurity field. He is a frequent conference speaker and has been interviewed by news outlets such as Politico, FedTechMagazine, and TechTarget. He previously served as Vice President and Director of Professional Outreach and Development for GWDC. He was part of many working groups for ISACA Global such as the Leadership Development Advisory Council. He is a key contributor to the CISA and CISM online review courses and exam content creation.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic planning. He’s leads IBM’s cybersecurity initiatives across Department of Homeland Security, Department of Justice, and Foreign Affairs. Jason designed and led many client security programs to drive success and innovation in areas such as vulnerability management programs, security operations, risk management, identity and access management, and solution architecture design efforts. Jason is adept at leading project teams, cyber capacity building, and implementing solutions in complex environments. He holds the following certifications: PMP, ITIL, CISSP-ISSAP, CISM, CISA, SAFe 5 Architect.
Jason received multiple leadership awards for his contributions to the technology sector both in the Washington, D.C. region and globally. He served as the President of the ISACA Greater Washington, D.C. Chapter (GWDC) from 2018-2020. He is a featured writer for Govloop and an ISACA Expert Speaker. Jason is a sought-after industry expert in the cybersecurity field. He is a frequent conference speaker and has been interviewed by news outlets such as Politico, FedTechMagazine, and TechTarget. He previously served as Vice President and Director of Professional Outreach and Development for GWDC. He was part of many working groups for ISACA Global such as the Leadership Development Advisory Council. He is a key contributor to the CISA and CISM online review courses and exam content creation.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 96: Jason Yakencheck]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic planning. He’s leads IBM’s cybersecurity initiatives across Department of Homeland Security, Department of Justice, and Foreign Affairs. Jason designed and led many client security programs to drive success and innovation in areas such as vulnerability management programs, security operations, risk management, identity and access management, and solution architecture design efforts. Jason is adept at leading project teams, cyber capacity building, and implementing solutions in complex environments. He holds the following certifications: PMP, ITIL, CISSP-ISSAP, CISM, CISA, SAFe 5 Architect.</p>
<p>Jason received multiple leadership awards for his contributions to the technology sector both in the Washington, D.C. region and globally. He served as the President of the ISACA Greater Washington, D.C. Chapter (GWDC) from 2018-2020. He is a featured writer for Govloop and an ISACA Expert Speaker. Jason is a sought-after industry expert in the cybersecurity field. He is a frequent conference speaker and has been interviewed by news outlets such as Politico, FedTechMagazine, and TechTarget. He previously served as Vice President and Director of Professional Outreach and Development for GWDC. He was part of many working groups for ISACA Global such as the Leadership Development Advisory Council. He is a key contributor to the CISA and CISM online review courses and exam content creation.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/a0a08898-5402-4b96-95f4-ad3e0634dd68-KBKAST-EP-96-Jason-Yakencheck.mp3" length="52932796"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic planning. He’s leads IBM’s cybersecurity initiatives across Department of Homeland Security, Department of Justice, and Foreign Affairs. Jason designed and led many client security programs to drive success and innovation in areas such as vulnerability management programs, security operations, risk management, identity and access management, and solution architecture design efforts. Jason is adept at leading project teams, cyber capacity building, and implementing solutions in complex environments. He holds the following certifications: PMP, ITIL, CISSP-ISSAP, CISM, CISA, SAFe 5 Architect.
Jason received multiple leadership awards for his contributions to the technology sector both in the Washington, D.C. region and globally. He served as the President of the ISACA Greater Washington, D.C. Chapter (GWDC) from 2018-2020. He is a featured writer for Govloop and an ISACA Expert Speaker. Jason is a sought-after industry expert in the cybersecurity field. He is a frequent conference speaker and has been interviewed by news outlets such as Politico, FedTechMagazine, and TechTarget. He previously served as Vice President and Director of Professional Outreach and Development for GWDC. He was part of many working groups for ISACA Global such as the Leadership Development Advisory Council. He is a key contributor to the CISA and CISM online review courses and exam content creation.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1001204/1700181102-KBKAST-EP-9x-Jason-Yakencheck.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 95: Jon Brandt]]>
                </title>
                <pubDate>Tue, 15 Feb 2022 12:00:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/985054</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-95-jon-brandt</link>
                                <description>
                                            <![CDATA[<p><strong>Jonathan Brandt, CISM, CDPSE, CCISO, CISSP, CySA+, CPI, PMP</strong></p>
<p>A senior information security practice manager in ISACA’s Knowledge and Research department. In this role, he contributes thought leadership by generating ideas and deliverables relevant to ISACA’s constituents. He serves ISACA® departments as a subject matter expert on information security projects and leads author management teams whenever external resources are necessary. Brandt is a highly accomplished US Navy veteran with more than 25 years of experience spanning multidisciplinary security, cyberoperations and technical workforce development. Prior to joining ISACA, Brandt was a project manager for classified critical infrastructure projects across the globe.</p>
<p><a href="https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004Kti2EAC">ISACA Portal</a></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jonathan Brandt, CISM, CDPSE, CCISO, CISSP, CySA+, CPI, PMP
A senior information security practice manager in ISACA’s Knowledge and Research department. In this role, he contributes thought leadership by generating ideas and deliverables relevant to ISACA’s constituents. He serves ISACA® departments as a subject matter expert on information security projects and leads author management teams whenever external resources are necessary. Brandt is a highly accomplished US Navy veteran with more than 25 years of experience spanning multidisciplinary security, cyberoperations and technical workforce development. Prior to joining ISACA, Brandt was a project manager for classified critical infrastructure projects across the globe.
ISACA Portal
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 95: Jon Brandt]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Jonathan Brandt, CISM, CDPSE, CCISO, CISSP, CySA+, CPI, PMP</strong></p>
<p>A senior information security practice manager in ISACA’s Knowledge and Research department. In this role, he contributes thought leadership by generating ideas and deliverables relevant to ISACA’s constituents. He serves ISACA® departments as a subject matter expert on information security projects and leads author management teams whenever external resources are necessary. Brandt is a highly accomplished US Navy veteran with more than 25 years of experience spanning multidisciplinary security, cyberoperations and technical workforce development. Prior to joining ISACA, Brandt was a project manager for classified critical infrastructure projects across the globe.</p>
<p><a href="https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004Kti2EAC">ISACA Portal</a></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/486e079b-0eca-4e66-93aa-0dc1dc27e356-KBKAST-EP-95-Jon-Brandt.mp3" length="64729126"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jonathan Brandt, CISM, CDPSE, CCISO, CISSP, CySA+, CPI, PMP
A senior information security practice manager in ISACA’s Knowledge and Research department. In this role, he contributes thought leadership by generating ideas and deliverables relevant to ISACA’s constituents. He serves ISACA® departments as a subject matter expert on information security projects and leads author management teams whenever external resources are necessary. Brandt is a highly accomplished US Navy veteran with more than 25 years of experience spanning multidisciplinary security, cyberoperations and technical workforce development. Prior to joining ISACA, Brandt was a project manager for classified critical infrastructure projects across the globe.
ISACA Portal
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/985054/1700181102-KBKAST-Episode-95-Jon-Brandt.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 94: Jean-Michel Ferat]]>
                </title>
                <pubDate>Thu, 20 Jan 2022 15:42:49 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-94-jean-michel-ferat</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-94-jean-michel-ferat</link>
                                <description>
                                            <![CDATA[<p>Jean-Michel Ferat is a Senior Managing Director at Ankura with over 20 years of experience in the specialized fields of forensic accounting, fraud detection, and data analytics. He has applied his skills in a variety of cases involving corruption, kickbacks, collusive bidding rings, money laundering, embezzlement, asset misappropriation, terrorist financing, and financial statement fraud. He has led or participated in reactive investigations and proactive compliance engagements, including Foreign Corrupt Practices Act monitorships, across the United States and in over 25 countries around the world.  Jean-Michel served two terms as the forensic accounting expert on the audit and finance committee of the board of directors of the Global Fund to Fight Aids, Tuberculosis and Malaria and currently serves on the international advisory board of the CEELI Institute where he advises the organization on anti-corruption initiatives.</p>
<p>Jean-Michel has led or participated in numerous high-profile and complex projects across the United States and in international locations including Burkina Faso, Cambodia, Cameroon, Chile, China, Djibouti, Guinea, Holland, India, Indonesia, Iraq, Japan, Jordan, Kenya, Kuwait, Latvia, Liberia, Madagascar, Mali, Mauritania, Mexico, Pakistan, Senegal, South Africa, Trinidad and Tobago, United Arab Emirates, and Vietnam.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jean-Michel Ferat is a Senior Managing Director at Ankura with over 20 years of experience in the specialized fields of forensic accounting, fraud detection, and data analytics. He has applied his skills in a variety of cases involving corruption, kickbacks, collusive bidding rings, money laundering, embezzlement, asset misappropriation, terrorist financing, and financial statement fraud. He has led or participated in reactive investigations and proactive compliance engagements, including Foreign Corrupt Practices Act monitorships, across the United States and in over 25 countries around the world.  Jean-Michel served two terms as the forensic accounting expert on the audit and finance committee of the board of directors of the Global Fund to Fight Aids, Tuberculosis and Malaria and currently serves on the international advisory board of the CEELI Institute where he advises the organization on anti-corruption initiatives.
Jean-Michel has led or participated in numerous high-profile and complex projects across the United States and in international locations including Burkina Faso, Cambodia, Cameroon, Chile, China, Djibouti, Guinea, Holland, India, Indonesia, Iraq, Japan, Jordan, Kenya, Kuwait, Latvia, Liberia, Madagascar, Mali, Mauritania, Mexico, Pakistan, Senegal, South Africa, Trinidad and Tobago, United Arab Emirates, and Vietnam.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 94: Jean-Michel Ferat]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jean-Michel Ferat is a Senior Managing Director at Ankura with over 20 years of experience in the specialized fields of forensic accounting, fraud detection, and data analytics. He has applied his skills in a variety of cases involving corruption, kickbacks, collusive bidding rings, money laundering, embezzlement, asset misappropriation, terrorist financing, and financial statement fraud. He has led or participated in reactive investigations and proactive compliance engagements, including Foreign Corrupt Practices Act monitorships, across the United States and in over 25 countries around the world.  Jean-Michel served two terms as the forensic accounting expert on the audit and finance committee of the board of directors of the Global Fund to Fight Aids, Tuberculosis and Malaria and currently serves on the international advisory board of the CEELI Institute where he advises the organization on anti-corruption initiatives.</p>
<p>Jean-Michel has led or participated in numerous high-profile and complex projects across the United States and in international locations including Burkina Faso, Cambodia, Cameroon, Chile, China, Djibouti, Guinea, Holland, India, Indonesia, Iraq, Japan, Jordan, Kenya, Kuwait, Latvia, Liberia, Madagascar, Mali, Mauritania, Mexico, Pakistan, Senegal, South Africa, Trinidad and Tobago, United Arab Emirates, and Vietnam.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/5b5d6e98-d1dd-4c62-9f1a-92c6ce14ca34-KBKAST-EP-94-Jean-Michel.mp3" length="66434987"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jean-Michel Ferat is a Senior Managing Director at Ankura with over 20 years of experience in the specialized fields of forensic accounting, fraud detection, and data analytics. He has applied his skills in a variety of cases involving corruption, kickbacks, collusive bidding rings, money laundering, embezzlement, asset misappropriation, terrorist financing, and financial statement fraud. He has led or participated in reactive investigations and proactive compliance engagements, including Foreign Corrupt Practices Act monitorships, across the United States and in over 25 countries around the world.  Jean-Michel served two terms as the forensic accounting expert on the audit and finance committee of the board of directors of the Global Fund to Fight Aids, Tuberculosis and Malaria and currently serves on the international advisory board of the CEELI Institute where he advises the organization on anti-corruption initiatives.
Jean-Michel has led or participated in numerous high-profile and complex projects across the United States and in international locations including Burkina Faso, Cambodia, Cameroon, Chile, China, Djibouti, Guinea, Holland, India, Indonesia, Iraq, Japan, Jordan, Kenya, Kuwait, Latvia, Liberia, Madagascar, Mali, Mauritania, Mexico, Pakistan, Senegal, South Africa, Trinidad and Tobago, United Arab Emirates, and Vietnam.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/930833/KBKAST-EP-94-Jean-Michel-Ferat.jpg"></itunes:image>
                                                                            <itunes:duration>00:46:06</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 93: Ian Sorbello]]>
                </title>
                <pubDate>Mon, 10 Jan 2022 08:55:19 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-93-ian-sorbello</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-93-ian-sorbello</link>
                                <description>
                                            <![CDATA[<p>Ian has dedicated his IT career to identity and access management, working in and around banking and finance for the last 19 years. In this time, Ian has worked as a software engineer, security architect, and identity product owner. He has led IAM programmes for major banks such as the Commonwealth Bank of Australia, and ran the digital transformation programme as Head of Technology, Security for HSBC Global in the UK. After a number of years independently consulting in Europe around PSD2 and Open Banking, Ian joined Transmit Security in 2019 as Sales Engineer across APAC, before moving into a global role in 2021 covering technical evangelism and marketing.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ian has dedicated his IT career to identity and access management, working in and around banking and finance for the last 19 years. In this time, Ian has worked as a software engineer, security architect, and identity product owner. He has led IAM programmes for major banks such as the Commonwealth Bank of Australia, and ran the digital transformation programme as Head of Technology, Security for HSBC Global in the UK. After a number of years independently consulting in Europe around PSD2 and Open Banking, Ian joined Transmit Security in 2019 as Sales Engineer across APAC, before moving into a global role in 2021 covering technical evangelism and marketing.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 93: Ian Sorbello]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Ian has dedicated his IT career to identity and access management, working in and around banking and finance for the last 19 years. In this time, Ian has worked as a software engineer, security architect, and identity product owner. He has led IAM programmes for major banks such as the Commonwealth Bank of Australia, and ran the digital transformation programme as Head of Technology, Security for HSBC Global in the UK. After a number of years independently consulting in Europe around PSD2 and Open Banking, Ian joined Transmit Security in 2019 as Sales Engineer across APAC, before moving into a global role in 2021 covering technical evangelism and marketing.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/26989236-db3c-4c41-8b8e-770ebba0d220-KBKAST-EP-93-Ian-Sorbello.mp3" length="81442853"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ian has dedicated his IT career to identity and access management, working in and around banking and finance for the last 19 years. In this time, Ian has worked as a software engineer, security architect, and identity product owner. He has led IAM programmes for major banks such as the Commonwealth Bank of Australia, and ran the digital transformation programme as Head of Technology, Security for HSBC Global in the UK. After a number of years independently consulting in Europe around PSD2 and Open Banking, Ian joined Transmit Security in 2019 as Sales Engineer across APAC, before moving into a global role in 2021 covering technical evangelism and marketing.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/906951/1700181103-KBKAST-EP-93-Ian-Sorbello.jpg"></itunes:image>
                                                                            <itunes:duration>00:56:31</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 92: Sawan Joshi]]>
                </title>
                <pubDate>Sat, 18 Dec 2021 18:31:59 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-92-sawan-joshi</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-92-sawan-joshi</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Sawan</span><span style="font-weight:400;"> is an IT Risk Management Professional with over 15 years’ experience in multi industry organisations that have grown by acquisitions and mergers where he created and delivered strategically aligned IT Transformation programmes while managing risk that improved scalability, agility and provided new business enablement.</span></p>
<p><span style="font-weight:400;">Sawan’s career has been well travelled, built upon collaborative and flexible approaches that have ensured people are at the centre of all initiatives as the main asset thus building Information Security and Privacy principles in every table discussion.</span></p>
<p><span style="font-weight:400;">As a qualified architect, one of his biggest strengths is to be an effective communicator and translate complex to a simple explanation and vice versa while focusing on the value of the work and how it contributes to business growth.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sawan is an IT Risk Management Professional with over 15 years’ experience in multi industry organisations that have grown by acquisitions and mergers where he created and delivered strategically aligned IT Transformation programmes while managing risk that improved scalability, agility and provided new business enablement.
Sawan’s career has been well travelled, built upon collaborative and flexible approaches that have ensured people are at the centre of all initiatives as the main asset thus building Information Security and Privacy principles in every table discussion.
As a qualified architect, one of his biggest strengths is to be an effective communicator and translate complex to a simple explanation and vice versa while focusing on the value of the work and how it contributes to business growth.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 92: Sawan Joshi]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Sawan</span><span style="font-weight:400;"> is an IT Risk Management Professional with over 15 years’ experience in multi industry organisations that have grown by acquisitions and mergers where he created and delivered strategically aligned IT Transformation programmes while managing risk that improved scalability, agility and provided new business enablement.</span></p>
<p><span style="font-weight:400;">Sawan’s career has been well travelled, built upon collaborative and flexible approaches that have ensured people are at the centre of all initiatives as the main asset thus building Information Security and Privacy principles in every table discussion.</span></p>
<p><span style="font-weight:400;">As a qualified architect, one of his biggest strengths is to be an effective communicator and translate complex to a simple explanation and vice versa while focusing on the value of the work and how it contributes to business growth.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/0ffa78e5-6a28-4429-8bf4-9bca404f4bf1-KBKAST-Episode-92-Sawan-Joshi.mp3" length="76045473"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sawan is an IT Risk Management Professional with over 15 years’ experience in multi industry organisations that have grown by acquisitions and mergers where he created and delivered strategically aligned IT Transformation programmes while managing risk that improved scalability, agility and provided new business enablement.
Sawan’s career has been well travelled, built upon collaborative and flexible approaches that have ensured people are at the centre of all initiatives as the main asset thus building Information Security and Privacy principles in every table discussion.
As a qualified architect, one of his biggest strengths is to be an effective communicator and translate complex to a simple explanation and vice versa while focusing on the value of the work and how it contributes to business growth.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/861348/KBKAST-Episode-92-Sawan-Joshi-2.jpg"></itunes:image>
                                                                            <itunes:duration>00:52:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 91: Tinesh Chhaya]]>
                </title>
                <pubDate>Wed, 08 Dec 2021 13:54:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/844215</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-91-tinesh-chhaya</link>
                                <description>
                                            <![CDATA[<p>Tinesh has 15 years of successful cyber corporate and 5 years of start-up entrepreneurial cyber experience.<br />
He has built and exited 2 start-ups and currently sits on the board as an advisor to start ups within Cyber, EdTech, Software Development and Social Tech.</p>
<p>Tinesh is a mentor, motivator and advises individuals who are considering an entrepreneurial career as well as being a mental health advocate, keen supporter of mindfulness and self care.</p>
<p>He is a Forbes Technology Council member, part time lecturer at Brunel University and aspiring author.</p>
<p>Tinesh is also a advocate of helping young learners find their place in the working world and helps over 30 young learners a year with his personal time to encourage and motivate them to follow their dreams and achieve their goals.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Tinesh has 15 years of successful cyber corporate and 5 years of start-up entrepreneurial cyber experience.
He has built and exited 2 start-ups and currently sits on the board as an advisor to start ups within Cyber, EdTech, Software Development and Social Tech.
Tinesh is a mentor, motivator and advises individuals who are considering an entrepreneurial career as well as being a mental health advocate, keen supporter of mindfulness and self care.
He is a Forbes Technology Council member, part time lecturer at Brunel University and aspiring author.
Tinesh is also a advocate of helping young learners find their place in the working world and helps over 30 young learners a year with his personal time to encourage and motivate them to follow their dreams and achieve their goals.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 91: Tinesh Chhaya]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Tinesh has 15 years of successful cyber corporate and 5 years of start-up entrepreneurial cyber experience.<br />
He has built and exited 2 start-ups and currently sits on the board as an advisor to start ups within Cyber, EdTech, Software Development and Social Tech.</p>
<p>Tinesh is a mentor, motivator and advises individuals who are considering an entrepreneurial career as well as being a mental health advocate, keen supporter of mindfulness and self care.</p>
<p>He is a Forbes Technology Council member, part time lecturer at Brunel University and aspiring author.</p>
<p>Tinesh is also a advocate of helping young learners find their place in the working world and helps over 30 young learners a year with his personal time to encourage and motivate them to follow their dreams and achieve their goals.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/865c2797-ebc4-429f-8fee-2b06b2a64544-KBKAST-Episode-91-Tinesh-Chhaya.mp3" length="100420044"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Tinesh has 15 years of successful cyber corporate and 5 years of start-up entrepreneurial cyber experience.
He has built and exited 2 start-ups and currently sits on the board as an advisor to start ups within Cyber, EdTech, Software Development and Social Tech.
Tinesh is a mentor, motivator and advises individuals who are considering an entrepreneurial career as well as being a mental health advocate, keen supporter of mindfulness and self care.
He is a Forbes Technology Council member, part time lecturer at Brunel University and aspiring author.
Tinesh is also a advocate of helping young learners find their place in the working world and helps over 30 young learners a year with his personal time to encourage and motivate them to follow their dreams and achieve their goals.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/844215/1700181104-KBKAST-Episode-91-Tinesh-Cchaya.jpg"></itunes:image>
                                                                            <itunes:duration>01:09:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 90: Scott Fletcher]]>
                </title>
                <pubDate>Wed, 01 Dec 2021 09:37:28 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-90-scott-fletcher</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-90-scott-fletcher</link>
                                <description>
                                            <![CDATA[<p>Scott Fletcher is a Cloud Security Engineer at Whispir</p>
<p>Scott’s background includes Penetration Testing, Software Development &amp; Security Consulting. He has held Principal Consultant rules in both Australia &amp; New Zealand, and worked for a number of enterprise and financial services organisations.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Scott Fletcher is a Cloud Security Engineer at Whispir
Scott’s background includes Penetration Testing, Software Development & Security Consulting. He has held Principal Consultant rules in both Australia & New Zealand, and worked for a number of enterprise and financial services organisations.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 90: Scott Fletcher]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Scott Fletcher is a Cloud Security Engineer at Whispir</p>
<p>Scott’s background includes Penetration Testing, Software Development &amp; Security Consulting. He has held Principal Consultant rules in both Australia &amp; New Zealand, and worked for a number of enterprise and financial services organisations.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/d97bf61a-81fa-4197-98fb-bbdfe0c19618-KBKAST-Episode-90-Scott-Fletcher.mp3" length="84517890"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Scott Fletcher is a Cloud Security Engineer at Whispir
Scott’s background includes Penetration Testing, Software Development & Security Consulting. He has held Principal Consultant rules in both Australia & New Zealand, and worked for a number of enterprise and financial services organisations.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/813656/KBKAST-Episode-90-Scott-Fletcher-1.jpg"></itunes:image>
                                                                            <itunes:duration>00:58:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 89: Phillip Campbell]]>
                </title>
                <pubDate>Thu, 25 Nov 2021 19:54:42 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-89-phillip-campbell</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-89-phillip-campbell</link>
                                <description>
                                            <![CDATA[<p>Phillip Campbell is the founder and CEO of enigmaFIT, a global executive brain coaching company. As a cognitive scientist, he continues to extensively research the brain and cognition.</p>
<p>He has developed a framework of how to optimize the integration of the left-hemisphere and right-hemisphere working together to create Brain Balance. Phillip has pioneered leadership development and learning agility areas approaches by leveraging the concepts of Fluid Thinking and Crystallized Knowledge, and providing the Fluid Thinking Development Program to the brightest leaders in our global business environment.</p>
<p>Phillip’s program is a refreshing and quantifiable approach to unlocking and harnessing the power of cognitive capability of individuals and organizations. His team at enigmaFIT provide cognitive development programs to C-suite and senior executives of global multinational companies across the USA, UK, Europe, Australia, and Asia, and also to successful entrepreneurs.</p>
<p>His methodology ensures that the best leaders become elite leaders, and exceed their potential by exponentially increasing their performance.</p>
<p> </p>
<h5><a href="/What_is_Fluid_Thinking_V1.1.pdf">Download ‘Fluid Thinking’ PDF</a></h5>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Phillip Campbell is the founder and CEO of enigmaFIT, a global executive brain coaching company. As a cognitive scientist, he continues to extensively research the brain and cognition.
He has developed a framework of how to optimize the integration of the left-hemisphere and right-hemisphere working together to create Brain Balance. Phillip has pioneered leadership development and learning agility areas approaches by leveraging the concepts of Fluid Thinking and Crystallized Knowledge, and providing the Fluid Thinking Development Program to the brightest leaders in our global business environment.
Phillip’s program is a refreshing and quantifiable approach to unlocking and harnessing the power of cognitive capability of individuals and organizations. His team at enigmaFIT provide cognitive development programs to C-suite and senior executives of global multinational companies across the USA, UK, Europe, Australia, and Asia, and also to successful entrepreneurs.
His methodology ensures that the best leaders become elite leaders, and exceed their potential by exponentially increasing their performance.
 
Download ‘Fluid Thinking’ PDF
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 89: Phillip Campbell]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Phillip Campbell is the founder and CEO of enigmaFIT, a global executive brain coaching company. As a cognitive scientist, he continues to extensively research the brain and cognition.</p>
<p>He has developed a framework of how to optimize the integration of the left-hemisphere and right-hemisphere working together to create Brain Balance. Phillip has pioneered leadership development and learning agility areas approaches by leveraging the concepts of Fluid Thinking and Crystallized Knowledge, and providing the Fluid Thinking Development Program to the brightest leaders in our global business environment.</p>
<p>Phillip’s program is a refreshing and quantifiable approach to unlocking and harnessing the power of cognitive capability of individuals and organizations. His team at enigmaFIT provide cognitive development programs to C-suite and senior executives of global multinational companies across the USA, UK, Europe, Australia, and Asia, and also to successful entrepreneurs.</p>
<p>His methodology ensures that the best leaders become elite leaders, and exceed their potential by exponentially increasing their performance.</p>
<p> </p>
<h5><a href="/What_is_Fluid_Thinking_V1.1.pdf">Download ‘Fluid Thinking’ PDF</a></h5>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/96b0ea67-5df8-4b1c-bd45-847021ab9458-KBKAST-Episode-89-Phillip-Campbell.mp3" length="100522206"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Phillip Campbell is the founder and CEO of enigmaFIT, a global executive brain coaching company. As a cognitive scientist, he continues to extensively research the brain and cognition.
He has developed a framework of how to optimize the integration of the left-hemisphere and right-hemisphere working together to create Brain Balance. Phillip has pioneered leadership development and learning agility areas approaches by leveraging the concepts of Fluid Thinking and Crystallized Knowledge, and providing the Fluid Thinking Development Program to the brightest leaders in our global business environment.
Phillip’s program is a refreshing and quantifiable approach to unlocking and harnessing the power of cognitive capability of individuals and organizations. His team at enigmaFIT provide cognitive development programs to C-suite and senior executives of global multinational companies across the USA, UK, Europe, Australia, and Asia, and also to successful entrepreneurs.
His methodology ensures that the best leaders become elite leaders, and exceed their potential by exponentially increasing their performance.
 
Download ‘Fluid Thinking’ PDF
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/f88ba633-5415-41cb-a5e8-6f1a9b807b1d-KBKAST-Episode-89-Phillip-Campbell.jpg"></itunes:image>
                                                                            <itunes:duration>01:09:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 88: Saaim Khan]]>
                </title>
                <pubDate>Thu, 18 Nov 2021 15:11:45 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-88-saaim-khan</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-88-saaim-khan</link>
                                <description>
                                            <![CDATA[<p>Saaim Khan is a cybersecurity professional with 20 years of experience in client-facing roles. He has worked with organisations in APAC, ranging from small businesses to large enterprises.</p>
<p>Saaim holds multiple security certifications (CISM, ISO 27001 LI/LA, CTT+) and degrees in Computer Science and Project Management and qualifications in Cybersecurity Management, Cyber Law and Cyber Warfare.</p>
<p>Saaim has previously built and let security consulting practices, while working as an interim-CISO, security advisor and strategy consultant with organisations both big and small. He has helped organisations achieve compliance and certification with ISO 27001, SOC2 and PCI-DSS, and conform to GDPR, CCPA, MAS-TRM and PDPA requirements.</p>
<p>Saaim is passionate about reducing cybersecurity inequity for businesses. A regular media commentator and podcaster, Saaim promotes the need for greater transparency in cybersecurity engagements.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Saaim Khan is a cybersecurity professional with 20 years of experience in client-facing roles. He has worked with organisations in APAC, ranging from small businesses to large enterprises.
Saaim holds multiple security certifications (CISM, ISO 27001 LI/LA, CTT+) and degrees in Computer Science and Project Management and qualifications in Cybersecurity Management, Cyber Law and Cyber Warfare.
Saaim has previously built and let security consulting practices, while working as an interim-CISO, security advisor and strategy consultant with organisations both big and small. He has helped organisations achieve compliance and certification with ISO 27001, SOC2 and PCI-DSS, and conform to GDPR, CCPA, MAS-TRM and PDPA requirements.
Saaim is passionate about reducing cybersecurity inequity for businesses. A regular media commentator and podcaster, Saaim promotes the need for greater transparency in cybersecurity engagements.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 88: Saaim Khan]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Saaim Khan is a cybersecurity professional with 20 years of experience in client-facing roles. He has worked with organisations in APAC, ranging from small businesses to large enterprises.</p>
<p>Saaim holds multiple security certifications (CISM, ISO 27001 LI/LA, CTT+) and degrees in Computer Science and Project Management and qualifications in Cybersecurity Management, Cyber Law and Cyber Warfare.</p>
<p>Saaim has previously built and let security consulting practices, while working as an interim-CISO, security advisor and strategy consultant with organisations both big and small. He has helped organisations achieve compliance and certification with ISO 27001, SOC2 and PCI-DSS, and conform to GDPR, CCPA, MAS-TRM and PDPA requirements.</p>
<p>Saaim is passionate about reducing cybersecurity inequity for businesses. A regular media commentator and podcaster, Saaim promotes the need for greater transparency in cybersecurity engagements.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/e3e3abbc-ae8e-4bec-b433-fcbd0aa3d77d-KBKAST-EP-89-Saaim-Khan.mp3" length="73753160"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Saaim Khan is a cybersecurity professional with 20 years of experience in client-facing roles. He has worked with organisations in APAC, ranging from small businesses to large enterprises.
Saaim holds multiple security certifications (CISM, ISO 27001 LI/LA, CTT+) and degrees in Computer Science and Project Management and qualifications in Cybersecurity Management, Cyber Law and Cyber Warfare.
Saaim has previously built and let security consulting practices, while working as an interim-CISO, security advisor and strategy consultant with organisations both big and small. He has helped organisations achieve compliance and certification with ISO 27001, SOC2 and PCI-DSS, and conform to GDPR, CCPA, MAS-TRM and PDPA requirements.
Saaim is passionate about reducing cybersecurity inequity for businesses. A regular media commentator and podcaster, Saaim promotes the need for greater transparency in cybersecurity engagements.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/789319/KBKAST-EP-89-Saaim-Khan.jpeg"></itunes:image>
                                                                            <itunes:duration>00:51:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 87: Lisa Lorenzin]]>
                </title>
                <pubDate>Thu, 11 Nov 2021 15:03:46 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-87-lisa-lorenzin</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-87-lisa-lorenzin</link>
                                <description>
                                            <![CDATA[<p>Lisa Lorenzin is Senior Director of Transformation Strategy at Zscaler, specializing in secure application access and digital transformation. For more than 25 years, she has worked in a variety of network and information security roles and has contributed to open standards for endpoint integrity and network security from the Trusted Computing Group (TCG) and Internet Engineering Task Force (IETF).</p>
<p>Lisa’s current focus is on helping customers achieve their security goals and create a seamless user experience across cloud and mobile environments through the use of cloud-delivered zero trust access solutions.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Lisa Lorenzin is Senior Director of Transformation Strategy at Zscaler, specializing in secure application access and digital transformation. For more than 25 years, she has worked in a variety of network and information security roles and has contributed to open standards for endpoint integrity and network security from the Trusted Computing Group (TCG) and Internet Engineering Task Force (IETF).
Lisa’s current focus is on helping customers achieve their security goals and create a seamless user experience across cloud and mobile environments through the use of cloud-delivered zero trust access solutions.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 87: Lisa Lorenzin]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Lisa Lorenzin is Senior Director of Transformation Strategy at Zscaler, specializing in secure application access and digital transformation. For more than 25 years, she has worked in a variety of network and information security roles and has contributed to open standards for endpoint integrity and network security from the Trusted Computing Group (TCG) and Internet Engineering Task Force (IETF).</p>
<p>Lisa’s current focus is on helping customers achieve their security goals and create a seamless user experience across cloud and mobile environments through the use of cloud-delivered zero trust access solutions.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1f3d8eef-a4cf-408b-a7a3-11b4374af5ca-KBKAST-Episode-87-Lisa-Lorenzin.mp3" length="77272210"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Lisa Lorenzin is Senior Director of Transformation Strategy at Zscaler, specializing in secure application access and digital transformation. For more than 25 years, she has worked in a variety of network and information security roles and has contributed to open standards for endpoint integrity and network security from the Trusted Computing Group (TCG) and Internet Engineering Task Force (IETF).
Lisa’s current focus is on helping customers achieve their security goals and create a seamless user experience across cloud and mobile environments through the use of cloud-delivered zero trust access solutions.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/776151/1700181105-KBKAST-Episode-87-Lisa-Lorenzin.jpg"></itunes:image>
                                                                            <itunes:duration>00:53:37</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 86: Lani Refiti]]>
                </title>
                <pubDate>Thu, 04 Nov 2021 11:02:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-86-lani-refiti</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-86-lani-refiti</link>
                                <description>
                                            <![CDATA[<p>Lani is a technologist, amassing 20+ years experience in fields such as cybersecurity, startups, IoT, AI and robotics.   He has worked for some of the largest organisations globally – Intel Corporation, Cisco Systems, PwC and Deloitte and is currently the ANZ Director for Claroty.  He also has an interest in the startup sector, and is part of the founding team at Cybermetrix and Azcende.</p>
<p>In 2017 he co-founded and currently serves as CEO of IoTSec Australia, an industry initiative to advocate for safe and secure practices in the emerging Internet of Things area with a focus on critical infrastructure and smart cities.  Lani is also a practicing Psychotherapist after completing his Masters in 2015 and it gives him an uncommon approach when looking at the intersection of humanity and emerging technology.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Lani is a technologist, amassing 20+ years experience in fields such as cybersecurity, startups, IoT, AI and robotics.   He has worked for some of the largest organisations globally – Intel Corporation, Cisco Systems, PwC and Deloitte and is currently the ANZ Director for Claroty.  He also has an interest in the startup sector, and is part of the founding team at Cybermetrix and Azcende.
In 2017 he co-founded and currently serves as CEO of IoTSec Australia, an industry initiative to advocate for safe and secure practices in the emerging Internet of Things area with a focus on critical infrastructure and smart cities.  Lani is also a practicing Psychotherapist after completing his Masters in 2015 and it gives him an uncommon approach when looking at the intersection of humanity and emerging technology.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 86: Lani Refiti]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Lani is a technologist, amassing 20+ years experience in fields such as cybersecurity, startups, IoT, AI and robotics.   He has worked for some of the largest organisations globally – Intel Corporation, Cisco Systems, PwC and Deloitte and is currently the ANZ Director for Claroty.  He also has an interest in the startup sector, and is part of the founding team at Cybermetrix and Azcende.</p>
<p>In 2017 he co-founded and currently serves as CEO of IoTSec Australia, an industry initiative to advocate for safe and secure practices in the emerging Internet of Things area with a focus on critical infrastructure and smart cities.  Lani is also a practicing Psychotherapist after completing his Masters in 2015 and it gives him an uncommon approach when looking at the intersection of humanity and emerging technology.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/84c06267-ef48-42e9-aa33-70e3b54e7e07-KBKAST-Episode-86-Lani-Refiti.mp3" length="64269955"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Lani is a technologist, amassing 20+ years experience in fields such as cybersecurity, startups, IoT, AI and robotics.   He has worked for some of the largest organisations globally – Intel Corporation, Cisco Systems, PwC and Deloitte and is currently the ANZ Director for Claroty.  He also has an interest in the startup sector, and is part of the founding team at Cybermetrix and Azcende.
In 2017 he co-founded and currently serves as CEO of IoTSec Australia, an industry initiative to advocate for safe and secure practices in the emerging Internet of Things area with a focus on critical infrastructure and smart cities.  Lani is also a practicing Psychotherapist after completing his Masters in 2015 and it gives him an uncommon approach when looking at the intersection of humanity and emerging technology.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/759697/KBKAST-Episode-86-Lani-Refiti.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 85: Dominic Vogel]]>
                </title>
                <pubDate>Thu, 28 Oct 2021 18:42:09 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-85-dominic-vogel</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-85-dominic-vogel</link>
                                <description>
                                            <![CDATA[<p>As Founder &amp; Chief Strategist at CyberSC, Dominic Vogel holds a proven track record within cyber security across multitude of industries (financial services, logistics, transportation, healthcare, government, telecommunications, and critical infrastructure). Dominic actively participates in the Vancouver security community and is a well-respected cyber security expert for appearing on media news outlets across North America and Internationally on BBC World News. Dominic is highly regarded as a cyber security thought leader and was recently appointed to the BC Provincial Cyber Security Advisory Committee.</p>
<p>Dominic focuses much of his energy on providing strategic security leadership to technology start-ups and small/midsize businesses to proactively solve their cyber risk challenges. He strives to provide practical cyber security advice to his clients and actively turning the security consulting world upside down.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[As Founder & Chief Strategist at CyberSC, Dominic Vogel holds a proven track record within cyber security across multitude of industries (financial services, logistics, transportation, healthcare, government, telecommunications, and critical infrastructure). Dominic actively participates in the Vancouver security community and is a well-respected cyber security expert for appearing on media news outlets across North America and Internationally on BBC World News. Dominic is highly regarded as a cyber security thought leader and was recently appointed to the BC Provincial Cyber Security Advisory Committee.
Dominic focuses much of his energy on providing strategic security leadership to technology start-ups and small/midsize businesses to proactively solve their cyber risk challenges. He strives to provide practical cyber security advice to his clients and actively turning the security consulting world upside down.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 85: Dominic Vogel]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>As Founder &amp; Chief Strategist at CyberSC, Dominic Vogel holds a proven track record within cyber security across multitude of industries (financial services, logistics, transportation, healthcare, government, telecommunications, and critical infrastructure). Dominic actively participates in the Vancouver security community and is a well-respected cyber security expert for appearing on media news outlets across North America and Internationally on BBC World News. Dominic is highly regarded as a cyber security thought leader and was recently appointed to the BC Provincial Cyber Security Advisory Committee.</p>
<p>Dominic focuses much of his energy on providing strategic security leadership to technology start-ups and small/midsize businesses to proactively solve their cyber risk challenges. He strives to provide practical cyber security advice to his clients and actively turning the security consulting world upside down.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/f2c9ec01-1279-4c70-9ce3-52a7b450663a-KBKAST-Episode-85-Dom-Vogel.mp3" length="71805129"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[As Founder & Chief Strategist at CyberSC, Dominic Vogel holds a proven track record within cyber security across multitude of industries (financial services, logistics, transportation, healthcare, government, telecommunications, and critical infrastructure). Dominic actively participates in the Vancouver security community and is a well-respected cyber security expert for appearing on media news outlets across North America and Internationally on BBC World News. Dominic is highly regarded as a cyber security thought leader and was recently appointed to the BC Provincial Cyber Security Advisory Committee.
Dominic focuses much of his energy on providing strategic security leadership to technology start-ups and small/midsize businesses to proactively solve their cyber risk challenges. He strives to provide practical cyber security advice to his clients and actively turning the security consulting world upside down.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/743973/1700181105-Dom-Vogel-KBKast.jpg"></itunes:image>
                                                                            <itunes:duration>00:49:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 84: Ed Badawi]]>
                </title>
                <pubDate>Thu, 21 Oct 2021 18:13:11 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-84-ed-badawi</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-84-ed-badawi</link>
                                <description>
                                            <![CDATA[<p>Having thrived as an investment advisor at an independent investment firm in the harsh post-GFC climate, Ed quickly learned that the <i>‘old-school’</i> approach to selling, which has been glorified in popular culture, was counterproductive and downright destructive over the long-term. This motivated Ed to breakdown the nuances and processes required for transparent, effective and scalable commercial strategies.</p>
<p>Since 2013, Ed has helped grow and scale multiple businesses across various sectors, ranging from financial markets advisories to digital agencies. He’s also led the successful launch of multiple start-ups while consulting for organisations in both the private and public sectors. In 2017, Ed and his longtime associate/client, Nicholas Forsyth, joined forces to take Sales Inc from a consultancy to a company that offers Sales as a Service. The aim…helping business reach their commercial objectives, whilst raising industry standards and awareness around best practice.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Having thrived as an investment advisor at an independent investment firm in the harsh post-GFC climate, Ed quickly learned that the ‘old-school’ approach to selling, which has been glorified in popular culture, was counterproductive and downright destructive over the long-term. This motivated Ed to breakdown the nuances and processes required for transparent, effective and scalable commercial strategies.
Since 2013, Ed has helped grow and scale multiple businesses across various sectors, ranging from financial markets advisories to digital agencies. He’s also led the successful launch of multiple start-ups while consulting for organisations in both the private and public sectors. In 2017, Ed and his longtime associate/client, Nicholas Forsyth, joined forces to take Sales Inc from a consultancy to a company that offers Sales as a Service. The aim…helping business reach their commercial objectives, whilst raising industry standards and awareness around best practice.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 84: Ed Badawi]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Having thrived as an investment advisor at an independent investment firm in the harsh post-GFC climate, Ed quickly learned that the <i>‘old-school’</i> approach to selling, which has been glorified in popular culture, was counterproductive and downright destructive over the long-term. This motivated Ed to breakdown the nuances and processes required for transparent, effective and scalable commercial strategies.</p>
<p>Since 2013, Ed has helped grow and scale multiple businesses across various sectors, ranging from financial markets advisories to digital agencies. He’s also led the successful launch of multiple start-ups while consulting for organisations in both the private and public sectors. In 2017, Ed and his longtime associate/client, Nicholas Forsyth, joined forces to take Sales Inc from a consultancy to a company that offers Sales as a Service. The aim…helping business reach their commercial objectives, whilst raising industry standards and awareness around best practice.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/967121b3-163f-4f7a-8efc-7445a1ba720e-KBKAST-Episode-83-Ed-Badawi.mp3" length="108465288"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Having thrived as an investment advisor at an independent investment firm in the harsh post-GFC climate, Ed quickly learned that the ‘old-school’ approach to selling, which has been glorified in popular culture, was counterproductive and downright destructive over the long-term. This motivated Ed to breakdown the nuances and processes required for transparent, effective and scalable commercial strategies.
Since 2013, Ed has helped grow and scale multiple businesses across various sectors, ranging from financial markets advisories to digital agencies. He’s also led the successful launch of multiple start-ups while consulting for organisations in both the private and public sectors. In 2017, Ed and his longtime associate/client, Nicholas Forsyth, joined forces to take Sales Inc from a consultancy to a company that offers Sales as a Service. The aim…helping business reach their commercial objectives, whilst raising industry standards and awareness around best practice.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/729239/KBKAST-Episode-83-Ed-Badawi.jpg"></itunes:image>
                                                                            <itunes:duration>01:15:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 83: Ted Ipsen]]>
                </title>
                <pubDate>Wed, 13 Oct 2021 18:35:00 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/714436</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-83-ted-ipsen</link>
                                <description>
                                            <![CDATA[<p>Ted Ipsen is the President and COO of Positroniq, a strategic security and risk consultancy. He is an experienced executive manager with over 20 years of experience specializing in high-tech crime investigation, digital forensics, and the delivery and oversight of consulting and advisory services in the areas of information security, secure development, security assessment, information risk management, IT governance, compliance, business continuity management, and aligning strategic IT and security goals with business objectives.</p>
<p>He was recruited out of law enforcement by a global “Big 4” audit and professional services firm, and has since moved progressively to more technical, and focused security consultancies.</p>
<p>Mr. Ipsen has worked with organizations across many industries, reviewing security and IT programs against industry leading practices, standards, and regulatory frameworks, integrating security operational processes, and providing security training to infosec practitioners, software developers, and executives.</p>
<p>He has served as the interim-CISO for a major airline, and built security programs for organizations of all sizes.</p>
<p>He has spoken at many national and international security conferences, and is the co-author of “Law Enforcement Challenges in Digital Forensics,” presented at the National Colloquium for Information Systems Security Education. He has contributed to a number of security publications, including “Securing Linux, Step by Step” and “Disaster Recovery, Step by Step”, issued by the SANS Institute, and “Practical Cybersecurity Architecture”, from Packt Publishing.</p>
<p> </p>
<p><strong>Resources Mentioned:</strong></p>
<p><a href="https://www.provendatarecovery.com/blog/what-is-digital-forensics/">https://www.provendatarecovery.com/blog/what-is-digital-forensics/</a></p>
<p><a href="https://www.cisostreet.com/effective-board-communication-for-cisos/">https://www.cisostreet.com/effective-board-communication-for-cisos/</a></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ted Ipsen is the President and COO of Positroniq, a strategic security and risk consultancy. He is an experienced executive manager with over 20 years of experience specializing in high-tech crime investigation, digital forensics, and the delivery and oversight of consulting and advisory services in the areas of information security, secure development, security assessment, information risk management, IT governance, compliance, business continuity management, and aligning strategic IT and security goals with business objectives.
He was recruited out of law enforcement by a global “Big 4” audit and professional services firm, and has since moved progressively to more technical, and focused security consultancies.
Mr. Ipsen has worked with organizations across many industries, reviewing security and IT programs against industry leading practices, standards, and regulatory frameworks, integrating security operational processes, and providing security training to infosec practitioners, software developers, and executives.
He has served as the interim-CISO for a major airline, and built security programs for organizations of all sizes.
He has spoken at many national and international security conferences, and is the co-author of “Law Enforcement Challenges in Digital Forensics,” presented at the National Colloquium for Information Systems Security Education. He has contributed to a number of security publications, including “Securing Linux, Step by Step” and “Disaster Recovery, Step by Step”, issued by the SANS Institute, and “Practical Cybersecurity Architecture”, from Packt Publishing.
 
Resources Mentioned:
https://www.provendatarecovery.com/blog/what-is-digital-forensics/
https://www.cisostreet.com/effective-board-communication-for-cisos/
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 83: Ted Ipsen]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Ted Ipsen is the President and COO of Positroniq, a strategic security and risk consultancy. He is an experienced executive manager with over 20 years of experience specializing in high-tech crime investigation, digital forensics, and the delivery and oversight of consulting and advisory services in the areas of information security, secure development, security assessment, information risk management, IT governance, compliance, business continuity management, and aligning strategic IT and security goals with business objectives.</p>
<p>He was recruited out of law enforcement by a global “Big 4” audit and professional services firm, and has since moved progressively to more technical, and focused security consultancies.</p>
<p>Mr. Ipsen has worked with organizations across many industries, reviewing security and IT programs against industry leading practices, standards, and regulatory frameworks, integrating security operational processes, and providing security training to infosec practitioners, software developers, and executives.</p>
<p>He has served as the interim-CISO for a major airline, and built security programs for organizations of all sizes.</p>
<p>He has spoken at many national and international security conferences, and is the co-author of “Law Enforcement Challenges in Digital Forensics,” presented at the National Colloquium for Information Systems Security Education. He has contributed to a number of security publications, including “Securing Linux, Step by Step” and “Disaster Recovery, Step by Step”, issued by the SANS Institute, and “Practical Cybersecurity Architecture”, from Packt Publishing.</p>
<p> </p>
<p><strong>Resources Mentioned:</strong></p>
<p><a href="https://www.provendatarecovery.com/blog/what-is-digital-forensics/">https://www.provendatarecovery.com/blog/what-is-digital-forensics/</a></p>
<p><a href="https://www.cisostreet.com/effective-board-communication-for-cisos/">https://www.cisostreet.com/effective-board-communication-for-cisos/</a></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/bafb5f0b-15b5-494f-b6d8-44a7b8a016e8-KBKAST-Episode-83-Ted-Ipsen.mp3" length="80656437"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ted Ipsen is the President and COO of Positroniq, a strategic security and risk consultancy. He is an experienced executive manager with over 20 years of experience specializing in high-tech crime investigation, digital forensics, and the delivery and oversight of consulting and advisory services in the areas of information security, secure development, security assessment, information risk management, IT governance, compliance, business continuity management, and aligning strategic IT and security goals with business objectives.
He was recruited out of law enforcement by a global “Big 4” audit and professional services firm, and has since moved progressively to more technical, and focused security consultancies.
Mr. Ipsen has worked with organizations across many industries, reviewing security and IT programs against industry leading practices, standards, and regulatory frameworks, integrating security operational processes, and providing security training to infosec practitioners, software developers, and executives.
He has served as the interim-CISO for a major airline, and built security programs for organizations of all sizes.
He has spoken at many national and international security conferences, and is the co-author of “Law Enforcement Challenges in Digital Forensics,” presented at the National Colloquium for Information Systems Security Education. He has contributed to a number of security publications, including “Securing Linux, Step by Step” and “Disaster Recovery, Step by Step”, issued by the SANS Institute, and “Practical Cybersecurity Architecture”, from Packt Publishing.
 
Resources Mentioned:
https://www.provendatarecovery.com/blog/what-is-digital-forensics/
https://www.cisostreet.com/effective-board-communication-for-cisos/
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/714436/1700181105-KBKAST-Episode-83-Ted-Ipsen.jpg"></itunes:image>
                                                                            <itunes:duration>00:55:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 82: Gail Bray]]>
                </title>
                <pubDate>Wed, 06 Oct 2021 20:10:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/gail-bray</guid>
                                    <link>https://kbkast.castos.com/episodes/gail-bray</link>
                                <description>
                                            <![CDATA[<p>Gail is responsible for leading a team to create the digital division of VU Polytechnic the TAFE arm of VU.  This includes leading three strategic initiatives, the Wyndham Tech School, Sunshine Skills Hub and Cybersecurity Training Centre to provide STEM training from Year 7 right up to mature age adults.  Gail engages in regular speaking events and podcasts to increase the visibility of careers that involve STEM and to educate education leaders on the skills required for the future of work.  Gail is passionate about promoting the growing job opportunities available to the young people of Melbourne’s West and believes anything is possible if you put your mind to it!</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Gail is responsible for leading a team to create the digital division of VU Polytechnic the TAFE arm of VU.  This includes leading three strategic initiatives, the Wyndham Tech School, Sunshine Skills Hub and Cybersecurity Training Centre to provide STEM training from Year 7 right up to mature age adults.  Gail engages in regular speaking events and podcasts to increase the visibility of careers that involve STEM and to educate education leaders on the skills required for the future of work.  Gail is passionate about promoting the growing job opportunities available to the young people of Melbourne’s West and believes anything is possible if you put your mind to it!
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 82: Gail Bray]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Gail is responsible for leading a team to create the digital division of VU Polytechnic the TAFE arm of VU.  This includes leading three strategic initiatives, the Wyndham Tech School, Sunshine Skills Hub and Cybersecurity Training Centre to provide STEM training from Year 7 right up to mature age adults.  Gail engages in regular speaking events and podcasts to increase the visibility of careers that involve STEM and to educate education leaders on the skills required for the future of work.  Gail is passionate about promoting the growing job opportunities available to the young people of Melbourne’s West and believes anything is possible if you put your mind to it!</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/65659dd9-ff2e-42ba-a997-3371c4282d79-KBKAST-Episode-82-Gail-Bray.mp3" length="78045091"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Gail is responsible for leading a team to create the digital division of VU Polytechnic the TAFE arm of VU.  This includes leading three strategic initiatives, the Wyndham Tech School, Sunshine Skills Hub and Cybersecurity Training Centre to provide STEM training from Year 7 right up to mature age adults.  Gail engages in regular speaking events and podcasts to increase the visibility of careers that involve STEM and to educate education leaders on the skills required for the future of work.  Gail is passionate about promoting the growing job opportunities available to the young people of Melbourne’s West and believes anything is possible if you put your mind to it!
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/701947/KBKAST-Episode-82-Gail-Bray.jpeg"></itunes:image>
                                                                            <itunes:duration>00:54:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 81: Jay Hira]]>
                </title>
                <pubDate>Tue, 28 Sep 2021 20:42:20 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-81-jay-hira</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-81-jay-hira</link>
                                <description>
                                            <![CDATA[<p>From an early age, Jay has been interested in computers, and is still fascinated by them and the impact they continue to have on our society. His first job out of university was at Wipro as a pen-tester, but he quickly and consistently climbed the ranks – or sometimes took a sideways move – to broaden his experience. As a result, Jay has had many different roles, ranging from technical, strategic, delivery, and customer-facing.</p>
<p>Jay moved continents and had to adapt to an entirely new city, a new way of life and a new culture. This taught him many things, such as personal resilience, the importance of building strong relationships, and how to pick new things up quickly. It’s also given him an incredibly diverse and broad perspective, which helps him get results.</p>
<p>Jay has been very strategic and proactive in his career moves, seeking opportunities to build out his skillset to help organisations protect and defend against cyber threats. I’m a team player and have always believed that teams can achieve more together than they can as individuals, which is very important to him as a leader. Jay has also discovered how fulfilling it can be to help others achieve their goals, which has fueled his passion for working with educators to help students develop skills to transition to the workforce successfully.</p>
<p>Jay wants to help organisations strengthen and shape their approach to cybersecurity through the alignment of cybersecurity outcomes with business success. Jay’s excited by what the future holds, which he believes puts him in a fantastic position to lead his teams and customers into the future.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[From an early age, Jay has been interested in computers, and is still fascinated by them and the impact they continue to have on our society. His first job out of university was at Wipro as a pen-tester, but he quickly and consistently climbed the ranks – or sometimes took a sideways move – to broaden his experience. As a result, Jay has had many different roles, ranging from technical, strategic, delivery, and customer-facing.
Jay moved continents and had to adapt to an entirely new city, a new way of life and a new culture. This taught him many things, such as personal resilience, the importance of building strong relationships, and how to pick new things up quickly. It’s also given him an incredibly diverse and broad perspective, which helps him get results.
Jay has been very strategic and proactive in his career moves, seeking opportunities to build out his skillset to help organisations protect and defend against cyber threats. I’m a team player and have always believed that teams can achieve more together than they can as individuals, which is very important to him as a leader. Jay has also discovered how fulfilling it can be to help others achieve their goals, which has fueled his passion for working with educators to help students develop skills to transition to the workforce successfully.
Jay wants to help organisations strengthen and shape their approach to cybersecurity through the alignment of cybersecurity outcomes with business success. Jay’s excited by what the future holds, which he believes puts him in a fantastic position to lead his teams and customers into the future.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 81: Jay Hira]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>From an early age, Jay has been interested in computers, and is still fascinated by them and the impact they continue to have on our society. His first job out of university was at Wipro as a pen-tester, but he quickly and consistently climbed the ranks – or sometimes took a sideways move – to broaden his experience. As a result, Jay has had many different roles, ranging from technical, strategic, delivery, and customer-facing.</p>
<p>Jay moved continents and had to adapt to an entirely new city, a new way of life and a new culture. This taught him many things, such as personal resilience, the importance of building strong relationships, and how to pick new things up quickly. It’s also given him an incredibly diverse and broad perspective, which helps him get results.</p>
<p>Jay has been very strategic and proactive in his career moves, seeking opportunities to build out his skillset to help organisations protect and defend against cyber threats. I’m a team player and have always believed that teams can achieve more together than they can as individuals, which is very important to him as a leader. Jay has also discovered how fulfilling it can be to help others achieve their goals, which has fueled his passion for working with educators to help students develop skills to transition to the workforce successfully.</p>
<p>Jay wants to help organisations strengthen and shape their approach to cybersecurity through the alignment of cybersecurity outcomes with business success. Jay’s excited by what the future holds, which he believes puts him in a fantastic position to lead his teams and customers into the future.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-81-Jay-Hira.mp3" length="76545149"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[From an early age, Jay has been interested in computers, and is still fascinated by them and the impact they continue to have on our society. His first job out of university was at Wipro as a pen-tester, but he quickly and consistently climbed the ranks – or sometimes took a sideways move – to broaden his experience. As a result, Jay has had many different roles, ranging from technical, strategic, delivery, and customer-facing.
Jay moved continents and had to adapt to an entirely new city, a new way of life and a new culture. This taught him many things, such as personal resilience, the importance of building strong relationships, and how to pick new things up quickly. It’s also given him an incredibly diverse and broad perspective, which helps him get results.
Jay has been very strategic and proactive in his career moves, seeking opportunities to build out his skillset to help organisations protect and defend against cyber threats. I’m a team player and have always believed that teams can achieve more together than they can as individuals, which is very important to him as a leader. Jay has also discovered how fulfilling it can be to help others achieve their goals, which has fueled his passion for working with educators to help students develop skills to transition to the workforce successfully.
Jay wants to help organisations strengthen and shape their approach to cybersecurity through the alignment of cybersecurity outcomes with business success. Jay’s excited by what the future holds, which he believes puts him in a fantastic position to lead his teams and customers into the future.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/689391/1700181105-KBKAST-Episode-81-Jay-Hira.jpg"></itunes:image>
                                                                            <itunes:duration>00:53:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 80: Andy Walker]]>
                </title>
                <pubDate>Mon, 13 Sep 2021 17:01:56 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-80-andy-walker</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-80-andy-walker</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;">Andy Walker is the co-founder and Chief Executive Officer of ditno, a Network Security Policy Management Software company that enables organisations to build a Governed Zero Trust Network for improved and simplified security.</span></p>
<p><span style="font-weight:400;">After completing an apprenticeship and signing a professional football contract in England, Andy studied Information Technology and quickly developed a passion for cyber security, specifically network security. He gained a number of industry qualifications including CCNA, CCNP, CCVP, MCSA and ITIL.</span></p>
<p><span style="font-weight:400;">Over the last 20 years, Andy has designed and engineered interconnected networks for large enterprises including financial services and global logistics organisations, ensuring their IT services are connected securely, reducing the impact of cyber threats.</span></p>
<p><span style="font-weight:400;">Before working on ditno, he was managing the delivery of large Network Security projects at the Commonwealth Bank of Australia. As ditno’s CEO, Andy has built a culture of innovation and collaboration to deliver leading-edge and beneficial solutions to their customers.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Andy Walker is the co-founder and Chief Executive Officer of ditno, a Network Security Policy Management Software company that enables organisations to build a Governed Zero Trust Network for improved and simplified security.
After completing an apprenticeship and signing a professional football contract in England, Andy studied Information Technology and quickly developed a passion for cyber security, specifically network security. He gained a number of industry qualifications including CCNA, CCNP, CCVP, MCSA and ITIL.
Over the last 20 years, Andy has designed and engineered interconnected networks for large enterprises including financial services and global logistics organisations, ensuring their IT services are connected securely, reducing the impact of cyber threats.
Before working on ditno, he was managing the delivery of large Network Security projects at the Commonwealth Bank of Australia. As ditno’s CEO, Andy has built a culture of innovation and collaboration to deliver leading-edge and beneficial solutions to their customers.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 80: Andy Walker]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;">Andy Walker is the co-founder and Chief Executive Officer of ditno, a Network Security Policy Management Software company that enables organisations to build a Governed Zero Trust Network for improved and simplified security.</span></p>
<p><span style="font-weight:400;">After completing an apprenticeship and signing a professional football contract in England, Andy studied Information Technology and quickly developed a passion for cyber security, specifically network security. He gained a number of industry qualifications including CCNA, CCNP, CCVP, MCSA and ITIL.</span></p>
<p><span style="font-weight:400;">Over the last 20 years, Andy has designed and engineered interconnected networks for large enterprises including financial services and global logistics organisations, ensuring their IT services are connected securely, reducing the impact of cyber threats.</span></p>
<p><span style="font-weight:400;">Before working on ditno, he was managing the delivery of large Network Security projects at the Commonwealth Bank of Australia. As ditno’s CEO, Andy has built a culture of innovation and collaboration to deliver leading-edge and beneficial solutions to their customers.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-80-Andy-Walker.mp3" length="58592596"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Andy Walker is the co-founder and Chief Executive Officer of ditno, a Network Security Policy Management Software company that enables organisations to build a Governed Zero Trust Network for improved and simplified security.
After completing an apprenticeship and signing a professional football contract in England, Andy studied Information Technology and quickly developed a passion for cyber security, specifically network security. He gained a number of industry qualifications including CCNA, CCNP, CCVP, MCSA and ITIL.
Over the last 20 years, Andy has designed and engineered interconnected networks for large enterprises including financial services and global logistics organisations, ensuring their IT services are connected securely, reducing the impact of cyber threats.
Before working on ditno, he was managing the delivery of large Network Security projects at the Commonwealth Bank of Australia. As ditno’s CEO, Andy has built a culture of innovation and collaboration to deliver leading-edge and beneficial solutions to their customers.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/658041/KBKAST-Episode-80-Andy-Walker.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 79: Michael Loewy]]>
                </title>
                <pubDate>Tue, 07 Sep 2021 17:30:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-79-michael-loewy</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-79-michael-loewy</link>
                                <description>
                                            <![CDATA[<p>Michael is a Co-founder of Tide Foundation, a deep tech start-up developing technology to enable cyber-herd immunity. He’s a seasoned entrepreneur with a rich history leading the development and go-to-market of enterprise software. He spent over a decade growing a decorated digital agency before merging to become a full services agency and successfully exiting. Michael holds a degree in Information Systems and Accounting, UNSW; was an academic professional at the University of Illinois and currently serves on the advisory board of the Children’s Medical Research Institute.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Michael is a Co-founder of Tide Foundation, a deep tech start-up developing technology to enable cyber-herd immunity. He’s a seasoned entrepreneur with a rich history leading the development and go-to-market of enterprise software. He spent over a decade growing a decorated digital agency before merging to become a full services agency and successfully exiting. Michael holds a degree in Information Systems and Accounting, UNSW; was an academic professional at the University of Illinois and currently serves on the advisory board of the Children’s Medical Research Institute.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 79: Michael Loewy]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Michael is a Co-founder of Tide Foundation, a deep tech start-up developing technology to enable cyber-herd immunity. He’s a seasoned entrepreneur with a rich history leading the development and go-to-market of enterprise software. He spent over a decade growing a decorated digital agency before merging to become a full services agency and successfully exiting. Michael holds a degree in Information Systems and Accounting, UNSW; was an academic professional at the University of Illinois and currently serves on the advisory board of the Children’s Medical Research Institute.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Ep-80-KBKAST-Mike-Loewy.mp3" length="65463982"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Michael is a Co-founder of Tide Foundation, a deep tech start-up developing technology to enable cyber-herd immunity. He’s a seasoned entrepreneur with a rich history leading the development and go-to-market of enterprise software. He spent over a decade growing a decorated digital agency before merging to become a full services agency and successfully exiting. Michael holds a degree in Information Systems and Accounting, UNSW; was an academic professional at the University of Illinois and currently serves on the advisory board of the Children’s Medical Research Institute.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/5ee27c24-13d9-4c4b-bc3a-cf5d86e61b86-KBKAST-Episode-79-Mike-Loewy.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 78: Jacqui Loustau]]>
                </title>
                <pubDate>Wed, 01 Sep 2021 11:42:36 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-78-jacqui-loustau</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-78-jacqui-loustau</link>
                                <description>
                                            <![CDATA[<p><strong>Jacqui Loustau</strong> – is the Founder and Executive Manager for the Australian Women in Security Network (AWSN).</p>
<p>She is a cybersecurity expert, with over 2 decades of  experience in IT and Information Security. She has worked on large projects internationally across a wide range of security domains and in cybercrime. She is passionate about security and collaborating with others to drive innovation and change within industry. This includes educating small businesses and individuals on improving their cybersecurity practices. She has written a number of white papers and contributed to books, podcasts, webinars and is regularly requested to speak at industry events.</p>
<p>As the Founder of the Australian Women in Security Network (AWSN) since 2015, she has been working on several initiatives to connect, support and inspire more talent from all industries and diverse backgrounds to pursue a career in security and to stay. For this work she has received several awards including global recognition as an IFSEC top influencer #9 for security thought leadership (2018), AUSCERT Information Security Excellence (2021), AISA 2016 Diversity in Cybersecurity, ISACA Oceania CACS 2018 Women in Technology Leadership, 2019 Best Volunteer winner and Highly commended for IT Security Breaker.</p>
<p>CyberShift2 Alliance on Eventbrite for now – <a href="https://www.eventbrite.com.au/e/cybershift2-tickets-163133064387" target="_blank" rel="noreferrer noopener">https://www.eventbrite.com.au/e/cybershift2-tickets-163133064387</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jacqui Loustau – is the Founder and Executive Manager for the Australian Women in Security Network (AWSN).
She is a cybersecurity expert, with over 2 decades of  experience in IT and Information Security. She has worked on large projects internationally across a wide range of security domains and in cybercrime. She is passionate about security and collaborating with others to drive innovation and change within industry. This includes educating small businesses and individuals on improving their cybersecurity practices. She has written a number of white papers and contributed to books, podcasts, webinars and is regularly requested to speak at industry events.
As the Founder of the Australian Women in Security Network (AWSN) since 2015, she has been working on several initiatives to connect, support and inspire more talent from all industries and diverse backgrounds to pursue a career in security and to stay. For this work she has received several awards including global recognition as an IFSEC top influencer #9 for security thought leadership (2018), AUSCERT Information Security Excellence (2021), AISA 2016 Diversity in Cybersecurity, ISACA Oceania CACS 2018 Women in Technology Leadership, 2019 Best Volunteer winner and Highly commended for IT Security Breaker.
CyberShift2 Alliance on Eventbrite for now – https://www.eventbrite.com.au/e/cybershift2-tickets-163133064387
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 78: Jacqui Loustau]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Jacqui Loustau</strong> – is the Founder and Executive Manager for the Australian Women in Security Network (AWSN).</p>
<p>She is a cybersecurity expert, with over 2 decades of  experience in IT and Information Security. She has worked on large projects internationally across a wide range of security domains and in cybercrime. She is passionate about security and collaborating with others to drive innovation and change within industry. This includes educating small businesses and individuals on improving their cybersecurity practices. She has written a number of white papers and contributed to books, podcasts, webinars and is regularly requested to speak at industry events.</p>
<p>As the Founder of the Australian Women in Security Network (AWSN) since 2015, she has been working on several initiatives to connect, support and inspire more talent from all industries and diverse backgrounds to pursue a career in security and to stay. For this work she has received several awards including global recognition as an IFSEC top influencer #9 for security thought leadership (2018), AUSCERT Information Security Excellence (2021), AISA 2016 Diversity in Cybersecurity, ISACA Oceania CACS 2018 Women in Technology Leadership, 2019 Best Volunteer winner and Highly commended for IT Security Breaker.</p>
<p>CyberShift2 Alliance on Eventbrite for now – <a href="https://www.eventbrite.com.au/e/cybershift2-tickets-163133064387" target="_blank" rel="noreferrer noopener">https://www.eventbrite.com.au/e/cybershift2-tickets-163133064387</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-78-Jacqui-Loustau.mp3" length="72137055"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jacqui Loustau – is the Founder and Executive Manager for the Australian Women in Security Network (AWSN).
She is a cybersecurity expert, with over 2 decades of  experience in IT and Information Security. She has worked on large projects internationally across a wide range of security domains and in cybercrime. She is passionate about security and collaborating with others to drive innovation and change within industry. This includes educating small businesses and individuals on improving their cybersecurity practices. She has written a number of white papers and contributed to books, podcasts, webinars and is regularly requested to speak at industry events.
As the Founder of the Australian Women in Security Network (AWSN) since 2015, she has been working on several initiatives to connect, support and inspire more talent from all industries and diverse backgrounds to pursue a career in security and to stay. For this work she has received several awards including global recognition as an IFSEC top influencer #9 for security thought leadership (2018), AUSCERT Information Security Excellence (2021), AISA 2016 Diversity in Cybersecurity, ISACA Oceania CACS 2018 Women in Technology Leadership, 2019 Best Volunteer winner and Highly commended for IT Security Breaker.
CyberShift2 Alliance on Eventbrite for now – https://www.eventbrite.com.au/e/cybershift2-tickets-163133064387
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/641189/KBKAST-Episode-78-Jacqui-Loustau.jpg"></itunes:image>
                                                                            <itunes:duration>00:50:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 77: Andrew Scully]]>
                </title>
                <pubDate>Mon, 23 Aug 2021 10:43:40 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-77-andrew-scully</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-77-andrew-scully</link>
                                <description>
                                            <![CDATA[<p>Andrew Scully is an information security professional with over 15 years’ experience building and delivering security and technical outcomes aligned for both the commercial, military and government sectors.</p>
<p>Previously, Andrew has successfully led large scale structural, technical, and cultural security transformations for Blue Coat Systems, Symantec, Telstra Defence and the Royal Australian Air Force. These roles have included responsibility for;</p>
<ul>
<li>Security program oversight as CISO for the Defence Terrestrial Communication Network delivered under JP2047, and</li>
<li>Operational risk management aspects of Symantec’s internal information security practice including the Joint Security Operations Centre, Incident Response, Forensics, Threat Intelligence, eDiscovery and Red Teaming.</li>
</ul>
<p>Currently, Andrew is the head of Cyber Security at Ampion (formerly Shelde). Andrew’s oversight includes more than 40 technical staff delivering complex cyber solutions across Sydney, Canberra and Melbourne.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Andrew Scully is an information security professional with over 15 years’ experience building and delivering security and technical outcomes aligned for both the commercial, military and government sectors.
Previously, Andrew has successfully led large scale structural, technical, and cultural security transformations for Blue Coat Systems, Symantec, Telstra Defence and the Royal Australian Air Force. These roles have included responsibility for;

Security program oversight as CISO for the Defence Terrestrial Communication Network delivered under JP2047, and
Operational risk management aspects of Symantec’s internal information security practice including the Joint Security Operations Centre, Incident Response, Forensics, Threat Intelligence, eDiscovery and Red Teaming.

Currently, Andrew is the head of Cyber Security at Ampion (formerly Shelde). Andrew’s oversight includes more than 40 technical staff delivering complex cyber solutions across Sydney, Canberra and Melbourne.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 77: Andrew Scully]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Andrew Scully is an information security professional with over 15 years’ experience building and delivering security and technical outcomes aligned for both the commercial, military and government sectors.</p>
<p>Previously, Andrew has successfully led large scale structural, technical, and cultural security transformations for Blue Coat Systems, Symantec, Telstra Defence and the Royal Australian Air Force. These roles have included responsibility for;</p>
<ul>
<li>Security program oversight as CISO for the Defence Terrestrial Communication Network delivered under JP2047, and</li>
<li>Operational risk management aspects of Symantec’s internal information security practice including the Joint Security Operations Centre, Incident Response, Forensics, Threat Intelligence, eDiscovery and Red Teaming.</li>
</ul>
<p>Currently, Andrew is the head of Cyber Security at Ampion (formerly Shelde). Andrew’s oversight includes more than 40 technical staff delivering complex cyber solutions across Sydney, Canberra and Melbourne.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-77-Andrew-Scully.mp3" length="61500150"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Andrew Scully is an information security professional with over 15 years’ experience building and delivering security and technical outcomes aligned for both the commercial, military and government sectors.
Previously, Andrew has successfully led large scale structural, technical, and cultural security transformations for Blue Coat Systems, Symantec, Telstra Defence and the Royal Australian Air Force. These roles have included responsibility for;

Security program oversight as CISO for the Defence Terrestrial Communication Network delivered under JP2047, and
Operational risk management aspects of Symantec’s internal information security practice including the Joint Security Operations Centre, Incident Response, Forensics, Threat Intelligence, eDiscovery and Red Teaming.

Currently, Andrew is the head of Cyber Security at Ampion (formerly Shelde). Andrew’s oversight includes more than 40 technical staff delivering complex cyber solutions across Sydney, Canberra and Melbourne.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/630975/1700181106-KBKAST-Episode-77-Andrew-Scully.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 76: Michael F. D. Anaya]]>
                </title>
                <pubDate>Thu, 12 Aug 2021 17:44:09 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-76-michael-f-d-anaya</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-76-michael-f-d-anaya</link>
                                <description>
                                            <![CDATA[<p>Michael is the Head of Attack Surface Analysis at Palo Alto Networks. He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent, leading extensive investigations and overseeing countless arrests, search warrants, and dismantlements of cyber threat actor sets. Michael has spoken on cybersecurity topics over 500 times around the world and was considered “one of the FBI’s most talented presenters.” Michael is driven by his family, making people laugh, and a desire to help others.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Michael is the Head of Attack Surface Analysis at Palo Alto Networks. He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent, leading extensive investigations and overseeing countless arrests, search warrants, and dismantlements of cyber threat actor sets. Michael has spoken on cybersecurity topics over 500 times around the world and was considered “one of the FBI’s most talented presenters.” Michael is driven by his family, making people laugh, and a desire to help others.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 76: Michael F. D. Anaya]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Michael is the Head of Attack Surface Analysis at Palo Alto Networks. He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent, leading extensive investigations and overseeing countless arrests, search warrants, and dismantlements of cyber threat actor sets. Michael has spoken on cybersecurity topics over 500 times around the world and was considered “one of the FBI’s most talented presenters.” Michael is driven by his family, making people laugh, and a desire to help others.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-76-Michael-Anaya-Cyber-Leadership.mp3" length="61860896"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Michael is the Head of Attack Surface Analysis at Palo Alto Networks. He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent, leading extensive investigations and overseeing countless arrests, search warrants, and dismantlements of cyber threat actor sets. Michael has spoken on cybersecurity topics over 500 times around the world and was considered “one of the FBI’s most talented presenters.” Michael is driven by his family, making people laugh, and a desire to help others.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/610603/KBKAST-Episode-76-Michael-Anaya.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 75: Sean Duca]]>
                </title>
                <pubDate>Wed, 04 Aug 2021 20:33:23 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-75-sean-duca</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-75-sean-duca</link>
                                <description>
                                            <![CDATA[<p><strong>Sean Duca</strong><br />
Vice President and Regional Chief Security<br />
Officer, Asia Pacific &amp; Japan<br />
Palo Alto Networks</p>
<p>Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean<br />
spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.<br />
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business<br />
initiatives.<br />
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.<br />
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sean Duca
Vice President and Regional Chief Security
Officer, Asia Pacific & Japan
Palo Alto Networks
Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean
spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business
initiatives.
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 75: Sean Duca]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Sean Duca</strong><br />
Vice President and Regional Chief Security<br />
Officer, Asia Pacific &amp; Japan<br />
Palo Alto Networks</p>
<p>Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean<br />
spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.<br />
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business<br />
initiatives.<br />
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.<br />
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-75-Sean-Duca.mp3" length="67538616"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sean Duca
Vice President and Regional Chief Security
Officer, Asia Pacific & Japan
Palo Alto Networks
Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean
spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.
With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business
initiatives.
Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.
Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/591520/1700181107-KBKAST-Episode-75-Sean-Duca.jpg"></itunes:image>
                                                                            <itunes:duration>00:46:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 74: Laura Hartley]]>
                </title>
                <pubDate>Wed, 28 Jul 2021 18:54:55 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-74-laura-hartley</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-74-laura-hartley</link>
                                <description>
                                            <![CDATA[<p>Laura is a criminologist specialising in cyber safety. She has worked in NAB’s Enterprise Security team for seven years, and previously worked in Personal, and Institutional Banking. Laura leads NAB’s Security Advisory &amp; Awareness team, which works with NAB’s employees, customers, and the community to empower them to keep themselves safe online and in the physical world. Laura has a Bachelor of Arts with double majors in Criminology and Political Science from The University of Melbourne/Queen Mary College University of London, and a Masters in Criminology from the University of Melbourne.</p>
<p><a href="https://www.nab.com.au/about-us/security/online-safety-tips-business">https://www.nab.com.au/about-us/security/online-safety-tips-business</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Laura is a criminologist specialising in cyber safety. She has worked in NAB’s Enterprise Security team for seven years, and previously worked in Personal, and Institutional Banking. Laura leads NAB’s Security Advisory & Awareness team, which works with NAB’s employees, customers, and the community to empower them to keep themselves safe online and in the physical world. Laura has a Bachelor of Arts with double majors in Criminology and Political Science from The University of Melbourne/Queen Mary College University of London, and a Masters in Criminology from the University of Melbourne.
https://www.nab.com.au/about-us/security/online-safety-tips-business
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 74: Laura Hartley]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Laura is a criminologist specialising in cyber safety. She has worked in NAB’s Enterprise Security team for seven years, and previously worked in Personal, and Institutional Banking. Laura leads NAB’s Security Advisory &amp; Awareness team, which works with NAB’s employees, customers, and the community to empower them to keep themselves safe online and in the physical world. Laura has a Bachelor of Arts with double majors in Criminology and Political Science from The University of Melbourne/Queen Mary College University of London, and a Masters in Criminology from the University of Melbourne.</p>
<p><a href="https://www.nab.com.au/about-us/security/online-safety-tips-business">https://www.nab.com.au/about-us/security/online-safety-tips-business</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-74-Laura-Hartley.mp3" length="37315348"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Laura is a criminologist specialising in cyber safety. She has worked in NAB’s Enterprise Security team for seven years, and previously worked in Personal, and Institutional Banking. Laura leads NAB’s Security Advisory & Awareness team, which works with NAB’s employees, customers, and the community to empower them to keep themselves safe online and in the physical world. Laura has a Bachelor of Arts with double majors in Criminology and Political Science from The University of Melbourne/Queen Mary College University of London, and a Masters in Criminology from the University of Melbourne.
https://www.nab.com.au/about-us/security/online-safety-tips-business
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/579749/KBKAST-Episode-74-Laura-Hartley.jpg"></itunes:image>
                                                                            <itunes:duration>00:25:52</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 73: Dustin Brewer]]>
                </title>
                <pubDate>Fri, 23 Jul 2021 14:23:48 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-73-dustin-brewer</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-73-dustin-brewer</link>
                                <description>
                                            <![CDATA[<p><em>Dustin Brewer, CISM, CSX-P, CDPSE, CEH, is ISACA’s Senior Director, Emerging Technology and Innovation, a role in which he explores and produces content for the ISACA® community on the utilisation benefits and possible threats to current infrastructure posed by emerging technologies. He has 20 years of experience in the IT field, beginning with networks, programming and hardware specialisation. He excelled in cybersecurity while serving in the US military and, later, as an independent contractor and lead developer for defence contract agencies, he specialised in computer networking security, penetration testing, and training for various US Department of Defence (DoD) and commercial entities.</em></p>
<p>Emerging Technology Report: <a href="https://www.isaca.org/go/emerging-tech-2021">https://www.isaca.org/go/emerging-tech-2021</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dustin Brewer, CISM, CSX-P, CDPSE, CEH, is ISACA’s Senior Director, Emerging Technology and Innovation, a role in which he explores and produces content for the ISACA® community on the utilisation benefits and possible threats to current infrastructure posed by emerging technologies. He has 20 years of experience in the IT field, beginning with networks, programming and hardware specialisation. He excelled in cybersecurity while serving in the US military and, later, as an independent contractor and lead developer for defence contract agencies, he specialised in computer networking security, penetration testing, and training for various US Department of Defence (DoD) and commercial entities.
Emerging Technology Report: https://www.isaca.org/go/emerging-tech-2021
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 73: Dustin Brewer]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><em>Dustin Brewer, CISM, CSX-P, CDPSE, CEH, is ISACA’s Senior Director, Emerging Technology and Innovation, a role in which he explores and produces content for the ISACA® community on the utilisation benefits and possible threats to current infrastructure posed by emerging technologies. He has 20 years of experience in the IT field, beginning with networks, programming and hardware specialisation. He excelled in cybersecurity while serving in the US military and, later, as an independent contractor and lead developer for defence contract agencies, he specialised in computer networking security, penetration testing, and training for various US Department of Defence (DoD) and commercial entities.</em></p>
<p>Emerging Technology Report: <a href="https://www.isaca.org/go/emerging-tech-2021">https://www.isaca.org/go/emerging-tech-2021</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-73-Dustin-Brewwer.mp3" length="69363724"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dustin Brewer, CISM, CSX-P, CDPSE, CEH, is ISACA’s Senior Director, Emerging Technology and Innovation, a role in which he explores and produces content for the ISACA® community on the utilisation benefits and possible threats to current infrastructure posed by emerging technologies. He has 20 years of experience in the IT field, beginning with networks, programming and hardware specialisation. He excelled in cybersecurity while serving in the US military and, later, as an independent contractor and lead developer for defence contract agencies, he specialised in computer networking security, penetration testing, and training for various US Department of Defence (DoD) and commercial entities.
Emerging Technology Report: https://www.isaca.org/go/emerging-tech-2021
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/570724/1700181107-KBKAST-Episode-73-Dustin-Brewer.jpg"></itunes:image>
                                                                            <itunes:duration>00:48:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 72: Ramses Gallego]]>
                </title>
                <pubDate>Fri, 16 Jul 2021 08:00:06 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-72-ramses-gallego</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-72-ramses-gallego</link>
                                <description>
                                            <![CDATA[<p>With an MBA and Law education, Ramsés is a +22 year security professional with deep expertise in the Risk Management and Governance areas. Ramsés is now <span class="Apple-converted-space"> </span>International Chief Technology Officer with CyberRes, a Micro Focus line of business, where he defines the vision and mission, purpose and promise of the division. He has recently been Strategist &amp; Evangelist for the office of the CTO with Symantec and holds the following professional accreditations: CISM, CGEIT, CISSP, SCPM, CCSK, ITIL and COBIT Foundations. An internationally recognized public speaker, has visited +24 different countries in the past 12 months and has been awarded ‘Best Speaker’ in the four continents. He is also a Six Sigma Black Belt professional and is proud of being Past International VP for ISACA’s Board of Directors and Immediate Past President and now Ambassador of the Barcelona Chapter. Ramsés is also Executive Vice President of the Quantum World Association and has had the US flag flown on his honor at The Capitol, in Washington DC, USA. With already 14 Marathons – and other crazy adventures on his legs – he lives in Barcelona, Spain, with his wonderful wife, and his two loved kids.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[With an MBA and Law education, Ramsés is a +22 year security professional with deep expertise in the Risk Management and Governance areas. Ramsés is now  International Chief Technology Officer with CyberRes, a Micro Focus line of business, where he defines the vision and mission, purpose and promise of the division. He has recently been Strategist & Evangelist for the office of the CTO with Symantec and holds the following professional accreditations: CISM, CGEIT, CISSP, SCPM, CCSK, ITIL and COBIT Foundations. An internationally recognized public speaker, has visited +24 different countries in the past 12 months and has been awarded ‘Best Speaker’ in the four continents. He is also a Six Sigma Black Belt professional and is proud of being Past International VP for ISACA’s Board of Directors and Immediate Past President and now Ambassador of the Barcelona Chapter. Ramsés is also Executive Vice President of the Quantum World Association and has had the US flag flown on his honor at The Capitol, in Washington DC, USA. With already 14 Marathons – and other crazy adventures on his legs – he lives in Barcelona, Spain, with his wonderful wife, and his two loved kids.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 72: Ramses Gallego]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>With an MBA and Law education, Ramsés is a +22 year security professional with deep expertise in the Risk Management and Governance areas. Ramsés is now <span class="Apple-converted-space"> </span>International Chief Technology Officer with CyberRes, a Micro Focus line of business, where he defines the vision and mission, purpose and promise of the division. He has recently been Strategist &amp; Evangelist for the office of the CTO with Symantec and holds the following professional accreditations: CISM, CGEIT, CISSP, SCPM, CCSK, ITIL and COBIT Foundations. An internationally recognized public speaker, has visited +24 different countries in the past 12 months and has been awarded ‘Best Speaker’ in the four continents. He is also a Six Sigma Black Belt professional and is proud of being Past International VP for ISACA’s Board of Directors and Immediate Past President and now Ambassador of the Barcelona Chapter. Ramsés is also Executive Vice President of the Quantum World Association and has had the US flag flown on his honor at The Capitol, in Washington DC, USA. With already 14 Marathons – and other crazy adventures on his legs – he lives in Barcelona, Spain, with his wonderful wife, and his two loved kids.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-72-Ramses-Gallego.mp3" length="73043590"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[With an MBA and Law education, Ramsés is a +22 year security professional with deep expertise in the Risk Management and Governance areas. Ramsés is now  International Chief Technology Officer with CyberRes, a Micro Focus line of business, where he defines the vision and mission, purpose and promise of the division. He has recently been Strategist & Evangelist for the office of the CTO with Symantec and holds the following professional accreditations: CISM, CGEIT, CISSP, SCPM, CCSK, ITIL and COBIT Foundations. An internationally recognized public speaker, has visited +24 different countries in the past 12 months and has been awarded ‘Best Speaker’ in the four continents. He is also a Six Sigma Black Belt professional and is proud of being Past International VP for ISACA’s Board of Directors and Immediate Past President and now Ambassador of the Barcelona Chapter. Ramsés is also Executive Vice President of the Quantum World Association and has had the US flag flown on his honor at The Capitol, in Washington DC, USA. With already 14 Marathons – and other crazy adventures on his legs – he lives in Barcelona, Spain, with his wonderful wife, and his two loved kids.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/563840/KBKAST-Episode-72-Ramses-Gallego.jpg"></itunes:image>
                                                                            <itunes:duration>00:50:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 71: Sam Crowther]]>
                </title>
                <pubDate>Wed, 07 Jul 2021 18:04:49 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-71-sam-crowther</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-71-sam-crowther</link>
                                <description>
                                            <![CDATA[<p class="p1">Sam Crowther is the founder of Kasada, a cybersecurity company with a mission to restore trust in the Internet. Sam’s passion in the security industry began as a high school student when he worked with the team at Australia’s Signals Intelligence Agency. From there, he moved to a red team role at Macquarie Group, an experience that inspired him to start his own company.</p>
<p class="p1">With funding from leading U.S. and Australian investors, Crowther launched Kasada in 2015 to provide innovative application security to companies around the world. Based in New York and Sydney, Crowther loves creating simple technical solutions to complex problems and is motivated by challenging preconceived ideas and beliefs in order to have a positive impact on the world.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sam Crowther is the founder of Kasada, a cybersecurity company with a mission to restore trust in the Internet. Sam’s passion in the security industry began as a high school student when he worked with the team at Australia’s Signals Intelligence Agency. From there, he moved to a red team role at Macquarie Group, an experience that inspired him to start his own company.
With funding from leading U.S. and Australian investors, Crowther launched Kasada in 2015 to provide innovative application security to companies around the world. Based in New York and Sydney, Crowther loves creating simple technical solutions to complex problems and is motivated by challenging preconceived ideas and beliefs in order to have a positive impact on the world.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 71: Sam Crowther]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p class="p1">Sam Crowther is the founder of Kasada, a cybersecurity company with a mission to restore trust in the Internet. Sam’s passion in the security industry began as a high school student when he worked with the team at Australia’s Signals Intelligence Agency. From there, he moved to a red team role at Macquarie Group, an experience that inspired him to start his own company.</p>
<p class="p1">With funding from leading U.S. and Australian investors, Crowther launched Kasada in 2015 to provide innovative application security to companies around the world. Based in New York and Sydney, Crowther loves creating simple technical solutions to complex problems and is motivated by challenging preconceived ideas and beliefs in order to have a positive impact on the world.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-71-Sam-Crowther.mp3" length="50463085"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sam Crowther is the founder of Kasada, a cybersecurity company with a mission to restore trust in the Internet. Sam’s passion in the security industry began as a high school student when he worked with the team at Australia’s Signals Intelligence Agency. From there, he moved to a red team role at Macquarie Group, an experience that inspired him to start his own company.
With funding from leading U.S. and Australian investors, Crowther launched Kasada in 2015 to provide innovative application security to companies around the world. Based in New York and Sydney, Crowther loves creating simple technical solutions to complex problems and is motivated by challenging preconceived ideas and beliefs in order to have a positive impact on the world.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/555002/1700181108-KBKAST-Episode-71-Sam-Crowther.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 70: Jenai Marinkovic]]>
                </title>
                <pubDate>Mon, 28 Jun 2021 13:09:08 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-70-jenai-marinkovic</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-70-jenai-marinkovic</link>
                                <description>
                                            <![CDATA[<p><strong>Jenai Marinkovic, vCTO/CISO, Tiro Security; Technology &amp; Information Security Consultant, Beyond; member, ISACA Emerging Trends Working Group</strong></p>
<p>Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.</p>
<p>Jenai’s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.</p>
<p><a href="https://www.isaca.org/state-of-cybersecurity-2021" target="_blank" rel="noreferrer noopener">www.isaca.org/state-of-cybersecurity-2021</a></p>
<p> </p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jenai Marinkovic, vCTO/CISO, Tiro Security; Technology & Information Security Consultant, Beyond; member, ISACA Emerging Trends Working Group
Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.
Jenai’s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.
www.isaca.org/state-of-cybersecurity-2021
 
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 70: Jenai Marinkovic]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Jenai Marinkovic, vCTO/CISO, Tiro Security; Technology &amp; Information Security Consultant, Beyond; member, ISACA Emerging Trends Working Group</strong></p>
<p>Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.</p>
<p>Jenai’s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.</p>
<p><a href="https://www.isaca.org/state-of-cybersecurity-2021" target="_blank" rel="noreferrer noopener">www.isaca.org/state-of-cybersecurity-2021</a></p>
<p> </p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-70-Jenai-Marinkovic.mp3" length="86123082"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jenai Marinkovic, vCTO/CISO, Tiro Security; Technology & Information Security Consultant, Beyond; member, ISACA Emerging Trends Working Group
Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.
Jenai’s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.
www.isaca.org/state-of-cybersecurity-2021
 
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/514640/KBKAST-Episode-70-Jenai-Marinkovic-1.jpg"></itunes:image>
                                                                            <itunes:duration>00:59:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 69: Rainer Runge]]>
                </title>
                <pubDate>Mon, 07 Jun 2021 19:50:20 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-69-rainer-runge</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-69-rainer-runge</link>
                                <description>
                                            <![CDATA[<p>Rainer has a long history in applications, data and enabling data driven decision amassed through years of experience in the data warehousing, business intelligence and information management. This has been at many levels, including strategy, project management, solution design, deployment, review and application support.</p>
<p>At Alex Solutions, Rainer brings this knowledge to the data management arena, leading the product direction to help organisations find, understand, share and take action on their data assets.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Rainer has a long history in applications, data and enabling data driven decision amassed through years of experience in the data warehousing, business intelligence and information management. This has been at many levels, including strategy, project management, solution design, deployment, review and application support.
At Alex Solutions, Rainer brings this knowledge to the data management arena, leading the product direction to help organisations find, understand, share and take action on their data assets.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 69: Rainer Runge]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Rainer has a long history in applications, data and enabling data driven decision amassed through years of experience in the data warehousing, business intelligence and information management. This has been at many levels, including strategy, project management, solution design, deployment, review and application support.</p>
<p>At Alex Solutions, Rainer brings this knowledge to the data management arena, leading the product direction to help organisations find, understand, share and take action on their data assets.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-69-Rainer-Runge-Data-Security.mp3" length="48861210"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Rainer has a long history in applications, data and enabling data driven decision amassed through years of experience in the data warehousing, business intelligence and information management. This has been at many levels, including strategy, project management, solution design, deployment, review and application support.
At Alex Solutions, Rainer brings this knowledge to the data management arena, leading the product direction to help organisations find, understand, share and take action on their data assets.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/474298/1700181108-KBKAST-Episode-69-Rainer-Runge.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 68: Kyla Guru]]>
                </title>
                <pubDate>Thu, 20 May 2021 17:30:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-68-kyla-guru</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-68-kyla-guru</link>
                                <description>
                                            <![CDATA[<p>Kyla is the founder and Chief Executive Officer of Bits N’ Bytes Cybersecurity Education, an NGO that sustains international partnerships with school districts, corporations including Facebook and IBM, and educational platforms like Discovery Education, all in efforts to increase awareness and fluency in privacy and cybersecurity.</p>
<p>Through these efforts, Kyla has worked with teams across Apple, Facebook, and Google, and gained experience working in Threat Intelligence Research, Cybersecurity/Privacy Program Management, and Governance, Risk, and Compliance (GRC). Kyla has also obtained the CDPSE, Certified Data Privacy Solutions Engineer Certification, from ISACA.</p>
<p>Kyla has also had the privilege of sharing her passion on stages including TEDxChicago, NIST’s NICE K12 Conference, RSAC-US 2019, and RSA-APJ 2019 in Singapore. She strives to be an advocate for both cybersecurity education as well as the critical mobilization of Gen-Z youth. With this, Kyla is also the co-founder and co-director of GirlCon Chicago, Chicago’s premiere high-school tech conference that unites 300+ industry professionals and students annually to discuss bridging the gender-gap in tech.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kyla is the founder and Chief Executive Officer of Bits N’ Bytes Cybersecurity Education, an NGO that sustains international partnerships with school districts, corporations including Facebook and IBM, and educational platforms like Discovery Education, all in efforts to increase awareness and fluency in privacy and cybersecurity.
Through these efforts, Kyla has worked with teams across Apple, Facebook, and Google, and gained experience working in Threat Intelligence Research, Cybersecurity/Privacy Program Management, and Governance, Risk, and Compliance (GRC). Kyla has also obtained the CDPSE, Certified Data Privacy Solutions Engineer Certification, from ISACA.
Kyla has also had the privilege of sharing her passion on stages including TEDxChicago, NIST’s NICE K12 Conference, RSAC-US 2019, and RSA-APJ 2019 in Singapore. She strives to be an advocate for both cybersecurity education as well as the critical mobilization of Gen-Z youth. With this, Kyla is also the co-founder and co-director of GirlCon Chicago, Chicago’s premiere high-school tech conference that unites 300+ industry professionals and students annually to discuss bridging the gender-gap in tech.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 68: Kyla Guru]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Kyla is the founder and Chief Executive Officer of Bits N’ Bytes Cybersecurity Education, an NGO that sustains international partnerships with school districts, corporations including Facebook and IBM, and educational platforms like Discovery Education, all in efforts to increase awareness and fluency in privacy and cybersecurity.</p>
<p>Through these efforts, Kyla has worked with teams across Apple, Facebook, and Google, and gained experience working in Threat Intelligence Research, Cybersecurity/Privacy Program Management, and Governance, Risk, and Compliance (GRC). Kyla has also obtained the CDPSE, Certified Data Privacy Solutions Engineer Certification, from ISACA.</p>
<p>Kyla has also had the privilege of sharing her passion on stages including TEDxChicago, NIST’s NICE K12 Conference, RSAC-US 2019, and RSA-APJ 2019 in Singapore. She strives to be an advocate for both cybersecurity education as well as the critical mobilization of Gen-Z youth. With this, Kyla is also the co-founder and co-director of GirlCon Chicago, Chicago’s premiere high-school tech conference that unites 300+ industry professionals and students annually to discuss bridging the gender-gap in tech.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-68-Kyla-Guru.mp3" length="68775781"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kyla is the founder and Chief Executive Officer of Bits N’ Bytes Cybersecurity Education, an NGO that sustains international partnerships with school districts, corporations including Facebook and IBM, and educational platforms like Discovery Education, all in efforts to increase awareness and fluency in privacy and cybersecurity.
Through these efforts, Kyla has worked with teams across Apple, Facebook, and Google, and gained experience working in Threat Intelligence Research, Cybersecurity/Privacy Program Management, and Governance, Risk, and Compliance (GRC). Kyla has also obtained the CDPSE, Certified Data Privacy Solutions Engineer Certification, from ISACA.
Kyla has also had the privilege of sharing her passion on stages including TEDxChicago, NIST’s NICE K12 Conference, RSAC-US 2019, and RSA-APJ 2019 in Singapore. She strives to be an advocate for both cybersecurity education as well as the critical mobilization of Gen-Z youth. With this, Kyla is also the co-founder and co-director of GirlCon Chicago, Chicago’s premiere high-school tech conference that unites 300+ industry professionals and students annually to discuss bridging the gender-gap in tech.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/451791/KBKAST-Episode-68-Kyla-Guru-1.jpg"></itunes:image>
                                                                            <itunes:duration>00:47:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 67: Wallon Walusayi]]>
                </title>
                <pubDate>Tue, 13 Apr 2021 11:36:01 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-67-wallon-walusayi</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-67-wallon-walusayi</link>
                                <description>
                                            <![CDATA[<p>Serial Entrepreneur Wallon Walusayi is the Co-Founder &amp; CEO of 3Data Analytics, a 3D platform for Operations &amp; Security. 3Data Analytics provided the first commercially available cloud-based XR platform 3Data Cloud and is now working with Large Enterprise &amp; Aerospace/Defense companies. Before becoming an entrepreneur, Wallon worked as a Data Analyst with Nike and in the Front office of the Milwaukee Brewers. His entrepreneurial journey began in 2015, founding one of the first 360 video live streaming companies and developing VR training simulators for RSA and Johnson Controls. In 2016 Wallon was NBC’s “SXSW featured entrepreneur” in 2017 he was named “Top 20 XR Person To Watch” and in 2018 named “SXSW Top 25 Startup” by Tech co.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Serial Entrepreneur Wallon Walusayi is the Co-Founder & CEO of 3Data Analytics, a 3D platform for Operations & Security. 3Data Analytics provided the first commercially available cloud-based XR platform 3Data Cloud and is now working with Large Enterprise & Aerospace/Defense companies. Before becoming an entrepreneur, Wallon worked as a Data Analyst with Nike and in the Front office of the Milwaukee Brewers. His entrepreneurial journey began in 2015, founding one of the first 360 video live streaming companies and developing VR training simulators for RSA and Johnson Controls. In 2016 Wallon was NBC’s “SXSW featured entrepreneur” in 2017 he was named “Top 20 XR Person To Watch” and in 2018 named “SXSW Top 25 Startup” by Tech co.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 67: Wallon Walusayi]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Serial Entrepreneur Wallon Walusayi is the Co-Founder &amp; CEO of 3Data Analytics, a 3D platform for Operations &amp; Security. 3Data Analytics provided the first commercially available cloud-based XR platform 3Data Cloud and is now working with Large Enterprise &amp; Aerospace/Defense companies. Before becoming an entrepreneur, Wallon worked as a Data Analyst with Nike and in the Front office of the Milwaukee Brewers. His entrepreneurial journey began in 2015, founding one of the first 360 video live streaming companies and developing VR training simulators for RSA and Johnson Controls. In 2016 Wallon was NBC’s “SXSW featured entrepreneur” in 2017 he was named “Top 20 XR Person To Watch” and in 2018 named “SXSW Top 25 Startup” by Tech co.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-67-Wallon-Walusayi.mp3" length="31526071"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Serial Entrepreneur Wallon Walusayi is the Co-Founder & CEO of 3Data Analytics, a 3D platform for Operations & Security. 3Data Analytics provided the first commercially available cloud-based XR platform 3Data Cloud and is now working with Large Enterprise & Aerospace/Defense companies. Before becoming an entrepreneur, Wallon worked as a Data Analyst with Nike and in the Front office of the Milwaukee Brewers. His entrepreneurial journey began in 2015, founding one of the first 360 video live streaming companies and developing VR training simulators for RSA and Johnson Controls. In 2016 Wallon was NBC’s “SXSW featured entrepreneur” in 2017 he was named “Top 20 XR Person To Watch” and in 2018 named “SXSW Top 25 Startup” by Tech co.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/417776/1700181108-KBKAST-Episode-67-Wallen-Walusayi.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 66: Neil Royle]]>
                </title>
                <pubDate>Thu, 08 Apr 2021 14:27:53 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-66-neil-royle</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-66-neil-royle</link>
                                <description>
                                            <![CDATA[<p>Neil is a Cyber Security Consultant at Kaspersky with over 20 years’ experience.  He delivers large complex technology programs within industrial, airports, aviation and buildings technology sectors across Australia, New Zealand, the UK, Europe and Middle East.  His passion for innovation and digital transformation has helped customers across the globe drive result oriented business transformation.  Neil is “Global Industrial Cyber Security Professional” certified and is focused on helping businesses within the industrial sector across Australia and New Zealand to improve their overall cyber security posture and embrace Industry 4.0 Technologies.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Neil is a Cyber Security Consultant at Kaspersky with over 20 years’ experience.  He delivers large complex technology programs within industrial, airports, aviation and buildings technology sectors across Australia, New Zealand, the UK, Europe and Middle East.  His passion for innovation and digital transformation has helped customers across the globe drive result oriented business transformation.  Neil is “Global Industrial Cyber Security Professional” certified and is focused on helping businesses within the industrial sector across Australia and New Zealand to improve their overall cyber security posture and embrace Industry 4.0 Technologies.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 66: Neil Royle]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Neil is a Cyber Security Consultant at Kaspersky with over 20 years’ experience.  He delivers large complex technology programs within industrial, airports, aviation and buildings technology sectors across Australia, New Zealand, the UK, Europe and Middle East.  His passion for innovation and digital transformation has helped customers across the globe drive result oriented business transformation.  Neil is “Global Industrial Cyber Security Professional” certified and is focused on helping businesses within the industrial sector across Australia and New Zealand to improve their overall cyber security posture and embrace Industry 4.0 Technologies.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-66-Neil-Royle.mp3" length="59195758"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Neil is a Cyber Security Consultant at Kaspersky with over 20 years’ experience.  He delivers large complex technology programs within industrial, airports, aviation and buildings technology sectors across Australia, New Zealand, the UK, Europe and Middle East.  His passion for innovation and digital transformation has helped customers across the globe drive result oriented business transformation.  Neil is “Global Industrial Cyber Security Professional” certified and is focused on helping businesses within the industrial sector across Australia and New Zealand to improve their overall cyber security posture and embrace Industry 4.0 Technologies.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/411019/KBKAST-Episode-66-Neil-Royle.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 65: Blair Crawford]]>
                </title>
                <pubDate>Thu, 25 Mar 2021 11:57:25 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-65-blair-crawford</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-65-blair-crawford</link>
                                <description>
                                            <![CDATA[<p><b><span>BLAIR CRAWFORD</span></b></p>
<p><b><span>Founder and </span></b><b><span>Managing Director, Daltrey</span></b><span> </span></p>
<p><span>Blair Crawford is a biometrics and identity management specialist with extensive experience </span><span>helping </span><span>global </span><span>organisations</span><span> solve their most pressing cyber security, risk and compliance challenges. Leveraging this wealth of experience, he recently established Daltrey – a unique security solution that delivers biometrics as a service for workforce authentication, across all physical and digital access scenarios.</span><span> </span><span> </span></p>
<p><span>Throughout</span><span> his time working with diverse international companies and federal government agencies, Blair witnessed key industry developments that now make it possible for </span><span>organisations</span><span> to integrate biometrics as a viable, scalable authentication method</span><span> and a solution to increased cyber threats and physical security breaches. </span><span>The </span><span>socialisation</span><span> of biometric technology with Apple Touch ID was a huge advancement, but it was just the start. A more critical development was the increased accountability of C-Suite executives for the control and protection of user and client data, as per GDPR and CPAA. Identity access management is now </span><span>recognised</span><span> as a core part of any </span><span>organisation’s</span><span> </span><span>cyber security </span><span>strategy, with severe implications in place for failing to do so. The final enabler for Daltrey was the </span><span>standardisation of interface specifications. This created a pathway for Blair and his team to build a system that establishes a </span><span>centralised</span><span>, trusted biometric identity, capable of being integrated across all access scenarios in a cost-effective way.</span><span> </span></p>
<p><span>Blair </span><span>is an industry thought leader, regular guest speaker and the host of industry podcast, </span><a href="https://daltrey.com/podcast/"><span>IDentity Today</span></a><span>. He </span><span>believes biometric technology is a convenient, powerful tool that can be used to create safer and more secure workplaces. He’s an firm advocate for self-sovereign identity and is driven to developing solutions that give users control over how their identity is used.</span></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[BLAIR CRAWFORD
Founder and Managing Director, Daltrey 
Blair Crawford is a biometrics and identity management specialist with extensive experience helping global organisations solve their most pressing cyber security, risk and compliance challenges. Leveraging this wealth of experience, he recently established Daltrey – a unique security solution that delivers biometrics as a service for workforce authentication, across all physical and digital access scenarios.  
Throughout his time working with diverse international companies and federal government agencies, Blair witnessed key industry developments that now make it possible for organisations to integrate biometrics as a viable, scalable authentication method and a solution to increased cyber threats and physical security breaches. The socialisation of biometric technology with Apple Touch ID was a huge advancement, but it was just the start. A more critical development was the increased accountability of C-Suite executives for the control and protection of user and client data, as per GDPR and CPAA. Identity access management is now recognised as a core part of any organisation’s cyber security strategy, with severe implications in place for failing to do so. The final enabler for Daltrey was the standardisation of interface specifications. This created a pathway for Blair and his team to build a system that establishes a centralised, trusted biometric identity, capable of being integrated across all access scenarios in a cost-effective way. 
Blair is an industry thought leader, regular guest speaker and the host of industry podcast, IDentity Today. He believes biometric technology is a convenient, powerful tool that can be used to create safer and more secure workplaces. He’s an firm advocate for self-sovereign identity and is driven to developing solutions that give users control over how their identity is used.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 65: Blair Crawford]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><b><span>BLAIR CRAWFORD</span></b></p>
<p><b><span>Founder and </span></b><b><span>Managing Director, Daltrey</span></b><span> </span></p>
<p><span>Blair Crawford is a biometrics and identity management specialist with extensive experience </span><span>helping </span><span>global </span><span>organisations</span><span> solve their most pressing cyber security, risk and compliance challenges. Leveraging this wealth of experience, he recently established Daltrey – a unique security solution that delivers biometrics as a service for workforce authentication, across all physical and digital access scenarios.</span><span> </span><span> </span></p>
<p><span>Throughout</span><span> his time working with diverse international companies and federal government agencies, Blair witnessed key industry developments that now make it possible for </span><span>organisations</span><span> to integrate biometrics as a viable, scalable authentication method</span><span> and a solution to increased cyber threats and physical security breaches. </span><span>The </span><span>socialisation</span><span> of biometric technology with Apple Touch ID was a huge advancement, but it was just the start. A more critical development was the increased accountability of C-Suite executives for the control and protection of user and client data, as per GDPR and CPAA. Identity access management is now </span><span>recognised</span><span> as a core part of any </span><span>organisation’s</span><span> </span><span>cyber security </span><span>strategy, with severe implications in place for failing to do so. The final enabler for Daltrey was the </span><span>standardisation of interface specifications. This created a pathway for Blair and his team to build a system that establishes a </span><span>centralised</span><span>, trusted biometric identity, capable of being integrated across all access scenarios in a cost-effective way.</span><span> </span></p>
<p><span>Blair </span><span>is an industry thought leader, regular guest speaker and the host of industry podcast, </span><a href="https://daltrey.com/podcast/"><span>IDentity Today</span></a><span>. He </span><span>believes biometric technology is a convenient, powerful tool that can be used to create safer and more secure workplaces. He’s an firm advocate for self-sovereign identity and is driven to developing solutions that give users control over how their identity is used.</span></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-65-Blair-Crawford.mp3" length="36673637"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[BLAIR CRAWFORD
Founder and Managing Director, Daltrey 
Blair Crawford is a biometrics and identity management specialist with extensive experience helping global organisations solve their most pressing cyber security, risk and compliance challenges. Leveraging this wealth of experience, he recently established Daltrey – a unique security solution that delivers biometrics as a service for workforce authentication, across all physical and digital access scenarios.  
Throughout his time working with diverse international companies and federal government agencies, Blair witnessed key industry developments that now make it possible for organisations to integrate biometrics as a viable, scalable authentication method and a solution to increased cyber threats and physical security breaches. The socialisation of biometric technology with Apple Touch ID was a huge advancement, but it was just the start. A more critical development was the increased accountability of C-Suite executives for the control and protection of user and client data, as per GDPR and CPAA. Identity access management is now recognised as a core part of any organisation’s cyber security strategy, with severe implications in place for failing to do so. The final enabler for Daltrey was the standardisation of interface specifications. This created a pathway for Blair and his team to build a system that establishes a centralised, trusted biometric identity, capable of being integrated across all access scenarios in a cost-effective way. 
Blair is an industry thought leader, regular guest speaker and the host of industry podcast, IDentity Today. He believes biometric technology is a convenient, powerful tool that can be used to create safer and more secure workplaces. He’s an firm advocate for self-sovereign identity and is driven to developing solutions that give users control over how their identity is used.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/399037/1700181109-KBKAST-Episode-65-Blair-Crawford.jpg"></itunes:image>
                                                                            <itunes:duration>00:50:53</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 64: Rachael Greaves]]>
                </title>
                <pubDate>Fri, 12 Mar 2021 13:23:41 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-64-rachael-greaves</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-64-rachael-greaves</link>
                                <description>
                                            <![CDATA[<p><span>Rachael Greaves is a records and information management thought leader, </span><span>who </span><span>designed the Castlepoint command and control product. Rachael has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments, and developed Castlepoint in response to the tension seen in organisations between compliance, usability, sustainability and cost. Rachael is a Certified Information Professional (CIP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Data Privacy Systems Engineer (CDPSE), and is certified in project, change, and records management. With a cultural anthropology and linguistics background, Rachael brings ethical, global and sustainable practices to the sector. Her innovative technology concept has transformed the compliance and risk management outcomes of multiple organisations, by automating the application of complex and multi-layered regulatory obligations to their data holdings. Rachael’s mission is to improve outcomes for citizens and stakeholders by helping governments and organisations to provide better, more accountable services.</span></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Rachael Greaves is a records and information management thought leader, who designed the Castlepoint command and control product. Rachael has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments, and developed Castlepoint in response to the tension seen in organisations between compliance, usability, sustainability and cost. Rachael is a Certified Information Professional (CIP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Data Privacy Systems Engineer (CDPSE), and is certified in project, change, and records management. With a cultural anthropology and linguistics background, Rachael brings ethical, global and sustainable practices to the sector. Her innovative technology concept has transformed the compliance and risk management outcomes of multiple organisations, by automating the application of complex and multi-layered regulatory obligations to their data holdings. Rachael’s mission is to improve outcomes for citizens and stakeholders by helping governments and organisations to provide better, more accountable services.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 64: Rachael Greaves]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span>Rachael Greaves is a records and information management thought leader, </span><span>who </span><span>designed the Castlepoint command and control product. Rachael has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments, and developed Castlepoint in response to the tension seen in organisations between compliance, usability, sustainability and cost. Rachael is a Certified Information Professional (CIP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Data Privacy Systems Engineer (CDPSE), and is certified in project, change, and records management. With a cultural anthropology and linguistics background, Rachael brings ethical, global and sustainable practices to the sector. Her innovative technology concept has transformed the compliance and risk management outcomes of multiple organisations, by automating the application of complex and multi-layered regulatory obligations to their data holdings. Rachael’s mission is to improve outcomes for citizens and stakeholders by helping governments and organisations to provide better, more accountable services.</span></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-64-Rachael-Greaves-.mp3" length="36126590"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Rachael Greaves is a records and information management thought leader, who designed the Castlepoint command and control product. Rachael has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments, and developed Castlepoint in response to the tension seen in organisations between compliance, usability, sustainability and cost. Rachael is a Certified Information Professional (CIP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Data Privacy Systems Engineer (CDPSE), and is certified in project, change, and records management. With a cultural anthropology and linguistics background, Rachael brings ethical, global and sustainable practices to the sector. Her innovative technology concept has transformed the compliance and risk management outcomes of multiple organisations, by automating the application of complex and multi-layered regulatory obligations to their data holdings. Rachael’s mission is to improve outcomes for citizens and stakeholders by helping governments and organisations to provide better, more accountable services.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/392295/KBKAST-Episode-64-Rachael-Greaves.jpg"></itunes:image>
                                                                            <itunes:duration>00:50:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 63: Prof. Lisa Harvey-Smith]]>
                </title>
                <pubDate>Wed, 10 Mar 2021 13:45:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-63-prof-lisa-harvey-smith</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-63-prof-lisa-harvey-smith</link>
                                <description>
                                            <![CDATA[<p><a href="https://www.smh.com.au/national/lisa-harvey-smith-the-unorthodox-rise-of-a-top-australian-astronomer-20180509-p4ze6w.html">Professor Lisa Harvey-Smith</a> is the Australian Government’s Women in STEM Ambassador and a Professor of Practice at the University of New South Wales. In her role as <a href="https://womensagenda.com.au/latest/astrophysicist-lisa-harvey-smith-named-australias-first-women-in-stem-ambassador/">Women in STEM Ambassador</a>, Lisa is responsible for increasing the participation of women and girls in Science, Technology, Engineering and Mathematics (STEM) studies and careers across Australia.</p>
<p>She is an award-winning astrophysicist with <a href="https://ui.adsabs.harvard.edu/search/filter_property_fq_property=AND&amp;filter_property_fq_property=property%3A%22refereed%22&amp;fq=%7B!type%3Daqp%20v%3D%24fq_property%7D&amp;fq_property=(property%3A%22refereed%22)&amp;q=harvey-smith%2C%20Lisa&amp;sort=date%20desc%2C%20bibcode%20desc&amp;p_=0">research interests</a> in the birth and death of stars and supermassive black holes. Lisa serves on the Australian Space Agency’s Advisory Group and previously worked on the <a href="https://skatelescope.org/">Square Kilometre Array</a> – a continent-spanning next-generation radio telescope that will survey billions of years of cosmic history. Lisa has written three popular science books: <em>When Galaxies Collide,</em> the children’s book <em>Under the Stars: Astrophysics for Bedtime </em>and<em> The Secret Life of Stars</em>.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Professor Lisa Harvey-Smith is the Australian Government’s Women in STEM Ambassador and a Professor of Practice at the University of New South Wales. In her role as Women in STEM Ambassador, Lisa is responsible for increasing the participation of women and girls in Science, Technology, Engineering and Mathematics (STEM) studies and careers across Australia.
She is an award-winning astrophysicist with research interests in the birth and death of stars and supermassive black holes. Lisa serves on the Australian Space Agency’s Advisory Group and previously worked on the Square Kilometre Array – a continent-spanning next-generation radio telescope that will survey billions of years of cosmic history. Lisa has written three popular science books: When Galaxies Collide, the children’s book Under the Stars: Astrophysics for Bedtime and The Secret Life of Stars.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 63: Prof. Lisa Harvey-Smith]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><a href="https://www.smh.com.au/national/lisa-harvey-smith-the-unorthodox-rise-of-a-top-australian-astronomer-20180509-p4ze6w.html">Professor Lisa Harvey-Smith</a> is the Australian Government’s Women in STEM Ambassador and a Professor of Practice at the University of New South Wales. In her role as <a href="https://womensagenda.com.au/latest/astrophysicist-lisa-harvey-smith-named-australias-first-women-in-stem-ambassador/">Women in STEM Ambassador</a>, Lisa is responsible for increasing the participation of women and girls in Science, Technology, Engineering and Mathematics (STEM) studies and careers across Australia.</p>
<p>She is an award-winning astrophysicist with <a href="https://ui.adsabs.harvard.edu/search/filter_property_fq_property=AND&amp;filter_property_fq_property=property%3A%22refereed%22&amp;fq=%7B!type%3Daqp%20v%3D%24fq_property%7D&amp;fq_property=(property%3A%22refereed%22)&amp;q=harvey-smith%2C%20Lisa&amp;sort=date%20desc%2C%20bibcode%20desc&amp;p_=0">research interests</a> in the birth and death of stars and supermassive black holes. Lisa serves on the Australian Space Agency’s Advisory Group and previously worked on the <a href="https://skatelescope.org/">Square Kilometre Array</a> – a continent-spanning next-generation radio telescope that will survey billions of years of cosmic history. Lisa has written three popular science books: <em>When Galaxies Collide,</em> the children’s book <em>Under the Stars: Astrophysics for Bedtime </em>and<em> The Secret Life of Stars</em>.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-63-Prof-Lisa-Harvey-Smith-.mp3" length="44034878"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Professor Lisa Harvey-Smith is the Australian Government’s Women in STEM Ambassador and a Professor of Practice at the University of New South Wales. In her role as Women in STEM Ambassador, Lisa is responsible for increasing the participation of women and girls in Science, Technology, Engineering and Mathematics (STEM) studies and careers across Australia.
She is an award-winning astrophysicist with research interests in the birth and death of stars and supermassive black holes. Lisa serves on the Australian Space Agency’s Advisory Group and previously worked on the Square Kilometre Array – a continent-spanning next-generation radio telescope that will survey billions of years of cosmic history. Lisa has written three popular science books: When Galaxies Collide, the children’s book Under the Stars: Astrophysics for Bedtime and The Secret Life of Stars.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/379838/1700181109-KBKAST-Episode-63-Lisa-Harvey-Smith.jpg"></itunes:image>
                                                                            <itunes:duration>01:01:06</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 62: Jo Stewart-Rattray]]>
                </title>
                <pubDate>Mon, 08 Mar 2021 15:38:23 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-62-jo-stewart-rattray</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-62-jo-stewart-rattray</link>
                                <description>
                                            <![CDATA[<p>Jo Stewart-Rattray CISM CGEIT CISA CRISC CP<br />
Director, BRM Advisory<br />
ISACA member</p>
<p>Adelaide business leader and information security veteran, Jo Stewart-Rattray, has been recognised for her tireless work educating and mentoring future generations of IT professionals and breaking down gender barriers in the IT industry, taking out Highly Commended in the Australian Women in Security Network’s 2020 Award of the Year.</p>
<p>For over 25 years Jo has championed gender equality in the security industry culminating in the establishment of SheLeadsTech, a program Jo pioneered with global professional association, ISACA, aimed at educating, mentoring and empowering women in tech. In under four years, SheLeadsTech has grown from a base of zero, to being embraced on five continents, and now is one of the core programs of ISACA’s newly launched One In Tech foundation. Over 10,000 community professionals have engaged in SheLeadsTech events and online platforms to promote gender equality, address the gender pay gap, enhance the careers of women in IT and offer a safe space to discuss their experiences.</p>
<blockquote><p>“Even as technology transforms the global economy at a staggering pace, we are still dealing with the gender bias that hampered our mothers and grandmothers,” said Stewart-Rattray. “A challenge this large and this persistent can feel overwhelming, but there are steps each of us can take to make meaningful progress. If we are resolute, the day will come when our classrooms, offices and board rooms are filled with empowered women and girls ready to make their mark on the technology workforce.“I am honoured to have received the Highly Commended Award amongst the amazing finalists for this year’s award. There is still much to do, and working together we can all help to break down these archaic barriers.”</p></blockquote>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jo Stewart-Rattray CISM CGEIT CISA CRISC CP
Director, BRM Advisory
ISACA member
Adelaide business leader and information security veteran, Jo Stewart-Rattray, has been recognised for her tireless work educating and mentoring future generations of IT professionals and breaking down gender barriers in the IT industry, taking out Highly Commended in the Australian Women in Security Network’s 2020 Award of the Year.
For over 25 years Jo has championed gender equality in the security industry culminating in the establishment of SheLeadsTech, a program Jo pioneered with global professional association, ISACA, aimed at educating, mentoring and empowering women in tech. In under four years, SheLeadsTech has grown from a base of zero, to being embraced on five continents, and now is one of the core programs of ISACA’s newly launched One In Tech foundation. Over 10,000 community professionals have engaged in SheLeadsTech events and online platforms to promote gender equality, address the gender pay gap, enhance the careers of women in IT and offer a safe space to discuss their experiences.
“Even as technology transforms the global economy at a staggering pace, we are still dealing with the gender bias that hampered our mothers and grandmothers,” said Stewart-Rattray. “A challenge this large and this persistent can feel overwhelming, but there are steps each of us can take to make meaningful progress. If we are resolute, the day will come when our classrooms, offices and board rooms are filled with empowered women and girls ready to make their mark on the technology workforce.“I am honoured to have received the Highly Commended Award amongst the amazing finalists for this year’s award. There is still much to do, and working together we can all help to break down these archaic barriers.”
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 62: Jo Stewart-Rattray]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jo Stewart-Rattray CISM CGEIT CISA CRISC CP<br />
Director, BRM Advisory<br />
ISACA member</p>
<p>Adelaide business leader and information security veteran, Jo Stewart-Rattray, has been recognised for her tireless work educating and mentoring future generations of IT professionals and breaking down gender barriers in the IT industry, taking out Highly Commended in the Australian Women in Security Network’s 2020 Award of the Year.</p>
<p>For over 25 years Jo has championed gender equality in the security industry culminating in the establishment of SheLeadsTech, a program Jo pioneered with global professional association, ISACA, aimed at educating, mentoring and empowering women in tech. In under four years, SheLeadsTech has grown from a base of zero, to being embraced on five continents, and now is one of the core programs of ISACA’s newly launched One In Tech foundation. Over 10,000 community professionals have engaged in SheLeadsTech events and online platforms to promote gender equality, address the gender pay gap, enhance the careers of women in IT and offer a safe space to discuss their experiences.</p>
<blockquote><p>“Even as technology transforms the global economy at a staggering pace, we are still dealing with the gender bias that hampered our mothers and grandmothers,” said Stewart-Rattray. “A challenge this large and this persistent can feel overwhelming, but there are steps each of us can take to make meaningful progress. If we are resolute, the day will come when our classrooms, offices and board rooms are filled with empowered women and girls ready to make their mark on the technology workforce.“I am honoured to have received the Highly Commended Award amongst the amazing finalists for this year’s award. There is still much to do, and working together we can all help to break down these archaic barriers.”</p></blockquote>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-62-Jo-Stewart-Rattray-.mp3" length="32779108"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jo Stewart-Rattray CISM CGEIT CISA CRISC CP
Director, BRM Advisory
ISACA member
Adelaide business leader and information security veteran, Jo Stewart-Rattray, has been recognised for her tireless work educating and mentoring future generations of IT professionals and breaking down gender barriers in the IT industry, taking out Highly Commended in the Australian Women in Security Network’s 2020 Award of the Year.
For over 25 years Jo has championed gender equality in the security industry culminating in the establishment of SheLeadsTech, a program Jo pioneered with global professional association, ISACA, aimed at educating, mentoring and empowering women in tech. In under four years, SheLeadsTech has grown from a base of zero, to being embraced on five continents, and now is one of the core programs of ISACA’s newly launched One In Tech foundation. Over 10,000 community professionals have engaged in SheLeadsTech events and online platforms to promote gender equality, address the gender pay gap, enhance the careers of women in IT and offer a safe space to discuss their experiences.
“Even as technology transforms the global economy at a staggering pace, we are still dealing with the gender bias that hampered our mothers and grandmothers,” said Stewart-Rattray. “A challenge this large and this persistent can feel overwhelming, but there are steps each of us can take to make meaningful progress. If we are resolute, the day will come when our classrooms, offices and board rooms are filled with empowered women and girls ready to make their mark on the technology workforce.“I am honoured to have received the Highly Commended Award amongst the amazing finalists for this year’s award. There is still much to do, and working together we can all help to break down these archaic barriers.”
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/377993/KBKAST-62-Jo-Stewart-Rattray.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 61: Kris Poria & Jeff Penrose]]>
                </title>
                <pubDate>Fri, 26 Feb 2021 13:27:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/370020</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-61-kris-poria-jeff-penrose</link>
                                <description>
                                            <![CDATA[<p>Kris has an extensive experience both running his own businesses as well as a successful corporate career across Asia, Europe, North America and then in Australia. Kris has started and run businesses successfully as well as cases of learnings from his adventures. He also has corporate career including internal transformations as well as leading customer engagements and sales for small to large multi-million dollar programs. He is ongoing early adopter for continuous personal productivity and learning – MBA from Macquarie Graduate School of Management.<br />
<strong><a href="https://www.linkedin.com/in/krisporia/">LinkedIn</a></strong></p>
<p>Jeff is an ICT domain specialist, with significant international business development, sales and delivery experience in the private and public sectors. He has held executive management and technical roles in both commercial and large government organisations. Jeff has extensive experience in defining and understanding business needs from clients and delivering creative outcomes. He is a detailed problem solver, with the ability to engage across a broad cross section of an organisation. Jeff is married with four adult children and an appetite for continuous learning of business and technology trends and issues – Graduate Diploma on Executive Leadership.<br />
<a href="https://www.linkedin.com/in/jeffpenrose/"><strong>LinkedIn</strong></a></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Kris has an extensive experience both running his own businesses as well as a successful corporate career across Asia, Europe, North America and then in Australia. Kris has started and run businesses successfully as well as cases of learnings from his adventures. He also has corporate career including internal transformations as well as leading customer engagements and sales for small to large multi-million dollar programs. He is ongoing early adopter for continuous personal productivity and learning – MBA from Macquarie Graduate School of Management.
LinkedIn
Jeff is an ICT domain specialist, with significant international business development, sales and delivery experience in the private and public sectors. He has held executive management and technical roles in both commercial and large government organisations. Jeff has extensive experience in defining and understanding business needs from clients and delivering creative outcomes. He is a detailed problem solver, with the ability to engage across a broad cross section of an organisation. Jeff is married with four adult children and an appetite for continuous learning of business and technology trends and issues – Graduate Diploma on Executive Leadership.
LinkedIn
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 61: Kris Poria & Jeff Penrose]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Kris has an extensive experience both running his own businesses as well as a successful corporate career across Asia, Europe, North America and then in Australia. Kris has started and run businesses successfully as well as cases of learnings from his adventures. He also has corporate career including internal transformations as well as leading customer engagements and sales for small to large multi-million dollar programs. He is ongoing early adopter for continuous personal productivity and learning – MBA from Macquarie Graduate School of Management.<br />
<strong><a href="https://www.linkedin.com/in/krisporia/">LinkedIn</a></strong></p>
<p>Jeff is an ICT domain specialist, with significant international business development, sales and delivery experience in the private and public sectors. He has held executive management and technical roles in both commercial and large government organisations. Jeff has extensive experience in defining and understanding business needs from clients and delivering creative outcomes. He is a detailed problem solver, with the ability to engage across a broad cross section of an organisation. Jeff is married with four adult children and an appetite for continuous learning of business and technology trends and issues – Graduate Diploma on Executive Leadership.<br />
<a href="https://www.linkedin.com/in/jeffpenrose/"><strong>LinkedIn</strong></a></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Episode-61-EarlyBirds-.mp3" length="41020560"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Kris has an extensive experience both running his own businesses as well as a successful corporate career across Asia, Europe, North America and then in Australia. Kris has started and run businesses successfully as well as cases of learnings from his adventures. He also has corporate career including internal transformations as well as leading customer engagements and sales for small to large multi-million dollar programs. He is ongoing early adopter for continuous personal productivity and learning – MBA from Macquarie Graduate School of Management.
LinkedIn
Jeff is an ICT domain specialist, with significant international business development, sales and delivery experience in the private and public sectors. He has held executive management and technical roles in both commercial and large government organisations. Jeff has extensive experience in defining and understanding business needs from clients and delivering creative outcomes. He is a detailed problem solver, with the ability to engage across a broad cross section of an organisation. Jeff is married with four adult children and an appetite for continuous learning of business and technology trends and issues – Graduate Diploma on Executive Leadership.
LinkedIn
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/370020/KBKAST-Episode-61-Kris-Jeff.jpg"></itunes:image>
                                                                            <itunes:duration>00:56:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 60: Jason Duerden]]>
                </title>
                <pubDate>Mon, 22 Feb 2021 23:24:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-60-jason-duerden</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-60-jason-duerden</link>
                                <description>
                                            <![CDATA[<p>As Managing Director for BlackBerry’s Spark Division, Jason Duerden is responsible for building and executing the business in Australia and New Zealand (ANZ). In this region, he drives strategy, operations and growth of BlackBerry’s next-generation platform, BlackBerry Spark. Jason brings over 10 years of leadership and business management and technology acumen experience to BlackBerry with domain knowledge in the cyber arena.</p>
<p>Following the acquisition of Cylance in Feb 2019, the BlackBerry Spark platform is the realisation of BlackBerry’s successful pivot to AI software and cybersecurity leader, offering a new unified endpoint security (UES) layer which can work with BlackBerry® unified endpoint management (UEM) to deliver zero trust security. Leveraging artificial intelligence, machine learning and automation, BlackBerry Spark offers improved cyberthreat prevention and remediation, and provides visibility across desktop, mobile, server, and IoT (including automotive) endpoints.</p>
<p>Jason leads a team that brings together sales and technical experts to deliver a unified platform and cyber services, offering a wide range of skills and expertise for the ANZ market to help navigate the demands of secure workplace mobility, business continuity and cyber threats to ensure operational resiliency. Prior to this, Jason was the Regional Director for BlackBerry Cylance responsible for building and leading the supply chain for BlackBerry Cylance in Australia and New Zealand. He was recognised as a CRN top Channel Chief in 2018.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[As Managing Director for BlackBerry’s Spark Division, Jason Duerden is responsible for building and executing the business in Australia and New Zealand (ANZ). In this region, he drives strategy, operations and growth of BlackBerry’s next-generation platform, BlackBerry Spark. Jason brings over 10 years of leadership and business management and technology acumen experience to BlackBerry with domain knowledge in the cyber arena.
Following the acquisition of Cylance in Feb 2019, the BlackBerry Spark platform is the realisation of BlackBerry’s successful pivot to AI software and cybersecurity leader, offering a new unified endpoint security (UES) layer which can work with BlackBerry® unified endpoint management (UEM) to deliver zero trust security. Leveraging artificial intelligence, machine learning and automation, BlackBerry Spark offers improved cyberthreat prevention and remediation, and provides visibility across desktop, mobile, server, and IoT (including automotive) endpoints.
Jason leads a team that brings together sales and technical experts to deliver a unified platform and cyber services, offering a wide range of skills and expertise for the ANZ market to help navigate the demands of secure workplace mobility, business continuity and cyber threats to ensure operational resiliency. Prior to this, Jason was the Regional Director for BlackBerry Cylance responsible for building and leading the supply chain for BlackBerry Cylance in Australia and New Zealand. He was recognised as a CRN top Channel Chief in 2018.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 60: Jason Duerden]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>As Managing Director for BlackBerry’s Spark Division, Jason Duerden is responsible for building and executing the business in Australia and New Zealand (ANZ). In this region, he drives strategy, operations and growth of BlackBerry’s next-generation platform, BlackBerry Spark. Jason brings over 10 years of leadership and business management and technology acumen experience to BlackBerry with domain knowledge in the cyber arena.</p>
<p>Following the acquisition of Cylance in Feb 2019, the BlackBerry Spark platform is the realisation of BlackBerry’s successful pivot to AI software and cybersecurity leader, offering a new unified endpoint security (UES) layer which can work with BlackBerry® unified endpoint management (UEM) to deliver zero trust security. Leveraging artificial intelligence, machine learning and automation, BlackBerry Spark offers improved cyberthreat prevention and remediation, and provides visibility across desktop, mobile, server, and IoT (including automotive) endpoints.</p>
<p>Jason leads a team that brings together sales and technical experts to deliver a unified platform and cyber services, offering a wide range of skills and expertise for the ANZ market to help navigate the demands of secure workplace mobility, business continuity and cyber threats to ensure operational resiliency. Prior to this, Jason was the Regional Director for BlackBerry Cylance responsible for building and leading the supply chain for BlackBerry Cylance in Australia and New Zealand. He was recognised as a CRN top Channel Chief in 2018.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Ep-60-Jason-Duerden.mp3" length="38894977"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[As Managing Director for BlackBerry’s Spark Division, Jason Duerden is responsible for building and executing the business in Australia and New Zealand (ANZ). In this region, he drives strategy, operations and growth of BlackBerry’s next-generation platform, BlackBerry Spark. Jason brings over 10 years of leadership and business management and technology acumen experience to BlackBerry with domain knowledge in the cyber arena.
Following the acquisition of Cylance in Feb 2019, the BlackBerry Spark platform is the realisation of BlackBerry’s successful pivot to AI software and cybersecurity leader, offering a new unified endpoint security (UES) layer which can work with BlackBerry® unified endpoint management (UEM) to deliver zero trust security. Leveraging artificial intelligence, machine learning and automation, BlackBerry Spark offers improved cyberthreat prevention and remediation, and provides visibility across desktop, mobile, server, and IoT (including automotive) endpoints.
Jason leads a team that brings together sales and technical experts to deliver a unified platform and cyber services, offering a wide range of skills and expertise for the ANZ market to help navigate the demands of secure workplace mobility, business continuity and cyber threats to ensure operational resiliency. Prior to this, Jason was the Regional Director for BlackBerry Cylance responsible for building and leading the supply chain for BlackBerry Cylance in Australia and New Zealand. He was recognised as a CRN top Channel Chief in 2018.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/365891/1700181110-KBKAST-Episode-60-Jason-Duerden.jpg"></itunes:image>
                                                                            <itunes:duration>00:54:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 59: Mandy Turner]]>
                </title>
                <pubDate>Fri, 05 Feb 2021 13:05:10 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-59-mandy-turner</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-59-mandy-turner</link>
                                <description>
                                            <![CDATA[<p>Mandy is a firm believer that diversity in all its forms should be encouraged to promote innovation and find solutions to challenges facing the world.</p>
<p>She herself has had a diverse career ranging from musician, artist, fraud investigator, risk assessor, trainer and analyst. She is currently the Manager of The University of Queensland Cyber Security Operation Centre, and prior to that was a Senior Cyber Crime Intelligence Analyst with the Australian Government.</p>
<p>She has held various roles in information security and investigations including security incident response, malware analysis, communications, and fraud investigator. With 20 years of specialist experience in the Australia Public Service, she has expertise in information security, cybercrime in emerging technologies, risk assessment, digital forensics, cybercrime analysis and fraud investigation.</p>
<p>In her own time, she volunteers at the Australian Information Security Association (AISA) as the Brisbane branch Executive Chair, is the co-founder and Australian Director of Cyber Century Mentoring, is a Justice of the Peace, and an Adjunct Lecturer in Criminology at The University of Queensland.</p>
<p>Mandy mentors students and those new to the infosec industry, speaks at conferences and events, has guest lectured at both The University of Queensland and Griffith University and writes about cybercrime and security awareness. She tweets as <span class="atMention" title="empressbat">@empressbat and</span> plays MMORPG. Her drink of choice is coffee.</p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mandy is a firm believer that diversity in all its forms should be encouraged to promote innovation and find solutions to challenges facing the world.
She herself has had a diverse career ranging from musician, artist, fraud investigator, risk assessor, trainer and analyst. She is currently the Manager of The University of Queensland Cyber Security Operation Centre, and prior to that was a Senior Cyber Crime Intelligence Analyst with the Australian Government.
She has held various roles in information security and investigations including security incident response, malware analysis, communications, and fraud investigator. With 20 years of specialist experience in the Australia Public Service, she has expertise in information security, cybercrime in emerging technologies, risk assessment, digital forensics, cybercrime analysis and fraud investigation.
In her own time, she volunteers at the Australian Information Security Association (AISA) as the Brisbane branch Executive Chair, is the co-founder and Australian Director of Cyber Century Mentoring, is a Justice of the Peace, and an Adjunct Lecturer in Criminology at The University of Queensland.
Mandy mentors students and those new to the infosec industry, speaks at conferences and events, has guest lectured at both The University of Queensland and Griffith University and writes about cybercrime and security awareness. She tweets as @empressbat and plays MMORPG. Her drink of choice is coffee.
 
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 59: Mandy Turner]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mandy is a firm believer that diversity in all its forms should be encouraged to promote innovation and find solutions to challenges facing the world.</p>
<p>She herself has had a diverse career ranging from musician, artist, fraud investigator, risk assessor, trainer and analyst. She is currently the Manager of The University of Queensland Cyber Security Operation Centre, and prior to that was a Senior Cyber Crime Intelligence Analyst with the Australian Government.</p>
<p>She has held various roles in information security and investigations including security incident response, malware analysis, communications, and fraud investigator. With 20 years of specialist experience in the Australia Public Service, she has expertise in information security, cybercrime in emerging technologies, risk assessment, digital forensics, cybercrime analysis and fraud investigation.</p>
<p>In her own time, she volunteers at the Australian Information Security Association (AISA) as the Brisbane branch Executive Chair, is the co-founder and Australian Director of Cyber Century Mentoring, is a Justice of the Peace, and an Adjunct Lecturer in Criminology at The University of Queensland.</p>
<p>Mandy mentors students and those new to the infosec industry, speaks at conferences and events, has guest lectured at both The University of Queensland and Griffith University and writes about cybercrime and security awareness. She tweets as <span class="atMention" title="empressbat">@empressbat and</span> plays MMORPG. Her drink of choice is coffee.</p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP59-KBKast-Amanda-Turner.mp3" length="52064461"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mandy is a firm believer that diversity in all its forms should be encouraged to promote innovation and find solutions to challenges facing the world.
She herself has had a diverse career ranging from musician, artist, fraud investigator, risk assessor, trainer and analyst. She is currently the Manager of The University of Queensland Cyber Security Operation Centre, and prior to that was a Senior Cyber Crime Intelligence Analyst with the Australian Government.
She has held various roles in information security and investigations including security incident response, malware analysis, communications, and fraud investigator. With 20 years of specialist experience in the Australia Public Service, she has expertise in information security, cybercrime in emerging technologies, risk assessment, digital forensics, cybercrime analysis and fraud investigation.
In her own time, she volunteers at the Australian Information Security Association (AISA) as the Brisbane branch Executive Chair, is the co-founder and Australian Director of Cyber Century Mentoring, is a Justice of the Peace, and an Adjunct Lecturer in Criminology at The University of Queensland.
Mandy mentors students and those new to the infosec industry, speaks at conferences and events, has guest lectured at both The University of Queensland and Griffith University and writes about cybercrime and security awareness. She tweets as @empressbat and plays MMORPG. Her drink of choice is coffee.
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/351281/KBKAST-Episode-59-Mandy-Turner.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 58: Gus Clarke]]>
                </title>
                <pubDate>Mon, 01 Feb 2021 09:29:43 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-58-gus-clarke</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-58-gus-clarke</link>
                                <description>
                                            <![CDATA[<p>Gus began his security journey almost 20 years ago by hacking schools library system to remove fines and had against his name. After he realised he could compromise and manipulate computer systems he continued his journey, albeit illicitly. He was later recruited directly out of high school by the Special Investigating Unit, a government agency, and thus began his professional career. Since then he’s worked also directly for government, specifically heading up security for a Province. He’s headed up red teaming and R&amp;D for PwC South Africa. Since then he was Head of Security for Africa’s first digital bank, and lately he’s part of a team building an entirely new blockchain protocol focused on privacy.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Gus began his security journey almost 20 years ago by hacking schools library system to remove fines and had against his name. After he realised he could compromise and manipulate computer systems he continued his journey, albeit illicitly. He was later recruited directly out of high school by the Special Investigating Unit, a government agency, and thus began his professional career. Since then he’s worked also directly for government, specifically heading up security for a Province. He’s headed up red teaming and R&D for PwC South Africa. Since then he was Head of Security for Africa’s first digital bank, and lately he’s part of a team building an entirely new blockchain protocol focused on privacy.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 58: Gus Clarke]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Gus began his security journey almost 20 years ago by hacking schools library system to remove fines and had against his name. After he realised he could compromise and manipulate computer systems he continued his journey, albeit illicitly. He was later recruited directly out of high school by the Special Investigating Unit, a government agency, and thus began his professional career. Since then he’s worked also directly for government, specifically heading up security for a Province. He’s headed up red teaming and R&amp;D for PwC South Africa. Since then he was Head of Security for Africa’s first digital bank, and lately he’s part of a team building an entirely new blockchain protocol focused on privacy.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP58-KBKast-Gus-Clarke.mp3" length="26057775"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Gus began his security journey almost 20 years ago by hacking schools library system to remove fines and had against his name. After he realised he could compromise and manipulate computer systems he continued his journey, albeit illicitly. He was later recruited directly out of high school by the Special Investigating Unit, a government agency, and thus began his professional career. Since then he’s worked also directly for government, specifically heading up security for a Province. He’s headed up red teaming and R&D for PwC South Africa. Since then he was Head of Security for Africa’s first digital bank, and lately he’s part of a team building an entirely new blockchain protocol focused on privacy.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/347184/1700181110-KBKAST-Episode-58-Gus-Clarke.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 57: Chris Pogue]]>
                </title>
                <pubDate>Wed, 27 Jan 2021 22:10:28 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-57-chris-pogue</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-57-chris-pogue</link>
                                <description>
                                            <![CDATA[<p>Chris Pogue is the Head of Nuix Partner Connect, the global ecosystem of more than 150 partners representing 74 different countries. He is also a member of the US Secret Service Electronic Crimes Task Force, The International Association of Chiefs of Police, and the International Association of Financial Crimes Investigators.</p>
<p>Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.</p>
<p>His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.</p>
<p>Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.  He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Chris Pogue is the Head of Nuix Partner Connect, the global ecosystem of more than 150 partners representing 74 different countries. He is also a member of the US Secret Service Electronic Crimes Task Force, The International Association of Chiefs of Police, and the International Association of Financial Crimes Investigators.
Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.
His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.
Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.  He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 57: Chris Pogue]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Chris Pogue is the Head of Nuix Partner Connect, the global ecosystem of more than 150 partners representing 74 different countries. He is also a member of the US Secret Service Electronic Crimes Task Force, The International Association of Chiefs of Police, and the International Association of Financial Crimes Investigators.</p>
<p>Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.</p>
<p>His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.</p>
<p>Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.  He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-EP57-Chris-Pogue.mp3" length="31535561"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Chris Pogue is the Head of Nuix Partner Connect, the global ecosystem of more than 150 partners representing 74 different countries. He is also a member of the US Secret Service Electronic Crimes Task Force, The International Association of Chiefs of Police, and the International Association of Financial Crimes Investigators.
Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.
His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.
Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.  He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/343426/KBKAST-Episode-57-Chris-Pogue.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 56: Benjamin Andrew]]>
                </title>
                <pubDate>Fri, 15 Jan 2021 15:57:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-56-benjamin-andrew</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-56-benjamin-andrew</link>
                                <description>
                                            <![CDATA[<p>Ben has an extensive background in cloud security and enterprise software, with over twenty years in enterprise software; primarily in Security and Compliance.</p>
<p>Starting his technical career building data centers as a Microsoft Certified Systems Engineer, Ben then secured data centers for Fortune 500 customers at McAfee. Learning common security challenges from customers, Ben moved into product management and was responsible for the data center and virtualization security product strategy and roadmap before moving on to work with strategic alliances at Intel Security identifying partners, defining and executing partner strategy, and driving alternate routes to market.</p>
<p>Ben moved to AWS in 2015 to AWS Marketplace which helps customers find, buy, and immediately start using software and services that run on the AWS Cloud. He spent 5 years driving partner integration as worldwide leader of Security, Networking, Open Source and Operating System categories, engaging directly with software vendors, influencing their product strategy and delivering software in a new cloud model. First as an individual contributor, then managing a team helped to bring vendor products to AWS Marketplace drive customer adoption and revenue.</p>
<p>Benjamin Andrew is now a Principal Technical PM for AWS in Migration, Marketplace &amp; Control Services coordinating the phased delivery of a set of prescriptive Service Management Frameworks to simplify cloud adoption helping enterprises improve the management and governance of their cloud environments. Providing end-to-end deployable patterns that include interoperability between third-party offerings from AWS Marketplace and AWS management and governance services.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ben has an extensive background in cloud security and enterprise software, with over twenty years in enterprise software; primarily in Security and Compliance.
Starting his technical career building data centers as a Microsoft Certified Systems Engineer, Ben then secured data centers for Fortune 500 customers at McAfee. Learning common security challenges from customers, Ben moved into product management and was responsible for the data center and virtualization security product strategy and roadmap before moving on to work with strategic alliances at Intel Security identifying partners, defining and executing partner strategy, and driving alternate routes to market.
Ben moved to AWS in 2015 to AWS Marketplace which helps customers find, buy, and immediately start using software and services that run on the AWS Cloud. He spent 5 years driving partner integration as worldwide leader of Security, Networking, Open Source and Operating System categories, engaging directly with software vendors, influencing their product strategy and delivering software in a new cloud model. First as an individual contributor, then managing a team helped to bring vendor products to AWS Marketplace drive customer adoption and revenue.
Benjamin Andrew is now a Principal Technical PM for AWS in Migration, Marketplace & Control Services coordinating the phased delivery of a set of prescriptive Service Management Frameworks to simplify cloud adoption helping enterprises improve the management and governance of their cloud environments. Providing end-to-end deployable patterns that include interoperability between third-party offerings from AWS Marketplace and AWS management and governance services.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 56: Benjamin Andrew]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Ben has an extensive background in cloud security and enterprise software, with over twenty years in enterprise software; primarily in Security and Compliance.</p>
<p>Starting his technical career building data centers as a Microsoft Certified Systems Engineer, Ben then secured data centers for Fortune 500 customers at McAfee. Learning common security challenges from customers, Ben moved into product management and was responsible for the data center and virtualization security product strategy and roadmap before moving on to work with strategic alliances at Intel Security identifying partners, defining and executing partner strategy, and driving alternate routes to market.</p>
<p>Ben moved to AWS in 2015 to AWS Marketplace which helps customers find, buy, and immediately start using software and services that run on the AWS Cloud. He spent 5 years driving partner integration as worldwide leader of Security, Networking, Open Source and Operating System categories, engaging directly with software vendors, influencing their product strategy and delivering software in a new cloud model. First as an individual contributor, then managing a team helped to bring vendor products to AWS Marketplace drive customer adoption and revenue.</p>
<p>Benjamin Andrew is now a Principal Technical PM for AWS in Migration, Marketplace &amp; Control Services coordinating the phased delivery of a set of prescriptive Service Management Frameworks to simplify cloud adoption helping enterprises improve the management and governance of their cloud environments. Providing end-to-end deployable patterns that include interoperability between third-party offerings from AWS Marketplace and AWS management and governance services.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP56-KBKast-Benjamin-Andrew.mp3" length="39233929"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ben has an extensive background in cloud security and enterprise software, with over twenty years in enterprise software; primarily in Security and Compliance.
Starting his technical career building data centers as a Microsoft Certified Systems Engineer, Ben then secured data centers for Fortune 500 customers at McAfee. Learning common security challenges from customers, Ben moved into product management and was responsible for the data center and virtualization security product strategy and roadmap before moving on to work with strategic alliances at Intel Security identifying partners, defining and executing partner strategy, and driving alternate routes to market.
Ben moved to AWS in 2015 to AWS Marketplace which helps customers find, buy, and immediately start using software and services that run on the AWS Cloud. He spent 5 years driving partner integration as worldwide leader of Security, Networking, Open Source and Operating System categories, engaging directly with software vendors, influencing their product strategy and delivering software in a new cloud model. First as an individual contributor, then managing a team helped to bring vendor products to AWS Marketplace drive customer adoption and revenue.
Benjamin Andrew is now a Principal Technical PM for AWS in Migration, Marketplace & Control Services coordinating the phased delivery of a set of prescriptive Service Management Frameworks to simplify cloud adoption helping enterprises improve the management and governance of their cloud environments. Providing end-to-end deployable patterns that include interoperability between third-party offerings from AWS Marketplace and AWS management and governance services.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/330089/1700181110-KBKAST-Episode-56-Benjamin-Andew-AWS.jpg"></itunes:image>
                                                                            <itunes:duration>00:54:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 55: Tulin Sevgin]]>
                </title>
                <pubDate>Mon, 11 Jan 2021 15:58:15 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-55-tulin-sevgin</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-55-tulin-sevgin</link>
                                <description>
                                            <![CDATA[<p>Director of Cybersecurity TPRM, UpGuard, Tulin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.</p>
<p>Amongst Tulin’s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.</p>
<p>Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,<br />
control and assurance. Tulin’s past working experience spans enterprise risk management, business<br />
continuity, risk culture analysis, project management, issues management, IT audit, data analytics,<br />
internal audit and external audit.<br />
Tulin has worked across multiple projects from:</p>
<ul>
<li>Developing and implementing successful Third-Party Risk Management Frameworks</li>
<li>APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness</li>
<li>Information Security Officer positions</li>
<li>Cyber Security Incident response exercises</li>
<li>Creating and exercising data breach response plans</li>
<li>Developing, managing and testing IT disaster recovery plans</li>
<li>Enhancing cyber risk frameworks for various clients</li>
<li>Facilitating cyber security awareness training</li>
<li>Post cyber incident reviews</li>
<li>Social engineering projects</li>
</ul>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Director of Cybersecurity TPRM, UpGuard, Tulin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.
Amongst Tulin’s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.
Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,
control and assurance. Tulin’s past working experience spans enterprise risk management, business
continuity, risk culture analysis, project management, issues management, IT audit, data analytics,
internal audit and external audit.
Tulin has worked across multiple projects from:

Developing and implementing successful Third-Party Risk Management Frameworks
APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness
Information Security Officer positions
Cyber Security Incident response exercises
Creating and exercising data breach response plans
Developing, managing and testing IT disaster recovery plans
Enhancing cyber risk frameworks for various clients
Facilitating cyber security awareness training
Post cyber incident reviews
Social engineering projects

]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 55: Tulin Sevgin]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Director of Cybersecurity TPRM, UpGuard, Tulin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.</p>
<p>Amongst Tulin’s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.</p>
<p>Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,<br />
control and assurance. Tulin’s past working experience spans enterprise risk management, business<br />
continuity, risk culture analysis, project management, issues management, IT audit, data analytics,<br />
internal audit and external audit.<br />
Tulin has worked across multiple projects from:</p>
<ul>
<li>Developing and implementing successful Third-Party Risk Management Frameworks</li>
<li>APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness</li>
<li>Information Security Officer positions</li>
<li>Cyber Security Incident response exercises</li>
<li>Creating and exercising data breach response plans</li>
<li>Developing, managing and testing IT disaster recovery plans</li>
<li>Enhancing cyber risk frameworks for various clients</li>
<li>Facilitating cyber security awareness training</li>
<li>Post cyber incident reviews</li>
<li>Social engineering projects</li>
</ul>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP55-KBKast-Tulin-Sevgin.mp3" length="34728904"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Director of Cybersecurity TPRM, UpGuard, Tulin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.
Amongst Tulin’s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.
Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,
control and assurance. Tulin’s past working experience spans enterprise risk management, business
continuity, risk culture analysis, project management, issues management, IT audit, data analytics,
internal audit and external audit.
Tulin has worked across multiple projects from:

Developing and implementing successful Third-Party Risk Management Frameworks
APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness
Information Security Officer positions
Cyber Security Incident response exercises
Creating and exercising data breach response plans
Developing, managing and testing IT disaster recovery plans
Enhancing cyber risk frameworks for various clients
Facilitating cyber security awareness training
Post cyber incident reviews
Social engineering projects

]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/325263/KBKAST-Episode-55-Tulin-Sevgin.jpg"></itunes:image>
                                                                            <itunes:duration>00:48:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 54: Dave Maunsell]]>
                </title>
                <pubDate>Tue, 29 Dec 2020 19:15:41 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-54-dave-maunsell</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-54-dave-maunsell</link>
                                <description>
                                            <![CDATA[<p>Dave is an accomplished executive with a strong affinity for technology and keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating into outcomes.</p>
<p>Prior to joining Haventec Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture’s Financial Services clients.</p>
<p>Prior to joining Accenture Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dave is an accomplished executive with a strong affinity for technology and keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating into outcomes.
Prior to joining Haventec Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture’s Financial Services clients.
Prior to joining Accenture Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 54: Dave Maunsell]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Dave is an accomplished executive with a strong affinity for technology and keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating into outcomes.</p>
<p>Prior to joining Haventec Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture’s Financial Services clients.</p>
<p>Prior to joining Accenture Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Ep54-Dave-Maunsell.mp3" length="46892743"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dave is an accomplished executive with a strong affinity for technology and keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating into outcomes.
Prior to joining Haventec Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture’s Financial Services clients.
Prior to joining Accenture Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/311474/1700181111-KBKAST-Episode-54-Dave-Maunsell.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:31</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 53: Ben Johnson]]>
                </title>
                <pubDate>Thu, 17 Dec 2020 14:08:45 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-53-ben-johnson</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-53-ben-johnson</link>
                                <description>
                                            <![CDATA[<p>Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company’s Chief Security Strategist. As the company’s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space.</p>
<p>Prior to Carbon Black, Ben was an NSA computer scientist, and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community.</p>
<p>Ben is active in the cybersecurity community, where he is a technical advisor to the US FISA Court and sits on the boards of multiple security startups. Ben earned a bachelor’s degree in computer science from the University of Chicago and a master’s degree in computer science from Johns Hopkins University. He lives in Newport Beach, CA with his wife and three sons.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company’s Chief Security Strategist. As the company’s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space.
Prior to Carbon Black, Ben was an NSA computer scientist, and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community.
Ben is active in the cybersecurity community, where he is a technical advisor to the US FISA Court and sits on the boards of multiple security startups. Ben earned a bachelor’s degree in computer science from the University of Chicago and a master’s degree in computer science from Johns Hopkins University. He lives in Newport Beach, CA with his wife and three sons.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 53: Ben Johnson]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company’s Chief Security Strategist. As the company’s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space.</p>
<p>Prior to Carbon Black, Ben was an NSA computer scientist, and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community.</p>
<p>Ben is active in the cybersecurity community, where he is a technical advisor to the US FISA Court and sits on the boards of multiple security startups. Ben earned a bachelor’s degree in computer science from the University of Chicago and a master’s degree in computer science from Johns Hopkins University. He lives in Newport Beach, CA with his wife and three sons.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP53-KBKast-Ben-Johnson.mp3" length="33552048"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company’s Chief Security Strategist. As the company’s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space.
Prior to Carbon Black, Ben was an NSA computer scientist, and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community.
Ben is active in the cybersecurity community, where he is a technical advisor to the US FISA Court and sits on the boards of multiple security startups. Ben earned a bachelor’s degree in computer science from the University of Chicago and a master’s degree in computer science from Johns Hopkins University. He lives in Newport Beach, CA with his wife and three sons.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/301068/KBKAST-Episode-53-Ben-Johnson.jpg"></itunes:image>
                                                                            <itunes:duration>00:46:31</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 52: Kavika Singhal]]>
                </title>
                <pubDate>Wed, 09 Dec 2020 11:15:40 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-52-kavika-singhal</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-52-kavika-singhal</link>
                                <description>
                                            <![CDATA[<p>My passion for cyber-security stems from my interest in mystery novels and crime shows since the age of 8. Somehow, I enjoyed the process of unravelling the unidentified. Being an ardent leaner, I explored my interest in computer science and being a consistent school topper, I was fortunate enough to secure the Vice-Chancellor scholarship at Western Sydney University. As an addition to my degree, I am working as research assistant with a Cyber-security Professor in WSU; assisting in her research in Ethical Hacking and Payment Fraud.</p>
<p>Outside my degree, I work as a volunteer for several institutions and non-profit organisations. To spread awareness about internet security and safety among elders, I undertook the role of a key speaker in the Digital Literacy Program for Senior Citizens at the Indian Support Center; a contribution to the senior citizens. I am recently selected for Microsoft Student Accelerator Program (MSA) to coordinate as Marketing Lead for my University (WSU); was successful in getting more than 1500 registrations for the program and currently head MSA’s Social Media team.</p>
<p>Cyber-security is expected to continue to boom in future and become a necessity for every company. As a student, it’s my duty to raise cyber awareness among the common kin and understand each aspect of security As an entrant in Cyber-security, I am overwhelmed by the plethora of opportunities in Cyber-security hence, I grab every chance to interact with veterans in the field.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[My passion for cyber-security stems from my interest in mystery novels and crime shows since the age of 8. Somehow, I enjoyed the process of unravelling the unidentified. Being an ardent leaner, I explored my interest in computer science and being a consistent school topper, I was fortunate enough to secure the Vice-Chancellor scholarship at Western Sydney University. As an addition to my degree, I am working as research assistant with a Cyber-security Professor in WSU; assisting in her research in Ethical Hacking and Payment Fraud.
Outside my degree, I work as a volunteer for several institutions and non-profit organisations. To spread awareness about internet security and safety among elders, I undertook the role of a key speaker in the Digital Literacy Program for Senior Citizens at the Indian Support Center; a contribution to the senior citizens. I am recently selected for Microsoft Student Accelerator Program (MSA) to coordinate as Marketing Lead for my University (WSU); was successful in getting more than 1500 registrations for the program and currently head MSA’s Social Media team.
Cyber-security is expected to continue to boom in future and become a necessity for every company. As a student, it’s my duty to raise cyber awareness among the common kin and understand each aspect of security As an entrant in Cyber-security, I am overwhelmed by the plethora of opportunities in Cyber-security hence, I grab every chance to interact with veterans in the field.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 52: Kavika Singhal]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>My passion for cyber-security stems from my interest in mystery novels and crime shows since the age of 8. Somehow, I enjoyed the process of unravelling the unidentified. Being an ardent leaner, I explored my interest in computer science and being a consistent school topper, I was fortunate enough to secure the Vice-Chancellor scholarship at Western Sydney University. As an addition to my degree, I am working as research assistant with a Cyber-security Professor in WSU; assisting in her research in Ethical Hacking and Payment Fraud.</p>
<p>Outside my degree, I work as a volunteer for several institutions and non-profit organisations. To spread awareness about internet security and safety among elders, I undertook the role of a key speaker in the Digital Literacy Program for Senior Citizens at the Indian Support Center; a contribution to the senior citizens. I am recently selected for Microsoft Student Accelerator Program (MSA) to coordinate as Marketing Lead for my University (WSU); was successful in getting more than 1500 registrations for the program and currently head MSA’s Social Media team.</p>
<p>Cyber-security is expected to continue to boom in future and become a necessity for every company. As a student, it’s my duty to raise cyber awareness among the common kin and understand each aspect of security As an entrant in Cyber-security, I am overwhelmed by the plethora of opportunities in Cyber-security hence, I grab every chance to interact with veterans in the field.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP52-Kavika-mixdown.mp3" length="44654448"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[My passion for cyber-security stems from my interest in mystery novels and crime shows since the age of 8. Somehow, I enjoyed the process of unravelling the unidentified. Being an ardent leaner, I explored my interest in computer science and being a consistent school topper, I was fortunate enough to secure the Vice-Chancellor scholarship at Western Sydney University. As an addition to my degree, I am working as research assistant with a Cyber-security Professor in WSU; assisting in her research in Ethical Hacking and Payment Fraud.
Outside my degree, I work as a volunteer for several institutions and non-profit organisations. To spread awareness about internet security and safety among elders, I undertook the role of a key speaker in the Digital Literacy Program for Senior Citizens at the Indian Support Center; a contribution to the senior citizens. I am recently selected for Microsoft Student Accelerator Program (MSA) to coordinate as Marketing Lead for my University (WSU); was successful in getting more than 1500 registrations for the program and currently head MSA’s Social Media team.
Cyber-security is expected to continue to boom in future and become a necessity for every company. As a student, it’s my duty to raise cyber awareness among the common kin and understand each aspect of security As an entrant in Cyber-security, I am overwhelmed by the plethora of opportunities in Cyber-security hence, I grab every chance to interact with veterans in the field.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/293375/1700181111-KBKAST-Episode-52-Kavika-Singhal.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:58</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 51: Todd Hubers]]>
                </title>
                <pubDate>Fri, 04 Dec 2020 06:01:54 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-51-todd-hubers</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-51-todd-hubers</link>
                                <description>
                                            <![CDATA[<p>Todd is a 33-year-old entrepreneur who started computer programming when he was 7 years of age. He earned a scholarship in 2004, and graduated with honours in 2006. He started an onsite computer repair business, to pay for fuel during University, and has since had a slew of start-ups that have been successful.</p>
<p>Todd is currently focused on a new cybersecurity business called Dull. With new technology, Dull helps customers and vendors build new solutions together more rapidly. The technology will ultimately be built-out as a unifying platform for enterprises.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Todd is a 33-year-old entrepreneur who started computer programming when he was 7 years of age. He earned a scholarship in 2004, and graduated with honours in 2006. He started an onsite computer repair business, to pay for fuel during University, and has since had a slew of start-ups that have been successful.
Todd is currently focused on a new cybersecurity business called Dull. With new technology, Dull helps customers and vendors build new solutions together more rapidly. The technology will ultimately be built-out as a unifying platform for enterprises.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 51: Todd Hubers]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Todd is a 33-year-old entrepreneur who started computer programming when he was 7 years of age. He earned a scholarship in 2004, and graduated with honours in 2006. He started an onsite computer repair business, to pay for fuel during University, and has since had a slew of start-ups that have been successful.</p>
<p>Todd is currently focused on a new cybersecurity business called Dull. With new technology, Dull helps customers and vendors build new solutions together more rapidly. The technology will ultimately be built-out as a unifying platform for enterprises.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP51-KBKAST-Todd-Hubers.mp3" length="22681678"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Todd is a 33-year-old entrepreneur who started computer programming when he was 7 years of age. He earned a scholarship in 2004, and graduated with honours in 2006. He started an onsite computer repair business, to pay for fuel during University, and has since had a slew of start-ups that have been successful.
Todd is currently focused on a new cybersecurity business called Dull. With new technology, Dull helps customers and vendors build new solutions together more rapidly. The technology will ultimately be built-out as a unifying platform for enterprises.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/292533/KBKAST-Episode-51-Todd-Hubers.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 50: Garrett O’Hara]]>
                </title>
                <pubDate>Thu, 26 Nov 2020 01:45:38 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/287021</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-50-garrett-ohara</link>
                                <description>
                                            <![CDATA[<p>Garrett O’Hara is the Principal Technical Consultant at Mimecast having joined in 2015 with the opening of the Sydney office, leading the growth and development of the local team. With over 20 years of experience across development, UI/UX, technology communication, training development and mentoring, Garrett now works to help organisations understand and manage their cyber resilience strategies and is a regular industry commentator on the cyber security landscape, data assurance approaches and business continuity.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Garrett O’Hara is the Principal Technical Consultant at Mimecast having joined in 2015 with the opening of the Sydney office, leading the growth and development of the local team. With over 20 years of experience across development, UI/UX, technology communication, training development and mentoring, Garrett now works to help organisations understand and manage their cyber resilience strategies and is a regular industry commentator on the cyber security landscape, data assurance approaches and business continuity.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 50: Garrett O’Hara]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Garrett O’Hara is the Principal Technical Consultant at Mimecast having joined in 2015 with the opening of the Sydney office, leading the growth and development of the local team. With over 20 years of experience across development, UI/UX, technology communication, training development and mentoring, Garrett now works to help organisations understand and manage their cyber resilience strategies and is a regular industry commentator on the cyber security landscape, data assurance approaches and business continuity.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP51-KBKAST-Gar-Ohara.mp3" length="37203321"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Garrett O’Hara is the Principal Technical Consultant at Mimecast having joined in 2015 with the opening of the Sydney office, leading the growth and development of the local team. With over 20 years of experience across development, UI/UX, technology communication, training development and mentoring, Garrett now works to help organisations understand and manage their cyber resilience strategies and is a regular industry commentator on the cyber security landscape, data assurance approaches and business continuity.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/287021/1700181111-KBKAST-Episode-50-Garrett-Ohara.jpg"></itunes:image>
                                                                            <itunes:duration>00:51:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 49: Sam Crowther]]>
                </title>
                <pubDate>Wed, 18 Nov 2020 10:47:46 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-49-sam-crowther</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-49-sam-crowther</link>
                                <description>
                                            <![CDATA[<p>Sam is a young technology enthusiast who’s found passion in cybersecurity at an early age. He was recruited to work for the Australian government while still in high school. He founded Kasada before turning 20 and has been able to raise USD 7 million at the end of 2019 with CIA backed In-Q-Tel as its latest investor. Kasada provides a solution that helps organisations protect from user account takeovers, fraud, data scraping and other disruptive attacks.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sam is a young technology enthusiast who’s found passion in cybersecurity at an early age. He was recruited to work for the Australian government while still in high school. He founded Kasada before turning 20 and has been able to raise USD 7 million at the end of 2019 with CIA backed In-Q-Tel as its latest investor. Kasada provides a solution that helps organisations protect from user account takeovers, fraud, data scraping and other disruptive attacks.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 49: Sam Crowther]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Sam is a young technology enthusiast who’s found passion in cybersecurity at an early age. He was recruited to work for the Australian government while still in high school. He founded Kasada before turning 20 and has been able to raise USD 7 million at the end of 2019 with CIA backed In-Q-Tel as its latest investor. Kasada provides a solution that helps organisations protect from user account takeovers, fraud, data scraping and other disruptive attacks.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKBAST-Ep-49-Sam-Crowther.mp3" length="62426255"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sam is a young technology enthusiast who’s found passion in cybersecurity at an early age. He was recruited to work for the Australian government while still in high school. He founded Kasada before turning 20 and has been able to raise USD 7 million at the end of 2019 with CIA backed In-Q-Tel as its latest investor. Kasada provides a solution that helps organisations protect from user account takeovers, fraud, data scraping and other disruptive attacks.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/282949/KBKAST-Episode-59-Sam-Crowther-Copy.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 48: Adam de Jong]]>
                </title>
                <pubDate>Tue, 10 Nov 2020 04:33:35 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-48-adam-de-jong</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-48-adam-de-jong</link>
                                <description>
                                            <![CDATA[<p>Adam is an high-energy leader, military veteran, and business executive with practical leadership experience working in diverse and complex environments. As CEO of CyAmast, an Australian founded technology company – specialising in IoT network security solutions, he is steering the company through a dramatic and successful scale-up period.</p>
<p>Their technology sits at the intersection of Machine Learning, Artificial Intelligence, and Software Defined Networking and is game changer in the way organisations can get visibility over their connected devices, and the defence against the pervasive threat of cyberattacks.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Adam is an high-energy leader, military veteran, and business executive with practical leadership experience working in diverse and complex environments. As CEO of CyAmast, an Australian founded technology company – specialising in IoT network security solutions, he is steering the company through a dramatic and successful scale-up period.
Their technology sits at the intersection of Machine Learning, Artificial Intelligence, and Software Defined Networking and is game changer in the way organisations can get visibility over their connected devices, and the defence against the pervasive threat of cyberattacks.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 48: Adam de Jong]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Adam is an high-energy leader, military veteran, and business executive with practical leadership experience working in diverse and complex environments. As CEO of CyAmast, an Australian founded technology company – specialising in IoT network security solutions, he is steering the company through a dramatic and successful scale-up period.</p>
<p>Their technology sits at the intersection of Machine Learning, Artificial Intelligence, and Software Defined Networking and is game changer in the way organisations can get visibility over their connected devices, and the defence against the pervasive threat of cyberattacks.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP48-Adam-de-Jong.mp3" length="19232698"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Adam is an high-energy leader, military veteran, and business executive with practical leadership experience working in diverse and complex environments. As CEO of CyAmast, an Australian founded technology company – specialising in IoT network security solutions, he is steering the company through a dramatic and successful scale-up period.
Their technology sits at the intersection of Machine Learning, Artificial Intelligence, and Software Defined Networking and is game changer in the way organisations can get visibility over their connected devices, and the defence against the pervasive threat of cyberattacks.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/273181/1700181112-KBKAST-Episode-48-Adam-de-Jong.jpg"></itunes:image>
                                                                            <itunes:duration>00:26:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 47: Jacqueline Jayne]]>
                </title>
                <pubDate>Mon, 26 Oct 2020 12:15:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-47-jacqueline-jayne</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-47-jacqueline-jayne</link>
                                <description>
                                            <![CDATA[<p>Jacqueline Jayne (JJ) currently serves as Security Awareness Advocate for the APAC region for KnowBe4, the world’s most popular security awareness and simulated phishing platform. With over 20 years’ experience as a conduit between people and technology, she has mastered the art of communication and influence. Previously, she led a successful cybersecurity education and awareness program that changed behaviour and culture, aimed at helping users make better cybersecurity decisions. Cybersecurity is everyone’s responsibility, and there is a gap in how to go about engaging hearts and minds across an entire organisation, regardless of its size. Her insights on the human condition and how to engage at all levels in this space are invaluable as many people struggle to understand the cyberthreat landscape and equally, tech people struggle to understand engage the people to create change. Humans are innately curious which in this climate causes major issues.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jacqueline Jayne (JJ) currently serves as Security Awareness Advocate for the APAC region for KnowBe4, the world’s most popular security awareness and simulated phishing platform. With over 20 years’ experience as a conduit between people and technology, she has mastered the art of communication and influence. Previously, she led a successful cybersecurity education and awareness program that changed behaviour and culture, aimed at helping users make better cybersecurity decisions. Cybersecurity is everyone’s responsibility, and there is a gap in how to go about engaging hearts and minds across an entire organisation, regardless of its size. Her insights on the human condition and how to engage at all levels in this space are invaluable as many people struggle to understand the cyberthreat landscape and equally, tech people struggle to understand engage the people to create change. Humans are innately curious which in this climate causes major issues.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 47: Jacqueline Jayne]]>
                </itunes:title>
                                    <itunes:episode>47</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jacqueline Jayne (JJ) currently serves as Security Awareness Advocate for the APAC region for KnowBe4, the world’s most popular security awareness and simulated phishing platform. With over 20 years’ experience as a conduit between people and technology, she has mastered the art of communication and influence. Previously, she led a successful cybersecurity education and awareness program that changed behaviour and culture, aimed at helping users make better cybersecurity decisions. Cybersecurity is everyone’s responsibility, and there is a gap in how to go about engaging hearts and minds across an entire organisation, regardless of its size. Her insights on the human condition and how to engage at all levels in this space are invaluable as many people struggle to understand the cyberthreat landscape and equally, tech people struggle to understand engage the people to create change. Humans are innately curious which in this climate causes major issues.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP47-KBKast-Jacqueline-Jayne.mp3" length="34832095"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jacqueline Jayne (JJ) currently serves as Security Awareness Advocate for the APAC region for KnowBe4, the world’s most popular security awareness and simulated phishing platform. With over 20 years’ experience as a conduit between people and technology, she has mastered the art of communication and influence. Previously, she led a successful cybersecurity education and awareness program that changed behaviour and culture, aimed at helping users make better cybersecurity decisions. Cybersecurity is everyone’s responsibility, and there is a gap in how to go about engaging hearts and minds across an entire organisation, regardless of its size. Her insights on the human condition and how to engage at all levels in this space are invaluable as many people struggle to understand the cyberthreat landscape and equally, tech people struggle to understand engage the people to create change. Humans are innately curious which in this climate causes major issues.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/263402/KBKAST-Episode-47-Jacqueline-Jayne.jpg"></itunes:image>
                                                                            <itunes:duration>00:48:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 46: Mark Luckin]]>
                </title>
                <pubDate>Wed, 21 Oct 2020 18:54:37 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-46-mark-luckin</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-46-mark-luckin</link>
                                <description>
                                            <![CDATA[<p>Mark works for Lockton Companies Australia, the worlds largest privately owned insurance brokerage and risk advisor.</p>
<p>Mark is the Head of Lockton’s Australian Cyber &amp; Technology Practice, and works with the Global Cyber and Technology team advising clients on the insurable nature of their associated cyber, privacy and technology risks. His experience encompasses advising small business to ASX top 200 companies, across a diverse range of industries.</p>
<p>Mark is a regular contributor to the Cyber Insurance area through both the regular publication of White Papers and appearance on panels on the topic. Mark compliments this area additionally advising clients on their Directors and Officers Liability, IT Liability, Professional Indemnity, Crime and Statutory Liability Insurance risks.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mark works for Lockton Companies Australia, the worlds largest privately owned insurance brokerage and risk advisor.
Mark is the Head of Lockton’s Australian Cyber & Technology Practice, and works with the Global Cyber and Technology team advising clients on the insurable nature of their associated cyber, privacy and technology risks. His experience encompasses advising small business to ASX top 200 companies, across a diverse range of industries.
Mark is a regular contributor to the Cyber Insurance area through both the regular publication of White Papers and appearance on panels on the topic. Mark compliments this area additionally advising clients on their Directors and Officers Liability, IT Liability, Professional Indemnity, Crime and Statutory Liability Insurance risks.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 46: Mark Luckin]]>
                </itunes:title>
                                    <itunes:episode>46</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mark works for Lockton Companies Australia, the worlds largest privately owned insurance brokerage and risk advisor.</p>
<p>Mark is the Head of Lockton’s Australian Cyber &amp; Technology Practice, and works with the Global Cyber and Technology team advising clients on the insurable nature of their associated cyber, privacy and technology risks. His experience encompasses advising small business to ASX top 200 companies, across a diverse range of industries.</p>
<p>Mark is a regular contributor to the Cyber Insurance area through both the regular publication of White Papers and appearance on panels on the topic. Mark compliments this area additionally advising clients on their Directors and Officers Liability, IT Liability, Professional Indemnity, Crime and Statutory Liability Insurance risks.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP46-Mark-Luckin.mp3" length="18892104"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mark works for Lockton Companies Australia, the worlds largest privately owned insurance brokerage and risk advisor.
Mark is the Head of Lockton’s Australian Cyber & Technology Practice, and works with the Global Cyber and Technology team advising clients on the insurable nature of their associated cyber, privacy and technology risks. His experience encompasses advising small business to ASX top 200 companies, across a diverse range of industries.
Mark is a regular contributor to the Cyber Insurance area through both the regular publication of White Papers and appearance on panels on the topic. Mark compliments this area additionally advising clients on their Directors and Officers Liability, IT Liability, Professional Indemnity, Crime and Statutory Liability Insurance risks.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/261263/1700181112-KBKAST-Episode-46-Mark-Luckin.jpg"></itunes:image>
                                                                            <itunes:duration>00:26:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 45: Mike Thompson]]>
                </title>
                <pubDate>Mon, 12 Oct 2020 23:12:27 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-45-mike-thompson</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-45-mike-thompson</link>
                                <description>
                                            <![CDATA[<p>Mike Thompson is the CTO and Co-founder of HackHunter. HackHunter protects organisations by detecting and tracking malicious WiFi and WiFi-operated drones. Mike is an IoT expert with an extensive background in Information and Cyber Security.</p>
<p>Amongst Mike’s many roles, he has:</p>
<ul>
<li>Worked as a CISO for an Insurance Company</li>
<li>Consulted to over 50 organisations, including Telstra, NAB and the Privacy Commission</li>
<li>Uncovered computer fraud</li>
<li>Legally hacked organisations</li>
<li>Designed and developed international award-winning software solutions</li>
<li>Provided investigation and advisory services at the highest levels in government across topics as diverse as biometrics and satellite surveillance systems.</li>
</ul>
<p>Mike is a smart home and 3D printing fanatic with a passion for unlocking the potential of IoT to make our lives richer, safer and sustainable. After the successful exit of his previous business, Mike combined his skills and experience in IoT and cyber security to start the HackHunter journey.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mike Thompson is the CTO and Co-founder of HackHunter. HackHunter protects organisations by detecting and tracking malicious WiFi and WiFi-operated drones. Mike is an IoT expert with an extensive background in Information and Cyber Security.
Amongst Mike’s many roles, he has:

Worked as a CISO for an Insurance Company
Consulted to over 50 organisations, including Telstra, NAB and the Privacy Commission
Uncovered computer fraud
Legally hacked organisations
Designed and developed international award-winning software solutions
Provided investigation and advisory services at the highest levels in government across topics as diverse as biometrics and satellite surveillance systems.

Mike is a smart home and 3D printing fanatic with a passion for unlocking the potential of IoT to make our lives richer, safer and sustainable. After the successful exit of his previous business, Mike combined his skills and experience in IoT and cyber security to start the HackHunter journey.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 45: Mike Thompson]]>
                </itunes:title>
                                    <itunes:episode>45</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mike Thompson is the CTO and Co-founder of HackHunter. HackHunter protects organisations by detecting and tracking malicious WiFi and WiFi-operated drones. Mike is an IoT expert with an extensive background in Information and Cyber Security.</p>
<p>Amongst Mike’s many roles, he has:</p>
<ul>
<li>Worked as a CISO for an Insurance Company</li>
<li>Consulted to over 50 organisations, including Telstra, NAB and the Privacy Commission</li>
<li>Uncovered computer fraud</li>
<li>Legally hacked organisations</li>
<li>Designed and developed international award-winning software solutions</li>
<li>Provided investigation and advisory services at the highest levels in government across topics as diverse as biometrics and satellite surveillance systems.</li>
</ul>
<p>Mike is a smart home and 3D printing fanatic with a passion for unlocking the potential of IoT to make our lives richer, safer and sustainable. After the successful exit of his previous business, Mike combined his skills and experience in IoT and cyber security to start the HackHunter journey.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Ep45-KBkast-Mike-Thompson.mp3" length="31042422"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mike Thompson is the CTO and Co-founder of HackHunter. HackHunter protects organisations by detecting and tracking malicious WiFi and WiFi-operated drones. Mike is an IoT expert with an extensive background in Information and Cyber Security.
Amongst Mike’s many roles, he has:

Worked as a CISO for an Insurance Company
Consulted to over 50 organisations, including Telstra, NAB and the Privacy Commission
Uncovered computer fraud
Legally hacked organisations
Designed and developed international award-winning software solutions
Provided investigation and advisory services at the highest levels in government across topics as diverse as biometrics and satellite surveillance systems.

Mike is a smart home and 3D printing fanatic with a passion for unlocking the potential of IoT to make our lives richer, safer and sustainable. After the successful exit of his previous business, Mike combined his skills and experience in IoT and cyber security to start the HackHunter journey.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/256195/KBKAST-Episode-45-Mike-Thompson.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 44: Dr. Alana Maurushat]]>
                </title>
                <pubDate>Fri, 02 Oct 2020 12:58:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-44-dr-alana-maurushat</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-44-dr-alana-maurushat</link>
                                <description>
                                            <![CDATA[<p>Dr. Alana Maurushat is Professor of Cybersecurity and Behaviour at Western Sydney University where she holds a joint position in the School of Computer Science &amp; Mathematics, and in the School of Social Sciences and Criminology, and is Key Researcher with the CRC Smart Satellites. She is currently researching on Payment Diversion Fraud and Ransomware, Tracking Money-Laundering through Bitcoin Blenders, distributed extreme edge computing for micro-clustered satellites, and Ethical Hacking. She previously was Senior Lecturer in Law, Key Researcher on the CRC Data to Decisions – Big Data in National Security, and Senior Fellow with the Australian CyberSecurity Centre for Research and Education all at UNSW. She is the Cyber-Ambassador for the NSW Cybersecurity Network. She is on the Board of Directors for the cybercrime investigation company IFW Global. She lectures &amp; researches in Cybersecurity, Privacy and Security by Design, Cyber Risk Management, and Artificial Intelligence across the disciplines of law, criminology, business, political science and information communications technology. Alana has done consultancy work on cyber security, open data, big data, technology and civil liberties for both the Australian and Canadian governments, industry and NGOs. Alana has done media with 60 Minutes, the New York Time, Insight, ABC, and 730 Report, and is the author of many books and articles.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dr. Alana Maurushat is Professor of Cybersecurity and Behaviour at Western Sydney University where she holds a joint position in the School of Computer Science & Mathematics, and in the School of Social Sciences and Criminology, and is Key Researcher with the CRC Smart Satellites. She is currently researching on Payment Diversion Fraud and Ransomware, Tracking Money-Laundering through Bitcoin Blenders, distributed extreme edge computing for micro-clustered satellites, and Ethical Hacking. She previously was Senior Lecturer in Law, Key Researcher on the CRC Data to Decisions – Big Data in National Security, and Senior Fellow with the Australian CyberSecurity Centre for Research and Education all at UNSW. She is the Cyber-Ambassador for the NSW Cybersecurity Network. She is on the Board of Directors for the cybercrime investigation company IFW Global. She lectures & researches in Cybersecurity, Privacy and Security by Design, Cyber Risk Management, and Artificial Intelligence across the disciplines of law, criminology, business, political science and information communications technology. Alana has done consultancy work on cyber security, open data, big data, technology and civil liberties for both the Australian and Canadian governments, industry and NGOs. Alana has done media with 60 Minutes, the New York Time, Insight, ABC, and 730 Report, and is the author of many books and articles.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 44: Dr. Alana Maurushat]]>
                </itunes:title>
                                    <itunes:episode>44</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Dr. Alana Maurushat is Professor of Cybersecurity and Behaviour at Western Sydney University where she holds a joint position in the School of Computer Science &amp; Mathematics, and in the School of Social Sciences and Criminology, and is Key Researcher with the CRC Smart Satellites. She is currently researching on Payment Diversion Fraud and Ransomware, Tracking Money-Laundering through Bitcoin Blenders, distributed extreme edge computing for micro-clustered satellites, and Ethical Hacking. She previously was Senior Lecturer in Law, Key Researcher on the CRC Data to Decisions – Big Data in National Security, and Senior Fellow with the Australian CyberSecurity Centre for Research and Education all at UNSW. She is the Cyber-Ambassador for the NSW Cybersecurity Network. She is on the Board of Directors for the cybercrime investigation company IFW Global. She lectures &amp; researches in Cybersecurity, Privacy and Security by Design, Cyber Risk Management, and Artificial Intelligence across the disciplines of law, criminology, business, political science and information communications technology. Alana has done consultancy work on cyber security, open data, big data, technology and civil liberties for both the Australian and Canadian governments, industry and NGOs. Alana has done media with 60 Minutes, the New York Time, Insight, ABC, and 730 Report, and is the author of many books and articles.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP44-AlanaMaurushat-KBKAST.mp3" length="37999160"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dr. Alana Maurushat is Professor of Cybersecurity and Behaviour at Western Sydney University where she holds a joint position in the School of Computer Science & Mathematics, and in the School of Social Sciences and Criminology, and is Key Researcher with the CRC Smart Satellites. She is currently researching on Payment Diversion Fraud and Ransomware, Tracking Money-Laundering through Bitcoin Blenders, distributed extreme edge computing for micro-clustered satellites, and Ethical Hacking. She previously was Senior Lecturer in Law, Key Researcher on the CRC Data to Decisions – Big Data in National Security, and Senior Fellow with the Australian CyberSecurity Centre for Research and Education all at UNSW. She is the Cyber-Ambassador for the NSW Cybersecurity Network. She is on the Board of Directors for the cybercrime investigation company IFW Global. She lectures & researches in Cybersecurity, Privacy and Security by Design, Cyber Risk Management, and Artificial Intelligence across the disciplines of law, criminology, business, political science and information communications technology. Alana has done consultancy work on cyber security, open data, big data, technology and civil liberties for both the Australian and Canadian governments, industry and NGOs. Alana has done media with 60 Minutes, the New York Time, Insight, ABC, and 730 Report, and is the author of many books and articles.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/251294/1700181113-KBKAST-Episode-44-Dr-Alana-Maurushat.jpg"></itunes:image>
                                                                            <itunes:duration>00:52:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 43: Dan Graves]]>
                </title>
                <pubDate>Fri, 18 Sep 2020 13:30:37 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-43-dan-graves</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-43-dan-graves</link>
                                <description>
                                            <![CDATA[<p>Daniel Graves is currently Chief Technology Officer at Delphix, responsible for strategy technology partnerships including AWS, GCP, IBM, Oracle, SAP and Microsoft. Graves is a software and cloud industry veteran of over 20 years with a diverse background in other functions including technology partnerships, business development, marketing, CTO, sales management, program management, presales, and as a developer.</p>
<p>At Delphix Graves assists with defining the overall partner and alliance strategy, and hiring and managing the team of business development, channel sales, and technical partner development staff. Previously at Delphix, Daniel built the Product organization from the ground up, including Product Management, Product Marketing, Program Management, and Delphix Labs. Prior to Delphix, Graves served as Cloud CTO at Symantec, leading technical and product strategy for the Cloud.</p>
<p>Over his career, he has led product groups at a variety of leading technology firms including NeXT / Apple, Sun Microsystems, NetDynamics, and Rockwell International’s AI labs. Graves has a Masters in Computer Engineering from Stanford University.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Daniel Graves is currently Chief Technology Officer at Delphix, responsible for strategy technology partnerships including AWS, GCP, IBM, Oracle, SAP and Microsoft. Graves is a software and cloud industry veteran of over 20 years with a diverse background in other functions including technology partnerships, business development, marketing, CTO, sales management, program management, presales, and as a developer.
At Delphix Graves assists with defining the overall partner and alliance strategy, and hiring and managing the team of business development, channel sales, and technical partner development staff. Previously at Delphix, Daniel built the Product organization from the ground up, including Product Management, Product Marketing, Program Management, and Delphix Labs. Prior to Delphix, Graves served as Cloud CTO at Symantec, leading technical and product strategy for the Cloud.
Over his career, he has led product groups at a variety of leading technology firms including NeXT / Apple, Sun Microsystems, NetDynamics, and Rockwell International’s AI labs. Graves has a Masters in Computer Engineering from Stanford University.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 43: Dan Graves]]>
                </itunes:title>
                                    <itunes:episode>43</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Daniel Graves is currently Chief Technology Officer at Delphix, responsible for strategy technology partnerships including AWS, GCP, IBM, Oracle, SAP and Microsoft. Graves is a software and cloud industry veteran of over 20 years with a diverse background in other functions including technology partnerships, business development, marketing, CTO, sales management, program management, presales, and as a developer.</p>
<p>At Delphix Graves assists with defining the overall partner and alliance strategy, and hiring and managing the team of business development, channel sales, and technical partner development staff. Previously at Delphix, Daniel built the Product organization from the ground up, including Product Management, Product Marketing, Program Management, and Delphix Labs. Prior to Delphix, Graves served as Cloud CTO at Symantec, leading technical and product strategy for the Cloud.</p>
<p>Over his career, he has led product groups at a variety of leading technology firms including NeXT / Apple, Sun Microsystems, NetDynamics, and Rockwell International’s AI labs. Graves has a Masters in Computer Engineering from Stanford University.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP43-KBKAST-Dan-Graves.mp3" length="31934602"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Daniel Graves is currently Chief Technology Officer at Delphix, responsible for strategy technology partnerships including AWS, GCP, IBM, Oracle, SAP and Microsoft. Graves is a software and cloud industry veteran of over 20 years with a diverse background in other functions including technology partnerships, business development, marketing, CTO, sales management, program management, presales, and as a developer.
At Delphix Graves assists with defining the overall partner and alliance strategy, and hiring and managing the team of business development, channel sales, and technical partner development staff. Previously at Delphix, Daniel built the Product organization from the ground up, including Product Management, Product Marketing, Program Management, and Delphix Labs. Prior to Delphix, Graves served as Cloud CTO at Symantec, leading technical and product strategy for the Cloud.
Over his career, he has led product groups at a variety of leading technology firms including NeXT / Apple, Sun Microsystems, NetDynamics, and Rockwell International’s AI labs. Graves has a Masters in Computer Engineering from Stanford University.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/242361/KBKAST-Episode-43-Dan-Graves.jpg"></itunes:image>
                                                                            <itunes:duration>00:44:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 42: Alice Almeida]]>
                </title>
                <pubDate>Thu, 10 Sep 2020 15:15:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-42-alice-almeida</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-42-alice-almeida</link>
                                <description>
                                            <![CDATA[<p>• Experienced Researcher – 20 years experience holding senior positions in research at Channel Nine, Seven Network, News Corp and Fairfax Media.<br />
• Held representative roles on the IAB Research and Measurement Councils, working on major industry projects.<br />
• Developed multiple market-first research pieces throughout my career; notably the Online Video Research and Mobile Internet Research, the first conducted<br />
in Australia, and research around Amazon entering the Australian market in 2017 which was picked up by major Australian publishers.<br />
• Presented my research and insight projects at over 60 conferences within APAC.<br />
• Strong knowledge of how research works; from understanding my client’s objectives, designing questionnaires to achieve complete results and interpreting<br />
those results into actionable insights.<br />
• A very strong profile with an excellent reputation within the industry as being passionate, knowledgeable and an industry expert.<br />
• Continuously invited to participate on panels, be interviewed on podcasts, write opinion and thought leadership pieces and to present at conferences.<br />
Highlight was being invited to participate in a panel discussion at SXSW in Austin, Texas and to provide evidence and insights at the senate inquiry into Public<br />
Interest Journalism in 2017.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[• Experienced Researcher – 20 years experience holding senior positions in research at Channel Nine, Seven Network, News Corp and Fairfax Media.
• Held representative roles on the IAB Research and Measurement Councils, working on major industry projects.
• Developed multiple market-first research pieces throughout my career; notably the Online Video Research and Mobile Internet Research, the first conducted
in Australia, and research around Amazon entering the Australian market in 2017 which was picked up by major Australian publishers.
• Presented my research and insight projects at over 60 conferences within APAC.
• Strong knowledge of how research works; from understanding my client’s objectives, designing questionnaires to achieve complete results and interpreting
those results into actionable insights.
• A very strong profile with an excellent reputation within the industry as being passionate, knowledgeable and an industry expert.
• Continuously invited to participate on panels, be interviewed on podcasts, write opinion and thought leadership pieces and to present at conferences.
Highlight was being invited to participate in a panel discussion at SXSW in Austin, Texas and to provide evidence and insights at the senate inquiry into Public
Interest Journalism in 2017.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 42: Alice Almeida]]>
                </itunes:title>
                                    <itunes:episode>42</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>• Experienced Researcher – 20 years experience holding senior positions in research at Channel Nine, Seven Network, News Corp and Fairfax Media.<br />
• Held representative roles on the IAB Research and Measurement Councils, working on major industry projects.<br />
• Developed multiple market-first research pieces throughout my career; notably the Online Video Research and Mobile Internet Research, the first conducted<br />
in Australia, and research around Amazon entering the Australian market in 2017 which was picked up by major Australian publishers.<br />
• Presented my research and insight projects at over 60 conferences within APAC.<br />
• Strong knowledge of how research works; from understanding my client’s objectives, designing questionnaires to achieve complete results and interpreting<br />
those results into actionable insights.<br />
• A very strong profile with an excellent reputation within the industry as being passionate, knowledgeable and an industry expert.<br />
• Continuously invited to participate on panels, be interviewed on podcasts, write opinion and thought leadership pieces and to present at conferences.<br />
Highlight was being invited to participate in a panel discussion at SXSW in Austin, Texas and to provide evidence and insights at the senate inquiry into Public<br />
Interest Journalism in 2017.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-EP42-Alice-Almeida.mp3" length="32669978"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[• Experienced Researcher – 20 years experience holding senior positions in research at Channel Nine, Seven Network, News Corp and Fairfax Media.
• Held representative roles on the IAB Research and Measurement Councils, working on major industry projects.
• Developed multiple market-first research pieces throughout my career; notably the Online Video Research and Mobile Internet Research, the first conducted
in Australia, and research around Amazon entering the Australian market in 2017 which was picked up by major Australian publishers.
• Presented my research and insight projects at over 60 conferences within APAC.
• Strong knowledge of how research works; from understanding my client’s objectives, designing questionnaires to achieve complete results and interpreting
those results into actionable insights.
• A very strong profile with an excellent reputation within the industry as being passionate, knowledgeable and an industry expert.
• Continuously invited to participate on panels, be interviewed on podcasts, write opinion and thought leadership pieces and to present at conferences.
Highlight was being invited to participate in a panel discussion at SXSW in Austin, Texas and to provide evidence and insights at the senate inquiry into Public
Interest Journalism in 2017.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/238800/1700181113-KBKAST-Episode-42-Alice-Almeida.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:18</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 41: Elias Manousos]]>
                </title>
                <pubDate>Fri, 04 Sep 2020 11:52:52 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-41-elias-manousos</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-41-elias-manousos</link>
                                <description>
                                            <![CDATA[<p>Co-Founder and Chief Executive Officer, RiskIQ, Elias Manousos is a security technology expert and experienced executive with over 20 years of delivering enterprise security solutions. Prior to co-founding RiskIQ, Elias was VP of R&amp;D at Securant Technologies (acquired by RSA), an Internet leader in authorization and single sign-on (SSO).</p>
<p>At Securant, he was instrumental in pioneering the now commonplace technologies providing increased browser security. Elias bootstrapped RiskIQ from zero to 100 employees and more than 100 customers in just 5 years. Today eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world rely on RiskIQ to protect their websites, mobile apps and customers from malware and fraud.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Co-Founder and Chief Executive Officer, RiskIQ, Elias Manousos is a security technology expert and experienced executive with over 20 years of delivering enterprise security solutions. Prior to co-founding RiskIQ, Elias was VP of R&D at Securant Technologies (acquired by RSA), an Internet leader in authorization and single sign-on (SSO).
At Securant, he was instrumental in pioneering the now commonplace technologies providing increased browser security. Elias bootstrapped RiskIQ from zero to 100 employees and more than 100 customers in just 5 years. Today eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world rely on RiskIQ to protect their websites, mobile apps and customers from malware and fraud.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 41: Elias Manousos]]>
                </itunes:title>
                                    <itunes:episode>41</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Co-Founder and Chief Executive Officer, RiskIQ, Elias Manousos is a security technology expert and experienced executive with over 20 years of delivering enterprise security solutions. Prior to co-founding RiskIQ, Elias was VP of R&amp;D at Securant Technologies (acquired by RSA), an Internet leader in authorization and single sign-on (SSO).</p>
<p>At Securant, he was instrumental in pioneering the now commonplace technologies providing increased browser security. Elias bootstrapped RiskIQ from zero to 100 employees and more than 100 customers in just 5 years. Today eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world rely on RiskIQ to protect their websites, mobile apps and customers from malware and fraud.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-EP41-Lou-Manousos.mp3" length="24877360"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Co-Founder and Chief Executive Officer, RiskIQ, Elias Manousos is a security technology expert and experienced executive with over 20 years of delivering enterprise security solutions. Prior to co-founding RiskIQ, Elias was VP of R&D at Securant Technologies (acquired by RSA), an Internet leader in authorization and single sign-on (SSO).
At Securant, he was instrumental in pioneering the now commonplace technologies providing increased browser security. Elias bootstrapped RiskIQ from zero to 100 employees and more than 100 customers in just 5 years. Today eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world rely on RiskIQ to protect their websites, mobile apps and customers from malware and fraud.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/237048/KBKAST-Episode-41-Elias-Manousos.jpg"></itunes:image>
                                                                            <itunes:duration>00:34:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 40: Nithin Thomas]]>
                </title>
                <pubDate>Wed, 26 Aug 2020 13:43:01 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-40-nithin-thomas</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-40-nithin-thomas</link>
                                <description>
                                            <![CDATA[<p>Nithin has scaled and led SQR Systems to design and deliver critical secure communications solutions for defence, national security and financial services on a global scale. His patented encryption technology is used in heavily regulated sectors.</p>
<p>He is an active contributor and thought leader in some of the world’s leading information security research and development communities and his contributions are featured in many high profile publications. He has been actively promoting simplicity in security and the need to consider user experience as a core part of security development.</p>
<p>Over the past 3 years, Nithin has established several research and commercial programmes in government, private sector and academia exploring emerging technologies to protect privacy from the threat of quantum computing.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Nithin has scaled and led SQR Systems to design and deliver critical secure communications solutions for defence, national security and financial services on a global scale. His patented encryption technology is used in heavily regulated sectors.
He is an active contributor and thought leader in some of the world’s leading information security research and development communities and his contributions are featured in many high profile publications. He has been actively promoting simplicity in security and the need to consider user experience as a core part of security development.
Over the past 3 years, Nithin has established several research and commercial programmes in government, private sector and academia exploring emerging technologies to protect privacy from the threat of quantum computing.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 40: Nithin Thomas]]>
                </itunes:title>
                                    <itunes:episode>40</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Nithin has scaled and led SQR Systems to design and deliver critical secure communications solutions for defence, national security and financial services on a global scale. His patented encryption technology is used in heavily regulated sectors.</p>
<p>He is an active contributor and thought leader in some of the world’s leading information security research and development communities and his contributions are featured in many high profile publications. He has been actively promoting simplicity in security and the need to consider user experience as a core part of security development.</p>
<p>Over the past 3 years, Nithin has established several research and commercial programmes in government, private sector and academia exploring emerging technologies to protect privacy from the threat of quantum computing.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP40-KBKast-Nithin-Thomas.mp3" length="29891008"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Nithin has scaled and led SQR Systems to design and deliver critical secure communications solutions for defence, national security and financial services on a global scale. His patented encryption technology is used in heavily regulated sectors.
He is an active contributor and thought leader in some of the world’s leading information security research and development communities and his contributions are featured in many high profile publications. He has been actively promoting simplicity in security and the need to consider user experience as a core part of security development.
Over the past 3 years, Nithin has established several research and commercial programmes in government, private sector and academia exploring emerging technologies to protect privacy from the threat of quantum computing.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/231698/1700181113-KBKAST-Episode-40-Nithin-Thomas.jpg"></itunes:image>
                                                                            <itunes:duration>00:41:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 39: Rinske Geerlings]]>
                </title>
                <pubDate>Wed, 19 Aug 2020 18:47:48 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-39-rinske-geerlings</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-39-rinske-geerlings</link>
                                <description>
                                            <![CDATA[<p>Rinske was awarded Risk Consultant of the Year by RMIA (2017), Outstanding Security Consultant Finalist in the OSPAs (2019) and BPW Business Woman of the Year (2010-2013). She is an internationally leading consultant, speaker and certified Business Continuity Planning (BCP), Information Security &amp; Risk Management trainer. Her firm, Business As Usual (BAU), since 2006, has worked with SMEs as well as prestigious clients such as 14 Central Banks and 100s of other public and private organisations worldwide. She draws on more than 20 years’ experience gained across Australasia, Africa, South America and Europe.</p>
<p>Rinske has been changing the way organisations ‘plan for the unexpected’. Her powerful facilitation skills enable organisations to prioritise, cut through information quickly and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCP, Security, Risk and Disaster Recovery… topics often perceived as dull and cumbersome.</p>
<p>Her alter ego includes being lead singer and manager of SophieG, which is involved in major music projects – including those contributing to the global charity Playing For Change, which provides music education to children in disadvantaged regions.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Rinske was awarded Risk Consultant of the Year by RMIA (2017), Outstanding Security Consultant Finalist in the OSPAs (2019) and BPW Business Woman of the Year (2010-2013). She is an internationally leading consultant, speaker and certified Business Continuity Planning (BCP), Information Security & Risk Management trainer. Her firm, Business As Usual (BAU), since 2006, has worked with SMEs as well as prestigious clients such as 14 Central Banks and 100s of other public and private organisations worldwide. She draws on more than 20 years’ experience gained across Australasia, Africa, South America and Europe.
Rinske has been changing the way organisations ‘plan for the unexpected’. Her powerful facilitation skills enable organisations to prioritise, cut through information quickly and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCP, Security, Risk and Disaster Recovery… topics often perceived as dull and cumbersome.
Her alter ego includes being lead singer and manager of SophieG, which is involved in major music projects – including those contributing to the global charity Playing For Change, which provides music education to children in disadvantaged regions.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 39: Rinske Geerlings]]>
                </itunes:title>
                                    <itunes:episode>39</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Rinske was awarded Risk Consultant of the Year by RMIA (2017), Outstanding Security Consultant Finalist in the OSPAs (2019) and BPW Business Woman of the Year (2010-2013). She is an internationally leading consultant, speaker and certified Business Continuity Planning (BCP), Information Security &amp; Risk Management trainer. Her firm, Business As Usual (BAU), since 2006, has worked with SMEs as well as prestigious clients such as 14 Central Banks and 100s of other public and private organisations worldwide. She draws on more than 20 years’ experience gained across Australasia, Africa, South America and Europe.</p>
<p>Rinske has been changing the way organisations ‘plan for the unexpected’. Her powerful facilitation skills enable organisations to prioritise, cut through information quickly and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCP, Security, Risk and Disaster Recovery… topics often perceived as dull and cumbersome.</p>
<p>Her alter ego includes being lead singer and manager of SophieG, which is involved in major music projects – including those contributing to the global charity Playing For Change, which provides music education to children in disadvantaged regions.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP39-Rinske-Geerlings-KBKast.mp3" length="36287734"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Rinske was awarded Risk Consultant of the Year by RMIA (2017), Outstanding Security Consultant Finalist in the OSPAs (2019) and BPW Business Woman of the Year (2010-2013). She is an internationally leading consultant, speaker and certified Business Continuity Planning (BCP), Information Security & Risk Management trainer. Her firm, Business As Usual (BAU), since 2006, has worked with SMEs as well as prestigious clients such as 14 Central Banks and 100s of other public and private organisations worldwide. She draws on more than 20 years’ experience gained across Australasia, Africa, South America and Europe.
Rinske has been changing the way organisations ‘plan for the unexpected’. Her powerful facilitation skills enable organisations to prioritise, cut through information quickly and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCP, Security, Risk and Disaster Recovery… topics often perceived as dull and cumbersome.
Her alter ego includes being lead singer and manager of SophieG, which is involved in major music projects – including those contributing to the global charity Playing For Change, which provides music education to children in disadvantaged regions.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/228672/KBKAST-Episode-39-Rinske-Geerlings.jpg"></itunes:image>
                                                                            <itunes:duration>00:50:20</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 38: Tanya Janca]]>
                </title>
                <pubDate>Thu, 23 Jul 2020 16:14:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-38-tanya-janca</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-38-tanya-janca</link>
                                <description>
                                            <![CDATA[<p>Tanya Janca, also known as ‘SheHacksPurple’, is the founder, security trainer and coach of SheHacksPurple.dev, specialising in software and cloud security. Her obsession with securing software runs deep, from starting her company, to running her own OWASP chapter for 4 years in Ottawa, co-founding a new OWASP chapter in Victoria, and co-founding the OWASP DevSlop open-source and education project.</p>
<p>With her countless blog articles, workshops and talks, her focus is clear. Tanya is also an advocate for diversity and inclusion, co-founding the international women’s organisation WoSEC, starting the online #CyberMentoringMonday initiative, and personally mentoring, advocating for and enabling countless other women in her field. As a professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Tanya Janca, also known as ‘SheHacksPurple’, is the founder, security trainer and coach of SheHacksPurple.dev, specialising in software and cloud security. Her obsession with securing software runs deep, from starting her company, to running her own OWASP chapter for 4 years in Ottawa, co-founding a new OWASP chapter in Victoria, and co-founding the OWASP DevSlop open-source and education project.
With her countless blog articles, workshops and talks, her focus is clear. Tanya is also an advocate for diversity and inclusion, co-founding the international women’s organisation WoSEC, starting the online #CyberMentoringMonday initiative, and personally mentoring, advocating for and enabling countless other women in her field. As a professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 38: Tanya Janca]]>
                </itunes:title>
                                    <itunes:episode>38</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Tanya Janca, also known as ‘SheHacksPurple’, is the founder, security trainer and coach of SheHacksPurple.dev, specialising in software and cloud security. Her obsession with securing software runs deep, from starting her company, to running her own OWASP chapter for 4 years in Ottawa, co-founding a new OWASP chapter in Victoria, and co-founding the OWASP DevSlop open-source and education project.</p>
<p>With her countless blog articles, workshops and talks, her focus is clear. Tanya is also an advocate for diversity and inclusion, co-founding the international women’s organisation WoSEC, starting the online #CyberMentoringMonday initiative, and personally mentoring, advocating for and enabling countless other women in her field. As a professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP38-Tanya-Janca-KBKast.mp3" length="40477239"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Tanya Janca, also known as ‘SheHacksPurple’, is the founder, security trainer and coach of SheHacksPurple.dev, specialising in software and cloud security. Her obsession with securing software runs deep, from starting her company, to running her own OWASP chapter for 4 years in Ottawa, co-founding a new OWASP chapter in Victoria, and co-founding the OWASP DevSlop open-source and education project.
With her countless blog articles, workshops and talks, her focus is clear. Tanya is also an advocate for diversity and inclusion, co-founding the international women’s organisation WoSEC, starting the online #CyberMentoringMonday initiative, and personally mentoring, advocating for and enabling countless other women in her field. As a professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/219119/1700181113-KBKAST-Episode-38-Tanya-Janca.jpg"></itunes:image>
                                                                            <itunes:duration>00:56:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 37: Chris Sant]]>
                </title>
                <pubDate>Wed, 15 Jul 2020 16:57:32 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-37-chris-sant</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-37-chris-sant</link>
                                <description>
                                            <![CDATA[<p>Christopher Sant is a Cyber Security leader who has been helping secure Australian organisations for the last 15 years. He has held various roles across Penetration testing, Privacy Compliance, Consulting, Security Operations, Risk Management and most recently focusing on Cyber Culture and Awareness. He is very passionate about using clear and simple messaging to make Cyber easily accessible to everyone, and describes his secret ninja skill as being able to cut through technical jargon to explain complex terms in ways that everyone can understand.</p>
<p>Chris has recently created a startup, ClearView Cyber Services, where he helps clients to build strong cyber cultures and get engagement at ALL levels of the organisation. His company’s focus is to strengthen businesses’ greatest asset in their Cyber defence; their people.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Christopher Sant is a Cyber Security leader who has been helping secure Australian organisations for the last 15 years. He has held various roles across Penetration testing, Privacy Compliance, Consulting, Security Operations, Risk Management and most recently focusing on Cyber Culture and Awareness. He is very passionate about using clear and simple messaging to make Cyber easily accessible to everyone, and describes his secret ninja skill as being able to cut through technical jargon to explain complex terms in ways that everyone can understand.
Chris has recently created a startup, ClearView Cyber Services, where he helps clients to build strong cyber cultures and get engagement at ALL levels of the organisation. His company’s focus is to strengthen businesses’ greatest asset in their Cyber defence; their people.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 37: Chris Sant]]>
                </itunes:title>
                                    <itunes:episode>37</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Christopher Sant is a Cyber Security leader who has been helping secure Australian organisations for the last 15 years. He has held various roles across Penetration testing, Privacy Compliance, Consulting, Security Operations, Risk Management and most recently focusing on Cyber Culture and Awareness. He is very passionate about using clear and simple messaging to make Cyber easily accessible to everyone, and describes his secret ninja skill as being able to cut through technical jargon to explain complex terms in ways that everyone can understand.</p>
<p>Chris has recently created a startup, ClearView Cyber Services, where he helps clients to build strong cyber cultures and get engagement at ALL levels of the organisation. His company’s focus is to strengthen businesses’ greatest asset in their Cyber defence; their people.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP37-KBKast-Chris-Sant.mp3" length="29439393"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Christopher Sant is a Cyber Security leader who has been helping secure Australian organisations for the last 15 years. He has held various roles across Penetration testing, Privacy Compliance, Consulting, Security Operations, Risk Management and most recently focusing on Cyber Culture and Awareness. He is very passionate about using clear and simple messaging to make Cyber easily accessible to everyone, and describes his secret ninja skill as being able to cut through technical jargon to explain complex terms in ways that everyone can understand.
Chris has recently created a startup, ClearView Cyber Services, where he helps clients to build strong cyber cultures and get engagement at ALL levels of the organisation. His company’s focus is to strengthen businesses’ greatest asset in their Cyber defence; their people.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/215109/KBKAST-Episode-37-Chris-Sant.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 36: Clint Marsden]]>
                </title>
                <pubDate>Thu, 09 Jul 2020 15:01:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-36-clint-marsden</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-36-clint-marsden</link>
                                <description>
                                            <![CDATA[<p>Clint started his career in Microsoft level 1 support at the age of 16 in 2003. Since that time he has held helpdesk &amp; server administrator roles with the past 7 years focusing on Cyber Security, Digital Forensics and Incident Response. He believes in continuing education, sharing knowledge with peers and providing mentoring to people interested in starting out in Cyber\, or pursuing goals within their existing Cyber career.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Clint started his career in Microsoft level 1 support at the age of 16 in 2003. Since that time he has held helpdesk & server administrator roles with the past 7 years focusing on Cyber Security, Digital Forensics and Incident Response. He believes in continuing education, sharing knowledge with peers and providing mentoring to people interested in starting out in Cyber\, or pursuing goals within their existing Cyber career.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 36: Clint Marsden]]>
                </itunes:title>
                                    <itunes:episode>36</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Clint started his career in Microsoft level 1 support at the age of 16 in 2003. Since that time he has held helpdesk &amp; server administrator roles with the past 7 years focusing on Cyber Security, Digital Forensics and Incident Response. He believes in continuing education, sharing knowledge with peers and providing mentoring to people interested in starting out in Cyber\, or pursuing goals within their existing Cyber career.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP36-CMarsden-mixdown.mp3" length="26946498"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Clint started his career in Microsoft level 1 support at the age of 16 in 2003. Since that time he has held helpdesk & server administrator roles with the past 7 years focusing on Cyber Security, Digital Forensics and Incident Response. He believes in continuing education, sharing knowledge with peers and providing mentoring to people interested in starting out in Cyber\, or pursuing goals within their existing Cyber career.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/212663/1700181114-KBKAST-Episode-36-Clint-Marsden.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 35: David Chou]]>
                </title>
                <pubDate>Wed, 01 Jul 2020 12:13:37 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-35-david-chou</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-35-david-chou</link>
                                <description>
                                            <![CDATA[<p>David Chou is the SVP, Chief Information Officer for a fully integrated healthcare system in the United States. Previously, Chou advised many different Fortune 500 technology solution companies while also serving as the CIO for an international life science company with 50+ sites throughout Australia, Singapore, and China. Chou has held executive roles with the Cleveland Clinic Abu Dhabi, Children’s Mercy Hospital, University Of Mississippi Medical Center, AHMC Healthcare, and Prime Healthcare.</p>
<p>David is a dynamic keynote speaker and industry commentator working with clients to transform their business models using technology. He has spoken around the world at healthcare tech-related conference including keynotes for leading industry events and intimate executive settings. Chou is also one of the most mentioned CIOs in the media and well quoted in outlets such as the Wall Street Journal, Modern Healthcare, HIMSS Media, ZDNet, <a href="https://cio.com/" target="_blank" rel="noreferrer noopener">CIO.com</a>, Huffington Post, and Becker’s Healthcare. David is an active member of both ACHE and HIMSS while serving on the board for CHIM.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[David Chou is the SVP, Chief Information Officer for a fully integrated healthcare system in the United States. Previously, Chou advised many different Fortune 500 technology solution companies while also serving as the CIO for an international life science company with 50+ sites throughout Australia, Singapore, and China. Chou has held executive roles with the Cleveland Clinic Abu Dhabi, Children’s Mercy Hospital, University Of Mississippi Medical Center, AHMC Healthcare, and Prime Healthcare.
David is a dynamic keynote speaker and industry commentator working with clients to transform their business models using technology. He has spoken around the world at healthcare tech-related conference including keynotes for leading industry events and intimate executive settings. Chou is also one of the most mentioned CIOs in the media and well quoted in outlets such as the Wall Street Journal, Modern Healthcare, HIMSS Media, ZDNet, CIO.com, Huffington Post, and Becker’s Healthcare. David is an active member of both ACHE and HIMSS while serving on the board for CHIM.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 35: David Chou]]>
                </itunes:title>
                                    <itunes:episode>35</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>David Chou is the SVP, Chief Information Officer for a fully integrated healthcare system in the United States. Previously, Chou advised many different Fortune 500 technology solution companies while also serving as the CIO for an international life science company with 50+ sites throughout Australia, Singapore, and China. Chou has held executive roles with the Cleveland Clinic Abu Dhabi, Children’s Mercy Hospital, University Of Mississippi Medical Center, AHMC Healthcare, and Prime Healthcare.</p>
<p>David is a dynamic keynote speaker and industry commentator working with clients to transform their business models using technology. He has spoken around the world at healthcare tech-related conference including keynotes for leading industry events and intimate executive settings. Chou is also one of the most mentioned CIOs in the media and well quoted in outlets such as the Wall Street Journal, Modern Healthcare, HIMSS Media, ZDNet, <a href="https://cio.com/" target="_blank" rel="noreferrer noopener">CIO.com</a>, Huffington Post, and Becker’s Healthcare. David is an active member of both ACHE and HIMSS while serving on the board for CHIM.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP35-David-Chou-KBKast.mp3" length="26946006"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[David Chou is the SVP, Chief Information Officer for a fully integrated healthcare system in the United States. Previously, Chou advised many different Fortune 500 technology solution companies while also serving as the CIO for an international life science company with 50+ sites throughout Australia, Singapore, and China. Chou has held executive roles with the Cleveland Clinic Abu Dhabi, Children’s Mercy Hospital, University Of Mississippi Medical Center, AHMC Healthcare, and Prime Healthcare.
David is a dynamic keynote speaker and industry commentator working with clients to transform their business models using technology. He has spoken around the world at healthcare tech-related conference including keynotes for leading industry events and intimate executive settings. Chou is also one of the most mentioned CIOs in the media and well quoted in outlets such as the Wall Street Journal, Modern Healthcare, HIMSS Media, ZDNet, CIO.com, Huffington Post, and Becker’s Healthcare. David is an active member of both ACHE and HIMSS while serving on the board for CHIM.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/209682/KBKAST-Episode-35-David-Chou.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 34: Lee Kagan]]>
                </title>
                <pubDate>Thu, 25 Jun 2020 17:53:06 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-34-lee-kagan</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-34-lee-kagan</link>
                                <description>
                                            <![CDATA[<p>Based in Toronto, Canada, Lee has been in the information security space since 2010. Working and consulting in various industries from financial, manufacturing, national services and government, Lee currently works as:</p>
<p>· Director, Adversarial Collaboration with Lares</p>
<p>· Co-founder of RedBlack Security – Toronto-based offensive security testing shop</p>
<p>Lee also is involved with initiatives such as:</p>
<p>· Co-founder of the Canadian Collegiate Cyber Exercise (C3X) – <a href="https://thec3x.com/" target="_blank" rel="noreferrer noopener">thec3x.com</a></p>
<p>· Organizer of DerbyCon Communities Toronto Chapter (DerbyComTOR)</p>
<p>· Instructor for the Offensive Insights for Security Professionals (OISP) training program (launching Q1 2020)</p>
<p>Lees area of expertise is tailored primarily around Microsoft technologies and the abuses for them. Lee is also a Command and Control (C2) designer and infrastructure maintainer for offensive teams.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Based in Toronto, Canada, Lee has been in the information security space since 2010. Working and consulting in various industries from financial, manufacturing, national services and government, Lee currently works as:
· Director, Adversarial Collaboration with Lares
· Co-founder of RedBlack Security – Toronto-based offensive security testing shop
Lee also is involved with initiatives such as:
· Co-founder of the Canadian Collegiate Cyber Exercise (C3X) – thec3x.com
· Organizer of DerbyCon Communities Toronto Chapter (DerbyComTOR)
· Instructor for the Offensive Insights for Security Professionals (OISP) training program (launching Q1 2020)
Lees area of expertise is tailored primarily around Microsoft technologies and the abuses for them. Lee is also a Command and Control (C2) designer and infrastructure maintainer for offensive teams.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 34: Lee Kagan]]>
                </itunes:title>
                                    <itunes:episode>34</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Based in Toronto, Canada, Lee has been in the information security space since 2010. Working and consulting in various industries from financial, manufacturing, national services and government, Lee currently works as:</p>
<p>· Director, Adversarial Collaboration with Lares</p>
<p>· Co-founder of RedBlack Security – Toronto-based offensive security testing shop</p>
<p>Lee also is involved with initiatives such as:</p>
<p>· Co-founder of the Canadian Collegiate Cyber Exercise (C3X) – <a href="https://thec3x.com/" target="_blank" rel="noreferrer noopener">thec3x.com</a></p>
<p>· Organizer of DerbyCon Communities Toronto Chapter (DerbyComTOR)</p>
<p>· Instructor for the Offensive Insights for Security Professionals (OISP) training program (launching Q1 2020)</p>
<p>Lees area of expertise is tailored primarily around Microsoft technologies and the abuses for them. Lee is also a Command and Control (C2) designer and infrastructure maintainer for offensive teams.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP34-Lee-Kagan.mp3" length="28187649"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Based in Toronto, Canada, Lee has been in the information security space since 2010. Working and consulting in various industries from financial, manufacturing, national services and government, Lee currently works as:
· Director, Adversarial Collaboration with Lares
· Co-founder of RedBlack Security – Toronto-based offensive security testing shop
Lee also is involved with initiatives such as:
· Co-founder of the Canadian Collegiate Cyber Exercise (C3X) – thec3x.com
· Organizer of DerbyCon Communities Toronto Chapter (DerbyComTOR)
· Instructor for the Offensive Insights for Security Professionals (OISP) training program (launching Q1 2020)
Lees area of expertise is tailored primarily around Microsoft technologies and the abuses for them. Lee is also a Command and Control (C2) designer and infrastructure maintainer for offensive teams.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/207531/1700181115-KBKAST-Episode-34-Lee-Kagan.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 33: Jen Willmer]]>
                </title>
                <pubDate>Wed, 10 Jun 2020 18:29:05 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-33-jen-willmer</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-33-jen-willmer</link>
                                <description>
                                            <![CDATA[<p>Jen has extensive experience and expertise in Corporate and Commercial Law, and Cyber Security and IT, with a background in Dispute Resolution and Litigation.</p>
<p>From a corporate and commercial perspective, Jen has worked on numerous transactions, ranging from restructures to large complex multi-million dollar cross-border M&amp;A deals. She works with businesses at all sizes, ranging from small family-owned businesses and private companies to ASX-listed companies. Jen also assists with all legal aspects of running a business, from structuring, capital raising, to daily operations, directors’ duties, risk management, corporate governance, and compliance with regulatory requirements.</p>
<p>In terms of cyber security, Jen assists companies to prepare for data breaches by drafting data breach response plans and pre-drafted notification statements, and guiding them through the relevant steps to comply with their legal obligations and manage their crisis communication to regulators, counterparties, customers and other stakeholders.  Jen also works with companies to draft relevant cyber security and privacy contracts, drafting policies, and advising on compliance requirements.</p>
<p>Jen regularly works with cyber security companies to assist them with establishing their own business, drafting terms and conditions and contracts with their clients, and managing their own risk and potential liability in providing their security products and services to clients.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jen has extensive experience and expertise in Corporate and Commercial Law, and Cyber Security and IT, with a background in Dispute Resolution and Litigation.
From a corporate and commercial perspective, Jen has worked on numerous transactions, ranging from restructures to large complex multi-million dollar cross-border M&A deals. She works with businesses at all sizes, ranging from small family-owned businesses and private companies to ASX-listed companies. Jen also assists with all legal aspects of running a business, from structuring, capital raising, to daily operations, directors’ duties, risk management, corporate governance, and compliance with regulatory requirements.
In terms of cyber security, Jen assists companies to prepare for data breaches by drafting data breach response plans and pre-drafted notification statements, and guiding them through the relevant steps to comply with their legal obligations and manage their crisis communication to regulators, counterparties, customers and other stakeholders.  Jen also works with companies to draft relevant cyber security and privacy contracts, drafting policies, and advising on compliance requirements.
Jen regularly works with cyber security companies to assist them with establishing their own business, drafting terms and conditions and contracts with their clients, and managing their own risk and potential liability in providing their security products and services to clients.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 33: Jen Willmer]]>
                </itunes:title>
                                    <itunes:episode>33</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jen has extensive experience and expertise in Corporate and Commercial Law, and Cyber Security and IT, with a background in Dispute Resolution and Litigation.</p>
<p>From a corporate and commercial perspective, Jen has worked on numerous transactions, ranging from restructures to large complex multi-million dollar cross-border M&amp;A deals. She works with businesses at all sizes, ranging from small family-owned businesses and private companies to ASX-listed companies. Jen also assists with all legal aspects of running a business, from structuring, capital raising, to daily operations, directors’ duties, risk management, corporate governance, and compliance with regulatory requirements.</p>
<p>In terms of cyber security, Jen assists companies to prepare for data breaches by drafting data breach response plans and pre-drafted notification statements, and guiding them through the relevant steps to comply with their legal obligations and manage their crisis communication to regulators, counterparties, customers and other stakeholders.  Jen also works with companies to draft relevant cyber security and privacy contracts, drafting policies, and advising on compliance requirements.</p>
<p>Jen regularly works with cyber security companies to assist them with establishing their own business, drafting terms and conditions and contracts with their clients, and managing their own risk and potential liability in providing their security products and services to clients.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP33-Jen-Willmer-KBKast.mp3" length="22837696"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jen has extensive experience and expertise in Corporate and Commercial Law, and Cyber Security and IT, with a background in Dispute Resolution and Litigation.
From a corporate and commercial perspective, Jen has worked on numerous transactions, ranging from restructures to large complex multi-million dollar cross-border M&A deals. She works with businesses at all sizes, ranging from small family-owned businesses and private companies to ASX-listed companies. Jen also assists with all legal aspects of running a business, from structuring, capital raising, to daily operations, directors’ duties, risk management, corporate governance, and compliance with regulatory requirements.
In terms of cyber security, Jen assists companies to prepare for data breaches by drafting data breach response plans and pre-drafted notification statements, and guiding them through the relevant steps to comply with their legal obligations and manage their crisis communication to regulators, counterparties, customers and other stakeholders.  Jen also works with companies to draft relevant cyber security and privacy contracts, drafting policies, and advising on compliance requirements.
Jen regularly works with cyber security companies to assist them with establishing their own business, drafting terms and conditions and contracts with their clients, and managing their own risk and potential liability in providing their security products and services to clients.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/202869/KBKAST-Episode-33-Jen-Willmer.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 32: Mitchell Parker]]>
                </title>
                <pubDate>Thu, 04 Jun 2020 12:42:34 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-32-mitchell-parker</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-32-mitchell-parker</link>
                                <description>
                                            <![CDATA[<p>Mitchell Parker, CISSP, is the Executive Director of Information Security and Compliance at IU Health. Mitch has done a significant amount of work in researching the effects of cloud and distributed computing, network-based threats, compliance, and privacy and security requirements on connected health devices. Mitch works collaboratively with a number of EMR and biomedical equipment vendors to improve their security postures and provide a better quality of service. He currently resides in Carmel, IN, with his wife, two children, and two cats.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Mitchell Parker, CISSP, is the Executive Director of Information Security and Compliance at IU Health. Mitch has done a significant amount of work in researching the effects of cloud and distributed computing, network-based threats, compliance, and privacy and security requirements on connected health devices. Mitch works collaboratively with a number of EMR and biomedical equipment vendors to improve their security postures and provide a better quality of service. He currently resides in Carmel, IN, with his wife, two children, and two cats.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 32: Mitchell Parker]]>
                </itunes:title>
                                    <itunes:episode>32</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Mitchell Parker, CISSP, is the Executive Director of Information Security and Compliance at IU Health. Mitch has done a significant amount of work in researching the effects of cloud and distributed computing, network-based threats, compliance, and privacy and security requirements on connected health devices. Mitch works collaboratively with a number of EMR and biomedical equipment vendors to improve their security postures and provide a better quality of service. He currently resides in Carmel, IN, with his wife, two children, and two cats.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP32-MitchParker-mixdown.mp3" length="26149856"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Mitchell Parker, CISSP, is the Executive Director of Information Security and Compliance at IU Health. Mitch has done a significant amount of work in researching the effects of cloud and distributed computing, network-based threats, compliance, and privacy and security requirements on connected health devices. Mitch works collaboratively with a number of EMR and biomedical equipment vendors to improve their security postures and provide a better quality of service. He currently resides in Carmel, IN, with his wife, two children, and two cats.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/201089/1700181115-KBKAST-Episode-32-Mitchell-Parker.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:15</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 31: Rafael Chiang]]>
                </title>
                <pubDate>Fri, 22 May 2020 15:58:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-31-rafael-chiang</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-31-rafael-chiang</link>
                                <description>
                                            <![CDATA[<p>Rafael Chiang is a skilled information security strategic leader, having worked in the information security industry for a variety of multinational and global organisations, for more than 20 years’. Dedicated to supporting and sustaining business growth through brand and value protection, Rafael’s specialty is communicating and collaborating at all organisational levels, creating tailored security cultures and experiences. Aside from spending time with his family, Rafael’s interests are learning and communication methods, meditation, neuroscience and psychosensory therapies.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Rafael Chiang is a skilled information security strategic leader, having worked in the information security industry for a variety of multinational and global organisations, for more than 20 years’. Dedicated to supporting and sustaining business growth through brand and value protection, Rafael’s specialty is communicating and collaborating at all organisational levels, creating tailored security cultures and experiences. Aside from spending time with his family, Rafael’s interests are learning and communication methods, meditation, neuroscience and psychosensory therapies.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 31: Rafael Chiang]]>
                </itunes:title>
                                    <itunes:episode>31</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Rafael Chiang is a skilled information security strategic leader, having worked in the information security industry for a variety of multinational and global organisations, for more than 20 years’. Dedicated to supporting and sustaining business growth through brand and value protection, Rafael’s specialty is communicating and collaborating at all organisational levels, creating tailored security cultures and experiences. Aside from spending time with his family, Rafael’s interests are learning and communication methods, meditation, neuroscience and psychosensory therapies.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP31-RafaelChiang-mixdown.mp3" length="37879520"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Rafael Chiang is a skilled information security strategic leader, having worked in the information security industry for a variety of multinational and global organisations, for more than 20 years’. Dedicated to supporting and sustaining business growth through brand and value protection, Rafael’s specialty is communicating and collaborating at all organisational levels, creating tailored security cultures and experiences. Aside from spending time with his family, Rafael’s interests are learning and communication methods, meditation, neuroscience and psychosensory therapies.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/196449/KBKAST-Episode-31-Rafael-Chiang.jpg"></itunes:image>
                                                                            <itunes:duration>00:52:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 30: Greg van der Gaast]]>
                </title>
                <pubDate>Wed, 20 May 2020 15:22:07 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-30-greg-van-der-gaast</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-30-greg-van-der-gaast</link>
                                <description>
                                            <![CDATA[<p>Starting as a teenage hacker in the 1990’s, having been involved in the largest mass hack of the time and setting off an international incident after hacking into a nuclear weapons facility, Greg has over two decades of technical, management, and leadership experience in Information Security.</p>
<p>A frequent speaker about bringing leadership, visibility, care, and accountability to the Information Security field and breaking out of today’s reactive status quo, he is an expert in building efficient and effective InfoSec organisations by harnessing human potential and addressing the often cultural root causes within management, IT, and InfoSec itself.</p>
<p>He is currently the Head of Information Security at the University of Salford, a freelance security strategy advisor, guest lecturer, mentor, author, and creator of the UoS Information Security Leadership Programme.</p>
<p>As for the book, ‘<em>Rethinking InfoSec</em>‘ the review:</p>
<p>“If you are ready to make a fundamental change to the way you operate, that will save you money yet allow you to achieve so much more, this book is a must read!”</p>
<p><a target="_blank" rel="noreferrer noopener">-cybersecurity-professionals.com</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Starting as a teenage hacker in the 1990’s, having been involved in the largest mass hack of the time and setting off an international incident after hacking into a nuclear weapons facility, Greg has over two decades of technical, management, and leadership experience in Information Security.
A frequent speaker about bringing leadership, visibility, care, and accountability to the Information Security field and breaking out of today’s reactive status quo, he is an expert in building efficient and effective InfoSec organisations by harnessing human potential and addressing the often cultural root causes within management, IT, and InfoSec itself.
He is currently the Head of Information Security at the University of Salford, a freelance security strategy advisor, guest lecturer, mentor, author, and creator of the UoS Information Security Leadership Programme.
As for the book, ‘Rethinking InfoSec‘ the review:
“If you are ready to make a fundamental change to the way you operate, that will save you money yet allow you to achieve so much more, this book is a must read!”
-cybersecurity-professionals.com
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 30: Greg van der Gaast]]>
                </itunes:title>
                                    <itunes:episode>30</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Starting as a teenage hacker in the 1990’s, having been involved in the largest mass hack of the time and setting off an international incident after hacking into a nuclear weapons facility, Greg has over two decades of technical, management, and leadership experience in Information Security.</p>
<p>A frequent speaker about bringing leadership, visibility, care, and accountability to the Information Security field and breaking out of today’s reactive status quo, he is an expert in building efficient and effective InfoSec organisations by harnessing human potential and addressing the often cultural root causes within management, IT, and InfoSec itself.</p>
<p>He is currently the Head of Information Security at the University of Salford, a freelance security strategy advisor, guest lecturer, mentor, author, and creator of the UoS Information Security Leadership Programme.</p>
<p>As for the book, ‘<em>Rethinking InfoSec</em>‘ the review:</p>
<p>“If you are ready to make a fundamental change to the way you operate, that will save you money yet allow you to achieve so much more, this book is a must read!”</p>
<p><a target="_blank" rel="noreferrer noopener">-cybersecurity-professionals.com</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP30-GregVDG-mixdown.mp3" length="46922193"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Starting as a teenage hacker in the 1990’s, having been involved in the largest mass hack of the time and setting off an international incident after hacking into a nuclear weapons facility, Greg has over two decades of technical, management, and leadership experience in Information Security.
A frequent speaker about bringing leadership, visibility, care, and accountability to the Information Security field and breaking out of today’s reactive status quo, he is an expert in building efficient and effective InfoSec organisations by harnessing human potential and addressing the often cultural root causes within management, IT, and InfoSec itself.
He is currently the Head of Information Security at the University of Salford, a freelance security strategy advisor, guest lecturer, mentor, author, and creator of the UoS Information Security Leadership Programme.
As for the book, ‘Rethinking InfoSec‘ the review:
“If you are ready to make a fundamental change to the way you operate, that will save you money yet allow you to achieve so much more, this book is a must read!”
-cybersecurity-professionals.com
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/195345/1700181115-KBKAST-Episode-30-Greg-van-der-Sant.jpg"></itunes:image>
                                                                            <itunes:duration>01:05:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 29: Melissa Wingard]]>
                </title>
                <pubDate>Thu, 14 May 2020 18:06:44 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-29-melissa-wingard</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-29-melissa-wingard</link>
                                <description>
                                            <![CDATA[<p>Melissa Wingard is a senior commercial technology lawyer, with almost 15 years’ experience, assisting software, cybersecurity, and technology companies, across the Asia Pacific region, grow their business and meet strategic aims, whilst managing risk and regulatory compliance.</p>
<p>Melissa works as Special Counsel for Phillips Ormonde Fitzpatrick, a specialist IP firm. She has extensive experience in relation to commercialising intellectual property, information security, data protection and privacy across APAC. She holds an LLB (Hons), BA (Hist &amp; Eng), Grad Dip Applied Finance &amp; Investment and is presently studying a Masters of CyberSecurity Operations</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Melissa Wingard is a senior commercial technology lawyer, with almost 15 years’ experience, assisting software, cybersecurity, and technology companies, across the Asia Pacific region, grow their business and meet strategic aims, whilst managing risk and regulatory compliance.
Melissa works as Special Counsel for Phillips Ormonde Fitzpatrick, a specialist IP firm. She has extensive experience in relation to commercialising intellectual property, information security, data protection and privacy across APAC. She holds an LLB (Hons), BA (Hist & Eng), Grad Dip Applied Finance & Investment and is presently studying a Masters of CyberSecurity Operations
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 29: Melissa Wingard]]>
                </itunes:title>
                                    <itunes:episode>29</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Melissa Wingard is a senior commercial technology lawyer, with almost 15 years’ experience, assisting software, cybersecurity, and technology companies, across the Asia Pacific region, grow their business and meet strategic aims, whilst managing risk and regulatory compliance.</p>
<p>Melissa works as Special Counsel for Phillips Ormonde Fitzpatrick, a specialist IP firm. She has extensive experience in relation to commercialising intellectual property, information security, data protection and privacy across APAC. She holds an LLB (Hons), BA (Hist &amp; Eng), Grad Dip Applied Finance &amp; Investment and is presently studying a Masters of CyberSecurity Operations</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP29-MelissaWingard-mixdown.mp3" length="28046694"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Melissa Wingard is a senior commercial technology lawyer, with almost 15 years’ experience, assisting software, cybersecurity, and technology companies, across the Asia Pacific region, grow their business and meet strategic aims, whilst managing risk and regulatory compliance.
Melissa works as Special Counsel for Phillips Ormonde Fitzpatrick, a specialist IP firm. She has extensive experience in relation to commercialising intellectual property, information security, data protection and privacy across APAC. She holds an LLB (Hons), BA (Hist & Eng), Grad Dip Applied Finance & Investment and is presently studying a Masters of CyberSecurity Operations
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/193244/KBKAST-Episode-29-Melissa-Wingard.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 28: Matt Flannery]]>
                </title>
                <pubDate>Mon, 11 May 2020 19:42:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-28-matt-flannery</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-28-matt-flannery</link>
                                <description>
                                            <![CDATA[<p>Matthew is the founder of Ayenem (<a href="https://www.ayenem.com.au/" target="_blank" rel="noreferrer noopener">www.ayenem.com.au</a>), a DevSecOps consultancy and founder of DevSecOps Sydney meet up.</p>
<p>Matt gets a kick out of rapidly becoming an expert in new and emerging technologies and pushing past the limits. It might be the joy of winning or just seeing people’s face go oohhh that’s impressive that drives him but, either way he gets results quickly and enjoys mentoring and up-skilling others along the way.</p>
<p>Matt most recently comes from a background at Deloitte where he built out Defensive and Offensive Cloud Security and Security Automation tooling for the DevOps practice, quickly becoming a leader in the DevSecOps / DevOps space where he then went on to build a software engineering powerhouse for a Network Security company. He has delivered robust software delivery pipelines with security automation for FSI, FinTech and large Enterprise companies and is passionate about Security automation and moving away from traditional penetration testing towards an Agile Security Testing and Continuous Security methodology.</p>
<p>He has presented live technical demonstrations and talks on a range of topics such as AWS Security, Docker Security, Serverless Security, DevSecOps and Kubernetes at different Industry events and conferences.</p>
<p>Matt’s core technical skills lie within Cloud Architecture across the big 3 (AWS, Azure, GCP), Platform Development &amp; Engineering, Automation, Container Orchestration, DevOps, Information Security and is presently working with companies to introduce DevSecOps and embrace Continuous Security.</p>
<p>If you have questions for Matt or just want to chat DevSecOps look out for the next DevSecOps Sydney (<a href="https://www.meetup.com/en-AU/DevSecOps-Sydney/" target="_blank" rel="noreferrer noopener">https://www.meetup.com/en-AU/DevSecOps-Sydney/</a>) meetup.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Matthew is the founder of Ayenem (www.ayenem.com.au), a DevSecOps consultancy and founder of DevSecOps Sydney meet up.
Matt gets a kick out of rapidly becoming an expert in new and emerging technologies and pushing past the limits. It might be the joy of winning or just seeing people’s face go oohhh that’s impressive that drives him but, either way he gets results quickly and enjoys mentoring and up-skilling others along the way.
Matt most recently comes from a background at Deloitte where he built out Defensive and Offensive Cloud Security and Security Automation tooling for the DevOps practice, quickly becoming a leader in the DevSecOps / DevOps space where he then went on to build a software engineering powerhouse for a Network Security company. He has delivered robust software delivery pipelines with security automation for FSI, FinTech and large Enterprise companies and is passionate about Security automation and moving away from traditional penetration testing towards an Agile Security Testing and Continuous Security methodology.
He has presented live technical demonstrations and talks on a range of topics such as AWS Security, Docker Security, Serverless Security, DevSecOps and Kubernetes at different Industry events and conferences.
Matt’s core technical skills lie within Cloud Architecture across the big 3 (AWS, Azure, GCP), Platform Development & Engineering, Automation, Container Orchestration, DevOps, Information Security and is presently working with companies to introduce DevSecOps and embrace Continuous Security.
If you have questions for Matt or just want to chat DevSecOps look out for the next DevSecOps Sydney (https://www.meetup.com/en-AU/DevSecOps-Sydney/) meetup.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 28: Matt Flannery]]>
                </itunes:title>
                                    <itunes:episode>28</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Matthew is the founder of Ayenem (<a href="https://www.ayenem.com.au/" target="_blank" rel="noreferrer noopener">www.ayenem.com.au</a>), a DevSecOps consultancy and founder of DevSecOps Sydney meet up.</p>
<p>Matt gets a kick out of rapidly becoming an expert in new and emerging technologies and pushing past the limits. It might be the joy of winning or just seeing people’s face go oohhh that’s impressive that drives him but, either way he gets results quickly and enjoys mentoring and up-skilling others along the way.</p>
<p>Matt most recently comes from a background at Deloitte where he built out Defensive and Offensive Cloud Security and Security Automation tooling for the DevOps practice, quickly becoming a leader in the DevSecOps / DevOps space where he then went on to build a software engineering powerhouse for a Network Security company. He has delivered robust software delivery pipelines with security automation for FSI, FinTech and large Enterprise companies and is passionate about Security automation and moving away from traditional penetration testing towards an Agile Security Testing and Continuous Security methodology.</p>
<p>He has presented live technical demonstrations and talks on a range of topics such as AWS Security, Docker Security, Serverless Security, DevSecOps and Kubernetes at different Industry events and conferences.</p>
<p>Matt’s core technical skills lie within Cloud Architecture across the big 3 (AWS, Azure, GCP), Platform Development &amp; Engineering, Automation, Container Orchestration, DevOps, Information Security and is presently working with companies to introduce DevSecOps and embrace Continuous Security.</p>
<p>If you have questions for Matt or just want to chat DevSecOps look out for the next DevSecOps Sydney (<a href="https://www.meetup.com/en-AU/DevSecOps-Sydney/" target="_blank" rel="noreferrer noopener">https://www.meetup.com/en-AU/DevSecOps-Sydney/</a>) meetup.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP28-KBKast-Matt-Flannery.mp3" length="25903706"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Matthew is the founder of Ayenem (www.ayenem.com.au), a DevSecOps consultancy and founder of DevSecOps Sydney meet up.
Matt gets a kick out of rapidly becoming an expert in new and emerging technologies and pushing past the limits. It might be the joy of winning or just seeing people’s face go oohhh that’s impressive that drives him but, either way he gets results quickly and enjoys mentoring and up-skilling others along the way.
Matt most recently comes from a background at Deloitte where he built out Defensive and Offensive Cloud Security and Security Automation tooling for the DevOps practice, quickly becoming a leader in the DevSecOps / DevOps space where he then went on to build a software engineering powerhouse for a Network Security company. He has delivered robust software delivery pipelines with security automation for FSI, FinTech and large Enterprise companies and is passionate about Security automation and moving away from traditional penetration testing towards an Agile Security Testing and Continuous Security methodology.
He has presented live technical demonstrations and talks on a range of topics such as AWS Security, Docker Security, Serverless Security, DevSecOps and Kubernetes at different Industry events and conferences.
Matt’s core technical skills lie within Cloud Architecture across the big 3 (AWS, Azure, GCP), Platform Development & Engineering, Automation, Container Orchestration, DevOps, Information Security and is presently working with companies to introduce DevSecOps and embrace Continuous Security.
If you have questions for Matt or just want to chat DevSecOps look out for the next DevSecOps Sydney (https://www.meetup.com/en-AU/DevSecOps-Sydney/) meetup.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/192301/1700181116-KBKAST-Episode-28-Matt-Flannery.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 27: Laura Lees]]>
                </title>
                <pubDate>Tue, 05 May 2020 18:53:14 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-27-laura-lees</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-27-laura-lees</link>
                                <description>
                                            <![CDATA[<p>Laura was appointed the Head of Information Security role in April 2019 for a large Financial Services organisation that is head quartered in Sydney. She is responsible for Information Security strategy execution. security reviews, assessments, testing and control assurance, detailed design, security architecture and project review in the APAC region. Laura and her team work with the rest of the Information Security team to ensure effective security controls across the APAC region as well as globally.</p>
<p>Laura has over 20 years experience in the technology, security and risk management industries with a focus on financial services. Her roles have included senior security roles at one of Australia’s big 4 banking institutions and Australia/NZ’s largest general insurer. Outside of the Link Group Laura is well regarded in the security industry having performed many volunteer roles including the current treasurer of the Sydney Chapter for ISACA, a long term member of the AISA Sydney Branch Committee, and a foundational member of the Sydney Chapter committee for the FAIR institute.</p>
<p>Laura is also a member of the security workstream for the IOTAA. Laura holds an MBA from MGSM and a Bachelor of Science majoring in Computer Science from Macquarie University along with industry certifications such as CISSP, CISM and SABSA. Laura has been nominated for a number of industry awards including being the 2019 recipient of the Jo Stewart-Rattray award for Women in Leadership from ISACA International.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Laura was appointed the Head of Information Security role in April 2019 for a large Financial Services organisation that is head quartered in Sydney. She is responsible for Information Security strategy execution. security reviews, assessments, testing and control assurance, detailed design, security architecture and project review in the APAC region. Laura and her team work with the rest of the Information Security team to ensure effective security controls across the APAC region as well as globally.
Laura has over 20 years experience in the technology, security and risk management industries with a focus on financial services. Her roles have included senior security roles at one of Australia’s big 4 banking institutions and Australia/NZ’s largest general insurer. Outside of the Link Group Laura is well regarded in the security industry having performed many volunteer roles including the current treasurer of the Sydney Chapter for ISACA, a long term member of the AISA Sydney Branch Committee, and a foundational member of the Sydney Chapter committee for the FAIR institute.
Laura is also a member of the security workstream for the IOTAA. Laura holds an MBA from MGSM and a Bachelor of Science majoring in Computer Science from Macquarie University along with industry certifications such as CISSP, CISM and SABSA. Laura has been nominated for a number of industry awards including being the 2019 recipient of the Jo Stewart-Rattray award for Women in Leadership from ISACA International.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 27: Laura Lees]]>
                </itunes:title>
                                    <itunes:episode>27</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Laura was appointed the Head of Information Security role in April 2019 for a large Financial Services organisation that is head quartered in Sydney. She is responsible for Information Security strategy execution. security reviews, assessments, testing and control assurance, detailed design, security architecture and project review in the APAC region. Laura and her team work with the rest of the Information Security team to ensure effective security controls across the APAC region as well as globally.</p>
<p>Laura has over 20 years experience in the technology, security and risk management industries with a focus on financial services. Her roles have included senior security roles at one of Australia’s big 4 banking institutions and Australia/NZ’s largest general insurer. Outside of the Link Group Laura is well regarded in the security industry having performed many volunteer roles including the current treasurer of the Sydney Chapter for ISACA, a long term member of the AISA Sydney Branch Committee, and a foundational member of the Sydney Chapter committee for the FAIR institute.</p>
<p>Laura is also a member of the security workstream for the IOTAA. Laura holds an MBA from MGSM and a Bachelor of Science majoring in Computer Science from Macquarie University along with industry certifications such as CISSP, CISM and SABSA. Laura has been nominated for a number of industry awards including being the 2019 recipient of the Jo Stewart-Rattray award for Women in Leadership from ISACA International.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP27-LauraLees-mixdown.mp3" length="49689189"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Laura was appointed the Head of Information Security role in April 2019 for a large Financial Services organisation that is head quartered in Sydney. She is responsible for Information Security strategy execution. security reviews, assessments, testing and control assurance, detailed design, security architecture and project review in the APAC region. Laura and her team work with the rest of the Information Security team to ensure effective security controls across the APAC region as well as globally.
Laura has over 20 years experience in the technology, security and risk management industries with a focus on financial services. Her roles have included senior security roles at one of Australia’s big 4 banking institutions and Australia/NZ’s largest general insurer. Outside of the Link Group Laura is well regarded in the security industry having performed many volunteer roles including the current treasurer of the Sydney Chapter for ISACA, a long term member of the AISA Sydney Branch Committee, and a foundational member of the Sydney Chapter committee for the FAIR institute.
Laura is also a member of the security workstream for the IOTAA. Laura holds an MBA from MGSM and a Bachelor of Science majoring in Computer Science from Macquarie University along with industry certifications such as CISSP, CISM and SABSA. Laura has been nominated for a number of industry awards including being the 2019 recipient of the Jo Stewart-Rattray award for Women in Leadership from ISACA International.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/189807/1700181116-KBKAST-Episode-27-Laura-Lees.jpg"></itunes:image>
                                                                            <itunes:duration>00:34:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 26: Tony Vizza]]>
                </title>
                <pubDate>Mon, 27 Apr 2020 13:42:17 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-26-tony-vizza</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-26-tony-vizza</link>
                                <description>
                                            <![CDATA[<p>Tony Vizza has been involved in the information technology and information security fields for more than 25 years.</p>
<p>Tony completed a Bachelor of Science in Computing Science from the University of Technology, Sydney, Global Executive MBA from the University of Sydney which included study at Stanford University, The London School of Economics and the Indian Institute of Management, Bangalore. He is currently studying for a Juris Doctor degree at the University of New South Wales.</p>
<p>His information security credentials include CISSP (Certified Information Systems Security Professional), CCSP (Certified Cloud Security Professional), CRISC (Certified in Risk and Information Systems Controls), CISM (Certified Information Security Manager) and he is a certified ISO/IEC 27001 Senior Lead Auditor.</p>
<p>Tony is a member of the board of directors for the Australian Information Security Association (AISA), Cyber Security Ambassador for the NSW Government, a member of the Cybersecurity Industry Advisory Committee for the NSW Government, a member of the Technology and Business Services Industry Skills Reference Group for NSW TAFE, a member of the Data Security Standards Committee for Blockchain Australia and has provided expert services to the Australian Government’s Australian Prudential Regulation Authority (APRA), the Law Society of NSW, the Australian Security Industry Association Limited (ASIAL) as well as numerous boards.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Tony Vizza has been involved in the information technology and information security fields for more than 25 years.
Tony completed a Bachelor of Science in Computing Science from the University of Technology, Sydney, Global Executive MBA from the University of Sydney which included study at Stanford University, The London School of Economics and the Indian Institute of Management, Bangalore. He is currently studying for a Juris Doctor degree at the University of New South Wales.
His information security credentials include CISSP (Certified Information Systems Security Professional), CCSP (Certified Cloud Security Professional), CRISC (Certified in Risk and Information Systems Controls), CISM (Certified Information Security Manager) and he is a certified ISO/IEC 27001 Senior Lead Auditor.
Tony is a member of the board of directors for the Australian Information Security Association (AISA), Cyber Security Ambassador for the NSW Government, a member of the Cybersecurity Industry Advisory Committee for the NSW Government, a member of the Technology and Business Services Industry Skills Reference Group for NSW TAFE, a member of the Data Security Standards Committee for Blockchain Australia and has provided expert services to the Australian Government’s Australian Prudential Regulation Authority (APRA), the Law Society of NSW, the Australian Security Industry Association Limited (ASIAL) as well as numerous boards.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 26: Tony Vizza]]>
                </itunes:title>
                                    <itunes:episode>26</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Tony Vizza has been involved in the information technology and information security fields for more than 25 years.</p>
<p>Tony completed a Bachelor of Science in Computing Science from the University of Technology, Sydney, Global Executive MBA from the University of Sydney which included study at Stanford University, The London School of Economics and the Indian Institute of Management, Bangalore. He is currently studying for a Juris Doctor degree at the University of New South Wales.</p>
<p>His information security credentials include CISSP (Certified Information Systems Security Professional), CCSP (Certified Cloud Security Professional), CRISC (Certified in Risk and Information Systems Controls), CISM (Certified Information Security Manager) and he is a certified ISO/IEC 27001 Senior Lead Auditor.</p>
<p>Tony is a member of the board of directors for the Australian Information Security Association (AISA), Cyber Security Ambassador for the NSW Government, a member of the Cybersecurity Industry Advisory Committee for the NSW Government, a member of the Technology and Business Services Industry Skills Reference Group for NSW TAFE, a member of the Data Security Standards Committee for Blockchain Australia and has provided expert services to the Australian Government’s Australian Prudential Regulation Authority (APRA), the Law Society of NSW, the Australian Security Industry Association Limited (ASIAL) as well as numerous boards.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP26-Tony-Vizza.mp3" length="37900121"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Tony Vizza has been involved in the information technology and information security fields for more than 25 years.
Tony completed a Bachelor of Science in Computing Science from the University of Technology, Sydney, Global Executive MBA from the University of Sydney which included study at Stanford University, The London School of Economics and the Indian Institute of Management, Bangalore. He is currently studying for a Juris Doctor degree at the University of New South Wales.
His information security credentials include CISSP (Certified Information Systems Security Professional), CCSP (Certified Cloud Security Professional), CRISC (Certified in Risk and Information Systems Controls), CISM (Certified Information Security Manager) and he is a certified ISO/IEC 27001 Senior Lead Auditor.
Tony is a member of the board of directors for the Australian Information Security Association (AISA), Cyber Security Ambassador for the NSW Government, a member of the Cybersecurity Industry Advisory Committee for the NSW Government, a member of the Technology and Business Services Industry Skills Reference Group for NSW TAFE, a member of the Data Security Standards Committee for Blockchain Australia and has provided expert services to the Australian Government’s Australian Prudential Regulation Authority (APRA), the Law Society of NSW, the Australian Security Industry Association Limited (ASIAL) as well as numerous boards.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/186549/KBKAST-Episode-26-Tony-Vizza.jpg"></itunes:image>
                                                                            <itunes:duration>00:26:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 25: Cat Coode]]>
                </title>
                <pubDate>Mon, 20 Apr 2020 18:44:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-25-cat-coode</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-25-cat-coode</link>
                                <description>
                                            <![CDATA[<p>Cat Coode is the founder of Binary Tattoo. Binary, for the language of all things digital. Tattoo, for the permanence of what goes online. Her mission is to help you safeguard your data and protect your digital identity. Backed by two decades of experience in mobile development and software architecture, as well as a certification in data privacy law, Cat helps corporations and individuals better understand cybersecurity and data privacy. She specializes in guiding companies through end-to-end Global Privacy Regulation compliance and delivering privacy education seminars.</p>
<p>Cat is an engineer, speaker, consultant, author, and, above all else, a parent. Her motivation to help others was born out of her concern for her kids and our ever-changing digital landscape.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Cat Coode is the founder of Binary Tattoo. Binary, for the language of all things digital. Tattoo, for the permanence of what goes online. Her mission is to help you safeguard your data and protect your digital identity. Backed by two decades of experience in mobile development and software architecture, as well as a certification in data privacy law, Cat helps corporations and individuals better understand cybersecurity and data privacy. She specializes in guiding companies through end-to-end Global Privacy Regulation compliance and delivering privacy education seminars.
Cat is an engineer, speaker, consultant, author, and, above all else, a parent. Her motivation to help others was born out of her concern for her kids and our ever-changing digital landscape.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 25: Cat Coode]]>
                </itunes:title>
                                    <itunes:episode>25</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Cat Coode is the founder of Binary Tattoo. Binary, for the language of all things digital. Tattoo, for the permanence of what goes online. Her mission is to help you safeguard your data and protect your digital identity. Backed by two decades of experience in mobile development and software architecture, as well as a certification in data privacy law, Cat helps corporations and individuals better understand cybersecurity and data privacy. She specializes in guiding companies through end-to-end Global Privacy Regulation compliance and delivering privacy education seminars.</p>
<p>Cat is an engineer, speaker, consultant, author, and, above all else, a parent. Her motivation to help others was born out of her concern for her kids and our ever-changing digital landscape.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/EP25-Cat-BinaryTattoo-mixdown.mp3" length="24338598"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Cat Coode is the founder of Binary Tattoo. Binary, for the language of all things digital. Tattoo, for the permanence of what goes online. Her mission is to help you safeguard your data and protect your digital identity. Backed by two decades of experience in mobile development and software architecture, as well as a certification in data privacy law, Cat helps corporations and individuals better understand cybersecurity and data privacy. She specializes in guiding companies through end-to-end Global Privacy Regulation compliance and delivering privacy education seminars.
Cat is an engineer, speaker, consultant, author, and, above all else, a parent. Her motivation to help others was born out of her concern for her kids and our ever-changing digital landscape.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/177097/1700181116-KBKAST-Episode-25-Car-Coode.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 24: Paul Heaton]]>
                </title>
                <pubDate>Wed, 15 Apr 2020 18:00:14 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-24-paul-heaton</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-24-paul-heaton</link>
                                <description>
                                            <![CDATA[<p>As an innovative and results-driven senior IT professional with 20 years in the field, Paul has gained extensive cross-industry experience in senior management roles within global teams across the Asia Pacific, multinational organisations, and Australian Government, including Telstra, IBM, Westpac, CBA, Qantas, and both Federal and State Government agencies.</p>
<p>Paul has a proven track record of managing and leading multi-million dollar restructure and development programs and projects, including the installation and management of enterprise and industry-scale technologies and services.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[As an innovative and results-driven senior IT professional with 20 years in the field, Paul has gained extensive cross-industry experience in senior management roles within global teams across the Asia Pacific, multinational organisations, and Australian Government, including Telstra, IBM, Westpac, CBA, Qantas, and both Federal and State Government agencies.
Paul has a proven track record of managing and leading multi-million dollar restructure and development programs and projects, including the installation and management of enterprise and industry-scale technologies and services.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 24: Paul Heaton]]>
                </itunes:title>
                                    <itunes:episode>24</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>As an innovative and results-driven senior IT professional with 20 years in the field, Paul has gained extensive cross-industry experience in senior management roles within global teams across the Asia Pacific, multinational organisations, and Australian Government, including Telstra, IBM, Westpac, CBA, Qantas, and both Federal and State Government agencies.</p>
<p>Paul has a proven track record of managing and leading multi-million dollar restructure and development programs and projects, including the installation and management of enterprise and industry-scale technologies and services.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/PAUL-CYNTERA-mixdown.mp3" length="21965081"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[As an innovative and results-driven senior IT professional with 20 years in the field, Paul has gained extensive cross-industry experience in senior management roles within global teams across the Asia Pacific, multinational organisations, and Australian Government, including Telstra, IBM, Westpac, CBA, Qantas, and both Federal and State Government agencies.
Paul has a proven track record of managing and leading multi-million dollar restructure and development programs and projects, including the installation and management of enterprise and industry-scale technologies and services.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/175459/KBKAST-Episode-24-Paul-Heaton.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 23: Ross McNaughton]]>
                </title>
                <pubDate>Tue, 31 Mar 2020 14:45:04 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-23-ross-mcnaughton</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-23-ross-mcnaughton</link>
                                <description>
                                            <![CDATA[<p>Ross is a seasoned Chief Information Security Officer (CISO) &amp; Cyber Security professional. He provides the strategic framework and direction in Cyber Security &amp; Technology Risk, providing robust security protection and management assurance. Ross has over 19 years of specialized experience dedicated to leading financial institutions in security policy design, cyber security implementation and security transformation for large financial institutions.</p>
<p>In his previous role at Gulf International Bank, Ross was brought in to modernise and transform the group Information &amp; Cyber Security function for the organisation across multiple international locations, as well as their retail online digital bank, meem. Ross has worked in over 12 countries accelerating cybersecurity adoption and modernisation programmes and speaks two languages. An industry Influencer, he has worked with more than 30 companies and 15 banks. He is consistently sought as one of the most influential CISO’s, throughout his industry and in thought leadership circles. His accreditations include CISSP, CISA, CISM, CRISC and many more. He has been a guest speaker in Cyber Security at Glasgow University in the UK and also contributes to panels and conferences around the world, as well as runs private closed door peer forums for CISO’s in the middle east.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Ross is a seasoned Chief Information Security Officer (CISO) & Cyber Security professional. He provides the strategic framework and direction in Cyber Security & Technology Risk, providing robust security protection and management assurance. Ross has over 19 years of specialized experience dedicated to leading financial institutions in security policy design, cyber security implementation and security transformation for large financial institutions.
In his previous role at Gulf International Bank, Ross was brought in to modernise and transform the group Information & Cyber Security function for the organisation across multiple international locations, as well as their retail online digital bank, meem. Ross has worked in over 12 countries accelerating cybersecurity adoption and modernisation programmes and speaks two languages. An industry Influencer, he has worked with more than 30 companies and 15 banks. He is consistently sought as one of the most influential CISO’s, throughout his industry and in thought leadership circles. His accreditations include CISSP, CISA, CISM, CRISC and many more. He has been a guest speaker in Cyber Security at Glasgow University in the UK and also contributes to panels and conferences around the world, as well as runs private closed door peer forums for CISO’s in the middle east.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 23: Ross McNaughton]]>
                </itunes:title>
                                    <itunes:episode>23</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Ross is a seasoned Chief Information Security Officer (CISO) &amp; Cyber Security professional. He provides the strategic framework and direction in Cyber Security &amp; Technology Risk, providing robust security protection and management assurance. Ross has over 19 years of specialized experience dedicated to leading financial institutions in security policy design, cyber security implementation and security transformation for large financial institutions.</p>
<p>In his previous role at Gulf International Bank, Ross was brought in to modernise and transform the group Information &amp; Cyber Security function for the organisation across multiple international locations, as well as their retail online digital bank, meem. Ross has worked in over 12 countries accelerating cybersecurity adoption and modernisation programmes and speaks two languages. An industry Influencer, he has worked with more than 30 companies and 15 banks. He is consistently sought as one of the most influential CISO’s, throughout his industry and in thought leadership circles. His accreditations include CISSP, CISA, CISM, CRISC and many more. He has been a guest speaker in Cyber Security at Glasgow University in the UK and also contributes to panels and conferences around the world, as well as runs private closed door peer forums for CISO’s in the middle east.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Ross-McNaughton.mp3" length="33796636"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Ross is a seasoned Chief Information Security Officer (CISO) & Cyber Security professional. He provides the strategic framework and direction in Cyber Security & Technology Risk, providing robust security protection and management assurance. Ross has over 19 years of specialized experience dedicated to leading financial institutions in security policy design, cyber security implementation and security transformation for large financial institutions.
In his previous role at Gulf International Bank, Ross was brought in to modernise and transform the group Information & Cyber Security function for the organisation across multiple international locations, as well as their retail online digital bank, meem. Ross has worked in over 12 countries accelerating cybersecurity adoption and modernisation programmes and speaks two languages. An industry Influencer, he has worked with more than 30 companies and 15 banks. He is consistently sought as one of the most influential CISO’s, throughout his industry and in thought leadership circles. His accreditations include CISSP, CISA, CISM, CRISC and many more. He has been a guest speaker in Cyber Security at Glasgow University in the UK and also contributes to panels and conferences around the world, as well as runs private closed door peer forums for CISO’s in the middle east.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/169436/1700181117-KBKAST-Episode-23-Ross-McNaughton.jpg"></itunes:image>
                                                                            <itunes:duration>00:46:54</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 22: Martin McGregor]]>
                </title>
                <pubDate>Thu, 26 Mar 2020 21:19:45 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-22-martin-mcgregor</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-22-martin-mcgregor</link>
                                <description>
                                            <![CDATA[<p>Martin has twenty years of experience as an innovator at the leading edge of technology. A deep technical understanding of the security and privacy implications of storing sensitive customer information allows him to help guard against the security vulnerabilities and risks any modern organisation might face.</p>
<p>Through his customer-centric approach, Martin helps businesses innovate to improve the performance and security of his clients. Devicie (formally Secure Measure at time of recording) has recently become both a Cyrise and AustCyber supported company.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Martin has twenty years of experience as an innovator at the leading edge of technology. A deep technical understanding of the security and privacy implications of storing sensitive customer information allows him to help guard against the security vulnerabilities and risks any modern organisation might face.
Through his customer-centric approach, Martin helps businesses innovate to improve the performance and security of his clients. Devicie (formally Secure Measure at time of recording) has recently become both a Cyrise and AustCyber supported company.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 22: Martin McGregor]]>
                </itunes:title>
                                    <itunes:episode>22</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Martin has twenty years of experience as an innovator at the leading edge of technology. A deep technical understanding of the security and privacy implications of storing sensitive customer information allows him to help guard against the security vulnerabilities and risks any modern organisation might face.</p>
<p>Through his customer-centric approach, Martin helps businesses innovate to improve the performance and security of his clients. Devicie (formally Secure Measure at time of recording) has recently become both a Cyrise and AustCyber supported company.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/22-Martin-McGregor.mp3" length="22195292"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Martin has twenty years of experience as an innovator at the leading edge of technology. A deep technical understanding of the security and privacy implications of storing sensitive customer information allows him to help guard against the security vulnerabilities and risks any modern organisation might face.
Through his customer-centric approach, Martin helps businesses innovate to improve the performance and security of his clients. Devicie (formally Secure Measure at time of recording) has recently become both a Cyrise and AustCyber supported company.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/164763/KBKAST-Episode-22-Martin-McGregor.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:47</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 21: Bastien Treptel]]>
                </title>
                <pubDate>Wed, 18 Mar 2020 19:02:30 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-21-bastien-treptel</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-21-bastien-treptel</link>
                                <description>
                                            <![CDATA[<p>Bastien is the co-founder of CTRL Group – Australia’s progressive information security firm, protecting businesses from cyber risk. CTRL Group offer best in class security solutions ranging from audits, hacking, monitoring, advisory and education.</p>
<p>With operations in Singapore, Thailand and Australia, CTRL Group are on a mission to safeguard organisations from brand and reputational damage, as well as increasing public awareness about the importance of cybersecurity to their financial and personal well-being. Bastien is dedicated to inspiring everyone to appreciate security as it starts to become an essential part of our lives as we move into a hyper digitised world.</p>
<p>Bastien has developed a progressive security methodology to enable CTRL Group clients to achieve a respectable level of cyber maturity, effectively helping them mitigate critical risks posed to their stakeholders and shareholders.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Bastien is the co-founder of CTRL Group – Australia’s progressive information security firm, protecting businesses from cyber risk. CTRL Group offer best in class security solutions ranging from audits, hacking, monitoring, advisory and education.
With operations in Singapore, Thailand and Australia, CTRL Group are on a mission to safeguard organisations from brand and reputational damage, as well as increasing public awareness about the importance of cybersecurity to their financial and personal well-being. Bastien is dedicated to inspiring everyone to appreciate security as it starts to become an essential part of our lives as we move into a hyper digitised world.
Bastien has developed a progressive security methodology to enable CTRL Group clients to achieve a respectable level of cyber maturity, effectively helping them mitigate critical risks posed to their stakeholders and shareholders.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 21: Bastien Treptel]]>
                </itunes:title>
                                    <itunes:episode>21</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Bastien is the co-founder of CTRL Group – Australia’s progressive information security firm, protecting businesses from cyber risk. CTRL Group offer best in class security solutions ranging from audits, hacking, monitoring, advisory and education.</p>
<p>With operations in Singapore, Thailand and Australia, CTRL Group are on a mission to safeguard organisations from brand and reputational damage, as well as increasing public awareness about the importance of cybersecurity to their financial and personal well-being. Bastien is dedicated to inspiring everyone to appreciate security as it starts to become an essential part of our lives as we move into a hyper digitised world.</p>
<p>Bastien has developed a progressive security methodology to enable CTRL Group clients to achieve a respectable level of cyber maturity, effectively helping them mitigate critical risks posed to their stakeholders and shareholders.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Bastien-Treptel-KBKAST.mp3" length="39557085"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Bastien is the co-founder of CTRL Group – Australia’s progressive information security firm, protecting businesses from cyber risk. CTRL Group offer best in class security solutions ranging from audits, hacking, monitoring, advisory and education.
With operations in Singapore, Thailand and Australia, CTRL Group are on a mission to safeguard organisations from brand and reputational damage, as well as increasing public awareness about the importance of cybersecurity to their financial and personal well-being. Bastien is dedicated to inspiring everyone to appreciate security as it starts to become an essential part of our lives as we move into a hyper digitised world.
Bastien has developed a progressive security methodology to enable CTRL Group clients to achieve a respectable level of cyber maturity, effectively helping them mitigate critical risks posed to their stakeholders and shareholders.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/162315/1700181117-KBKAST-Episode-21-Bastien-Treptel.jpg"></itunes:image>
                                                                            <itunes:duration>00:27:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 20: Thomas Mynott]]>
                </title>
                <pubDate>Fri, 01 Nov 2019 16:46:48 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-20-thomas-mynott</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-20-thomas-mynott</link>
                                <description>
                                            <![CDATA[<p>At 19 years old I left my small country town to join the Army. I began my military career in Canberra being trained as a military manager and soldier. 2 years later I found myself in East-Timor managing a team of 34 maintenance and transportation staff and supporting the military operations for the 500+ strong Australian Defence Force contingent in the country. As a 22-year-old at the time, I felt that this was a normal experience and thought that any 22 years old would be able to do what I was doing, of course I know now that is not really the case. However, In my context, the Army was willing to give me all the responsibility and trust to do the job, and I loved it.</p>
<p>I continued in the Army for another 6 years, had so many more incredible experiences and learnt so many skills. I even completed a Masters in Business during my final years. Then finally one day, like so many others in the Army, I decided I had achieved everything I wanted to achieve and decided to transition out of the military in my next career. The biggest problem I now faced was, I didn’t know what I wanted to do next.</p>
<p>Once leaving Defence I landed in Recruiting and found that I was good at it, though I struggled to get the same level of satisfaction and purpose from my new role as I did in the military. That is when I decided to join the WithYouWithMe team, because here was a business with the ambitious goal of solving military veteran underemployment. At that time I joined it was only Tom Moore, our co-founder and CEO, a marketing intern and myself working out of a living room. Since then we have helped over 1000 veteran gain new jobs, have been awarded the Priminister’s Veteran Award, been named the second-fastest growing Tech company in Australia for 2018 and have now opened up and Office in the US to help American Veterans.</p>
<p>Nowadays, I am the Head of Sales for Australia and am still just as passionate and dedicated to our mission, which is to solve underemployment for all people in Australia. My key role is to connecting growing and transforming the business to our veterans and non-veterans, who are being trained and deployed into high-demand and high-growth careers such as Cybersecurity.</p>
<p>I just recently turned 30, am married to my beautiful and very supportive wife, Anne, and have a son called Archie who, at the time of writing this, is 7 weeks old, and next to me sleeping soundly.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[At 19 years old I left my small country town to join the Army. I began my military career in Canberra being trained as a military manager and soldier. 2 years later I found myself in East-Timor managing a team of 34 maintenance and transportation staff and supporting the military operations for the 500+ strong Australian Defence Force contingent in the country. As a 22-year-old at the time, I felt that this was a normal experience and thought that any 22 years old would be able to do what I was doing, of course I know now that is not really the case. However, In my context, the Army was willing to give me all the responsibility and trust to do the job, and I loved it.
I continued in the Army for another 6 years, had so many more incredible experiences and learnt so many skills. I even completed a Masters in Business during my final years. Then finally one day, like so many others in the Army, I decided I had achieved everything I wanted to achieve and decided to transition out of the military in my next career. The biggest problem I now faced was, I didn’t know what I wanted to do next.
Once leaving Defence I landed in Recruiting and found that I was good at it, though I struggled to get the same level of satisfaction and purpose from my new role as I did in the military. That is when I decided to join the WithYouWithMe team, because here was a business with the ambitious goal of solving military veteran underemployment. At that time I joined it was only Tom Moore, our co-founder and CEO, a marketing intern and myself working out of a living room. Since then we have helped over 1000 veteran gain new jobs, have been awarded the Priminister’s Veteran Award, been named the second-fastest growing Tech company in Australia for 2018 and have now opened up and Office in the US to help American Veterans.
Nowadays, I am the Head of Sales for Australia and am still just as passionate and dedicated to our mission, which is to solve underemployment for all people in Australia. My key role is to connecting growing and transforming the business to our veterans and non-veterans, who are being trained and deployed into high-demand and high-growth careers such as Cybersecurity.
I just recently turned 30, am married to my beautiful and very supportive wife, Anne, and have a son called Archie who, at the time of writing this, is 7 weeks old, and next to me sleeping soundly.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 20: Thomas Mynott]]>
                </itunes:title>
                                    <itunes:episode>20</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>At 19 years old I left my small country town to join the Army. I began my military career in Canberra being trained as a military manager and soldier. 2 years later I found myself in East-Timor managing a team of 34 maintenance and transportation staff and supporting the military operations for the 500+ strong Australian Defence Force contingent in the country. As a 22-year-old at the time, I felt that this was a normal experience and thought that any 22 years old would be able to do what I was doing, of course I know now that is not really the case. However, In my context, the Army was willing to give me all the responsibility and trust to do the job, and I loved it.</p>
<p>I continued in the Army for another 6 years, had so many more incredible experiences and learnt so many skills. I even completed a Masters in Business during my final years. Then finally one day, like so many others in the Army, I decided I had achieved everything I wanted to achieve and decided to transition out of the military in my next career. The biggest problem I now faced was, I didn’t know what I wanted to do next.</p>
<p>Once leaving Defence I landed in Recruiting and found that I was good at it, though I struggled to get the same level of satisfaction and purpose from my new role as I did in the military. That is when I decided to join the WithYouWithMe team, because here was a business with the ambitious goal of solving military veteran underemployment. At that time I joined it was only Tom Moore, our co-founder and CEO, a marketing intern and myself working out of a living room. Since then we have helped over 1000 veteran gain new jobs, have been awarded the Priminister’s Veteran Award, been named the second-fastest growing Tech company in Australia for 2018 and have now opened up and Office in the US to help American Veterans.</p>
<p>Nowadays, I am the Head of Sales for Australia and am still just as passionate and dedicated to our mission, which is to solve underemployment for all people in Australia. My key role is to connecting growing and transforming the business to our veterans and non-veterans, who are being trained and deployed into high-demand and high-growth careers such as Cybersecurity.</p>
<p>I just recently turned 30, am married to my beautiful and very supportive wife, Anne, and have a son called Archie who, at the time of writing this, is 7 weeks old, and next to me sleeping soundly.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Thomas-Mynott-mixdown.mp3" length="30857751"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[At 19 years old I left my small country town to join the Army. I began my military career in Canberra being trained as a military manager and soldier. 2 years later I found myself in East-Timor managing a team of 34 maintenance and transportation staff and supporting the military operations for the 500+ strong Australian Defence Force contingent in the country. As a 22-year-old at the time, I felt that this was a normal experience and thought that any 22 years old would be able to do what I was doing, of course I know now that is not really the case. However, In my context, the Army was willing to give me all the responsibility and trust to do the job, and I loved it.
I continued in the Army for another 6 years, had so many more incredible experiences and learnt so many skills. I even completed a Masters in Business during my final years. Then finally one day, like so many others in the Army, I decided I had achieved everything I wanted to achieve and decided to transition out of the military in my next career. The biggest problem I now faced was, I didn’t know what I wanted to do next.
Once leaving Defence I landed in Recruiting and found that I was good at it, though I struggled to get the same level of satisfaction and purpose from my new role as I did in the military. That is when I decided to join the WithYouWithMe team, because here was a business with the ambitious goal of solving military veteran underemployment. At that time I joined it was only Tom Moore, our co-founder and CEO, a marketing intern and myself working out of a living room. Since then we have helped over 1000 veteran gain new jobs, have been awarded the Priminister’s Veteran Award, been named the second-fastest growing Tech company in Australia for 2018 and have now opened up and Office in the US to help American Veterans.
Nowadays, I am the Head of Sales for Australia and am still just as passionate and dedicated to our mission, which is to solve underemployment for all people in Australia. My key role is to connecting growing and transforming the business to our veterans and non-veterans, who are being trained and deployed into high-demand and high-growth careers such as Cybersecurity.
I just recently turned 30, am married to my beautiful and very supportive wife, Anne, and have a son called Archie who, at the time of writing this, is 7 weeks old, and next to me sleeping soundly.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/121955/KBKAST-Episode-20-Thomas-Mynott.jpg"></itunes:image>
                                                                            <itunes:duration>00:42:49</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 19: Casey Ellis]]>
                </title>
                <pubDate>Thu, 26 Sep 2019 15:25:07 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-19-casey-ellis</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-19-casey-ellis</link>
                                <description>
                                            <![CDATA[<div style="text-align:justify;">Casey is the Founder, Chairman, and CTO of Bugcrowd. He is an 18 year veteran of information security, servicing clients ranging from startups to multinational corporations as a pen tester, security and risk consultant and solutions architect, then most recently as a career entrepreneur.</div>
<div style="text-align:justify;"></div>
<div style="text-align:justify;">Casey pioneered the Crowdsourced Security as a Service model launching the first bug bounty programs on the Bugcrowd platform in 2012, and co-founded the <a href="https://disclose.io/" target="_blank" rel="noreferrer noopener">https://disclose.io</a> vulnerability disclosure standardization project in 2016.</div>
<div style="text-align:justify;"></div>
<div style="text-align:justify;">A proud ex-pat of Sydney Australia, Casey lives with his wife and two kids in the San Francisco Bay Area. He is happy as long as he’s in the passionate pursuit of potential.</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Casey is the Founder, Chairman, and CTO of Bugcrowd. He is an 18 year veteran of information security, servicing clients ranging from startups to multinational corporations as a pen tester, security and risk consultant and solutions architect, then most recently as a career entrepreneur.

Casey pioneered the Crowdsourced Security as a Service model launching the first bug bounty programs on the Bugcrowd platform in 2012, and co-founded the https://disclose.io vulnerability disclosure standardization project in 2016.

A proud ex-pat of Sydney Australia, Casey lives with his wife and two kids in the San Francisco Bay Area. He is happy as long as he’s in the passionate pursuit of potential.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 19: Casey Ellis]]>
                </itunes:title>
                                    <itunes:episode>19</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div style="text-align:justify;">Casey is the Founder, Chairman, and CTO of Bugcrowd. He is an 18 year veteran of information security, servicing clients ranging from startups to multinational corporations as a pen tester, security and risk consultant and solutions architect, then most recently as a career entrepreneur.</div>
<div style="text-align:justify;"></div>
<div style="text-align:justify;">Casey pioneered the Crowdsourced Security as a Service model launching the first bug bounty programs on the Bugcrowd platform in 2012, and co-founded the <a href="https://disclose.io/" target="_blank" rel="noreferrer noopener">https://disclose.io</a> vulnerability disclosure standardization project in 2016.</div>
<div style="text-align:justify;"></div>
<div style="text-align:justify;">A proud ex-pat of Sydney Australia, Casey lives with his wife and two kids in the San Francisco Bay Area. He is happy as long as he’s in the passionate pursuit of potential.</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Casey-Ellis-mixdown.mp3" length="25489146"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Casey is the Founder, Chairman, and CTO of Bugcrowd. He is an 18 year veteran of information security, servicing clients ranging from startups to multinational corporations as a pen tester, security and risk consultant and solutions architect, then most recently as a career entrepreneur.

Casey pioneered the Crowdsourced Security as a Service model launching the first bug bounty programs on the Bugcrowd platform in 2012, and co-founded the https://disclose.io vulnerability disclosure standardization project in 2016.

A proud ex-pat of Sydney Australia, Casey lives with his wife and two kids in the San Francisco Bay Area. He is happy as long as he’s in the passionate pursuit of potential.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/113711/1700181117-KBKAST-Episode-19-Casey-Ellis.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 18: Phil Zongo]]>
                </title>
                <pubDate>Tue, 17 Sep 2019 14:40:58 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-18-phil-zongo</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-18-phil-zongo</link>
                                <description>
                                            <![CDATA[<div style="text-align:justify;">Phil Zongo is the author of The Five Anchors of Cyber Resilience, an Amazon best-selling book that strips away the complexity of cyber security and provides practical guidance to business executives.</div>
<div style="text-align:justify;"></div>
<div></div>
<div style="text-align:justify;">In 2017, Phil was invited to Chicago, USA, where he was honoured with ISACA’s International Best Book / Article Award for his paper, The Automation Conundrum. This is one of ISACA’s highest global honours that recognises individuals who have made major contributions to publications in the field of IS audit, control and/or security. He has received several other awards in recognition for his thought leadership.</div>
<div style="text-align:justify;"></div>
<div></div>
<div style="text-align:justify;">Phil is a Director and Co-Founder of the Cyber Leadership Institute, an organisation that develops the next generation of cyber leaders. Phil is a voice in demand for several stratgic matters, such as cyber resilience, machine learning, blockchain, cloud computing, etc and has keynoted several high profile conferences.</div>
<div style="text-align:justify;"></div>
<div></div>
<div style="text-align:justify;">Over the last 15 years, Zongo has advised numerous business leaders on how to manage critical risks within complex transformation programs as well as rapidly build cost effective and high-impact cyber resilience programs.</div>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Phil Zongo is the author of The Five Anchors of Cyber Resilience, an Amazon best-selling book that strips away the complexity of cyber security and provides practical guidance to business executives.


In 2017, Phil was invited to Chicago, USA, where he was honoured with ISACA’s International Best Book / Article Award for his paper, The Automation Conundrum. This is one of ISACA’s highest global honours that recognises individuals who have made major contributions to publications in the field of IS audit, control and/or security. He has received several other awards in recognition for his thought leadership.


Phil is a Director and Co-Founder of the Cyber Leadership Institute, an organisation that develops the next generation of cyber leaders. Phil is a voice in demand for several stratgic matters, such as cyber resilience, machine learning, blockchain, cloud computing, etc and has keynoted several high profile conferences.


Over the last 15 years, Zongo has advised numerous business leaders on how to manage critical risks within complex transformation programs as well as rapidly build cost effective and high-impact cyber resilience programs.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 18: Phil Zongo]]>
                </itunes:title>
                                    <itunes:episode>18</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<div style="text-align:justify;">Phil Zongo is the author of The Five Anchors of Cyber Resilience, an Amazon best-selling book that strips away the complexity of cyber security and provides practical guidance to business executives.</div>
<div style="text-align:justify;"></div>
<div></div>
<div style="text-align:justify;">In 2017, Phil was invited to Chicago, USA, where he was honoured with ISACA’s International Best Book / Article Award for his paper, The Automation Conundrum. This is one of ISACA’s highest global honours that recognises individuals who have made major contributions to publications in the field of IS audit, control and/or security. He has received several other awards in recognition for his thought leadership.</div>
<div style="text-align:justify;"></div>
<div></div>
<div style="text-align:justify;">Phil is a Director and Co-Founder of the Cyber Leadership Institute, an organisation that develops the next generation of cyber leaders. Phil is a voice in demand for several stratgic matters, such as cyber resilience, machine learning, blockchain, cloud computing, etc and has keynoted several high profile conferences.</div>
<div style="text-align:justify;"></div>
<div></div>
<div style="text-align:justify;">Over the last 15 years, Zongo has advised numerous business leaders on how to manage critical risks within complex transformation programs as well as rapidly build cost effective and high-impact cyber resilience programs.</div>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Phil-Z-RELEASE.mp3" length="32875361"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Phil Zongo is the author of The Five Anchors of Cyber Resilience, an Amazon best-selling book that strips away the complexity of cyber security and provides practical guidance to business executives.


In 2017, Phil was invited to Chicago, USA, where he was honoured with ISACA’s International Best Book / Article Award for his paper, The Automation Conundrum. This is one of ISACA’s highest global honours that recognises individuals who have made major contributions to publications in the field of IS audit, control and/or security. He has received several other awards in recognition for his thought leadership.


Phil is a Director and Co-Founder of the Cyber Leadership Institute, an organisation that develops the next generation of cyber leaders. Phil is a voice in demand for several stratgic matters, such as cyber resilience, machine learning, blockchain, cloud computing, etc and has keynoted several high profile conferences.


Over the last 15 years, Zongo has advised numerous business leaders on how to manage critical risks within complex transformation programs as well as rapidly build cost effective and high-impact cyber resilience programs.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/112272/KBKAST-Episode-18-Phil-Zongo.jpg"></itunes:image>
                                                                            <itunes:duration>00:45:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 17: Nathan Clarke]]>
                </title>
                <pubDate>Wed, 28 Aug 2019 21:50:03 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-17-nathan-clarke</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-17-nathan-clarke</link>
                                <description>
                                            <![CDATA[<p style="font-weight:400;text-align:justify;">Nathan enlisted in the Army in 1996 and worked in many different roles supporting the various information systems supporting ADF operations. Late in his career he served in the ADFCIRT and decided then that cyber security was going to be the mainstay of his post-military career.</p>
<p style="font-weight:400;text-align:justify;">Since Leaving the defence force Nathan has raised two SOCs, one dedicated to defence, another for multiple commercial tenants where he is now, at Verizon. Nathan’s focus in his cyber security career is on incident response, leadership, and detection development. He publicly speaks on various topics related to SOCs.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Nathan enlisted in the Army in 1996 and worked in many different roles supporting the various information systems supporting ADF operations. Late in his career he served in the ADFCIRT and decided then that cyber security was going to be the mainstay of his post-military career.
Since Leaving the defence force Nathan has raised two SOCs, one dedicated to defence, another for multiple commercial tenants where he is now, at Verizon. Nathan’s focus in his cyber security career is on incident response, leadership, and detection development. He publicly speaks on various topics related to SOCs.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 17: Nathan Clarke]]>
                </itunes:title>
                                    <itunes:episode>17</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p style="font-weight:400;text-align:justify;">Nathan enlisted in the Army in 1996 and worked in many different roles supporting the various information systems supporting ADF operations. Late in his career he served in the ADFCIRT and decided then that cyber security was going to be the mainstay of his post-military career.</p>
<p style="font-weight:400;text-align:justify;">Since Leaving the defence force Nathan has raised two SOCs, one dedicated to defence, another for multiple commercial tenants where he is now, at Verizon. Nathan’s focus in his cyber security career is on incident response, leadership, and detection development. He publicly speaks on various topics related to SOCs.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Nathan-Clarke-mixdown.mp3" length="21827823"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Nathan enlisted in the Army in 1996 and worked in many different roles supporting the various information systems supporting ADF operations. Late in his career he served in the ADFCIRT and decided then that cyber security was going to be the mainstay of his post-military career.
Since Leaving the defence force Nathan has raised two SOCs, one dedicated to defence, another for multiple commercial tenants where he is now, at Verizon. Nathan’s focus in his cyber security career is on incident response, leadership, and detection development. He publicly speaks on various topics related to SOCs.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/108690/1700181118-KBKAST-Episode-17-Nathan-Clarke.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:17</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 16: Dan Holman & Eric Flis]]>
                </title>
                <pubDate>Thu, 11 Jul 2019 17:07:02 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/99443</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-16-dan-holman-eric-flis</link>
                                <description>
                                            <![CDATA[<p style="font-weight:400;text-align:justify;">Dan Holman is the CEO and Eric Flis the COO of WorldStack; the leading Australian Open Source Intelligence (OSINT) company.</p>
<p>They founded WorldStack to create the tools that enhance the decision-making of their clients with actionable intelligence. This is fuelled by freely available, but hard to filter data that sits on the open web, deep, and dark web, and WorldStack’s solutions provide the tools to turn that data into genuine insight.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dan Holman is the CEO and Eric Flis the COO of WorldStack; the leading Australian Open Source Intelligence (OSINT) company.
They founded WorldStack to create the tools that enhance the decision-making of their clients with actionable intelligence. This is fuelled by freely available, but hard to filter data that sits on the open web, deep, and dark web, and WorldStack’s solutions provide the tools to turn that data into genuine insight.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 16: Dan Holman & Eric Flis]]>
                </itunes:title>
                                    <itunes:episode>16</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p style="font-weight:400;text-align:justify;">Dan Holman is the CEO and Eric Flis the COO of WorldStack; the leading Australian Open Source Intelligence (OSINT) company.</p>
<p>They founded WorldStack to create the tools that enhance the decision-making of their clients with actionable intelligence. This is fuelled by freely available, but hard to filter data that sits on the open web, deep, and dark web, and WorldStack’s solutions provide the tools to turn that data into genuine insight.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/WorldStack-mixdown.mp3" length="21057743"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dan Holman is the CEO and Eric Flis the COO of WorldStack; the leading Australian Open Source Intelligence (OSINT) company.
They founded WorldStack to create the tools that enhance the decision-making of their clients with actionable intelligence. This is fuelled by freely available, but hard to filter data that sits on the open web, deep, and dark web, and WorldStack’s solutions provide the tools to turn that data into genuine insight.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/99443/KBKAST-Episode-16-Dan-Holman.jpg"></itunes:image>
                                                                            <itunes:duration>00:29:10</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 15: Nicole Stephensen]]>
                </title>
                <pubDate>Tue, 02 Jul 2019 19:28:56 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-15-nicole-stephensen</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-15-nicole-stephensen</link>
                                <description>
                                            <![CDATA[<p style="text-align:justify;">Nicole Stephensen is a Privacy Specialist with extensive local and international experience in operational and strategic privacy matters. She is Principal Consultant at <a href="https://www.groundupprivacy.com.au/">Ground Up Consulting</a>, a boutique firm she established in 2011.</p>
<p style="text-align:justify;">Nicole is also the Executive Director for Privacy and Data Protection at the <a href="https://iotsecurityinstitute.com/iotsec/index.php">Internet of Things Security Institute</a>, where she is co-author of the IoTSI Security Framework for Smart Cities and Critical Infrastructure and hosts a bi-weekly podcast,<a href="https://podcasts.apple.com/au/podcast/privacy-matters-with-nicole-stephensen/id1451572716"><em> ‘Privacy Matters</em></a>‘.</p>
<p style="text-align:justify;">With nearly 20 years in the privacy profession, Nicole believes in building organisational capacity around privacy and embedding best practice into organisational culture. In her private practice, she assists government, private and not for profit sectors to unlock the strategic value of privacy and enhance community trust. She also helps to find, unpack and address privacy risk, via formal Privacy Impact Assessments and more collaborative on-site reviews of policies, processes and ‘on the ground’ handling of personal information. In consultation with her clients, she develops and delivers bespoke training for staff and executive levels.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Nicole Stephensen is a Privacy Specialist with extensive local and international experience in operational and strategic privacy matters. She is Principal Consultant at Ground Up Consulting, a boutique firm she established in 2011.
Nicole is also the Executive Director for Privacy and Data Protection at the Internet of Things Security Institute, where she is co-author of the IoTSI Security Framework for Smart Cities and Critical Infrastructure and hosts a bi-weekly podcast, ‘Privacy Matters‘.
With nearly 20 years in the privacy profession, Nicole believes in building organisational capacity around privacy and embedding best practice into organisational culture. In her private practice, she assists government, private and not for profit sectors to unlock the strategic value of privacy and enhance community trust. She also helps to find, unpack and address privacy risk, via formal Privacy Impact Assessments and more collaborative on-site reviews of policies, processes and ‘on the ground’ handling of personal information. In consultation with her clients, she develops and delivers bespoke training for staff and executive levels.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 15: Nicole Stephensen]]>
                </itunes:title>
                                    <itunes:episode>15</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p style="text-align:justify;">Nicole Stephensen is a Privacy Specialist with extensive local and international experience in operational and strategic privacy matters. She is Principal Consultant at <a href="https://www.groundupprivacy.com.au/">Ground Up Consulting</a>, a boutique firm she established in 2011.</p>
<p style="text-align:justify;">Nicole is also the Executive Director for Privacy and Data Protection at the <a href="https://iotsecurityinstitute.com/iotsec/index.php">Internet of Things Security Institute</a>, where she is co-author of the IoTSI Security Framework for Smart Cities and Critical Infrastructure and hosts a bi-weekly podcast,<a href="https://podcasts.apple.com/au/podcast/privacy-matters-with-nicole-stephensen/id1451572716"><em> ‘Privacy Matters</em></a>‘.</p>
<p style="text-align:justify;">With nearly 20 years in the privacy profession, Nicole believes in building organisational capacity around privacy and embedding best practice into organisational culture. In her private practice, she assists government, private and not for profit sectors to unlock the strategic value of privacy and enhance community trust. She also helps to find, unpack and address privacy risk, via formal Privacy Impact Assessments and more collaborative on-site reviews of policies, processes and ‘on the ground’ handling of personal information. In consultation with her clients, she develops and delivers bespoke training for staff and executive levels.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Nicole-Stephensen-KBKAST.mp3" length="20695991"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Nicole Stephensen is a Privacy Specialist with extensive local and international experience in operational and strategic privacy matters. She is Principal Consultant at Ground Up Consulting, a boutique firm she established in 2011.
Nicole is also the Executive Director for Privacy and Data Protection at the Internet of Things Security Institute, where she is co-author of the IoTSI Security Framework for Smart Cities and Critical Infrastructure and hosts a bi-weekly podcast, ‘Privacy Matters‘.
With nearly 20 years in the privacy profession, Nicole believes in building organisational capacity around privacy and embedding best practice into organisational culture. In her private practice, she assists government, private and not for profit sectors to unlock the strategic value of privacy and enhance community trust. She also helps to find, unpack and address privacy risk, via formal Privacy Impact Assessments and more collaborative on-site reviews of policies, processes and ‘on the ground’ handling of personal information. In consultation with her clients, she develops and delivers bespoke training for staff and executive levels.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/96718/1700181119-KBKAST-Episode-15-Nicole-Stephensen.jpg"></itunes:image>
                                                                            <itunes:duration>00:28:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 14: Shannon Sedgwick]]>
                </title>
                <pubDate>Tue, 07 May 2019 21:54:32 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-14-shannon-sedgwick</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-14-shannon-sedgwick</link>
                                <description>
                                            <![CDATA[<p style="font-weight:400;text-align:justify;">Shannon provides future-focused leadership to government and private enterprise executives and boards to maximise the benefits of implementing new technologies, align that implementation with their strategic intent, and future-proof their organisations against cyber threats. After spending nearly a decade working across the world consulting on technology, cyber security, and risk management, Shannon has unique and unparalleled insight into what makes an organisation successful and resilient.</p>
<p style="font-weight:400;text-align:justify;">Shannon has landed coverage in print and broadcast outlets around the world, including the Today Show, Seven News, Sky News, ITV, KBPS, ABC, 60 Minutes, 2GB, and Sunday Night. His articles have been featured in the Asia Pacific Security Magazine, AFR, The Australian, news.com.au, and university journals.</p>
<h4>SHOW NOTES</h4>
<p><a href="https://youtu.be/9B8PHOL3CxU">ISIS Drone Footage</a></p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Shannon provides future-focused leadership to government and private enterprise executives and boards to maximise the benefits of implementing new technologies, align that implementation with their strategic intent, and future-proof their organisations against cyber threats. After spending nearly a decade working across the world consulting on technology, cyber security, and risk management, Shannon has unique and unparalleled insight into what makes an organisation successful and resilient.
Shannon has landed coverage in print and broadcast outlets around the world, including the Today Show, Seven News, Sky News, ITV, KBPS, ABC, 60 Minutes, 2GB, and Sunday Night. His articles have been featured in the Asia Pacific Security Magazine, AFR, The Australian, news.com.au, and university journals.
SHOW NOTES
ISIS Drone Footage
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 14: Shannon Sedgwick]]>
                </itunes:title>
                                    <itunes:episode>14</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p style="font-weight:400;text-align:justify;">Shannon provides future-focused leadership to government and private enterprise executives and boards to maximise the benefits of implementing new technologies, align that implementation with their strategic intent, and future-proof their organisations against cyber threats. After spending nearly a decade working across the world consulting on technology, cyber security, and risk management, Shannon has unique and unparalleled insight into what makes an organisation successful and resilient.</p>
<p style="font-weight:400;text-align:justify;">Shannon has landed coverage in print and broadcast outlets around the world, including the Today Show, Seven News, Sky News, ITV, KBPS, ABC, 60 Minutes, 2GB, and Sunday Night. His articles have been featured in the Asia Pacific Security Magazine, AFR, The Australian, news.com.au, and university journals.</p>
<h4>SHOW NOTES</h4>
<p><a href="https://youtu.be/9B8PHOL3CxU">ISIS Drone Footage</a></p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Shannon-S-mixdown2.mp3" length="33525556"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Shannon provides future-focused leadership to government and private enterprise executives and boards to maximise the benefits of implementing new technologies, align that implementation with their strategic intent, and future-proof their organisations against cyber threats. After spending nearly a decade working across the world consulting on technology, cyber security, and risk management, Shannon has unique and unparalleled insight into what makes an organisation successful and resilient.
Shannon has landed coverage in print and broadcast outlets around the world, including the Today Show, Seven News, Sky News, ITV, KBPS, ABC, 60 Minutes, 2GB, and Sunday Night. His articles have been featured in the Asia Pacific Security Magazine, AFR, The Australian, news.com.au, and university journals.
SHOW NOTES
ISIS Drone Footage
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/84878/1700181119-KBKAST-Episode-14-Shannon-Sedgwick.jpg"></itunes:image>
                                                                            <itunes:duration>00:46:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 13: Dr. Lydia Kostopoulos]]>
                </title>
                <pubDate>Thu, 11 Apr 2019 18:48:14 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/dr-lydia-kostopoulos</guid>
                                    <link>https://kbkast.castos.com/episodes/dr-lydia-kostopoulos</link>
                                <description>
                                            <![CDATA[<p>Dr. Lydia Kostopoulos’ work is at the intersection of people, strategy, technology, education, and national security. She addressed the United Nations member states on the military effects panel at the Convention of Certain Weapons Group of Governmental Experts (GGE) meeting on Lethal Autonomous Weapons Systems (LAWS). Formerly the Director for Strategic Engagement at the College of Information and Cyberspace at the National Defense University, a Principal Consultant for PA and higher education professor teaching national security at several universities, her professional experience spans three continents, several countries, and multi-cultural environments.</p>
<p>She speaks and writes on disruptive technology convergence, innovation, tech ethics, and national security. She lectures at the National Defense University, Joint Special Operations University, is a member of the IEEE-USA AI Policy Committee, participates in NATO’s Science for Peace and Security Program, and during the Obama administration has received the U.S. Presidential Volunteer Service Award for her pro bono work in cybersecurity. In efforts to raise awareness on AI and ethics she is working on a reflectional art series [#ArtAboutAI], and a game about emerging technology and ethics called <a href="https://www.sapien2-0.com/" target="_blank" rel="noreferrer noopener">Sapien2.0</a>.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Dr. Lydia Kostopoulos’ work is at the intersection of people, strategy, technology, education, and national security. She addressed the United Nations member states on the military effects panel at the Convention of Certain Weapons Group of Governmental Experts (GGE) meeting on Lethal Autonomous Weapons Systems (LAWS). Formerly the Director for Strategic Engagement at the College of Information and Cyberspace at the National Defense University, a Principal Consultant for PA and higher education professor teaching national security at several universities, her professional experience spans three continents, several countries, and multi-cultural environments.
She speaks and writes on disruptive technology convergence, innovation, tech ethics, and national security. She lectures at the National Defense University, Joint Special Operations University, is a member of the IEEE-USA AI Policy Committee, participates in NATO’s Science for Peace and Security Program, and during the Obama administration has received the U.S. Presidential Volunteer Service Award for her pro bono work in cybersecurity. In efforts to raise awareness on AI and ethics she is working on a reflectional art series [#ArtAboutAI], and a game about emerging technology and ethics called Sapien2.0.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 13: Dr. Lydia Kostopoulos]]>
                </itunes:title>
                                    <itunes:episode>13</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Dr. Lydia Kostopoulos’ work is at the intersection of people, strategy, technology, education, and national security. She addressed the United Nations member states on the military effects panel at the Convention of Certain Weapons Group of Governmental Experts (GGE) meeting on Lethal Autonomous Weapons Systems (LAWS). Formerly the Director for Strategic Engagement at the College of Information and Cyberspace at the National Defense University, a Principal Consultant for PA and higher education professor teaching national security at several universities, her professional experience spans three continents, several countries, and multi-cultural environments.</p>
<p>She speaks and writes on disruptive technology convergence, innovation, tech ethics, and national security. She lectures at the National Defense University, Joint Special Operations University, is a member of the IEEE-USA AI Policy Committee, participates in NATO’s Science for Peace and Security Program, and during the Obama administration has received the U.S. Presidential Volunteer Service Award for her pro bono work in cybersecurity. In efforts to raise awareness on AI and ethics she is working on a reflectional art series [#ArtAboutAI], and a game about emerging technology and ethics called <a href="https://www.sapien2-0.com/" target="_blank" rel="noreferrer noopener">Sapien2.0</a>.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Lydia-Kostopoulos-mixdown.mp3" length="28394955"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Dr. Lydia Kostopoulos’ work is at the intersection of people, strategy, technology, education, and national security. She addressed the United Nations member states on the military effects panel at the Convention of Certain Weapons Group of Governmental Experts (GGE) meeting on Lethal Autonomous Weapons Systems (LAWS). Formerly the Director for Strategic Engagement at the College of Information and Cyberspace at the National Defense University, a Principal Consultant for PA and higher education professor teaching national security at several universities, her professional experience spans three continents, several countries, and multi-cultural environments.
She speaks and writes on disruptive technology convergence, innovation, tech ethics, and national security. She lectures at the National Defense University, Joint Special Operations University, is a member of the IEEE-USA AI Policy Committee, participates in NATO’s Science for Peace and Security Program, and during the Obama administration has received the U.S. Presidential Volunteer Service Award for her pro bono work in cybersecurity. In efforts to raise awareness on AI and ethics she is working on a reflectional art series [#ArtAboutAI], and a game about emerging technology and ethics called Sapien2.0.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/80552/1700181119-KBKAST-Episode-13-Dr-Lydia-Kostopoulos.jpg"></itunes:image>
                                                                            <itunes:duration>00:39:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 12: Greg van der Gaast]]>
                </title>
                <pubDate>Mon, 25 Mar 2019 19:42:33 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/greg-van-der-gaast</guid>
                                    <link>https://kbkast.castos.com/episodes/greg-van-der-gaast</link>
                                <description>
                                            <![CDATA[<p>Greg is a 20+ year cyber veteran. Veteran may be an accurate term considering he’s been at war with the way the sector has worked for much of that time. From teenage hacker to covert government operator, to architect, manager, and head of security, he’s never accepted anything without understanding how the pieces fit together, without asking “why?”</p>
<p>The answers led him to realisations about the true root causes of issues and the fact that not only are they not even on most people’s radar, but that many of the industry’s solutions and approaches are counterproductive, requiring a new approach he’s been perfecting over the last decade. He’s on a mission to pull InfoSec away from dealing with symptoms and to start addressing the true origins of problems, dramatically boosting assurance while slashing costs and complexity.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Greg is a 20+ year cyber veteran. Veteran may be an accurate term considering he’s been at war with the way the sector has worked for much of that time. From teenage hacker to covert government operator, to architect, manager, and head of security, he’s never accepted anything without understanding how the pieces fit together, without asking “why?”
The answers led him to realisations about the true root causes of issues and the fact that not only are they not even on most people’s radar, but that many of the industry’s solutions and approaches are counterproductive, requiring a new approach he’s been perfecting over the last decade. He’s on a mission to pull InfoSec away from dealing with symptoms and to start addressing the true origins of problems, dramatically boosting assurance while slashing costs and complexity.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 12: Greg van der Gaast]]>
                </itunes:title>
                                    <itunes:episode>12</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Greg is a 20+ year cyber veteran. Veteran may be an accurate term considering he’s been at war with the way the sector has worked for much of that time. From teenage hacker to covert government operator, to architect, manager, and head of security, he’s never accepted anything without understanding how the pieces fit together, without asking “why?”</p>
<p>The answers led him to realisations about the true root causes of issues and the fact that not only are they not even on most people’s radar, but that many of the industry’s solutions and approaches are counterproductive, requiring a new approach he’s been perfecting over the last decade. He’s on a mission to pull InfoSec away from dealing with symptoms and to start addressing the true origins of problems, dramatically boosting assurance while slashing costs and complexity.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKast-Greg-van-der-Gaast.mp3" length="45736106"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Greg is a 20+ year cyber veteran. Veteran may be an accurate term considering he’s been at war with the way the sector has worked for much of that time. From teenage hacker to covert government operator, to architect, manager, and head of security, he’s never accepted anything without understanding how the pieces fit together, without asking “why?”
The answers led him to realisations about the true root causes of issues and the fact that not only are they not even on most people’s radar, but that many of the industry’s solutions and approaches are counterproductive, requiring a new approach he’s been perfecting over the last decade. He’s on a mission to pull InfoSec away from dealing with symptoms and to start addressing the true origins of problems, dramatically boosting assurance while slashing costs and complexity.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/75939/KBKAST-Episode-12-Greg-van-der-Sant-Copy.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:06</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 11: Dr Rebecca Wynn]]>
                </title>
                <pubDate>Tue, 12 Mar 2019 20:56:29 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/dr-rebecca-wynn</guid>
                                    <link>https://kbkast.castos.com/episodes/dr-rebecca-wynn</link>
                                <description>
                                            <![CDATA[<p>Named 2017 Cybersecurity Professional of the Year – Cybersecurity Excellence Awards, Chief Privacy Officer (CPO) SC Magazine, Global Privacy and Security by Design (GPSbyDesign) International Council Member, and finalist Women in Technology Business Role Model of the Year 2018; Dr. Rebecca Wynn is lauded as a “game-changer who is ten steps ahead in developing and enforcing cybersecurity and privacy best practices and policies.” She is a “big picture” thinker who brings nearly 20 years of experience in Information Security, Assurance &amp; Technology.</p>
<p>Recently, Rebecca led the information security, privacy, and compliance pre-acquisition, acquisition and post-acquisition of LearnVest, Inc. to Northwestern Mutual Life Insurance Company – a Fortune 100 company. She is well known for being a gifted polymath, having deep understanding of current cyber security challenges and privacy issues. She has a proven track record of taking companies to the next level of excellence in many sectors including government, financial services, fintech, healthcare, information technology, legal, semiconductors, and retail.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Named 2017 Cybersecurity Professional of the Year – Cybersecurity Excellence Awards, Chief Privacy Officer (CPO) SC Magazine, Global Privacy and Security by Design (GPSbyDesign) International Council Member, and finalist Women in Technology Business Role Model of the Year 2018; Dr. Rebecca Wynn is lauded as a “game-changer who is ten steps ahead in developing and enforcing cybersecurity and privacy best practices and policies.” She is a “big picture” thinker who brings nearly 20 years of experience in Information Security, Assurance & Technology.
Recently, Rebecca led the information security, privacy, and compliance pre-acquisition, acquisition and post-acquisition of LearnVest, Inc. to Northwestern Mutual Life Insurance Company – a Fortune 100 company. She is well known for being a gifted polymath, having deep understanding of current cyber security challenges and privacy issues. She has a proven track record of taking companies to the next level of excellence in many sectors including government, financial services, fintech, healthcare, information technology, legal, semiconductors, and retail.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 11: Dr Rebecca Wynn]]>
                </itunes:title>
                                    <itunes:episode>11</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Named 2017 Cybersecurity Professional of the Year – Cybersecurity Excellence Awards, Chief Privacy Officer (CPO) SC Magazine, Global Privacy and Security by Design (GPSbyDesign) International Council Member, and finalist Women in Technology Business Role Model of the Year 2018; Dr. Rebecca Wynn is lauded as a “game-changer who is ten steps ahead in developing and enforcing cybersecurity and privacy best practices and policies.” She is a “big picture” thinker who brings nearly 20 years of experience in Information Security, Assurance &amp; Technology.</p>
<p>Recently, Rebecca led the information security, privacy, and compliance pre-acquisition, acquisition and post-acquisition of LearnVest, Inc. to Northwestern Mutual Life Insurance Company – a Fortune 100 company. She is well known for being a gifted polymath, having deep understanding of current cyber security challenges and privacy issues. She has a proven track record of taking companies to the next level of excellence in many sectors including government, financial services, fintech, healthcare, information technology, legal, semiconductors, and retail.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Rebecca-Wynn-mixdown.mp3" length="52438146"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Named 2017 Cybersecurity Professional of the Year – Cybersecurity Excellence Awards, Chief Privacy Officer (CPO) SC Magazine, Global Privacy and Security by Design (GPSbyDesign) International Council Member, and finalist Women in Technology Business Role Model of the Year 2018; Dr. Rebecca Wynn is lauded as a “game-changer who is ten steps ahead in developing and enforcing cybersecurity and privacy best practices and policies.” She is a “big picture” thinker who brings nearly 20 years of experience in Information Security, Assurance & Technology.
Recently, Rebecca led the information security, privacy, and compliance pre-acquisition, acquisition and post-acquisition of LearnVest, Inc. to Northwestern Mutual Life Insurance Company – a Fortune 100 company. She is well known for being a gifted polymath, having deep understanding of current cyber security challenges and privacy issues. She has a proven track record of taking companies to the next level of excellence in many sectors including government, financial services, fintech, healthcare, information technology, legal, semiconductors, and retail.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/71693/1700181119-KBKAST-Episode-11-Dr-Rebecca-Wynn.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 10: Jasun Tate]]>
                </title>
                <pubDate>Mon, 11 Feb 2019 21:06:28 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-10-jasun-tate</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-10-jasun-tate</link>
                                <description>
                                            <![CDATA[<p>Jasun Tate is a career Cyber Intelligence professional with over 21 years experience in the US Intelligence and Cyber Operations Community. Having worked in some of the most critical and sensitive operations for the US Government at Home and Abroad his unique perspective on the reality of the Cyber threat is unique in and of itself. After serving with the US Navy, National Geospatial-Intelligence Agency and Army Research Laboratories Jasun left the classified field of operations and traded it in for distinguished positions with a few Fortune 100 companies as the Public Sector Business Information Security Officer for the largest Data Broker and Credit Agency in the world Experian.</p>
<p>After seeing the disparity between the Cyber Intelligence capabilities in contrast to the security capabilities of the world today he started a unique and agile boutique firm named <a href="https://bitsdigits.news/">bits&amp;digits</a>. Initially developed as a Cyber Solutions and Development consulting firm, it has since matured into one of the worlds most bespoken Crisis Mitigation and Information Awareness outfits today.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jasun Tate is a career Cyber Intelligence professional with over 21 years experience in the US Intelligence and Cyber Operations Community. Having worked in some of the most critical and sensitive operations for the US Government at Home and Abroad his unique perspective on the reality of the Cyber threat is unique in and of itself. After serving with the US Navy, National Geospatial-Intelligence Agency and Army Research Laboratories Jasun left the classified field of operations and traded it in for distinguished positions with a few Fortune 100 companies as the Public Sector Business Information Security Officer for the largest Data Broker and Credit Agency in the world Experian.
After seeing the disparity between the Cyber Intelligence capabilities in contrast to the security capabilities of the world today he started a unique and agile boutique firm named bits&digits. Initially developed as a Cyber Solutions and Development consulting firm, it has since matured into one of the worlds most bespoken Crisis Mitigation and Information Awareness outfits today.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 10: Jasun Tate]]>
                </itunes:title>
                                    <itunes:episode>10</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jasun Tate is a career Cyber Intelligence professional with over 21 years experience in the US Intelligence and Cyber Operations Community. Having worked in some of the most critical and sensitive operations for the US Government at Home and Abroad his unique perspective on the reality of the Cyber threat is unique in and of itself. After serving with the US Navy, National Geospatial-Intelligence Agency and Army Research Laboratories Jasun left the classified field of operations and traded it in for distinguished positions with a few Fortune 100 companies as the Public Sector Business Information Security Officer for the largest Data Broker and Credit Agency in the world Experian.</p>
<p>After seeing the disparity between the Cyber Intelligence capabilities in contrast to the security capabilities of the world today he started a unique and agile boutique firm named <a href="https://bitsdigits.news/">bits&amp;digits</a>. Initially developed as a Cyber Solutions and Development consulting firm, it has since matured into one of the worlds most bespoken Crisis Mitigation and Information Awareness outfits today.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Jasun-Tate-mixdown.mp3" length="27685832"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jasun Tate is a career Cyber Intelligence professional with over 21 years experience in the US Intelligence and Cyber Operations Community. Having worked in some of the most critical and sensitive operations for the US Government at Home and Abroad his unique perspective on the reality of the Cyber threat is unique in and of itself. After serving with the US Navy, National Geospatial-Intelligence Agency and Army Research Laboratories Jasun left the classified field of operations and traded it in for distinguished positions with a few Fortune 100 companies as the Public Sector Business Information Security Officer for the largest Data Broker and Credit Agency in the world Experian.
After seeing the disparity between the Cyber Intelligence capabilities in contrast to the security capabilities of the world today he started a unique and agile boutique firm named bits&digits. Initially developed as a Cyber Solutions and Development consulting firm, it has since matured into one of the worlds most bespoken Crisis Mitigation and Information Awareness outfits today.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/62399/KBKAST-Episode-10-Jasun-Tate.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:23</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 9: Andrew Bycroft]]>
                </title>
                <pubDate>Wed, 06 Feb 2019 11:12:00 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-9-andrew-bycroft</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-9-andrew-bycroft</link>
                                <description>
                                            <![CDATA[<p>After 18 years of working in cybersecurity he realised most of the solutions being implemented were falling short. With four years of extensive research, he found the real reason why cybercrime was so prevalent was mostly due to a lack of knowledge at the CEO and Director level.</p>
<p>In 2018, Andrew co-founded the International Cyber Resilience Institute, with the goal of educating CEOs and Directors about cybercrime. The company now offers advice to executives around the globe covering cybersecurity, including risk mitigation and how to properly handle a security breach.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[After 18 years of working in cybersecurity he realised most of the solutions being implemented were falling short. With four years of extensive research, he found the real reason why cybercrime was so prevalent was mostly due to a lack of knowledge at the CEO and Director level.
In 2018, Andrew co-founded the International Cyber Resilience Institute, with the goal of educating CEOs and Directors about cybercrime. The company now offers advice to executives around the globe covering cybersecurity, including risk mitigation and how to properly handle a security breach.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 9: Andrew Bycroft]]>
                </itunes:title>
                                    <itunes:episode>9</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>After 18 years of working in cybersecurity he realised most of the solutions being implemented were falling short. With four years of extensive research, he found the real reason why cybercrime was so prevalent was mostly due to a lack of knowledge at the CEO and Director level.</p>
<p>In 2018, Andrew co-founded the International Cyber Resilience Institute, with the goal of educating CEOs and Directors about cybercrime. The company now offers advice to executives around the globe covering cybersecurity, including risk mitigation and how to properly handle a security breach.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Andrew-Bycroft.mp3" length="17747445"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[After 18 years of working in cybersecurity he realised most of the solutions being implemented were falling short. With four years of extensive research, he found the real reason why cybercrime was so prevalent was mostly due to a lack of knowledge at the CEO and Director level.
In 2018, Andrew co-founded the International Cyber Resilience Institute, with the goal of educating CEOs and Directors about cybercrime. The company now offers advice to executives around the globe covering cybersecurity, including risk mitigation and how to properly handle a security breach.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/61139/1700181119-KBKAST-Episode-09-Andrew-Bycroft.jpg"></itunes:image>
                                                                            <itunes:duration>00:24:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 8: Scott Fletcher]]>
                </title>
                <pubDate>Tue, 29 Jan 2019 18:10:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-8-scott-fletcher</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-8-scott-fletcher</link>
                                <description>
                                            <![CDATA[<p>Scott Fletcher is a Solutions Architect and Security Researcher at RedShield Security. Scott’s background includes Penetration Testing, Software Development, and Security Consulting. Previously he was Principal Consultant at Aura Information Security and worked for a number of enterprise and financial services organisations.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Scott Fletcher is a Solutions Architect and Security Researcher at RedShield Security. Scott’s background includes Penetration Testing, Software Development, and Security Consulting. Previously he was Principal Consultant at Aura Information Security and worked for a number of enterprise and financial services organisations.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 8: Scott Fletcher]]>
                </itunes:title>
                                    <itunes:episode>8</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Scott Fletcher is a Solutions Architect and Security Researcher at RedShield Security. Scott’s background includes Penetration Testing, Software Development, and Security Consulting. Previously he was Principal Consultant at Aura Information Security and worked for a number of enterprise and financial services organisations.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Scott-F-mixdown-FIN-Mono.mp3" length="22391821"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Scott Fletcher is a Solutions Architect and Security Researcher at RedShield Security. Scott’s background includes Penetration Testing, Software Development, and Security Consulting. Previously he was Principal Consultant at Aura Information Security and worked for a number of enterprise and financial services organisations.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/59891/KBKAST-Episode-08-Scott-Fletcher-1.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 7: Jenny Radcliffe]]>
                </title>
                <pubDate>Fri, 14 Dec 2018 17:24:16 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-7-jenny-radcliffe</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-7-jenny-radcliffe</link>
                                <description>
                                            <![CDATA[<p>Jenny speaks, consults and trains people in the skills of ‘people hacking’ and explains how “Social Engineering” using psychological methods can be a huge threat to organisations of all sizes. She reveals how that same knowledge is a valuable tool for security professionals of all types in the prevention of these attacks, scams and cons of all kinds.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Jenny speaks, consults and trains people in the skills of ‘people hacking’ and explains how “Social Engineering” using psychological methods can be a huge threat to organisations of all sizes. She reveals how that same knowledge is a valuable tool for security professionals of all types in the prevention of these attacks, scams and cons of all kinds.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 7: Jenny Radcliffe]]>
                </itunes:title>
                                    <itunes:episode>7</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Jenny speaks, consults and trains people in the skills of ‘people hacking’ and explains how “Social Engineering” using psychological methods can be a huge threat to organisations of all sizes. She reveals how that same knowledge is a valuable tool for security professionals of all types in the prevention of these attacks, scams and cons of all kinds.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-Episode-7-Jenny-Radcliffe.mp3" length="29135392"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Jenny speaks, consults and trains people in the skills of ‘people hacking’ and explains how “Social Engineering” using psychological methods can be a huge threat to organisations of all sizes. She reveals how that same knowledge is a valuable tool for security professionals of all types in the prevention of these attacks, scams and cons of all kinds.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/54218/1700181120-KBKAST-Episode-07-Jenny-Radcliffe.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 6: Eric Flis]]>
                </title>
                <pubDate>Thu, 22 Nov 2018 23:50:24 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-6-eric-flis</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-6-eric-flis</link>
                                <description>
                                            <![CDATA[<p>Eric Flis is the Co-Founder and COO of Worldstack, an Open Source Intelligence (OSINT) company that has created solutions to distil insights from the oceans of data that surround our modern existence. With a background in security, counter-terrorism, and policing, Eric has experiences firmly rooted in the physical world, not just the virtual. This pragmatic experience has fuelled an equally practical approach to new digital intelligence methods.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Eric Flis is the Co-Founder and COO of Worldstack, an Open Source Intelligence (OSINT) company that has created solutions to distil insights from the oceans of data that surround our modern existence. With a background in security, counter-terrorism, and policing, Eric has experiences firmly rooted in the physical world, not just the virtual. This pragmatic experience has fuelled an equally practical approach to new digital intelligence methods.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 6: Eric Flis]]>
                </itunes:title>
                                    <itunes:episode>6</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Eric Flis is the Co-Founder and COO of Worldstack, an Open Source Intelligence (OSINT) company that has created solutions to distil insights from the oceans of data that surround our modern existence. With a background in security, counter-terrorism, and policing, Eric has experiences firmly rooted in the physical world, not just the virtual. This pragmatic experience has fuelled an equally practical approach to new digital intelligence methods.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Ep6-Eric-Flis.mp3" length="22395441"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Eric Flis is the Co-Founder and COO of Worldstack, an Open Source Intelligence (OSINT) company that has created solutions to distil insights from the oceans of data that surround our modern existence. With a background in security, counter-terrorism, and policing, Eric has experiences firmly rooted in the physical world, not just the virtual. This pragmatic experience has fuelled an equally practical approach to new digital intelligence methods.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/50998/KBKAST-Episode-06-Eric-Flis.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 5: Steve McLaughlin]]>
                </title>
                <pubDate>Wed, 21 Nov 2018 23:36:31 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-5-steve-mclaughlin</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-5-steve-mclaughlin</link>
                                <description>
                                            <![CDATA[<p>Steve McLaughlin is a security specialist based in Sydney, Australia. His record as a subject matter expert, particularly in the realm of pentesting, supports his growing and successful presence online.</p>
<p>Steve and his company, Core Sentinel, provide detailed security technical assessments in a digestible and actionable manner to their clients, and led by Steve’s dedicated approach to continual education, are always evolving.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Steve McLaughlin is a security specialist based in Sydney, Australia. His record as a subject matter expert, particularly in the realm of pentesting, supports his growing and successful presence online.
Steve and his company, Core Sentinel, provide detailed security technical assessments in a digestible and actionable manner to their clients, and led by Steve’s dedicated approach to continual education, are always evolving.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 5: Steve McLaughlin]]>
                </itunes:title>
                                    <itunes:episode>5</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Steve McLaughlin is a security specialist based in Sydney, Australia. His record as a subject matter expert, particularly in the realm of pentesting, supports his growing and successful presence online.</p>
<p>Steve and his company, Core Sentinel, provide detailed security technical assessments in a digestible and actionable manner to their clients, and led by Steve’s dedicated approach to continual education, are always evolving.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Steve-M-FINAL.mp3" length="29227385"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Steve McLaughlin is a security specialist based in Sydney, Australia. His record as a subject matter expert, particularly in the realm of pentesting, supports his growing and successful presence online.
Steve and his company, Core Sentinel, provide detailed security technical assessments in a digestible and actionable manner to their clients, and led by Steve’s dedicated approach to continual education, are always evolving.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/50988/1700181120-KBKAST-Episode-05-Steve-McLaughlin.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:32</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 4: Gabriel Gomez]]>
                </title>
                <pubDate>Tue, 25 Sep 2018 20:55:48 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-4-gabriel-gomez</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-4-gabriel-gomez</link>
                                <description>
                                            <![CDATA[<p>Gabriel Gomez II is an IT Professional with a demonstrated record of achievement at overseeing all facets of the project life-cycle. Outstanding communication skills with the ability to build strong working relationships and to communicate with technical and non-technical audiences at all levels of the organisation. Gabriel is dedicated to life-long learning, and has a passion for building high performing teams.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Gabriel Gomez II is an IT Professional with a demonstrated record of achievement at overseeing all facets of the project life-cycle. Outstanding communication skills with the ability to build strong working relationships and to communicate with technical and non-technical audiences at all levels of the organisation. Gabriel is dedicated to life-long learning, and has a passion for building high performing teams.
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 4: Gabriel Gomez]]>
                </itunes:title>
                                    <itunes:episode>4</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>Gabriel Gomez II is an IT Professional with a demonstrated record of achievement at overseeing all facets of the project life-cycle. Outstanding communication skills with the ability to build strong working relationships and to communicate with technical and non-technical audiences at all levels of the organisation. Gabriel is dedicated to life-long learning, and has a passion for building high performing teams.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/Gabriel-Gomez-Mixdown.mp3" length="23628399"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Gabriel Gomez II is an IT Professional with a demonstrated record of achievement at overseeing all facets of the project life-cycle. Outstanding communication skills with the ability to build strong working relationships and to communicate with technical and non-technical audiences at all levels of the organisation. Gabriel is dedicated to life-long learning, and has a passion for building high performing teams.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/43345/KBKAST-Episode-04-Gabriel-Gomez.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:47</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 3: Alec Fry]]>
                </title>
                <pubDate>Thu, 12 Apr 2018 00:40:22 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-3-alec-fry-kbkast</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-3-alec-fry-kbkast</link>
                                <description>
                                            <![CDATA[<p>We were joined by Alec Fry for this episode – a man that knows more about Identity &amp; Access Management than anyone probably should! He is a subject matter expert across various modes of authentication, and it was great to pull apart many of the challenges and ideas that security – particularly IAM – is trying to tackle today in the wake of personal privacy spilling into the wider public realm.</p>
<p><span style="color:#000000;"><a style="color:#000000;" href="https://www.museumoffailure.se">The Museum of Failure</a></span></p>
<p> </p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[We were joined by Alec Fry for this episode – a man that knows more about Identity & Access Management than anyone probably should! He is a subject matter expert across various modes of authentication, and it was great to pull apart many of the challenges and ideas that security – particularly IAM – is trying to tackle today in the wake of personal privacy spilling into the wider public realm.
The Museum of Failure
 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 3: Alec Fry]]>
                </itunes:title>
                                    <itunes:episode>3</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>We were joined by Alec Fry for this episode – a man that knows more about Identity &amp; Access Management than anyone probably should! He is a subject matter expert across various modes of authentication, and it was great to pull apart many of the challenges and ideas that security – particularly IAM – is trying to tackle today in the wake of personal privacy spilling into the wider public realm.</p>
<p><span style="color:#000000;"><a style="color:#000000;" href="https://www.museumoffailure.se">The Museum of Failure</a></span></p>
<p> </p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/AlecFry-KBKAST-ep3-audio-01.mp3" length="19874156"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[We were joined by Alec Fry for this episode – a man that knows more about Identity & Access Management than anyone probably should! He is a subject matter expert across various modes of authentication, and it was great to pull apart many of the challenges and ideas that security – particularly IAM – is trying to tackle today in the wake of personal privacy spilling into the wider public realm.
The Museum of Failure
 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/24691/1700181121-KBKAST-Episode-03-Alec-Fry.jpg"></itunes:image>
                                                                            <itunes:duration>00:27:35</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 2: Dominic Vogel]]>
                </title>
                <pubDate>Wed, 11 Apr 2018 23:44:23 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598695</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-2-dominic-vogel</link>
                                <description>
                                            <![CDATA[<p> </p>
<p>We had a rewarding chat with Dominc Vogel – a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[ 
We had a rewarding chat with Dominc Vogel – a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 2: Dominic Vogel]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p> </p>
<p>We had a rewarding chat with Dominc Vogel – a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598695/KBKAST-DOMINIC-VOGEL.mp3" length="46221488"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[ 
We had a rewarding chat with Dominc Vogel – a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598695/1700181121-KBKast-Dominic-Vogel.png"></itunes:image>
                                                                            <itunes:duration>00:32:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 2: Dominic Vogel]]>
                </title>
                <pubDate>Wed, 11 Apr 2018 13:44:23 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-2-dominic-vogel</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-2-dominic-vogel</link>
                                <description>
                                            <![CDATA[We had a rewarding chat with Dominc Vogel - a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[We had a rewarding chat with Dominc Vogel - a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 2: Dominic Vogel]]>
                </itunes:title>
                                    <itunes:episode>2</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[We had a rewarding chat with Dominc Vogel - a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-DOMINIC-VOGEL.mp3" length="46221488"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[We had a rewarding chat with Dominc Vogel - a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/24669/KBKAST-Episode-02-Dom-Vogel.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 1: Duncan McAlynn]]>
                </title>
                <pubDate>Tue, 10 Apr 2018 00:27:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/929/episode/1598696</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-1-duncan-mcalynn</link>
                                <description>
                                            <![CDATA[<p>We spoke with Duncan this week; a veteran with more than 20 years’ experience in cyber security, systems management, and solutions architecture. He’s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[We spoke with Duncan this week; a veteran with more than 20 years’ experience in cyber security, systems management, and solutions architecture. He’s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 1: Duncan McAlynn]]>
                </itunes:title>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>We spoke with Duncan this week; a veteran with more than 20 years’ experience in cyber security, systems management, and solutions architecture. He’s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/1598696/KBKAST-DUNCAN-MCALYNN2.mp3" length="47102343"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[We spoke with Duncan this week; a veteran with more than 20 years’ experience in cyber security, systems management, and solutions architecture. He’s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/images/1598696/1700181121-KBKAST-Episode-01-Duncan-McAlynn.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 1: Duncan McAlynn]]>
                </title>
                <pubDate>Mon, 09 Apr 2018 14:27:18 +0000</pubDate>
                <dc:creator>KBI.Media</dc:creator>
                <guid isPermaLink="true">
                    https://kbkast.castos.com/podcasts/929/episodes/episode-1-duncan-mcalynn</guid>
                                    <link>https://kbkast.castos.com/episodes/episode-1-duncan-mcalynn</link>
                                <description>
                                            <![CDATA[<p>We spoke with Duncan this week; a veteran with more than 20 years’ experience in cyber security, systems management, and solutions architecture. He’s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.</p>
]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[We spoke with Duncan this week; a veteran with more than 20 years’ experience in cyber security, systems management, and solutions architecture. He’s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.
]]>
                </itunes:subtitle>
                                <itunes:title>
                    <![CDATA[Episode 1: Duncan McAlynn]]>
                </itunes:title>
                                    <itunes:episode>1</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p>We spoke with Duncan this week; a veteran with more than 20 years’ experience in cyber security, systems management, and solutions architecture. He’s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.</p>
]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/kbkast/KBKAST-DUNCAN-MCALYNN2.mp3" length="47102343"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[We spoke with Duncan this week; a veteran with more than 20 years’ experience in cyber security, systems management, and solutions architecture. He’s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/kbkast/1100e0d7-91ec-4656-8275-ed2af14c5e78-KBKAST-Episode-01-Duncan-McAlynn.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[KBI.Media]]>
                </itunes:author>
                            </item>
            </channel>
</rss>
